Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual Operators
Abstract
:1. Introduction
- The proposed non-reducing CNN can detect a dual-operated image and the operation sequence. Different types of operations such as median filtering, Gaussian blurring, image resizing, and un-sharp masking are detected successfully.
- Multiple convolutional layers are inserted in the CNN network by adopting a bottleneck approach in the proposed method. The computational requirement of the proposed CNN is less due to fewer learning parameters. However, the proposed method has a performance improvement by the bottleneck approach.
- To retain maximum statistical information, no pooling layer is interleaved between the convolutional layers. Since a pooling layer can reduce the computational cost with the sacrifice of relevant operation fingerprints that are inherited.
- To avoid the overfitting issue and boost the performance, one global averaging pooling layer is utilized. An additional improvement of more than two percent in the detection accuracy can achieve by using a global averaging pooling layer in most of the cases.
- The proposed method can ensure a better performance in challenging environments with low-resolution images and dual operators manipulation without specific preprocessing requirements.
2. Detection of Image Processing Operator Sequence
2.1. Problem Formulation
- Ω0: An image is not operated by any operator;
- Ω1: An image is operated by α operator;
- Ω2: An image is operated by β operator;
- Ω3: The first image is operated by α then operated by β;
- Ω4: The first image is operated by β then operated by α.
2.2. Effectiveness on Compressed Images
- Ω0: Image is not operated by any operator and JPEG compressed with quality factor Q1;
- Ω1: Image is JPEG compressed with quality factor Q1 and operated by α operator then JPEG compressed with quality factor Q2;
- Ω2: Image is JPEG compressed with quality factor Q1 and operated by β operator then JPEG compressed with quality factor Q2;
- Ω3: Image is operated by α then JPEG compressed with quality factor Q1, and again the image is operated by β then JPEG compressed with quality factor Q2;
- Ω4: Image is operated by β then JPEG compressed with quality factor Q1, and again the image is operated by α then JPEG compressed with quality factor Q2.
2.3. Detection for Dissimilar Parameters and Compression
3. Framework of the Proposed CNN
4. Experimental Results
4.1. Detection of Dual Operators Sequence for Similar Specification
4.2. Detection of Dual Operators Sequence for Dissimilar Specification
4.3. Comparative Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Yang, P.; Ni, R.; Zhao, Y.; Zhao, W. Source Camera Identification Based on Content-Adaptive Fusion Residual Networks. Pattern Recognit. Lett. 2019, 119, 195–204. [Google Scholar] [CrossRef]
- Ding, X.; Chen, Y.; Tang, Z.; Huang, Y. Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning. IEEE Access 2019, 7, 25878–25890. [Google Scholar] [CrossRef]
- Yang, P.; Baracchi, D.; Ni, R.; Zhao, Y.; Argenti, F.; Piva, A. A Survey of Deep Learning-Based Source Image Forensics. J. Imaging 2020, 6, 9. [Google Scholar] [CrossRef] [Green Version]
