SlideShare a Scribd company logo
Operation-wise Attention Network for
Tampering Localization Fusion
Polychronis Charitidis, Giorgos Kordopatis-Zilos, Symeon Papadopoulos, Ioannis
Kompatsiaris
MeVer Team @ Information Technologies Institute (ITI) /
Centre for Research & Technology Hellas (CERTH)
Content-Based Multimedia Indexing Conference, June 28-30, 2021
WeVerify Project
● Goals
○ Address the advanced content verification challenges
○ Social media and web content analysis for detection of disinformation
○ Exposure of misleading and fabricated content
○ Platform for collaborative, decentralised content verification, tracking, and debunking.
● Developed tools
○ DeepFake detection service
○ Image Verification Assistant
Image Verification Assistant
● Goal: forgery localization in images.
● Report from various image forensics algorithms.
○ JPEG based methods, Noise-based methods, Deep-learning based methods
○ Focuses on splicing and copy-move manipulations
● Inspect the multiple reports in tandem.
Tampered Image Mask Localizations from Forensic Algorithms
Source: DEFACTO dataset
Motivation
● Observations:
○ Many forensics output visualizations increases the complexity of the results, especially for
non-experts.
■ Each algorithm has requires specific knowledge for proper interpretation.
○ Some of these forensics results are complementary to each other so their combination could
potentially lead to better results
● Solution and contributions:
○ Develop a fully automatic fusion approach that is able to combine diverse forensics signals.
○ The combined result:
■ is more robust and accurate
■ is easier to interpret and requires no specialized knowledge
■ empower non-experts in image verification
Methodology
● For this work we select 5 forensics algorithms for fusion.
● These algorithms were selected among others based on their performance on
forgery localization datasets
○ ADQ1 and DCT that both base their detection on analysis of the JPEG compression, in the
transform domain
○ BLK and CAGI that base their detection on analysis of the JPEG compression in the spatial
domain
○ Splicebuster which is a noise-based detector
● Train a deep learning architecture to fuse the diverse tampering localization
algorithms
○ Fully automatic
○ Complex and diverse features
○ Availability of large-scale datasets
Models
● We considered two different models:
○ Eff-B4-Unet: A U-Net based architecture that uses Efficient-B4 as an encoder
○ Operation-wise Attention Fusion network (OwAF), which is an adapted image
restoration architecture
■ Operation-wise Attention layer:
Training and Evaluation process
● Training dataset:
○ DEFACTO dataset (Mahfoudi et al., 2019)
○ Contains various synthetic manipulations like splicing and copy-move
○ 15,000 tampered images / 75,000 forensics algorithms localizations
● Evaluation datasets:
○ DEFACTO test dataset
■ Contains 1000 tampered images
○ CASIA V2.0 dataset (Dong et al., 2013)
■ Contains 5,123 tampered images
○ The IFS-TC Image Forensics Challenge set
■ Contains 450 tampered images
● Compared our approach with another fusion approach (Iakovidou et al., 2020)
● Metrics: F1, IoU
Results on DEFACTO test dataset
MODELS MACRO-F1 IOU
BLK 0.463 0.053
ADQ1 0.573 0.123
CAGI 0.479 0.072
DCT 0.509 0.101
Splicebuster 0.554 0.087
Eff-B4-Unet 0.908 0.690
OwAF 0.912 0.707
Results on CASIA v2 dataset
MODELS MACRO-F1 IOU
BLK 0.509 0.089
ADQ1 0.573 0.130
CAGI 0.502 0.094
DCT 0.546 0.113
Splicebuster 0.576 0.093
Iakovidou et al. (2020) 0.598 0.166
OwAF 0.611 0.172
Results on IFS-TC dataset
MODELS MACRO-F1 IOU
BLK 0.459 0.063
ADQ1 0.485 0.076
CAGI 0.506 0.091
DCT 0.467 0.065
Splicebuster 0.560 0.129
Iakovidou et al. (2020) 0.549 0.112
OwAF 0.529 0.106
Discussion and Limitations
● The reported experimental results are promising and in many cases
outperform the individual forensics techniques.
● Our automatic approach outperforms a competing fusion approach in many
cases.
● The results of our approach are easier to interpret by non-experts.
● An important limitation of this work is the generalization ability of the
fusion model.
● Our approach performance depends on the performance of the individual
forensic algorithms.
Future work
● To deal with the generalization, we will try to increase the size of the training
dataset and include different manipulations from other datasets.
● We will experiment with task-specific regularization techniques, like
localization map dropout.
● We plan to experiment with multi-stream fusion architectures that besides the
forensics localization maps, will consider the input image itself.
Thank you!
Polychronis Charitidis / charitidis@iti.gr
Media Verification Team / https://mever.gr / @meverteam
WeVerify project / http://www.weverify.eu / @WeVerify

