Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (2): 545-551.DOI: 10.11772/j.issn.1001-9081.2021122107
Special Issue: 前沿与综合应用
• Frontier and comprehensive applications • Previous Articles Next Articles
Wanli SHEN, Yujin ZHANG(), Wan HU
Received:
2021-12-13
Revised:
2022-03-08
Accepted:
2022-03-15
Online:
2023-02-08
Published:
2023-02-10
Contact:
Yujin ZHANG
About author:
SHEN Wanli, born in 1997, M. S. candidate. His research interests include image processing, deep learning, image inpainting forensics.Supported by:
通讯作者:
张玉金
作者简介:
沈万里(1997—),男,上海人,硕士研究生,CCF会员,主要研究方向:图像处理、深度学习、图像修复取证基金资助:
CLC Number:
Wanli SHEN, Yujin ZHANG, Wan HU. U-shaped feature pyramid network for image inpainting forensics[J]. Journal of Computer Applications, 2023, 43(2): 545-551.
沈万里, 张玉金, 胡万. 面向图像修复取证的U型特征金字塔网络[J]. 《计算机应用》唯一官方网站, 2023, 43(2): 545-551.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021122107
Input | Operator | Filter | Channel |
---|---|---|---|
M×N×3 | Conv1-1 | 3×3 | 64 |
M×N×64 | Conv1-2 | 3×3 | 64 |
M×N×64 | Max-pooling | 2×2 | 128 |
M×N×128 | Conv2-1 | 3×3 | 128 |
M×N×128 | Conv2-2 | 3×3 | 128 |
M×N×128 | Max-pooling | 2×2 | 256 |
M×N×256 | Conv3-1 | 3×3 | 256 |
M×N×256 | Conv3-2 | 3×3 | 256 |
M×N×256 | Conv3-3 | 3×3 | 256 |
M×N×256 | Max-pooling | 2×2 | 512 |
M×N×512 | Conv4-1 | 3×3 | 512 |
M×N×512 | Conv4-2 | 3×3 | 512 |
M×N×512 | Conv4-3 | 3×3 | 512 |
M×N×512 | Max-pooling | 2×2 | 512 |
M×N×512 | Conv5-1 | 3×3 | 512 |
M×N×512 | Conv5-2 | 3×3 | 512 |
M×N×512 | Conv5-3 | 3×3 | 512 |
Tab. 1 Structure of VGG16 feature extraction module
Input | Operator | Filter | Channel |
---|---|---|---|
M×N×3 | Conv1-1 | 3×3 | 64 |
M×N×64 | Conv1-2 | 3×3 | 64 |
M×N×64 | Max-pooling | 2×2 | 128 |
M×N×128 | Conv2-1 | 3×3 | 128 |
M×N×128 | Conv2-2 | 3×3 | 128 |
M×N×128 | Max-pooling | 2×2 | 256 |
M×N×256 | Conv3-1 | 3×3 | 256 |
M×N×256 | Conv3-2 | 3×3 | 256 |
M×N×256 | Conv3-3 | 3×3 | 256 |
M×N×256 | Max-pooling | 2×2 | 512 |
M×N×512 | Conv4-1 | 3×3 | 512 |
M×N×512 | Conv4-2 | 3×3 | 512 |
M×N×512 | Conv4-3 | 3×3 | 512 |
M×N×512 | Max-pooling | 2×2 | 512 |
M×N×512 | Conv5-1 | 3×3 | 512 |
M×N×512 | Conv5-2 | 3×3 | 512 |
M×N×512 | Conv5-3 | 3×3 | 512 |
实验 | Recall | Precision | IoU | F1 |
---|---|---|---|---|
场景1 | 82.22 | 92.16 | 76.63 | 84.54 |
场景2 | 82.71 | 95.17 | 79.42 | 86.60 |
场景3 | 96.18 | 87.88 | 84.92 | 91.84 |
场景4 | 99.17 | 94.78 | 94.03 | 96.92 |
Tab. 2 Localization results obtained by different variants of the proposed method
实验 | Recall | Precision | IoU | F1 |
---|---|---|---|---|
场景1 | 82.22 | 92.16 | 76.63 | 84.54 |
场景2 | 82.71 | 95.17 | 79.42 | 86.60 |
场景3 | 96.18 | 87.88 | 84.92 | 91.84 |
场景4 | 99.17 | 94.78 | 94.03 | 96.92 |
数据集 | LDI | Patch-CNN | HP-FCN | 本文方法 | ||||
---|---|---|---|---|---|---|---|---|
F1 | IoU | F1 | IoU | F1 | IoU | F1 | IoU | |
平均 | 41.65 | 33.60 | 57.17 | 41.95 | 66.94 | 59.22 | 79.19 | 74.72 |
GC | 58.56 | 46.35 | 56.08 | 49.48 | 76.93 | 72.15 | 80.69 | 78.15 |
CA | 39.43 | 23.12 | 58.37 | 41.22 | 52.38 | 44.58 | 80.05 | 78.29 |
SH | 39.24 | 26.13 | 65.86 | 49.10 | 71.43 | 62.85 | 78.94 | 76.01 |
LB | 48.46 | 37.27 | 49.56 | 32.94 | 68.57 | 60.10 | 78.17 | 70.95 |
RN | 51.14 | 39.33 | 54.40 | 37.36 | 65.78 | 57.12 | 79.15 | 74.09 |
EC | 43.91 | 29.42 | 58.76 | 41.61 | 66.58 | 58.48 | 77.67 | 70.83 |