- Peng, A.; Wu, Y.; Kang, X. Revealing Traces of Image Resampling and Resampling Antiforensics. Adv. Multimed. 2017, 2017, 7130491. [Google Scholar] [CrossRef]
- Qiao, T.; Zhu, A.; Retraint, F. Exposing Image Resampling Forgery by Using Linear Parametric Model. Multimed. Tools Appl. 2018, 77, 1501–1523. [Google Scholar] [CrossRef]
- Wang, P.; Liu, F.; Yang, C.; Luo, X. Blind Forensics of Image Gamma Transformation and Its Application in Splicing Detection. J. Vis. Commun. Image Represent. 2018, 55, 80–90. [Google Scholar] [CrossRef]
- Sun, J.-Y.; Kim, S.-W.; Lee, S.-W.; Ko, S.-J. A Novel Contrast Enhancement Forensics Based on Convolutional Neural Networks. Signal Process. Image Commun. 2018, 63, 149–160. [Google Scholar] [CrossRef]
- Wang, P.; Liu, F.; Yang, C. Thresholding Binary Coding for Image Forensics of Weak Sharpening. Signal Process. Image Commun. 2020, 88, 115956. [Google Scholar] [CrossRef]
- Tang, H.; Ni, R.; Zhao, Y.; Li, X. Median Filtering Detection of Small-Size Image Based on CNN. J. Vis. Commun. Image Represent. 2018, 51, 162–168. [Google Scholar] [CrossRef]
- Zhang, J.; Liao, Y.; Zhu, X.; Wang, H.; Ding, J. A Deep Learning Approach in the Discrete Cosine Transform Domain to Median Filtering Forensics. IEEE Signal Process. Lett. 2020, 27, 276–280. [Google Scholar] [CrossRef]
- Qiu, X.; Li, H.; Luo, W.; Huang, J. A Universal Image Forensic Strategy Based on Steganalytic Model. In Proceedings of the IH and MMSec 2014—Proceedings of the 2014 ACM Information Hiding and Multimedia Security Workshop, Salzburg, Austria, 11–13 June 2014; pp. 165–170. [Google Scholar]
- Bayar, B.; Stamm, M.C. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security—IH&MMSec ’16, Vigo Galicia, Spain, 20–22 June 2016; pp. 5–10. [Google Scholar]
- Bayar, B.; Stamm, M.C. Constrained Convolutional Neural Networks: A New Approach towards General Purpose Image Manipulation Detection. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2691–2706. [Google Scholar] [CrossRef]
- Li, H.; Luo, W.; Qiu, X.; Huang, J. Identification of Various Image Operations Using Residual-Based Features. IEEE Trans. Circuits Syst. Video Technol. 2018, 28, 31–45. [Google Scholar] [CrossRef]
- Boroumand, M.; Fridrich, J. Deep Learning for Detecting Processing History of Images. In Proceedings of the IS and T International Symposium on Electronic Imaging Science and Technology, Burlingame, CA, USA, 28 January–1 February 2018. [Google Scholar]
- Mazumdar, A.; Singh, J.; Tomar, Y.S.; Bora, P.K. Universal Image Manipulation Detection Using Deep Siamese Convolutional Neural Network. arXiv 2018, arXiv:1808.06323 2018. [Google Scholar]
- Mazumdar, A.; Singh, J.; Tomar, Y.S.; Bora, P.K. Detection of Image Manipulations Using Siamese Convolutional Neural Networks. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2019; Volume 11941, pp. 226–233. ISBN 9783030348687. [Google Scholar]
- Chen, Y.; Kang, X.; Shi, Y.Q.; Wang, Z.J. A Multi-Purpose Image Forensic Method Using Densely Connected Convolutional Neural Networks. J. Real-Time Image Process. 2019, 16, 725–740. [Google Scholar] [CrossRef]