More Related Content

What's hot

Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Universitat Politècnica de Catalunya
 
Keyframe-based Video Summarization Designer
Keyframe-based Video Summarization DesignerKeyframe-based Video Summarization Designer
Keyframe-based Video Summarization Designer
Universitat Politècnica de Catalunya
 
An automated approach for the recognition of bengali license plates presentation
An automated approach for the recognition of bengali license plates presentationAn automated approach for the recognition of bengali license plates presentation
An automated approach for the recognition of bengali license plates presentation
MD Abdullah Al Nasim
 
auto-assistance system for visually impaired person
auto-assistance system for visually impaired personauto-assistance system for visually impaired person
auto-assistance system for visually impaired person
shahsamkit73
 
Automatic Building detection for satellite Images using IGV and DSM
Automatic Building detection for satellite Images using IGV and DSMAutomatic Building detection for satellite Images using IGV and DSM
Automatic Building detection for satellite Images using IGV and DSM
Amit Raikar
 
The Impact of Segmentation on the Accuracy and Sensitivity of a Melanoma Clas...
The Impact of Segmentation on the Accuracy and Sensitivity of a Melanoma Clas...The Impact of Segmentation on the Accuracy and Sensitivity of a Melanoma Clas...
The Impact of Segmentation on the Accuracy and Sensitivity of a Melanoma Clas...
Oge Marques
 
Digest of Human Detection from CVPR2015
Digest of Human Detection from CVPR2015Digest of Human Detection from CVPR2015
Digest of Human Detection from CVPR2015
belltailjp
 
Fast object re detection and localization in video for spatio-temporal fragme...
Fast object re detection and localization in video for spatio-temporal fragme...Fast object re detection and localization in video for spatio-temporal fragme...
Fast object re detection and localization in video for spatio-temporal fragme...
MediaMixerCommunity
 
76201950
7620195076201950
76201950
IJRAT
 
Color based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlabColor based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlab
Kamal Pradhan
 
Dsip and its biometrics appln
Dsip and its biometrics applnDsip and its biometrics appln
Dsip and its biometrics appln
Dr. Vinayak Bharadi
 
unrban-building-damage-detection-by-PJLi.ppt
unrban-building-damage-detection-by-PJLi.pptunrban-building-damage-detection-by-PJLi.ppt
unrban-building-damage-detection-by-PJLi.pptgrssieee
 
An Image Based PCB Fault Detection and Its Classification
An Image Based PCB Fault Detection and Its ClassificationAn Image Based PCB Fault Detection and Its Classification
An Image Based PCB Fault Detection and Its Classification
rahulmonikasharma
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
IRJET Journal
 
Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...
IJECEIAES
 
Александр Заричковый "Faster than real-time face detection"
Александр Заричковый "Faster than real-time face detection"Александр Заричковый "Faster than real-time face detection"
Александр Заричковый "Faster than real-time face detection"
Fwdays
 
Detecting and Avoiding Frontal Obstacles from a Monocular Camera for Micro Un...
Detecting and Avoiding Frontal Obstacles from a Monocular Camera for Micro Un...Detecting and Avoiding Frontal Obstacles from a Monocular Camera for Micro Un...
Detecting and Avoiding Frontal Obstacles from a Monocular Camera for Micro Un...
Mohamed Elawady
 
Step zhedong
Step zhedongStep zhedong
Step zhedong
哲东 郑
 

What's hot (19)

Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
 
Keyframe-based Video Summarization Designer
Keyframe-based Video Summarization DesignerKeyframe-based Video Summarization Designer
Keyframe-based Video Summarization Designer
 
An automated approach for the recognition of bengali license plates presentation
An automated approach for the recognition of bengali license plates presentationAn automated approach for the recognition of bengali license plates presentation
An automated approach for the recognition of bengali license plates presentation
 
auto-assistance system for visually impaired person
auto-assistance system for visually impaired personauto-assistance system for visually impaired person
auto-assistance system for visually impaired person
 
Automatic Building detection for satellite Images using IGV and DSM
Automatic Building detection for satellite Images using IGV and DSMAutomatic Building detection for satellite Images using IGV and DSM
Automatic Building detection for satellite Images using IGV and DSM
 
The Impact of Segmentation on the Accuracy and Sensitivity of a Melanoma Clas...
The Impact of Segmentation on the Accuracy and Sensitivity of a Melanoma Clas...The Impact of Segmentation on the Accuracy and Sensitivity of a Melanoma Clas...
The Impact of Segmentation on the Accuracy and Sensitivity of a Melanoma Clas...
 
Digest of Human Detection from CVPR2015
Digest of Human Detection from CVPR2015Digest of Human Detection from CVPR2015
Digest of Human Detection from CVPR2015
 
Fast object re detection and localization in video for spatio-temporal fragme...
Fast object re detection and localization in video for spatio-temporal fragme...Fast object re detection and localization in video for spatio-temporal fragme...
Fast object re detection and localization in video for spatio-temporal fragme...
 
76201950
7620195076201950
76201950
 
Color based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlabColor based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlab
 
Dsip and its biometrics appln
Dsip and its biometrics applnDsip and its biometrics appln
Dsip and its biometrics appln
 
unrban-building-damage-detection-by-PJLi.ppt
unrban-building-damage-detection-by-PJLi.pptunrban-building-damage-detection-by-PJLi.ppt
unrban-building-damage-detection-by-PJLi.ppt
 
An Image Based PCB Fault Detection and Its Classification
An Image Based PCB Fault Detection and Its ClassificationAn Image Based PCB Fault Detection and Its Classification
An Image Based PCB Fault Detection and Its Classification
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
 
End of Year Presentation
End of Year PresentationEnd of Year Presentation
End of Year Presentation
 
Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...
 
Александр Заричковый "Faster than real-time face detection"
Александр Заричковый "Faster than real-time face detection"Александр Заричковый "Faster than real-time face detection"
Александр Заричковый "Faster than real-time face detection"
 
Detecting and Avoiding Frontal Obstacles from a Monocular Camera for Micro Un...
Detecting and Avoiding Frontal Obstacles from a Monocular Camera for Micro Un...Detecting and Avoiding Frontal Obstacles from a Monocular Camera for Micro Un...
Detecting and Avoiding Frontal Obstacles from a Monocular Camera for Micro Un...
 
Step zhedong
Step zhedongStep zhedong
Step zhedong
 

Similar to Operation wise attention network for tampering localization fusion

1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi
1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi
1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi
sathiyasowmi
 
01-06 OCRE Test Suite - Fernandes.pdf
01-06 OCRE Test Suite - Fernandes.pdf01-06 OCRE Test Suite - Fernandes.pdf
01-06 OCRE Test Suite - Fernandes.pdf
OCRE | Open Clouds for Research Environments
 
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionSecure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
IJAEMSJORNAL
 
team12.project_ver_1_(1).pptx
team12.project_ver_1_(1).pptxteam12.project_ver_1_(1).pptx
team12.project_ver_1_(1).pptx
RitwikShrivastava1
 
Transfer Learning Model for Image Segmentation by Integrating U-NetPlusPlus a...
Transfer Learning Model for Image Segmentation by Integrating U-NetPlusPlus a...Transfer Learning Model for Image Segmentation by Integrating U-NetPlusPlus a...
Transfer Learning Model for Image Segmentation by Integrating U-NetPlusPlus a...
YutaSuzuki27
 
IRJET- Object Detection and Recognition using Single Shot Multi-Box Detector
IRJET- Object Detection and Recognition using Single Shot Multi-Box DetectorIRJET- Object Detection and Recognition using Single Shot Multi-Box Detector
IRJET- Object Detection and Recognition using Single Shot Multi-Box Detector
IRJET Journal
 
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hubCloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Björn Backeberg
 
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
IRJET Journal
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018
InVID Project
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Amélie Gyrard
 
End-to-end deep auto-encoder for segmenting a moving object with limited tra...
End-to-end deep auto-encoder for segmenting a moving object  with limited tra...End-to-end deep auto-encoder for segmenting a moving object  with limited tra...
End-to-end deep auto-encoder for segmenting a moving object with limited tra...
IJECEIAES
 
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNINGCAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNING
IRJET Journal
 
Thoughts on Cybersecurity
Thoughts on CybersecurityThoughts on Cybersecurity
Thoughts on Cybersecurity
Frank Wuerthwein
 
