Computer Vision Systems and Methods for Blind Localization of Image Forgery
Computer vision systems and methods for localizing image forgery are provided. The system generates a constrained convolution via a plurality of learned rich filters. The system trains a convolutional neural network with the constrained convolution and a plurality of images of a dataset to learn a low level representation of each image among the plurality of images. The low level representation is indicative of a statistical signature of at least one source camera model of each image. The system can determine a splicing manipulation localization by the trained convolutional neural network.
Latest Insurance Services Office, Inc. Patents:
- Computer vision systems and methods for end-to-end training of convolutional neural networks using differentiable dual-decomposition techniques
- Computer vision systems and methods for detecting power line hazards from imagery
- System and method for creating customized insurance-related forms using computing devices
- Computer vision systems and methods for object detection with reinforcement learning
- Systems and Methods for Detecting, Localizing, and Visualizing Manipulations of Portable Document Format Files
This application is a continuation of, and claims the benefit of priority to, U.S. patent application Ser. No. 16/919,840 filed on Jul. 2, 2020, which claims priority to U.S. Provisional Application Ser. No. 62/869,712 filed on Jul. 2, 2019, the entire disclosures of which are hereby expressly incorporated by reference.
FIELD OF THE DISCLOSUREThe present disclosure relates generally to the field of computer vision. Specifically, the present disclosure relates to computer vision systems and methods for blind localization of image forgery.
RELATED ARTPhoto-realistically altering the contents of digital images and videos is problematic as society becomes increasingly reliant on digital images and videos as dependable sources of information. Altering image contents is facilitated by the availability of image editing software and aggravated by recent advances in deep generative models. Digital image forensics focuses on this issue by addressing critical problems such as establishing a veracity of an image (i.e., manipulation detection), localizing a tampered region within the image (i.e., manipulation localization), and identifying an alteration type within the tampered region. It should be understood that different alternation types require different forensic techniques. One type of alteration includes introducing foreign material into an image. For example, splicing can be utilized to insert a part of one image into another image (i.e., the host image). Additionally, touch-up techniques such as sharpening and blurring may be utilized to make the image appear authentic. A well trained forgery expert can utilize splicing manipulations and additional touch-up techniques to manipulate an image to change its meaning.
Semantic information has had limited success in solving operations such as splicing and inpainting because skilled attackers utilize semantic structures to hide image alterations. Non-semantic pixel-level statistics have proven more successful since these statistics amplify low-level camera model specific distortions and noise patterns indicative of a camera model “digital fingerprint.” A camera model digital fingerprint can aid in verifying the integrity of an image by determining whether the camera model fingerprint is consistent across an entirety of the image. Several hand-engineered, low-level statistics approaches have been explored. However, given the aforementioned availability of image editing software and the technological improvement of deep generative models, there is a need for forensic algorithms that can provide data-driven deep learning solutions for the localization of image forgery.
Therefore, there is a need for computer vision systems and methods which can improve the localization of image forgery while improving an ability of computer systems to more efficiently process data. These and other needs are addressed by the computer vision systems and methods of the present disclosure.
SUMMARYThe present disclosure relates to computer vision systems and methods for the localization of image forgery. The system generates a constrained convolution via a plurality of learned rich filters. The system trains an 18 layer convolutional neural network with the constrained convolution and a plurality of images of the Dresden Image dataset to learn a low level representation indicative of a statistical signature of at least one source camera model of each image among the plurality of images. In particular, the system extracts at least one noise residual pattern from each image among the plurality of images via the constrained convolution, determines a spatial distribution of the extracted at least one noise residual pattern, and suppresses semantic edges present in each image among the plurality of images by applying a probabilistic regularization. The system localizes a splicing manipulation present in an image of the dataset by the trained convolutional neural network. In particular, the system subdivides the image into a plurality of patches, determines a hundred-dimensional feature vector for each patch, and segments the plurality of patches by applying an expectation maximization algorithm to each patch to fit a two component Gaussian mixture model to each feature vector.