- Xue, H.; Liu, H.; Li, J.; Li, H.; Luo, J. Sed-Net: Detecting Multi-Type Edits of Images. In Proceedings of the 2020 IEEE International Conference on Multimedia and Expo (ICME), London, UK, 6–10 July 2020; pp. 1–6. [Google Scholar]
- Singhal, D.; Gupta, A.; Tripathi, A.; Kothari, R. CNN-Based Multiple Manipulation Detector Using Frequency Domain Features of Image Residuals. ACM Trans. Intell. Syst. Technol. 2020, 11, 1–26. [Google Scholar] [CrossRef]
- Barni, M.; Nowroozi, E.; Tondi, B.; Zhang, B. Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors against Adversarial Examples. In Proceedings of the ICASSP 2020—2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 4–8 May 2020; pp. 2977–2981. [Google Scholar]
- Stamm, M.C.; Chu, X.; Liu, K.J.R. Forensically Determining the Order of Signal Processing Operations. In Proceedings of the Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013, Guangzhou, China, 18–21 November 2013. [Google Scholar]
- Chu, X.; Chen, Y.; Liu, K.J.R. Detectability of the Order of Operations: An Information Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 2016, 11, 823–836. [Google Scholar] [CrossRef]
- Comesaña, P. Detection and Information Theoretic Measures for Quantifying the Distinguishability between Multimedia Operator Chains. In Proceedings of the WIFS 2012—Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, Costa Adeje, Spain, 2–5 December 2012. [Google Scholar]
- Bayar, B.; Stamm, M.C. Towards Order of Processing Operations Detection in JPEG-Compressed Images with Convolutional Neural Networks. Electron. Imaging 2018, 30, art00009. [Google Scholar] [CrossRef] [Green Version]
- Liao, X.; Li, K.; Zhu, X.; Liu, K.J.R. Robust Detection of Image Operator Chain with Two-Stream Convolutional Neural Network. IEEE J. Sel. Top. Signal Process. 2020, 14, 955–968. [Google Scholar] [CrossRef]
- Shi, Y.Q.; Sutthiwan, P.; Chen, L. Textural Features for Steganalysis. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2013; Volume 7692, pp. 63–77. ISBN 9783642363726. [Google Scholar]
- Fridrich, J.; Kodovsky, J. Rich Models for Steganalysis of Digital Images. IEEE Trans. Inf. Forensics Secur. 2012, 7, 868–882. [Google Scholar] [CrossRef] [Green Version]
- Barni, M.; Costanzo, A.; Nowroozi, E.; Tondi, B. Cnn-Based Detection of Generic Contrast Adjustment with JPEG Post-Processing. In Proceedings of the International Conference on Image Processing (ICIP), Athens, Greece, 7–10 October 2018; pp. 3803–3807. [Google Scholar]
- Bas, P.; Filler, T.; Pevný, T. Break Our Steganographic System: The ins and outs of organizing BOSS. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2011; Volume 6958, pp. 59–70. ISBN 9783642241772. [Google Scholar]
- Xu, G.; Wu, H.-Z.; Shi, Y.-Q. Structural Design of Convolutional Neural Networks for Steganalysis. IEEE Signal Process. Lett. 2016, 23, 708–712. [Google Scholar] [CrossRef]
- Ioffe, S.; Szegedy, C. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In Proceedings of the 32nd International Conference on Machine Learning (ICML), Lille, France, 6–11 July 2015; pp. 448–456. [Google Scholar]