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLINGUSING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
IRJET Journal
 
OGF Introductory Overview - OGF 44 at EGI Conference 2015
OGF Introductory Overview - OGF 44 at EGI Conference 2015OGF Introductory Overview - OGF 44 at EGI Conference 2015
OGF Introductory Overview - OGF 44 at EGI Conference 2015
Alan Sill
 
OpenACC and Hackathons Monthly Highlights: April 2023
OpenACC and Hackathons Monthly Highlights: April  2023OpenACC and Hackathons Monthly Highlights: April  2023
OpenACC and Hackathons Monthly Highlights: April 2023
OpenACC
 
IRJET- Embedded System for Automatic Door Access using Face Recognition Te...
IRJET- 	  Embedded System for Automatic Door Access using Face Recognition Te...IRJET- 	  Embedded System for Automatic Door Access using Face Recognition Te...
IRJET- Embedded System for Automatic Door Access using Face Recognition Te...
IRJET Journal
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
eSAT Publishing House
 
UberCloud HPC Experiment Introduction for Beginners
UberCloud HPC Experiment Introduction for BeginnersUberCloud HPC Experiment Introduction for Beginners
UberCloud HPC Experiment Introduction for Beginners
hpcexperiment
 
Formal Methods for Dependable Neural Networks
Formal Methods for Dependable Neural Networks Formal Methods for Dependable Neural Networks
Formal Methods for Dependable Neural Networks
Chih-Hong Cheng
 

Similar to Operation wise attention network for tampering localization fusion (20)

1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi
1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi
1 st review pothole srm bi1 st review pothole srm bi1 st review pothole srm bi
 
01-06 OCRE Test Suite - Fernandes.pdf
01-06 OCRE Test Suite - Fernandes.pdf01-06 OCRE Test Suite - Fernandes.pdf
01-06 OCRE Test Suite - Fernandes.pdf
 
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionSecure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
 
team12.project_ver_1_(1).pptx
team12.project_ver_1_(1).pptxteam12.project_ver_1_(1).pptx
team12.project_ver_1_(1).pptx
 
Transfer Learning Model for Image Segmentation by Integrating U-NetPlusPlus a...
Transfer Learning Model for Image Segmentation by Integrating U-NetPlusPlus a...Transfer Learning Model for Image Segmentation by Integrating U-NetPlusPlus a...
Transfer Learning Model for Image Segmentation by Integrating U-NetPlusPlus a...
 
IRJET- Object Detection and Recognition using Single Shot Multi-Box Detector
IRJET- Object Detection and Recognition using Single Shot Multi-Box DetectorIRJET- Object Detection and Recognition using Single Shot Multi-Box Detector
IRJET- Object Detection and Recognition using Single Shot Multi-Box Detector
 
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hubCloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
 
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
 
End-to-end deep auto-encoder for segmenting a moving object with limited tra...
End-to-end deep auto-encoder for segmenting a moving object  with limited tra...End-to-end deep auto-encoder for segmenting a moving object  with limited tra...
End-to-end deep auto-encoder for segmenting a moving object with limited tra...
 
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNINGCAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNING
 
Thoughts on Cybersecurity
Thoughts on CybersecurityThoughts on Cybersecurity
Thoughts on Cybersecurity
 
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLINGUSING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
 
OGF Introductory Overview - OGF 44 at EGI Conference 2015
OGF Introductory Overview - OGF 44 at EGI Conference 2015OGF Introductory Overview - OGF 44 at EGI Conference 2015
OGF Introductory Overview - OGF 44 at EGI Conference 2015
 
OpenACC and Hackathons Monthly Highlights: April 2023
OpenACC and Hackathons Monthly Highlights: April  2023OpenACC and Hackathons Monthly Highlights: April  2023
OpenACC and Hackathons Monthly Highlights: April 2023
 
IRJET- Embedded System for Automatic Door Access using Face Recognition Te...
IRJET- 	  Embedded System for Automatic Door Access using Face Recognition Te...IRJET- 	  Embedded System for Automatic Door Access using Face Recognition Te...
IRJET- Embedded System for Automatic Door Access using Face Recognition Te...
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
 
UberCloud HPC Experiment Introduction for Beginners
UberCloud HPC Experiment Introduction for BeginnersUberCloud HPC Experiment Introduction for Beginners
UberCloud HPC Experiment Introduction for Beginners
 