Tab.3 Comparison of F1-score and IoU values on six datasets when quality factor is 96
数据集 | LDI | Patch-CNN | HP-FCN | 本文方法 | ||||
---|---|---|---|---|---|---|---|---|
F1 | IoU | F1 | IoU | F1 | IoU | F1 | IoU | |
平均 | 41.65 | 33.60 | 57.17 | 41.95 | 66.94 | 59.22 | 79.19 | 74.72 |
GC | 58.56 | 46.35 | 56.08 | 49.48 | 76.93 | 72.15 | 80.69 | 78.15 |
CA | 39.43 | 23.12 | 58.37 | 41.22 | 52.38 | 44.58 | 80.05 | 78.29 |
SH | 39.24 | 26.13 | 65.86 | 49.10 | 71.43 | 62.85 | 78.94 | 76.01 |
LB | 48.46 | 37.27 | 49.56 | 32.94 | 68.57 | 60.10 | 78.17 | 70.95 |
RN | 51.14 | 39.33 | 54.40 | 37.36 | 65.78 | 57.12 | 79.15 | 74.09 |
EC | 43.91 | 29.42 | 58.76 | 41.61 | 66.58 | 58.48 | 77.67 | 70.83 |
方法 | LDI | Patch-CNN | HP-FCN | 本文方法 |
---|---|---|---|---|
平均 | 8.67 | 13.51 | 28.53 | 77.34 |
GC | 15.29 | 19.02 | 30.66 | 78.29 |
CA | 2.30 | 14.17 | 26.81 | 79.13 |
SH | 6.26 | 5.01 | 34.17 | 75.74 |
LB | 10.39 | 6.35 | 29.39 | 77.01 |
RN | 14.17 | 15.09 | 25.16 | 76.90 |
EC | 3.62 | 21.44 | 25.00 | 76.98 |
Tab. 4 Comparison of F1-score on six datasets when quality factor is 85
方法 | LDI | Patch-CNN | HP-FCN | 本文方法 |
---|---|---|---|---|
平均 | 8.67 | 13.51 | 28.53 | 77.34 |
GC | 15.29 | 19.02 | 30.66 | 78.29 |
CA | 2.30 | 14.17 | 26.81 | 79.13 |
SH | 6.26 | 5.01 | 34.17 | 75.74 |
LB | 10.39 | 6.35 | 29.39 | 77.01 |
RN | 14.17 | 15.09 | 25.16 | 76.90 |
EC | 3.62 | 21.44 | 25.00 | 76.98 |
方法 | LDI | Patch-CNN | HP-FCN | 本文方法 |
---|---|---|---|---|
平均 | 0.51 | 8.88 | 24.62 | 72.72 |
GC | 0.04 | 10.23 | 27.10 | 76.54 |
CA | 0.22 | 3.87 | 22.08 | 74.65 |
SH | 0.38 | 6.20 | 30.43 | 69.73 |
LB | 0.05 | 6.89 | 28.57 | 70.58 |
RN | 1.98 | 9.42 | 18.52 | 68.13 |
EC | 0.42 | 16.69 | 21.06 | 76.68 |
Tab.5 Comparison of F1-score on six datasets when quality factor is 75
方法 | LDI | Patch-CNN | HP-FCN | 本文方法 |
---|---|---|---|---|
平均 | 0.51 | 8.88 | 24.62 | 72.72 |
GC | 0.04 | 10.23 | 27.10 | 76.54 |
CA | 0.22 | 3.87 | 22.08 | 74.65 |
SH | 0.38 | 6.20 | 30.43 | 69.73 |
LB | 0.05 | 6.89 | 28.57 | 70.58 |
RN | 1.98 | 9.42 | 18.52 | 68.13 |
EC | 0.42 | 16.69 | 21.06 | 76.68 |
方法 | 平均运行时间 | 方法 | 平均运行时间 |
---|---|---|---|
LDI | 30.7 | HP-FCN | 0.049 |
Patch-CNN | 1.9 | 本文方法 | 0.032 |
Tab. 6 Average running times of different methods
方法 | 平均运行时间 | 方法 | 平均运行时间 |
---|---|---|---|
LDI | 30.7 | HP-FCN | 0.049 |
Patch-CNN | 1.9 | 本文方法 | 0.032 |
1 | ZHANG Y L, DING F, KWONG S, et al. Feature pyramid network for diffusion-based image inpainting detection[J]. Information Sciences, 2021, 572: 29-42. 10.1016/j.ins.2021.04.042 |
2 | 冯浪,张玲,张晓龙. 基于扩张卷积的图像修复[J]. 计算机应用, 2020, 40(3):825-831. 10.11772/j.issn.1001-9081.2019081471 |
FENG L, ZHANG L, ZHANG X L. Image inpainting based on dilated convolution[J]. Journal of Computer Applications, 2020, 40(3):825-831. 10.11772/j.issn.1001-9081.2019081471 | |
3 | ELHARROUSS O, ALMAADEED N, AL-MAADEED S, et al. Image inpainting: a review[J]. Neural Processing Letters, 2020, 51(2): 2007-2028. 10.1007/s11063-019-10163-0 |
4 | 刘婷婷,张玉金,吴飞,等. 基于梯度域导向滤波增强的图像扩散修复取证[J]. 激光与光电子学进展, 2020, 57(8):43-50. 10.3788/lop57.081003 |
LIU T T, ZHANG Y J, WU F, et al. Diffusion-based image inpainting forensics via gradient domain guided filtering enhancement[J]. Laser and Optoelectronics Progress, 2020, 57(8):43-50. 10.3788/lop57.081003 | |
