Netinfo Security ›› 2023, Vol. 23 ›› Issue (4): 30-38.doi: 10.3969/j.issn.1671-1122.2023.04.004

Previous Articles     Next Articles

Image Attribution Algorithm with Multi-Distortion Robustness

QI Shuren1, ZHANG Yushu1(), XUE Mingfu1, HUA Zhongyun2   

  1. 1. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
    2. School of Computer Science and Technology, Harbin Institute of Technology(Shenzhen), Shenzhen 518055, China
  • Received:2022-10-20 Online:2023-04-10 Published:2023-04-18
  • Contact: ZHANG Yushu E-mail:yushu@nuaa.edu.cn

Abstract:

With the development of multimedia editing software and generative neural networks, the reliability of digital images is being continuously eroded. As an emerging forensic technique for provenance analysis, image attribution retraces the trustworthy source of the image under analysis and visualizes the editorial changes in such image. Thus, it can effectively combat malicious manipulation, assisting users to form correct judgments on image information. However, current image attribution methods are not sufficiently robust to the geometric transformations or signal corruptions in modern cyberspace, especially for images that contain multiple distortions. For this gap, an image attribution method with multi-distortion robustness was proposed. The method was based on an orthogonal and covariant image local representation strategy with robustness to multiple geometric transformations or signal corruptions. Two fast implementations were designed for sparse and dense representation tasks, respectively. The resulting image attribution method was able to efficiently retrace near-duplicate source in a trusted database, correct the geometric pose, and visualize potential tampering regions. In such process, the proposed method was robust to various benign transformations while maintaining sensitivity to subtle content manipulation. Simulation results show that the proposed image attribution method exhibits better forgery detection robustness and overall accuracy, as well as better feature compactness and implementation cost.

Key words: geometric invariance, image attribution, perceptual hashing, forgery detection, near-duplicate retrieval

CLC Number: