JOURNAL ARTICLE

A Multiscale Fusion Lightweight Image-Splicing Tamper-Detection Model

Dan ZhaoXuedong Tian

Year: 2022 Journal:   Electronics Vol: 11 (16)Pages: 2621-2621   Publisher: Multidisciplinary Digital Publishing Institute

Abstract

The easy availability and usability of photo-editing tools have increased the number of forgery attacks, primarily splicing attacks, thereby increasing cybercrimes. Because of an existing image-splicing tamper-detection algorithm based on deep learning with high model complexity and weak robustness, a multiscale fusion lightweight model for image-splicing tamper detection is proposed. For the above problems and to improve MobileNetV2, the structural block of the classification part of the original network structure was removed, the stride of the sixth largest structural block of the network was changed to 1, the dilated convolution was used instead of downsampling, and the features extracted from the second and third large structural blocks in the network were downsampled with maximal pooling; then, the constraint on the backbone network was increased by jumping connections. Combined with the pyramid pooling module, the acquired feature layers were divided into regions of different sizes for average pooling; then, all feature layers were fused. The experimental results show that it had a low number of parameters and required a small amount of computation, achieving 91.0% and 96.4% precision on CASIA and COLUMB, respectively, and 83.2% and 88.1% F-measure on CASIA and COLUMB, respectively.

Keywords:
Pooling Computer science Robustness (evolution) Artificial intelligence Pattern recognition (psychology) Pyramid (geometry) Upsampling Block (permutation group theory) Feature (linguistics) Convolutional neural network Deep learning Image (mathematics) Mathematics

Metrics

14
Cited By
1.73
FWCI (Field Weighted Citation Impact)
36
Refs
0.83
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Digital Media Forensic Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
© 2026 ScienceGate Book Chapters — All rights reserved.