Formal Methods for Dependable Neural Networks
Formal Methods for Dependable Neural Networks Formal Methods for Dependable Neural Networks
Formal Methods for Dependable Neural Networks
 

More from Weverify

MeVer tools for disinformation detection
MeVer tools for disinformation detectionMeVer tools for disinformation detection
MeVer tools for disinformation detection
Weverify
 
TTO2021: Cross-Lingual Rumour Stance Classification: a First Study with BERT...
TTO2021: Cross-Lingual Rumour Stance Classification:  a First Study with BERT...TTO2021: Cross-Lingual Rumour Stance Classification:  a First Study with BERT...
TTO2021: Cross-Lingual Rumour Stance Classification: a First Study with BERT...
Weverify
 
MeVer tools for disinformation detection
MeVer tools for disinformation detectionMeVer tools for disinformation detection
MeVer tools for disinformation detection
Weverify
 
Operation-wise Attention Network for Tampering Localization Fusion.
Operation-wise Attention Network for Tampering Localization Fusion.Operation-wise Attention Network for Tampering Localization Fusion.
Operation-wise Attention Network for Tampering Localization Fusion.
Weverify
 
L tvs disinfo - 24 nov 2020
L tvs disinfo - 24 nov 2020L tvs disinfo - 24 nov 2020
L tvs disinfo - 24 nov 2020
Weverify
 
RDSM workshop 13 dec2020
RDSM workshop 13 dec2020RDSM workshop 13 dec2020
RDSM workshop 13 dec2020
Weverify
 
We verify balkan disinformation panel
We verify balkan disinformation panelWe verify balkan disinformation panel
We verify balkan disinformation panel
Weverify
 
Text analysis for disinformation detection 17 dec 2020
Text analysis for disinformation detection    17 dec 2020Text analysis for disinformation detection    17 dec 2020
Text analysis for disinformation detection 17 dec 2020
Weverify
 
20200112 EUDL training for adult learners
20200112 EUDL training for adult learners20200112 EUDL training for adult learners
20200112 EUDL training for adult learners
Weverify
 
#Semiform2020 02 11 2020
#Semiform2020 02 11 2020#Semiform2020 02 11 2020
#Semiform2020 02 11 2020
Weverify
 
2nd workshop em data science 08 02 2021
2nd workshop em data science 08 02 20212nd workshop em data science 08 02 2021
2nd workshop em data science 08 02 2021
Weverify
 
Stance classification. Presentation at QMUL 11 Nov 2020
Stance classification. Presentation at QMUL 11 Nov 2020Stance classification. Presentation at QMUL 11 Nov 2020
Stance classification. Presentation at QMUL 11 Nov 2020
Weverify
 
Stance classification. Uni Cambridge 22 Jan 2021
Stance classification. Uni Cambridge 22 Jan 2021Stance classification. Uni Cambridge 22 Jan 2021
Stance classification. Uni Cambridge 22 Jan 2021
Weverify
 
EDMO workshop 17 Feb 2021
EDMO workshop 17 Feb 2021EDMO workshop 17 Feb 2021
EDMO workshop 17 Feb 2021
Weverify
 
Edmo research + platforms panel
Edmo research + platforms panel Edmo research + platforms panel
Edmo research + platforms panel
Weverify
 
Qurator keynote berlin 2101 2020
Qurator keynote berlin 2101 2020Qurator keynote berlin 2101 2020
Qurator keynote berlin 2101 2020
Weverify
 
Aacl / SoBigData 2020 06 12 2020
Aacl / SoBigData 2020 06 12 2020Aacl / SoBigData 2020 06 12 2020
Aacl / SoBigData 2020 06 12 2020
Weverify
 
TTO Keynote 08 10 2021
TTO Keynote 08 10 2021TTO Keynote 08 10 2021
TTO Keynote 08 10 2021
Weverify
 
We verify @ meta forum 2020 - Dec 2 2020
We verify @ meta forum 2020 - Dec 2 2020We verify @ meta forum 2020 - Dec 2 2020
We verify @ meta forum 2020 - Dec 2 2020
Weverify
 
Stance classification - Presentation QMUL by Carolina Scarton, USFD
Stance classification - Presentation QMUL by Carolina Scarton, USFDStance classification - Presentation QMUL by Carolina Scarton, USFD
Stance classification - Presentation QMUL by Carolina Scarton, USFD
Weverify
 

More from Weverify (20)

MeVer tools for disinformation detection
MeVer tools for disinformation detectionMeVer tools for disinformation detection
MeVer tools for disinformation detection
 
TTO2021: Cross-Lingual Rumour Stance Classification: a First Study with BERT...
TTO2021: Cross-Lingual Rumour Stance Classification:  a First Study with BERT...TTO2021: Cross-Lingual Rumour Stance Classification:  a First Study with BERT...
TTO2021: Cross-Lingual Rumour Stance Classification: a First Study with BERT...
 
