首页 > 其他分享 >ab

ab

时间:2023-06-30 13:22:16浏览次数:27  
标签:ab compression image results JPEG scaling images

In this section, to further assess the robustness of the TBNet, different attacks including JPEG compression and scaling, are first used to the testing images from the CASIA1.0 and Carvalho datasets, respectively, and then the performance of TBNet is assessed on these two datasets. Their results are shown in Figs. 6 and 7. We note that in the scaling attacks, the scaling ratios of 0.7 and 0.5 are used in our experiments, and the JPEG compression consists of quality factors of 70 and 50. MCC CASIA and MCC carvalho indicate the MCC performance of the TBNet when the CASIA1.0 and Carvalho datasets are separately employed. F1 CASIA and F1 carvalho indicate the F1 performance of the TBNet when the CASIA1.0 and Carvalho datasets are separately used. It is observed from  Fig. 6 that the MCC and F1 lines are essentially a straight line when the scaling attack is used so that the scaling attack has almost no effect on the TBNet. Similarly, when the JPEG compression attack is utilized in Fig. 7, the MCC and F1 lines show a slight downward trend, indicating that this attack degrades the performance of TBNet slightly, but it still can mine the remaining tampering traces from all of the channels. We think this is because some high-frequency information is lost in the jpeg compression process, and this information is very important for detecting the tampering image. Thus, these experimental results prove the stability of TBNet.

Following previous studies [3, 6, 11], we evaluate the model robustness against four image post-processing methods, Gaussian blur, Gaussian noise, JPEG compression and ISO noise over NIST dataset to verify the robustness of MSMGNet. The detailed results of robustness analysis are shown in Fig. 8. For each post-processing method, we vary the kernel size in Gaussian blur (from 3 to 9), variance of Gaussian noise (from 3 to 9), quality in JPEG compression (from 50 to 100), and variance of ISO noise (from 0.05 to 0.2) for comprehensive evaluation. As can be observed, Gaussian blur affects the detection performance more severely, in particular when a larger kernel size of 9×9, which blurs images and erases manipulation traces around tampered regions. In addition, compared with other baselines, MSMG-Net achieves the most general robust performance on ISO noise. The results of MSMG-Net is owed to our multi-scale multi-grained learning, where a parallel partial shunted transformer block designed to learn coarse-to-fine manipulation segmentation features. In summary, our model, MSMG-Net, consistently performs the best among all methods and can effectively tackle the challenges brought by various post-processing methods.
In this subsection, we evaluate the robustness of different methods by considering several common types of postprocessing. To this end, we enlarged the PS-scripted bookcover dataset by applying resizing, cropping, and noise adding to the generated tampered images with different factors and saving them with different JPEG qualities. Subsequently, we trained models with the enlarged dataset and performed testing on the PS-boundary and PS-arbitrary datasets. Three methods, i.e., Bayar’s 64 × 64, Forensic Similarity, and Mantra-net, were included for comparisons, since they perform relatively well in the experiments conducted in Section IV-C and IV-D.
As we all know, in real-world scenarios, different tampered images are usually subjected to different JPEG compressions. Training a specific ReLoc model for each JPEG compression under investigation is impractical because it would be timeconsuming and the implementations of JPEG compression would vary from manufacturers and software. Therefore, in this subsection, we evaluate the robustness against different JPEG compressions by using a single model. The average improvements for QF 70 are relatively slighter, which are 0.042, 0.037, and 0.021 for DFCN, SCSE-Unet, and MVSSnet, respectively. When the testing QF is unseen in the training phase (i.e., QF 60), the average improvements achieved by ReLoc for DFCN, SCSE-Unet, and MVSS-net are 0.035, 0.010, and 0.012, respectively, which are still considerable. These experimental results indicate that ReLoc is also effective for improving the robustness against multiple JPEG compressions.
Experimental results under JPEG Compression Attack. It is well-known that the JPEG compression process is lossy and leads to modified pixel values and information loss due to rounding errors. The comparative experimental results of the JPEG compression attack are presented in Figure 8(b). The results demonstrate that as the quality factor decreases from 100 to 50, the F1-Score of other deep learning detection methods experiences a significant decline, while ASGC-Net maintains its performance stability. Our module’s JPEG artifacts removal capability can effectively mitigate the impact of JPEG compression, restoring and enhancing tampered region traces, which significantly improves the performance.
Experimental Results under Image Blending. While image blending is a widely-used technique for post-processing tampered images, its robustness has not been comprehensively studied in recent research. To generate realistic tampered images, we employ image blending, which seamlessly merges overlapping areas from different images. This method ensures that the transformed pixels blend with the original image, obscuring boundaries and reducing color differences. Hence, it makes distinguishing between authentic and tampered images more challenging.
Experimental results under scaling attack. Scaling down an image rseduces its main features, making it challenging to identify tampering. Therefore, existing methods are often ineffective against scaling attacks, particularly image shrinking attacks. Specifically, we employ a range of scaling factors, varying from 0.6 to 1.4 with a step of 0.1, to resize the images.
The majority of images are vulnerable to unpredictability arising from content modifications or geometric distortions, such as compression, noise, and resizing. Therefore, it is essential for image tamper detection algorithms to consider the resilience of these alterations. To assess the effectiveness of our method on In-The-Wild and Carvalho datasets, we subjected the test images to various attacks, including JPEG compression, image scaling, and image blending.
The proposed method is capable of automatically adjusting the perceptual field size based on the shape of the tampered target, in addition to exhibiting significant resistance against external compression, noise, and scaling interference.

