Facial Image Retouching Detection Algorithm Based on Multi Scale-Convolutional Neural Network
CSTR:
Author:
  • Article
  • | |
  • Metrics
  • |
  • Reference [22]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    In order to solve the problem that the existing facial retouching detection algorithm has complex feature extraction and low recognition rate, we proposed a facial retouching detection algorithm based on Multi-Scale-Convolutional Neural Network (MS-CNN). Different from the traditional CNN, MS-CNN adds image preprocessing, which uses Histograms of Oriented Gradient (HOG) feature-based facial extraction algorithm to extract the facial part from the original image. It connects the Local Response Normalization (LRN) layer after the first pooling layer to accelerate the convergence of the model. A multi-scale convolution layer is proposed, which cascades convolution kernel of 1×1, 3×3, and 5×5 to improve the classification accuracy. The experimental results show that the detection accuracy of the proposed algorithm is 99.5% in LFW data set and 92.9% in ND-ⅢTD data set, respectively. Compared with the mainstream network structure and existing facial retouching detection algorithms, the detection accuracy of the proposed algorithm is significantly improved.

    Reference
    [1] Qazi T, Hayat K, Khan SU, et al. Survey on blind image forgery detection. IET Image Processing, 2013, 7(7):660-670.[doi:10.1049/iet-ipr.2012.0388
    [2] Ananya U, Mudenagudi U. Detection of doctored images using bispectral analysis. Proceedings of 2011 IEEE International Conference on Image Information Processing. Shimla, India. 2011. 1-6.
    [3] 李晓飞,申铉京,陈海鹏.基于Bi-Laplacian润饰图像的盲鉴别算法.计算机应用, 2011, 31(1):239-242.[doi:10.3969/j.issn.1000-386X.2011.01.072
    [4] Kee E, Farid H. A perceptual metric for photo retouching. Proceedings of the National Academy of Sciences of the United States of America, 2011, 108(50):19907-19912.[doi:10.1073/pnas.1110747108
    [5] Shah H, Shinde P, Kukreja J. Retouching detection and steganalysis. IJEIR, 2013, 2(6):487-490
    [6] Hinton GE, Salakhutdinov RR. Reducing the dimensionality of data with neural networks. Science, 2006, 313(5786):504-507.[doi:10.1126/science.1127647
    [7] Lecun Y, Bottou L, Bengio Y, et al. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 1998, 86(11):2278-2324.[doi:10.1109/5.726791
    [8] Krizhevsky A, Sutskever I, Hinton GE. ImageNet classification with deep convolutional neural networks. Proceedings of the 25th International Conference on Neural Information Processing Systems. Lake Tahoe, NV, USA. 2012. 1097-1105.
    [9] Hinton GE, Srivastava N, Krizhevsky A, et al. Improving neural networks by preventing co-adaptation of feature detectors. arXiv:1207.0580.
    [10] Lin M, Chen Q, Yan SC. Network in network. International Conference on Learning Representations. Banff, Canada. 2014.
    [11] He KM, Zhang XY, Ren SQ, et al. Deep residual learning for image recognition. Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition. Las Vegas, NV, USA. 2015. 770-778.
    [12] Girshick R, Donahue J, Darrell T, et al. Rich feature hierarchies for accurate object detection and semantic segmentation. Proceedings of 2014 IEEE Conference on Computer Vision and Pattern Recognition. Columbus, OH, USA. 2013. 580-587.
    [13] Shelhamer E, Long J, Darrell T. Fully convolutional networks for semantic segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017, 39(4):640-651.[doi:10.1109/TPAMI.2016.2572683
    [14] Chen JS, Kang XG, Liu Y, et al. Median filtering forensics based on convolutional neural networks. IEEE Signal Processing Letters, 2015, 22(11):1849-1853.[doi:10.1109/LSP.2015.2438008
    [15] Yang PP, Ni RR, Zhao Y. Recapture image forensics based on laplacian convolutional neural networks. Proceedings of the 15th International Workshop on Digital Forensics and Watermarking. Beijing, China. 2016. 119-128.
    [16] Bondi L, Baroffio L, Güera D, et al. First steps toward camera model identification with convolutional neural networks. IEEE Signal Processing Letters, 2017, 24(3):259-263.[doi:10.1109/LSP.2016.2641006
    [17] Qian YL, Dong J, Wang W, et al. Deep learning for steganalysis via convolutional neural networks. Proceedings of SPIE 9409, Media Watermarking, Security, and Forensics. San Francisco, CA, USA. 2015. 94090J.
    [18] Rao Y, Ni JQ. A deep learning approach to detection of splicing and copy-move forgeries in images. Proceedings of 2016 IEEE International Workshop on Information Forensics and Security (WIFS). Abu Dhabi, United Arab Emirates. 2017. 1-6.
    [19] Bharati A, Singh R, Vatsa M, et al. Detecting facial retouching using supervised deep learning. IEEE Transactions on Information Forensics and Security, 2016, 11(9):1903-1913.[doi:10.1109/TIFS.2016.2561898
    [20] Bharati A, Vatsa M, Singh R, et al. Demography-based facial retouching detection using subclass supervised sparse autoencoder. Proceedings of 2017 IEEE International Joint Conference on Biometrics (IJCB). Denver, CO, USA. 2017. 474-482.
    [21] Dalal N, Triggs B. Histograms of oriented gradients for human detection. Proceedings of 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. San Diego, CA, USA. 2005. 886-893.
    [22] Jia YQ, Shelhamer E, Donahue J, et al. Caffe:Convolutional architecture for fast feature embedding. Proceedings of the 22nd ACM international conference on Multimedia. Orlando, FL, USA. 2014. 675-678.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

张萌,王晓峰,胡姣姣,张德鹏.基于多尺度卷积神经网络的人脸润饰检测算法.计算机系统应用,2019,28(10):130-137

Copy
Share
Article Metrics
  • Abstract:2122
  • PDF: 2209
  • HTML: 1315
  • Cited by: 0
History
  • Received:March 01,2019
  • Revised:March 29,2019
  • Online: October 15,2019
  • Published: October 15,2019
Article QR Code
You are the first990998Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063