Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (6): 207-218.doi: 10.19665/j.issn1001-2400.20230105

• Cyberspace Security • Previous Articles     Next Articles

Document image forgery localization and desensitization localization using the attention mechanism

ZHENG Kengtao1(),LI Bin1,2(),ZENG Jinhua3()   

  1. 1. Guangdong Key Lab of Intelligent Information Processing,Shenzhen Key Laboratory of Media Security, Shenzhen University,Shenzhen 518060,China
    2. Shenzhen Institute of Artificial Intelligence and Robotics for Society,Shenzhen 518129,China
    3. Academy of Forensic Science,Shanghai 200063,China
  • Received:2022-10-30 Online:2023-12-20 Published:2024-01-22

Abstract:

Some important documents such as contracts,certificates and notifications are often stored and disseminated in a digital format.However,due to the inclusion of key text information,such images are often easily illegally tampered with and used,causing serious social impact and harm.Meanwhile,taking personal privacy and security into account,people also tend to remove sensitive information from these digital documents.Malicious tampering and desensitization can both introduce extra traces to the original images,but there are differences in motivation and operations.Therefore,it is necessary to differentiate them to locate the tamper areas more accurately.To address this issue,we propose a convolutional encoder-decoder network,which has multi-level features of the encoder through U-Net connection,effectively learning tampering and desensitization traces.At the same time,several Squeeze-and-Excitation attention mechanism modules are introduced in the decoder to suppress image content and focus on weaker operation traces,to improve the detection ability of the network.To effectively assist network training,we build a document image forensics dataset containing common tampering and desensitization operations.Experimental results show that our model performs effectively both on this dataset and on the public tamper datasets,and outperforms comparison algorithms.At the same time,the proposed method is robust to several common post-processing operations.

Key words: document image, forgery localization, desensitization localization, U-Net, squeeze-and-excitation attention mechanism

CLC Number: 

  • TP391