标签:ab,compression,image,results,JPEG,scaling,images
From: https://www.cnblogs.com/lwp-nicol/p/17516468.html

相关文章

  • Vue3 vite:is a JavaScript file. Did you mean to enable the 'allowJs' option?
    描述今天在vue3+vite下进行打包时,突然vscode报了一个error。 大概的意识是询问是否启用“allowJS”选项,因为该文件在程序内是指定用于编译的根文件。提示信息已经很明确了,下面从网上摘抄了下什么是allowJS选项。allowJs是1.8中新提供的选项。TypeScrip......
  • 基于mpc(最优控制)的车辆自适应巡航控制(acc),模型预测控制,通过carsim与matlab联防实现速度
    基于mpc(最优控制)的车辆自适应巡航控制(acc),模型预测控制,通过carsim与matlab联防实现速度与间距控制。最优控制(MPC):最优控制是一种优化方法,用于设计系统的控制策略,以使系统在给定约束条件下达到最优性能。车辆自适应巡航控制(ACC):车辆自适应巡航控制是一种智能驾驶技术,通过使用传感器和......
  • MATLAB仿真Gough-Stewart并联机器人斯图尔特6自由度并联机器人逆运动学仿真 动力学控
    MATLAB仿真Gough-Stewart并联机器人斯图尔特6自由度并联机器人逆运动学仿真动力学控制pid控制1.搭建了六自由度Stewart并联机器人simulinksimscape仿真模型2.建立了逆向运动学仿真输入位置和姿态求解各个杆长3.运用pid控制器进行动力学跟踪控制使用MATLAB进行了Gough-Stewar......
  • redis集群报错:MISCONF Redis is configured to save RDB snapshots, but it is curren
    之前在x86架构的服务器部署redis集群,未遇到题中问题;然而在ARM架构的服务器部署redis集群,第一次遇到如此问题。虽然问题已经解决,但不清楚问题的具体原因,在此做个记录。性能测试过程中,通过pinpoint捕捉到如下报错:MISCONFRedisisconfiguredtosaveRDBsnapshots,butitis......
  • 使用gitlab实现CICD
    一、概念介绍GitLabCI/CD是一个内置在GitLab中的工具,用于通过持续方法进行软件开发:ContinuousIntegration(CI) 持续集成ContinuousDelivery(CD)   持续交付ContinuousDeployment(CD)  持续部署持续集成的工作原理是将小的代码块推送到Git仓库中......
  • 看这个视频,4万人学会云上部署 Stable Diffusion
    目前大火的AIGC领域中,除了ChatGPT,StableDiffusion在文生图领域大放异彩,深刻影响着绘画、视频制作等相关领域。《动手吧,开发者》本期活动邀请B站知识区UP主、“林粒粒”手把手教大家用函数计算FC部署StableDiffusion,教程简单易上手,在B站已有4w多用户观看学习。......
  • gitlab-docker部署最终版
    下载gitlab镜像dockerpullgitlab/gitlab-ce:latest 运行mkdirgitlabgitlab/etcgitlab/loggitlab/optdockerrun-id-p3000:80-p9922:22-v/root/gitlab/etc:/etc/gitlab-v/root/gitlab/log:/var/log/gitlab-v/root/gitlab/opt:/var/opt/gitlab--restart......
  • MidJourney v5.2 、Stable Diffusion XL 0.9 出图对比
    最近两个最流行的AI图像生成器,Midjourney和StableDiffusion,都发布了重大更新。Midjourneyv5.2引入了许多新功能,包括“缩小”功能、“/缩短”命令、改进的图像质量等。StableDiffusionXL(SDXL)0.9则专注于改善图像质量和构图。新模型使用更大的数据集和更强大的算法,生成的图......
  • nginx error报错:nginx 8: Not enough storage is available to process this command
    在nginx.conf中http下添加如下代码:client_max_body_size2000m;client_body_buffer_size2000m;client_body_timeout500;client_header_buffer_size64k;client_header_timeout500;keepalive_requests300;large_client_header......
  • matlab调制解调 OFDM OTFS 16qam qpsk ldpc turbo在高斯白噪声,频率选择性衰落信道下
    matlab调制解调 OFDMOTFS16qamqpskldpcturbo在高斯白噪声,频率选择性衰落信道下的误比特率性能仿真,matlab代码OFDMsimulink 包括添加保护间隔(cp),信道均衡(ZFMMSEMRCMALMSEE)代码每行都有注释,适用于学习,附带仿真说明,完全不用担心看不懂原创文章,转载请说明出处,资料来......