MeVer tools for disinformation detection
MeVer tools for disinformation detectionMeVer tools for disinformation detection
MeVer tools for disinformation detection
 
Operation-wise Attention Network for Tampering Localization Fusion.
Operation-wise Attention Network for Tampering Localization Fusion.Operation-wise Attention Network for Tampering Localization Fusion.
Operation-wise Attention Network for Tampering Localization Fusion.
 
L tvs disinfo - 24 nov 2020
L tvs disinfo - 24 nov 2020L tvs disinfo - 24 nov 2020
L tvs disinfo - 24 nov 2020
 
RDSM workshop 13 dec2020
RDSM workshop 13 dec2020RDSM workshop 13 dec2020
RDSM workshop 13 dec2020
 
We verify balkan disinformation panel
We verify balkan disinformation panelWe verify balkan disinformation panel
We verify balkan disinformation panel
 
Text analysis for disinformation detection 17 dec 2020
Text analysis for disinformation detection    17 dec 2020Text analysis for disinformation detection    17 dec 2020
Text analysis for disinformation detection 17 dec 2020
 
20200112 EUDL training for adult learners
20200112 EUDL training for adult learners20200112 EUDL training for adult learners
20200112 EUDL training for adult learners
 
#Semiform2020 02 11 2020
#Semiform2020 02 11 2020#Semiform2020 02 11 2020
#Semiform2020 02 11 2020
 
2nd workshop em data science 08 02 2021
2nd workshop em data science 08 02 20212nd workshop em data science 08 02 2021
2nd workshop em data science 08 02 2021
 
Stance classification. Presentation at QMUL 11 Nov 2020
Stance classification. Presentation at QMUL 11 Nov 2020Stance classification. Presentation at QMUL 11 Nov 2020
Stance classification. Presentation at QMUL 11 Nov 2020
 
Stance classification. Uni Cambridge 22 Jan 2021
Stance classification. Uni Cambridge 22 Jan 2021Stance classification. Uni Cambridge 22 Jan 2021
Stance classification. Uni Cambridge 22 Jan 2021
 
EDMO workshop 17 Feb 2021
EDMO workshop 17 Feb 2021EDMO workshop 17 Feb 2021
EDMO workshop 17 Feb 2021
 
Edmo research + platforms panel
Edmo research + platforms panel Edmo research + platforms panel
Edmo research + platforms panel
 
Qurator keynote berlin 2101 2020
Qurator keynote berlin 2101 2020Qurator keynote berlin 2101 2020
Qurator keynote berlin 2101 2020
 
Aacl / SoBigData 2020 06 12 2020
Aacl / SoBigData 2020 06 12 2020Aacl / SoBigData 2020 06 12 2020
Aacl / SoBigData 2020 06 12 2020
 
TTO Keynote 08 10 2021
TTO Keynote 08 10 2021TTO Keynote 08 10 2021
TTO Keynote 08 10 2021
 
We verify @ meta forum 2020 - Dec 2 2020
We verify @ meta forum 2020 - Dec 2 2020We verify @ meta forum 2020 - Dec 2 2020
We verify @ meta forum 2020 - Dec 2 2020
 
Stance classification - Presentation QMUL by Carolina Scarton, USFD
Stance classification - Presentation QMUL by Carolina Scarton, USFDStance classification - Presentation QMUL by Carolina Scarton, USFD
Stance classification - Presentation QMUL by Carolina Scarton, USFD
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Operation wise attention network for tampering localization fusion

