Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image tampering detection method, terminal equipment and storage medium

A tampering detection and image technology, applied in image enhancement, image analysis, image data processing and other directions, can solve the problems of accuracy limitation, weak positioning ability, inappropriate tampering detection, etc., to achieve the effect of improving performance

Active Publication Date: 2021-02-19
XIAMEN MEIYA PICO INFORMATION
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the current tamper detection methods based on traditional methods and deep learning methods can achieve certain detection results, there are still defects
Most of the traditional methods are designed for a certain tampering method, so the robustness and scalability are poor, and they are not suitable for various tampering detection
However, most of the methods based on deep learning are for tamper detection, with weak or no positioning ability, and the accuracy is limited to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image tampering detection method, terminal equipment and storage medium
  • Image tampering detection method, terminal equipment and storage medium
  • Image tampering detection method, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] An embodiment of the present invention provides a method for detecting image tampering, such as figure 1 As shown, the method includes the following steps:

[0032] S1: Collect the untampered image and the corresponding tampered image, subtract the tampered image from the untampered image to obtain the difference image of the tampered image, and combine the untampered image and the tampered image together to form a training set.

[0033] In order to improve the generalization ability of the model, so that the model learns the discriminative features that can better identify the untampered image and the tampered image, in this embodiment, the tampered image uses a variety of tampering methods, such as face attribute operation, copy-paste, human Face synthesis, identity transformation, etc., make the training set contain many different types of tampered images.

[0034] In this embodiment, the difference image is generated in the following manner:

[0035] Use the face ...

Embodiment 2

[0071] The present invention also provides an image tampering detection terminal device, including a memory, a processor, and a computer program stored in the memory and operable on the processor, and the present invention is realized when the processor executes the computer program Steps in the above method embodiment of Embodiment 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an image tampering detection method, terminal equipment and a storage medium, and the method comprises the steps: S1, collecting an untampered image and a corresponding tampered image, subtracting the tampered image from the untampered image to obtain a difference image of the tampered image, and enabling the untampered image and the tampered image to jointly form a training set; S2, constructing a binary classification network model, and training the binary classification network model through the training set, so that the trained binary classification network model can distinguish whether the image is tampered or not, wherein the binary classification network model comprises a feature extraction layer, an image attention layer and a classifier; S3, recognizing whether the image is tampered or not through the trained binary classification network model. The difference image is used as a real label. A real label is used as tampering supervision information, a neural network is used for training a binary classification network, the network is guided to obtain an accurate tampering detection probability value and a fake positioning graph, and the performanceof face tampering image recognition and classification can be effectively improved.

Description

technical field [0001] The invention relates to the field of image monitoring, in particular to an image tampering detection method, a terminal device and a storage medium. Background technique [0002] With advances in image editing technology and user-friendly editing software, low-cost tampering with the image generation process has become ubiquitous. But these advances have also lured real fake content that has a major impact on people's lives. They can be used to generate fake faces, spread on ubiquitous social networks, and even be used to crack face recognition systems, causing serious harm to security. Therefore, it is crucial to develop methods that can reliably detect such manipulations, and in recent years there has been increasing attention to this goal. [0003] Face tampering detection methods are mainly divided into two types: traditional methods and deep learning-based methods. The traditional method is to design manual features according to a certain type...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T7/00G06K9/46G06K9/62G06N3/04G06N3/08
CPCG06T7/0002G06N3/084G06T2207/20081G06T2207/20084G06V10/40G06N3/045G06F18/25G06F18/24G06F18/214
Inventor 林燕语张光斌高志鹏尤俊生赵建强杜新胜张辉极
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products