5 | LI H D, LUO W Q, HUANG J W. Localization of diffusion-based inpainting in digital images[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(12): 3050-3064. 10.1109/tifs.2017.2730822 |
6 | ZHU X S, QIAN Y J, ZHAO X F, et al. A deep learning approach to patch-based image inpainting forensics[J]. Signal Processing: Image Communication, 2018, 67: 90-99. 10.1016/j.image.2018.05.015 |
7 | KUMAR N, MEENPAL T. Semantic segmentation-based image inpainting detection[M]// FAVORSKAYA M N, MEKHILEF S, PANDEY R K, et al. Innovations in Electrical and Electronic Engineering, LNEE 661. Singapore: Springer, 2021: 665-677. 10.1007/978-981-15-4692-1_51 |
8 | ZHU X S, QIAN Y J, ZHAO X F, et al. A deep learning approach to patch-based image inpainting forensics[J]. Signal Processing: Image Communication, 2018, 67: 90-99. 10.1016/j.image.2018.05.015 |
9 | WU Y, ABDALMAGEED W, NATARAJAN P. ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 9535-9544. 10.1109/cvpr.2019.00977 |
10 | LI H D, HUANG J W. Localization of deep inpainting using high-pass fully convolutional network[C]// Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision. Piscataway: IEEE, 2019: 8300-8309. 10.1109/iccv.2019.00839 |
11 | GE S M, LI C Y, ZHAO S W, et al. Occluded face recognition in the wild by identity-diversity inpainting[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(10): 3387-3397. 10.1109/tcsvt.2020.2967754 |
12 | SIMONYAN K, ZISSERMAN A. Very deep convolutional networks for large-scale image recognition[EB/OL]. (2015-04-10) [2021-12-12].. |
13 | LIN T Y, DOLLÁR P, GIRSHICK R, et al. Feature pyramid networks for object detection[C]// Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2017: 936-944. 10.1109/cvpr.2017.106 |
14 | BOCHKOVSKIY A, WANG C Y, LIAO H Y M. YOLOv4: optimal speed and accuracy of object detection[EB/OL]. (2020-04-23) [2022-02-26].. |
15 | 朱新山,钱永军,孙彪,等. 基于深度神经网络的图像修复取证算法[J]. 光学学报, 2018, 38(11): No.1110005. 10.3788/aos201838.1110005 |
ZHU X S, QIAN Y J, SUN B, et al. Image inpainting forensics algorithm based on deep neural network[J]. Acta Optica Sinica, 2018, 38(11): No.1110005. 10.3788/aos201838.1110005 | |
16 | YU J, LIN Z, YANG J, et al. Generative image inpainting with contextual attention[C]// Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2018: 5505-5514. 10.1109/cvpr.2018.00577 |
17 | WU H W, ZHOU J T. GIID-Net: generalizable image inpainting detection via neural architecture search and attention[EB/OL]. (2021-01-29)[2022-02-26].. 10.1109/icip42928.2021.9506778 |
18 | YAN Z Y, LI X M, LI M, et al. Shift-Net: image inpainting via deep feature rearrangement[C]// Proceedings of the 2018 European Conference on Computer Vision, LNCS 11218. Cham: Springer, 2018: 3-19. |
19 | DENG J, DONG W, SOCHER R, et al. ImageNet: a large-scale hierarchical image database[C]// Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2009:248-255. 10.1109/cvpr.2009.5206848 |
20 | IIZUKA S, SIMO-SERRA E, ISHIKAWA H. Globally and locally consistent image completion[J]. ACM Transactions on Graphics, 2017, 36(4): No.107. 10.1145/3072959.3073659 |
21 | WU H W, ZHOU J T, LI Y M. Deep generative model for image inpainting with local binary pattern learning and spatial attention[J]. IEEE Transactions on Multimedia, 2022, 24: 4016-4027. 10.1109/tmm.2021.3111491 |
