• Aucun résultat trouvé

Tampering detection and localization in images from social networks : A CBIR approach

N/A
N/A
Protected

Academic year: 2021

Partager "Tampering detection and localization in images from social networks : A CBIR approach"

Copied!
2
0
0

Texte intégral

(1)Tampering detection and localization in images from social networks : A CBIR approach Cédric Maigrot, Ewa Kijak, Ronan Sicre, Vincent Claveau. To cite this version: Cédric Maigrot, Ewa Kijak, Ronan Sicre, Vincent Claveau. Tampering detection and localization in images from social networks : A CBIR approach. ICIAP 2017 - International Conference on Image Analysis and Processing, Oct 2017, Catane, Italy. pp.1. �hal-01844033�. HAL Id: hal-01844033 https://hal.inria.fr/hal-01844033 Submitted on 19 Jul 2018. HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés..

(2) Tampering detection and localization in images from social networks : A CBIR approach Cédric Maigrot. Ewa Kijak. Ronan Sicre. Vincent Claveau. {firstname}.{lastname}@irisa.fr. Step 1 : Content-based image retrieval system. Datasets Queries : (Total : 2,346 images). • Goal : Find the best image in our database for a comparaison with the query. Reddit : 254, forged. ME :18, forged. F600 [3] : 160, forged. F600 [3] : 400, original. • Method : 1. Find the 10 most similar images with a dot product using the descriptors explain below. Research is accelerated with a KD-Tree approach 2. Reorder these 10 candidates in order to find the best candidate. Define an homography between the image query and each candidate in order to found the best homography. Twitter : 23, forged. Holidays [4] : 1491, negative queries. Descriptors used based on VGG19 [1] • Two sizes used : training images size or based on a kernelization step like [2] • Three vectors are analyzed based on the output of three layers: last convolutional layer C5 with a output lenght of 512 and the fullyconnected layers C6 and C7 with a output lenght of 4096 for both • A mean or max pooling have to be apply in the case of C5 when we used the standard training images size and the three outputs in case of kernelized approach. Database: (Total : 154,558 images) • Twitter : 152,754 + 16 • Me [5] : 310 • Reddit : 128 • F2000 [6] : 1,300 • SATS-130 [7] : 50. Example Query :. Results of the first step. Candidates :. Rank #1. Rank #2. Rank #3. Rank #4. Step 2 : Homogaphy estimation. Example. • Goal : compare the two images and find the forged area if there is one • Method : 1. Match keypoints from the images by similarity. 2. Define an homography based on RANSAC [8] and find the outliers which correspond to matching not verifying the homography 3. Define a density map based on the list of outliers and binarize the map with a known threshold. Outliers map. Results of the second step. Density map. Mask predicted. Ground truth mask. Refs [1 ] Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556. [2 ] Tolias, G., Sicre, R., & Jégou, H. (2015). Particular object retrieval with integral max-pooling of CNN activations. arXiv preprint arXiv:1511.05879. [3 ] Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., & Serra, G. (2013). Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Processing: Image Communication, 28(6), 659-669. [4 ] Jegou, H., Douze, M., & Schmid, C. (2008). Hamming embedding and weak geometric consistency for large scale image search. Computer Vision–ECCV 2008, 304-317. [5 ] Christina Boididou, Symeon Papadopoulos, Duc-Tien Dang-Nguyen, Giulia Boato, Michael Riegler, Stuart E. Middleton, Katerina Andreadou, and Yiannis Kompat- siaris. Verifying multimedia use at mediaeval 2016. In Working Notes Proceedings of the MediaEval 2016 Workshop, 2016. [6 ] Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 6(3), 1099-1110. [7 ] Christlein, V., Riess, C., & Angelopoulou, E. (2010, December). On rotation invariance in copy-move forgery detection. In Information Forensics and Security (WIFS), 2010 IEEE International Workshop on (pp. 1-6). IEEE. [8 ] Fischer, M. A., & Bolles, R. C. (1981). A paradigm for model-fitting with applications to image analysis and automated cartography..

(3)

Références

Documents relatifs

For IRPSNR, the THM is computed as the pixel-wise PSNR between the Gaussian blurred versions of the two images (with standard deviation σ = 4). The SSIM THM is the pixel-wise SSIM

In the last part of the thesis a method is proposed to compensate for the apparent increase in the calculated distance between the related nodes due to decrease in the voltage of

By taking advantage of the number of images available on the internet, we propose a generic system based on image retrieval, followed by image comparison based on local features

Our algorithm overcomes the limitations of previous localization techniques in that it: 1) requires no synchronization between the nodes 2) makes no assump- tion about the

The general data-base of 9500 examples previously mentionned has been compressed with a Kohonen algorithm, in order to obtain 256 faces and 256 backgrounds.. Then, the robot

Under the 3-depth policy, if A requires only one path that is free of blacklist problems, L can access the resource because of (A, B, G, L); if A requires all the paths from him to

In (Pasquet et al., 2016) a framework is proposed to automatically detect man- hole covers in high resolution aerial images by combining the method based on the geometrical filter

To solve the problem of the detection of buried networks, we present an automatic detection approach based on knowledge representation in ontologies and reasoning on this knowledge