The foregoing features of the disclosure will be apparent from the following Detailed Description, taken in connection with the accompanying drawings, in which:
The present disclosure relates to computer vision systems and methods for the localization of image forgery, as discussed in detail below in connection with
By way of background, the image formation process broadly consists of three stages: (1) sensor measurements; (2) in-camera processing; and (3) storage which may include compression.
The image formation process is unique for every camera model and yields subtle distortions and noise patterns in the image (i.e., a camera model “fingerprint”) that are invisible to the eye. These subtle distortions and noise patterns are useful in forensic applications because they are specific to each camera model. Accordingly, forensic algorithms inspect low-level statistics of an image or inconsistencies therein to localize manipulations. These include distinctive features stemming from the hardware and software of a particular camera model (or a post-processing step thereafter). For example, at a lowest hardware level, a photo-response non-uniformity (PRNU) noise pattern is indicative of a digital noise fingerprint of a particular camera model and can be utilized for camera model identification. Additionally, sensor pattern noise originates from imperfections in the sensor itself and has shown to be sensitive to several manipulations types. Accordingly, sensor pattern noise can be utilized for the detection and localization of forgeries. However, sensor pattern noise is difficult to detect in image regions with high texture and is absent or suppressed in saturated and dark regions of an image. A color filter array (CFA) and its interpolation algorithms are also particular to a camera model and can aid in discerning camera models. In particular, (CFA) demosaicking is an in-camera processing step that produces pixel colors. Different detection and localization strategies based on CFA signature inconsistencies are known. However, the scope of such specialized CFA models is often limited. Joint Photographic Experts Group (JPEG) is a common storage form and carries camera model signatures such as dimples or can contain clues regarding post-processing steps such as traces of multiple compressions. Additionally, the JPEG image compression format can aid in discerning between single or multiple image compressions and distinguish between camera models. Although, JPEG statistics have been utilized for detection and localization tasks, these statistics are format specific and do not generalize to other common or new formats.
Traditional image forensic algorithms have modelled discrepancies in one or multiple such statistics to detect or localize splicing manipulations. Prior knowledge characterizing theses discrepancies has been leveraged to design handcrafted features. Learned image forensic approaches have gained popularity with the growing success of machine learning and deep learning. One approach recasts hand designed high pass filters, useful for extracting residual signatures, as a constrained convolutional neural network (CNN) to learn the filters and residuals from a training dataset. Another approach utilizes a dual branch CNN, one branch learning from image-semantics and the other branch learning from image-noise, to localize spliced regions. Yet another approach, leverages Exchangeable Image File Format (EXIF) metadata to train a Siamese neural network to verify metadata consistency among patches of a test image to localize manipulated pixels. Another known approach addresses state-of-the-art face manipulations including some created by deep neural networks and has demonstrated that learned CNNs outperform traditional methods. However, the success of the aforementioned deep learning approaches have typically shown vulnerability to generalizing to new datasets.
The systems and methods of the present disclosure utilize a CNN for blind splice detection. In particular, the system utilizes a CNN to detect splices in an image without prior knowledge of a source camera model of the image. The blind splice detection approach improves the generalization ability of the CNN by training the CNN on a surrogate task of source camera model identification. In particular, by training the CNN on the surrogate task of source camera model identification, the systems and methods of the present disclosure allow for leveraging of large, widely available and un-manipulated camera-tagged image databases for training. Further, it also provides for avoiding known manipulated datasets and the risk of overspecializing towards these datasets. Additionally, the CNN trains with a large number of camera models to improve generalization and the CNN's ability to segregate camera models.
The ability to differentiate (even unknown) camera models during training is important. As mentioned above, camera identification is useful in image forensics and several camera model identification approaches are known. For example, a known PRNU based camera identification algorithm estimates reference noise patterns utilizing wavelet de-noising and averaging, and subsequently matches the reference noise patterns to new images by correlation to determine the source camera model. Another known approach trains a CNN to compute features along with a Support Vector Machine (SVM) for source camera model identification. Another known approach utilizes learned high pass filters (i.e., rich filters (RFs)) from constrained convolution layers for source camera model identification. Additionally, another known approach, trains a similar learned RF based CNN for source camera model identification and utilizes the output of the CNN as features to train a second network for splice detection.