22 | YU T, GUO Z Y, JIN X, et al. Region normalization for image inpainting[C]// Proceedings of the 34th AAAI Conference on Artificial Intelligence. Palo Alto, CA: AAAI Press, 2020: 12733-12740. 10.1609/aaai.v34i07.6967 |
23 | NAZERI K, NG E, JOSEPH T, et al. EdgeConnect: generative image inpainting with adversarial edge learning[EB/OL]. (2019-01-11) [2022-02-26].. 10.1109/iccvw.2019.00408 |
[1] | Zhangjian JI, Ming ZHANG, Zilong WANG. High-precision object detection algorithm based on improved VarifocalNet [J]. Journal of Computer Applications, 2023, 43(7): 2147-2154. |
[2] | Yuanyuan QIN, Hong ZHANG. Pulmonary nodule detection algorithm based on attention feature pyramid networks [J]. Journal of Computer Applications, 2023, 43(7): 2311-2318. |
[3] | Lihua SHEN, Bo LI. Super-resolution reconstruction of lung CT images based on feature pyramid network and dense network [J]. Journal of Computer Applications, 2023, 43(5): 1612-1619. |
[4] | GUO Zihao, DONG Lele, QU Zhijian. Arthropod object detection method based on improved Faster RCNN [J]. Journal of Computer Applications, 2023, 43(1): 88-97. |
[5] | Nan XIANG, Chuanzhong PAN, Gaoxiang YU. Object detection algorithm combined with optimized feature extraction structure [J]. Journal of Computer Applications, 2022, 42(11): 3558-3563. |
[6] | LUO Hui, JIA Chen, LU Chunyu, LI Jian. Rail tread block defects detection method based on improved Faster R-CNN [J]. Journal of Computer Applications, 2021, 41(3): 904-910. |
[7] | GAO Zhiyong, HUANG Jinzhen, DU Chenggang. Pulmonary nodule detection based on feature pyramid networks [J]. Journal of Computer Applications, 2020, 40(9): 2571-2576. |
[8] | YIN Li, LIN Xinqi, CHEN Lifei. Moving object removal forgery detection algorithm in video frame [J]. Journal of Computer Applications, 2018, 38(3): 879-883. |
[9] | YANG Fan, YAN Diqun, XU Hongwei, WANG Rangding, JIN Chao, XIANG Li. Tampering detection algorithm based on noise consistency for digital voice heterologous splicing [J]. Journal of Computer Applications, 2017, 37(12): 3452-3457. |
[10] | LIN Jing, HUANG Tianqiang, LAI Yueicong, LU Henan. Detection of continuously and repeated copy-move forgery to single frame in videos by quantized DCT coefficients [J]. Journal of Computer Applications, 2016, 36(5): 1356-1361. |
[11] | LIU Yi LIU Yongben. Image resampling tampering detection based on further resampling [J]. Journal of Computer Applications, 2014, 34(3): 815-819. |
[12] | CHEN Zong-ming ZHOU Zhi-ping. Source camera identification using Noise variance and texture complexity analysis [J]. Journal of Computer Applications, 2012, 32(06): 1563-1566. |
[13] | CHEN Zong-ming ZHOU Zhi-ping. Source camera identification based on nonsubsampled Contourlet transform denoising filter design [J]. Journal of Computer Applications, 2012, 32(02): 507-513. |
[14] | OU Jiajia CAI Biye XIONG Bin LI Feng. Detection of image region-duplication forgery based on gray level co-occurrence matrix [J]. Journal of Computer Applications, 2011, 31(06): 1628-1630. |
[15] | Chang-hui ZHOU Yong-jian HU Li-ling TAN. Study on performance of typical source camera classification algorithms [J]. Journal of Computer Applications, 2011, 31(04): 1133-1137. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||