- Nair, V.; Hinton, G.E. Rectified Linear Units Improve Restricted Boltzmann Machines. In Proceedings of the ICML 2010—27th International Conference on Machine Learning, Haifa, Israel, 21–24 June 2010. [Google Scholar]
- Xu, G. Deep Convolutional Neural Network to Detect J-UNIWARD. In Proceedings of the IH and MMSec 2017—2017 ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, PA, USA, 20–21 June 2017. [Google Scholar]
- Yedroudj, M.; Comby, F.; Chaumont, M. Yedroudj-Net: An Efficient CNN for Spatial Steganalysis. In Proceedings of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, Canada, 15–20 April 2018; Volume 2018, pp. 2092–2096. [Google Scholar]
- Lin, M.; Chen, Q.; Yan, S. Network in Network. In Proceedings of the 2nd International Conference on Learning Representations, ICLR 2014—Conference Track Proceedings, Banff, AB, Canada, 14–16 April 2014. [Google Scholar]
- Xavier Glorot, Y.B. Understanding the Difficulty of Training Deep Feedforward Neural Networks. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, Sardinia, Italy, 13–15 May 2010; pp. 249–256. [Google Scholar]
- Schaefer, G.; Stich, M. UCID: An Uncompressed Color Image Database. In Storage and Retrieval Methods and Applications for Multimedia, Proceedings of the Electronic Imaging, San Jose, CA, USA, 18–22 January 2004; Yeung, M.M., Lienhart, R.W., Li, C.-S., Eds.; SPIE: Bellingham, WA, USA, 2004; Volume 5307, pp. 472–480. [Google Scholar]
- Abdulrahman, H.; Chaumont, M.; Montesinos, P.; Magnier, B. Color Image Steganalysis Based on Steerable Gaussian Filters Bank. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security—IH&MMSec ’16, Vigo Galicia, Spain, 20–22 June 2016; pp. 109–114. [Google Scholar]
- Liu, Q.; Chen, Z. Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images. ACM Trans. Intell. Syst. Technol. 2015, 5, 1–30. [Google Scholar] [CrossRef]
α = | GAU_1.0 | GAU_1.0 | GAU_1.0 | GAU_1.0 | GAU_1.0 | GAU_1.0 | GAU_0.7 | GAU_0.7 | GAU_0.7 | GAU_0.7 | GAU_0.7 | GAU_0.7 |
β = | MF3 | MF5 | SH_2.0 | SH_3.0 | UP_1.2 | UP_1.5 | MF3 | MF5 | SH_2.0 | SH_3.0 | UP_1.2 | UP_1.5 |
Ω0 | 99.51 | 99.45 | 95.47 | 98.06 | 99.77 | 99.79 | 98.61 | 98.59 | 94.64 | 93.41 | 99.33 | 99.17 |
Ω1 | 93.29 | 98.45 | 91.16 | 95.84 | 82.97 | 94.90 | 98.15 | 99.07 | 94.97 | 94.47 | 94.40 | 99.59 |
Ω2 | 99.05 | 94.39 | 93.08 | 90.41 | 99.13 | 99.57 | 94.02 | 82.37 | 90.87 | 91.47 | 95.23 | 95.53 |
Ω3 | 97.65 | 97.71 | 99.74 | 99.90 | 99.85 | 99.89 | 94.30 | 92.33 | 98.43 | 96.99 | 99.36 | 99.31 |
Ω4 | 98.95 | 99.07 | 81.94 | 83.79 | 93.67 | 96.41 | 99.66 | 99.78 | 86.56 | 90.13 | 99.86 | 99.86 |
Average Accuracy | 97.69 | 97.81 | 92.28 | 93.60 | 95.07 | 98.11 | 96.95 | 94.43 | 93.09 | 93.30 | 97.63 | 98.69 |
α = | MF3 | MF3 | MF3 | MF3 | MF5 | MF5 | MF5 | MF5 | SH_2.0 | SH_2.0 | SH_3.0 | SH_3.0 |
β = | SH_2.0 | SH_3.0 | UP_1.2 | UP_1.5 | SH_2.0 | SH_3.0 | UP_1.2 | UP_1.5 | UP_1.2 | UP_1.5 | UP_1.2 | UP_1.5 |
Ω0 | 94.97 | 94.49 | 85.03 | 93.01 | 88.33 | 92.24 | 71.71 | 83.12 | 93.41 | 96.06 | 98.29 | 96.51 |
Ω1 | 99.43 | 99.30 | 99.82 | 99.87 | 99.45 | 98.76 | 99.65 | 99.69 | 95.95 | 94.34 | 90.56 | 92.81 |