The systems and methods of the present disclosure utilize RFs and probabilistic regularization based on mutual information to learn low level features of source camera models and suppress semantic contents in training images. As mentioned above, the system and method of the present disclosure utilize a deep learning approach (i.e., a CNN) for blind splice detection. As such, the CNN does not have prior knowledge of source camera models corresponding to spliced image regions and host image regions. Rather, the CNN is trained to compute low-level features which can segregate camera models. The learned low level features comprise signatures of the image formation pipeline of a camera model including, but not limited to, hardware, internal processing algorithms and compression. In particular, the system and method of the present disclosure perform image splice localization by computing low-level features over an image which identify the signatures of multiple source camera models and segmenting the spliced image regions and the host image regions via a two component Gaussian mixture model. During image splice localization it is assumed that spliced image regions and host image regions originate from different source camera models.
Several RF approaches are known. For example, spatial rich models for steganalysis utilize a large set of hand-engineered RFs to extract local noise-like features from an image. The
RFs extract residual information that highlights low level statistics over the image semantics by computing dependencies among neighboring pixels. Rich filters are effective in image forensics and have been widely adopted by various known splice detection algorithms. For example, SpliceBuster (SB) is a blind splice detection algorithm that utilizes a fixed RF to separate camera features from spliced regions and host regions. Another known algorithm utilizes three fixed
RFs in a noise-branch to compute residuals along with a CNN to learn co-occurrence probabilities of the residuals as features to train a region proposal network to detect spliced regions. Yet another known algorithm utilizes a constrained convolution layer to learn RF-like features and a CNN to learn the co-occurrence probabilities from the data. In particular, at every iteration, the weights of the constrained convolution layer are projected to satisfy wk (0, 0)=−1 and Σm,n ≠0,0 wk (m,n)=1, where wk (i,j) is the weight of the kth filter at position (i, j). The end-to-end trained network identifies broad image-level manipulations such as blurring and compression. It should be understood that the system and method of the present disclosure also utilize learned RFs, but employ a new constrained convolution layer and a different approach for applying the constraints.
Turning to the drawings,
In step 34, the model training system 18 trains the neural network 16 utilizing the rich filter constrained convolution on training input data 20. In particular, the model training system 18 trains the neural network 16 to learn a representation indicative of a statistical fingerprint of a source camera model from an input image patch while suppressing the semantic edge content thereof. The system 10 also trains the neural network utilizing a cross entropy loss function and a mutual information based regularization parameter as described in further detail below in relation to
Generally, the system 10 receives a red, blue and green (RGB) patch as the input patch (Pi) 52. For example, the system 10 receives a 72×72×3 RGB patch as the input patch 52. Additionally, the system 10 also receives the camera model label 54 during training as an input.
Then, the system 10 computes residuals via a 5×5×64 constrained convolution layer 56 comprising 64 learned RFs. In particular, the system 10 defines a residual to be a difference between a predicted value for a central pixel defined over its neighborhood and a scaled value of a pixel. The constrained convolution to learn residuals is defined by Equation 1 below as:
for the kth filter, where the support of the residuals is a N×N neighborhood (N=5). The summation ensures that the predicted value and the pixel's value have opposite signs. As noted above, the system 10 utilizes a large bank of learned RFs, k=1 . . . 64. These constraints (i.e., RF constraints 74) are applied by including RF=(Σk(RF(k))2)1/2 as a penalty in the cost function. This provides for the neural network 16 to learn suitable residuals for camera model identification.
The first convolution block 58 comprises a 3×3×19 regular decimating convolution, batch normalization and a rectified linear unit (ReLU) activation and is repeated five times. The second convolution block 60 comprises identical first and second sub-blocks and a skip connection around the second sub-block. Each of the first and second sub-blocks consists of a 3×3×19 non decimating convolution, batch-normalization and ReLU activation. The skip connection adds an output of the first sub-block's ReLU activation to an output of the second sub-block's batch normalization. The second convolution block 60 is repeated twelve times. The first convolution block 58 and second convolution block 60 architecture can be more effective than a standard residual block because it achieves approximately a ten percent improved validation accuracy regarding the surrogate task of camera model identification during training. Together, the first convolution block 58 and the second convolution block 60 learn the spatial distribution of residual values and can be interpreted as learning their co-occurrences. The final convolution is a 3×3×1 bottleneck layer 62 having an output that is a pre-feature image pi of size 56×56.
