4.7 Article

Document images forgery localization using a two-stream network

Journal

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
Volume 37, Issue 8, Pages 5272-5289

Publisher

WILEY
DOI: 10.1002/int.22792

Keywords

document images; forgery localization; inception net; pixel correlation; two-stream network

Funding

  1. National Natural Science Foundation of China [62072480, U2001202]
  2. Shanghai Science and Technology Commission Project [21DZ2200100]
  3. Science and Technology Planning Project of Shenzhen Municipality [202102080316]
  4. Opening Project of GuangDong Province Key Laboratory of Information Security Technology [2020B1212060078]

Ask authors/readers for more resources

In this paper, a novel two-stream network is proposed for detecting and locating forgery regions in document images. The network captures forgery traces and anomalous features, then integrates features and performs classification with a discriminant network, outperforming state-of-the-art methods in experimental results.
Document images often contain essential and sensitive information. With image editing software, one can easily manipulate the semantic meaning of the document image by copy-move, splicing, and removal, which causes many security issues. Hence, the document image forgery detection and localization are of great significance. In this paper, a novel two-stream network is proposed to detect and locate the forgery regions of document images. One stream captures forgery traces from the spatial information, including unnatural boundaries, contrast/brightness inconsistencies, and blurring. The other stream eliminates the image semantics by six residual filters, then capture the anomalous features between neighboring pixels introduced by upsampling, downsamping, and inpainting. Finally, the discriminant network is introduced to deeply fuse features from the two streams, and discriminates whether each image patch is forged or not using global average pooling and fully connected layer. Extensive experimental results on our constructed document image data set and the Security AI Challenger Program data set demonstrate the proposed two-stream network outperforms state-of-the-art methods. This proposed two-stream network is also better than each single stream, and is robust to some common forgery postprocessing operations.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available