Ω2 | 92.91 | 92.95 | 98.68 | 98.81 | 93.15 | 93.57 | 99.65 | 99.57 | 87.76 | 95.05 | 91.37 | 83.06 |
Ω3 | 96.77 | 97.13 | 99.69 | 99.57 | 91.99 | 95.56 | 99.67 | 99.79 | 94.37 | 78.05 | 90.59 | 95.59 |
Ω4 | 85.36 | 87.63 | 91.06 | 98.83 | 79.06 | 85.27 | 80.23 | 87.37 | 99.91 | 99.80 | 99.76 | 99.00 |
Average Accuracy | 93.89 | 94.30 | 94.85 | 98.02 | 90.40 | 93.08 | 90.18 | 93.91 | 94.28 | 92.66 | 94.11 | 93.39 |
α | β | Compression | Ω0 | Ω1 | Ω2 | Ω3 | Ω4 | Average Accuracy |
---|---|---|---|---|---|---|---|---|
GAU_1.0 | MF5 | Q1 = 90, Q2 = 70 | 99.13 | 92.56 | 86.89 | 91.96 | 92.80 | 92.67 |
GAU_1.0 | MF5 | Q1 = 75, Q2 = 85 | 98.91 | 94.27 | 88.14 | 92.85 | 99.13 | 94.66 |
GAU_1.0 | MF5 | Q1 = 85, Q2 = 75 | 96.44 | 90.07 | 89.03 | 90.58 | 96.24 | 92.47 |
GAU_1.0 | UP_1.5 | Q1 = 75, Q2 = 85 | 98.93 | 84.09 | 98.77 | 97.60 | 68.21 | 89.52 |
GAU_1.0 | UP_1.5 | Q1 = 85, Q2 = 85 | 97.29 | 73.14 | 97.83 | 91.58 | 81.52 | 88.27 |
GAU_0.9 | UP_1.2 | Q1 = 70, Q2 = 90 | 99.81 | 89.87 | 97.55 | 93.32 | 66.23 | 89.35 |
GAU_0.8 | MF3 | Q1 = 70, Q2 = 90 | 99.59 | 95.76 | 94.67 | 95.72 | 91.45 | 95.44 |
MF5 | UP_1.5 | Q1 = 75, Q2 = 85 | 97.28 | 78.22 | 98.35 | 96.29 | 79.21 | 89.87 |
MF5 | UP_1.5 | Q1 = 85, Q2 = 75 | 97.39 | 76.70 | 97.97 | 96.79 | 71.89 | 88.15 |
SH_2.0 | UP_1.2 | Q1 = 80, Q2 = 90 | 97,63 | 95.23 | 94,82 | 84.17 | 90.12 | 89.84 |
SH_3.0 | UP_1.5 | Q1 = 80, Q2 = 90 | 98.21 | 96.97 | 94.56 | 83.67 | 89.45 | 92.57 |
SH_3.0 | UP_1.5 | Q1 = 75, Q2 = 85 | 98.22 | 98.23 | 96.25 | 85.45 | 80.41 | 91.71 |
Set | Single Operator | Uncompressed | Compression Q = 85 |
---|---|---|---|
Set 1 | ORI | 89.15 | 85.93 |
SH_2.0 | 97.01 | 82.14 | |
UP_1.2 | 99.91 | 83.37 | |
MF5 | 99.81 | 98.82 | |
GAU_7.0 | 99.56 | 92.84 | |
Average Accuracy | 97.09 | 88.62 | |
Set 2 | ORI | 97.39 | 90.81 |
SH_3.0 | 90.70 | 83.08 | |
UP_1.5 | 99.99 | 90.92 | |
MF3 | 99.81 | 95.11 | |
GAU_1.0 | 99.93 | 95.17 | |
Average Accuracy | 97.56 | 91.02 |
Operator | Training | Testing | Compression | Ω0 | Ω1 | Ω2 | Ω3 | Ω4 | Average Accuracy |
---|---|---|---|---|---|---|---|---|---|
α | GAU = {0.7, 0.8, 0.9, 1.0} | GAU = {0.701, 0.702, …, 0.899, 0.900} | No | 99.11 | 96.75 | 99.47 | 99.73 | 95.07 | 98.02 |
β | UP = {1.5, 1.6, 1.7, 1.8} | UP = {1.500, 1.501, …, 1.799, 1.800} | |||||||
α | GAU = {0.7, 0.8, 0.9, 1.0} | GAU = {0.701, 0.702, …, 0.899, 0.900} | Q1 = 80 | 99.39 | 96.49 | 86.06 | 94.16 | 96.35 | 94.49 |
β | UP = {1.5, 1.6, 1.7, 1.8} | UP = {1.500, 1.501, …, 1.799, 1.800} | Q2 = 90 | ||||||
α | GAU = {0.7, 0.8, 0.9, 1.0} | GAU = {0.701, 0.702, …, 0.899, 0.900} | No | 99.59 | 88.32 | 98.72 | 98.52 | 96.63 | 96.36 |
β | MF3, MF5 | MF3, MF5 | |||||||
α | GAU_1.0 | GAU_1.0 | No | 99.84 | 95.30 | 98.17 | 96.71 | 99.09 | 97.82 |
β | UP = {1.4, 1.5, …, 1.9} | UP = {1.400, 1.401, …, 1.899, 1.900} |
Operator | Compression | Ω0 | Ω1 | Ω2 | Ω3 | Ω4 | Average Accuracy | ||
---|---|---|---|---|---|---|---|---|---|
α | β | Training | Testing | ||||||
GAU_1.0 | MF5 | Q1 = 85, Q2 = 75 | Q1 = 80, Q2 = 75 | 94.73 | 91.17 | 89.25 | 90.44 | 96.41 | 92.40 |
GAU_1.0 | MF5 | Q1 = 75, Q2 = 85 | Q1 = 85, Q2 = 75 | 94.26 | 76.25 | 87.84 | 56.56 | 84.90 | 79.96 |