Following the bottleneck layer 62 are the first, second, and third FC layers 64, 66, 68. The first FC layer 64 comprises 75 neurons, the second FC layer 66 is the feature layer and comprises 100 neurons and the third FC layer 68 is the final layer that outputs logits with a number of neurons C corresponding to a number of training camera models. The first FC layer 64 is followed by a dropout layer with a keep probability of 0.8 and ReLU non-linearity. The system 10 trains the neural network 16 utilizing the cross-entropy loss function 72 over the training input data 20 as defined by Equation 2 below:
In Equation 2, yi is the camera model label for the ith training data point in the mini batch of length M and ŷi is the softmax value computed from the output of the third FC layer 68.
Mutual information is a well-known metric for registering medical images because it provides for capturing linear and non-linear dependencies between two random variables. Additionally, mutual information can effectively compare images of the same body part across different modalities with different contrasts (e.g., magnetic resonance imaging (MRI), computed tomography (CT), and positron emission tomography (PET)). The system 10 utilizes these mutual information characteristics to compute a dependency of the input patch Pi52 with the pre-feature image pi which is the output of the bottleneck layer 62. Since the pre-feature image pi is a transformed version of the residuals computed by the constrained convolution layer 56, the dependency reflects a presence of semantic edges in pi. As such, the mutual information regularization can be defined by Equation 3 as follows:
where p(·) provides for approximating mutual information numerically. In particular p(·) is defined as a transform that converts the input patch Pi52 to its gray scalar version then resizes it from its dimensions of 72×72×3 to the dimensions of 56×56 of the pre-feature image pi. p(·) conserves the semantic edges in the input patch Pi52 and aligns them to the edges in the pre-feature image pi. As such, in Equation 3 the system 10 can compute the mutual information regularization numerically by approximating p(ρ(Pi)), p(pi) and p(ρ(Pi), pi) the marginal and joint distribution of Pi and pi, using histograms (e.g., 50 bins). Histogram based mutual information computation is a common approximation that is widely used in medical imaging. However, histogram based mutual information computation can also be computationally inefficient which can result in extended training time as described in further detail below.
The complete loss function 76 for training the neural network 16 combines the mutual information regularization 70, the cross entropy loss function 72, the RF constraints 74 and an I2 regularization of all weights, W, of the neural network 16 as defined by Equation 4 below:
=CE+RF+γMI+ω∥W∥2 Equation 4
In Equation 4, λ, γ, and ω balance the amount of the RF constraint penalty and mutual information and I2 regularizations to apply along with the main loss.
Training, testing, and results of the system 10 will now be described in greater detail. The system 10 trains by utilizing the Dresden Image Database which consists of approximately 17,000 JPEG images sourced from 27 camera model. It should be understood that the images are not segregated based on compression quality factors because compression quality factors are considered to part of a camera model signature. The system 10 selects, for each camera model, 0.2% and 0.1% of the images as validation sets and test sets while the remaining images are utilized for training. Training comprises a mini batch size M of 50 patches and 100,000 patches per epoch chosen randomly every epoch. The system 10 trains for 130 epochs, utilizing an Adam optimizer with a constant learning rate of 1e-4 for 80 epochs which then decays exponentially by a factor of 0.9 over the remaining epochs. The system 10 yields approximately 72% camera model identification accuracy for the validation sets and the test sets for generic values for the weights in Equation 4 of λ=γ=1 and ω≈5e−4. The system 10 utilizes a NVIDIA GTX 1080Ti GPU but it should be understood that any suitable graphics card can be utilized.