  • 1. Operation-wise Attention Network for Tampering Localization Fusion Polychronis Charitidis, Giorgos Kordopatis-Zilos, Symeon Papadopoulos, Ioannis Kompatsiaris MeVer Team @ Information Technologies Institute (ITI) / Centre for Research & Technology Hellas (CERTH) Content-Based Multimedia Indexing Conference, June 28-30, 2021
  • 2. WeVerify Project ● Goals ○ Address the advanced content verification challenges ○ Social media and web content analysis for detection of disinformation ○ Exposure of misleading and fabricated content ○ Platform for collaborative, decentralised content verification, tracking, and debunking. ● Developed tools ○ DeepFake detection service ○ Image Verification Assistant
  • 3. Image Verification Assistant ● Goal: forgery localization in images. ● Report from various image forensics algorithms. ○ JPEG based methods, Noise-based methods, Deep-learning based methods ○ Focuses on splicing and copy-move manipulations ● Inspect the multiple reports in tandem. Tampered Image Mask Localizations from Forensic Algorithms Source: DEFACTO dataset
  • 4. Motivation ● Observations: ○ Many forensics output visualizations increases the complexity of the results, especially for non-experts. ■ Each algorithm has requires specific knowledge for proper interpretation. ○ Some of these forensics results are complementary to each other so their combination could potentially lead to better results ● Solution and contributions: ○ Develop a fully automatic fusion approach that is able to combine diverse forensics signals. ○ The combined result: ■ is more robust and accurate ■ is easier to interpret and requires no specialized knowledge ■ empower non-experts in image verification
  • 5. Methodology ● For this work we select 5 forensics algorithms for fusion. ● These algorithms were selected among others based on their performance on forgery localization datasets ○ ADQ1 and DCT that both base their detection on analysis of the JPEG compression, in the transform domain ○ BLK and CAGI that base their detection on analysis of the JPEG compression in the spatial domain ○ Splicebuster which is a noise-based detector ● Train a deep learning architecture to fuse the diverse tampering localization algorithms ○ Fully automatic ○ Complex and diverse features ○ Availability of large-scale datasets
  • 6. Models ● We considered two different models: ○ Eff-B4-Unet: A U-Net based architecture that uses Efficient-B4 as an encoder ○ Operation-wise Attention Fusion network (OwAF), which is an adapted image restoration architecture ■ Operation-wise Attention layer:
  • 7. Training and Evaluation process ● Training dataset: ○ DEFACTO dataset (Mahfoudi et al., 2019) ○ Contains various synthetic manipulations like splicing and copy-move ○ 15,000 tampered images / 75,000 forensics algorithms localizations ● Evaluation datasets: ○ DEFACTO test dataset ■ Contains 1000 tampered images ○ CASIA V2.0 dataset (Dong et al., 2013) ■ Contains 5,123 tampered images ○ The IFS-TC Image Forensics Challenge set ■ Contains 450 tampered images ● Compared our approach with another fusion approach (Iakovidou et al., 2020) ● Metrics: F1, IoU
  • 8. Results on DEFACTO test dataset MODELS MACRO-F1 IOU BLK 0.463 0.053 ADQ1 0.573 0.123 CAGI 0.479 0.072 DCT 0.509 0.101 Splicebuster 0.554 0.087 Eff-B4-Unet 0.908 0.690 OwAF 0.912 0.707
  • 9. Results on CASIA v2 dataset MODELS MACRO-F1 IOU BLK 0.509 0.089 ADQ1 0.573 0.130 CAGI 0.502 0.094 DCT 0.546 0.113 Splicebuster 0.576 0.093 Iakovidou et al. (2020) 0.598 0.166 OwAF 0.611 0.172
  • 10. Results on IFS-TC dataset MODELS MACRO-F1 IOU BLK 0.459 0.063 ADQ1 0.485 0.076 CAGI 0.506 0.091 DCT 0.467 0.065 Splicebuster 0.560 0.129 Iakovidou et al. (2020) 0.549 0.112 OwAF 0.529 0.106
  • 11. Discussion and Limitations ● The reported experimental results are promising and in many cases outperform the individual forensics techniques. ● Our automatic approach outperforms a competing fusion approach in many cases. ● The results of our approach are easier to interpret by non-experts. ● An important limitation of this work is the generalization ability of the fusion model. ● Our approach performance depends on the performance of the individual forensic algorithms.
  • 12. Future work ● To deal with the generalization, we will try to increase the size of the training dataset and include different manipulations from other datasets. ● We will experiment with task-specific regularization techniques, like localization map dropout. ● We plan to experiment with multi-stream fusion architectures that besides the forensics localization maps, will consider the input image itself.
  • 13. Thank you! Polychronis Charitidis / charitidis@iti.gr Media Verification Team / https://mever.gr / @meverteam WeVerify project / http://www.weverify.eu / @WeVerify