GAU_1.0 | MF5 | Q1 = 85, Q2 = 75 | Q1 = 90, Q2 = 75 | 97.22 | 90.55 | 89.04 | 88.31 | 91.59 | 91.34 |
GAU_1.0 | UP_1.5 | Q1 = 85, Q2 = 85 | Q1 = 75, Q2 = 85 | 87.03 | 72.22 | 99.51 | 91.44 | 80.77 | 86.19 |
GAU_1.0 | UP_1.5 | Q1 = 75, Q2 = 85 | Q1 = 85, Q2 = 85 | 91.95 | 79.01 | 92.78 | 97.96 | 65.57 | 85.45 |
MF5 | UP_1.5 | Q1 = 85, Q2 = 75 | Q1 = 75, Q2 = 85 | 78.54 | 80.41 | 98.15 | 70.97 | 96.62 | 84.94 |
SH_3.0 | UP_1.5 | Q1 = 80, Q2 = 90 | Q1 = 75, Q2 = 85 | 90.64 | 99.30 | 61.39 | 83.93 | 86.01 | 84.26 |
SH_3.0 | UP_1.5 | Q1 = 75, Q2 = 85 | Q1 = 80, Q2 = 90 | 93.58 | 86.78 | 99.08 | 69.63 | 69.92 | 83.80 |
Operator | Classification Error (%) | Operator | Classification Error (%) | ||||
---|---|---|---|---|---|---|---|
α | β | Proposed | Liao et al. [26] | α | β | Proposed | Liao et al. [26] |
GAU_1.0 | MF3 | 02.31 | 07.39 | MF3 | SH_2.0 | 06.11 | 14.24 |
GAU_1.0 | MF5 | 02.19 | 05.98 | MF3 | SH_3.0 | 05.70 | 13.81 |
GAU_1.0 | SH_2.0 | 07.72 | 13.25 | MF3 | UP_1.2 | 05.15 | 10.83 |
GAU_1.0 | SH_3.0 | 06.40 | 11.49 | MF3 | UP_1.5 | 01.98 | 07.49 |
GAU_1.0 | UP_1.2 | 04.93 | 08.79 | MF5 | SH_2.0 | 09.60 | 18.02 |
GAU_1.0 | UP_1.5 | 01.89 | 03.77 | MF5 | SH_3.0 | 06.92 | 15.49 |
GAU_0.7 | MF3 | 03.05 | 08.26 | MF5 | UP_1.2 | 09.82 | 13.37 |
GAU_0.7 | MF5 | 05.57 | 08.01 | MF5 | UP_1.5 | 06.09 | 08.34 |
GAU_0.7 | SH_2.0 | 06.91 | 13.31 | SH_2.0 | UP_1.2 | 05.72 | 14.94 |
GAU_0.7 | SH_3.0 | 06.70 | 12.70 | SH_2.0 | UP_1.5 | 07.34 | 11.67 |
GAU_0.7 | UP_1.2 | 02.37 | 06.23 | SH_3.0 | UP_1.2 | 05.89 | 13.54 |
GAU_0.7 | UP_1.5 | 01.31 | 05.95 | SH_3.0 | UP_1.5 | 06.61 | 10.84 |
Operator | Compression | Classification Error (%) | ||
---|---|---|---|---|
α | β | Proposed | Liao et al. [26] | |
GAU_1.0 | UP_1.5 | Q1 = 75, Q2 = 85 | 10.48 | 09.80 |
GAU_1.0 | UP_1.5 | Q1 = 85, Q2 = 85 | 11.73 | 14.68 |
GAU_1.0 | MF5 | Q1 = 90, Q2 = 70 | 07.33 | 16.35 |
GAU_1.0 | MF5 | Q1 = 75, Q2 = 85 | 05.34 | 11.82 |
GAU_1.0 | MF5 | Q1 = 85, Q2 = 75 | 07.53 | 15.93 |
GAU_0.9 | UP_1.2 | Q1 = 70, Q2 = 90 | 10.65 | 14.12 |
MF5 | UP_1.5 | Q1 = 75, Q2 = 85 | 10.13 | 13.25 |
MF5 | UP_1.5 | Q1 = 85, Q2 = 75 | 11.85 | 21.75 |
MF3 | GAU_0.8 | Q1 = 70, Q2 = 90 | 04.56 | 12.70 |
SH_2.0 | UP_1.2 | Q1 = 80, Q2 = 90 | 10.16 | 14.65 |
SH_3.0 | UP_1.5 | Q1 = 80, Q2 = 90 | 07.43 | 13.55 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cho, S.-H.; Agarwal, S.; Koh, S.-J.; Jung, K.-H. Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual Operators. Appl. Sci. 2022, 12, 7152. https://doi.org/10.3390/app12147152
Cho S-H, Agarwal S, Koh S-J, Jung K-H. Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual Operators. Applied Sciences. 2022; 12(14):7152. https://doi.org/10.3390/app12147152
Chicago/Turabian StyleCho, Se-Hyun, Saurabh Agarwal, Seok-Joo Koh, and Ki-Hyun Jung. 2022. "Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual Operators" Applied Sciences 12, no. 14: 7152. https://doi.org/10.3390/app12147152
APA StyleCho, S. -H., Agarwal, S., Koh, S. -J., & Jung, K. -H. (2022). Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual Operators. Applied Sciences, 12(14), 7152. https://doi.org/10.3390/app12147152