The quantitative performance of the system 10 and results of a hyper-parameter search to determine an optimal overlap of input patches during splice localization will now be described in greater detail. The performance of the system 10 is quantitatively evaluated by testing the system 10 on three datasets, utilizing pixel level scoring metrics and comparing the system 10 with two splice detection algorithms.
Table 180 of
As shown in table 190, the system 10 outperforms EXIF-SC and SB on the DSO-1 and NC16 datasets and performs equally as well with SB as a top performer on the NC17-dev1 dataset. Table 200 of
The qualitative performance of the system 10 will now be described in greater detail.
As described above, the system 10 allows for blind forgery (e.g., splice localization) detection by utilizing a deep CNN that learns low level features capable of segregating camera models. These low level features, independent of the semantic contents of the training images, are learned via a two-step process. In the first step, the system 10 applies a unique constrained convolution to learn relevant residuals present in an image and in the second step, the system 10 utilizes a probabilistic mutual information based regularization to suppress semantic edges present in the image. Preliminary results on the DSO-1, NC16 and NC17-dev1 test datasets evidence the potential of the system 10, indicating up to 4% points improvement over the SB and EXIF-SC models. It should be understood that additional testing of the system 10 can be performed on other datasets (e.g., the Media Forensics Challenge 2018 dataset) and in comparison to other models. System 10 performance based on the effects of JPEG compression can be evaluated. During training of the system 10, the histogram based implementation of the probabilistic mutual information based regularization proved to be computationally cumbersome. This compels certain modifications of the system 10 including utilizing a relatively small mini batch size, training for a limited number of epochs and considering a relatively small neural network 16. The system 10 can be improved by eliminating this bottleneck to train on larger models and datasets. The system 10 can also be improved by fine-tuning the neural network 16 on training data provided with each dataset.
(CRT), etc.). The storage device 304 could comprise any suitable, computer-readable storage medium such as disk, non-volatile memory (e.g., read-only memory (ROM), erasable programmable ROM (EPROM), electrically-erasable programmable ROM (EEPROM), flash memory, field-programmable gate array (FPGA), etc.). The computer system 302 could be a networked computer system, a personal computer, a server, a smart phone, tablet computer etc. It is noted that the server 302 need not be a networked server, and indeed, could be a stand-alone computer system.
The functionality provided by the present disclosure could be provided by computer software code 306, which could be embodied as computer-readable program code stored on the storage device 304 and executed by the CPU 212 using any suitable, high or low level computing language, such as Python, Java, C, C++, C#, .NET, MATLAB, etc. The network interface 308 could include an Ethernet network interface device, a wireless network interface device, or any other suitable device which permits the server 302 to communicate via the network. The CPU 312 could include any suitable single-core or multiple-core microprocessor of any suitable architecture that is capable of implementing and running the computer software code 306 (e.g., Intel processor). The random access memory 314 could include any suitable, high-speed, random access memory typical of most modern computers, such as dynamic RAM (DRAM), etc.
Having thus described the system and method in detail, it is to be understood that the foregoing description is not intended to limit the spirit or scope thereof. It will be understood that the embodiments of the present disclosure described herein are merely exemplary and that a person skilled in the art can make any variations and modification without departing from the spirit and scope of the disclosure. All such variations and modifications, including those discussed above, are intended to be included within the scope of the disclosure. What is desired to be protected by Letters Patent is set forth in the following claims.
Claims
1. A computer vision system for localizing image forgery comprising:
- a memory; and
- a processor in communication with the memory, the processor: generating a constrained convolution using a plurality of learned rich filters, training a neural network with the constrained convolution and a plurality of images of a dataset to learn a low-level representation indicative of a statistical signature of at least one source camera model for each image among the plurality of images, and localizing an attribute of an image of the dataset by the trained neural network.
Type: Application
Filed: Jul 19, 2022
Publication Date: Nov 17, 2022
Applicant: Insurance Services Office, Inc. (Jersey City, NJ)
Inventors: Aurobrata Ghosh (Pondicherry), Zheng Zhong (Jersey City, NJ), Terrance E. Boult (Colorado Springs, CO), Maneesh Kumar Singh (Princeton, NJ)
Application Number: 17/868,157