Image-anomaly detection, which is widely used in industrial fields. Previous studies that attempted to address this problem often trained convolutional neural network-based models(e.g., autoencoders and generative adv...Image-anomaly detection, which is widely used in industrial fields. Previous studies that attempted to address this problem often trained convolutional neural network-based models(e.g., autoencoders and generative adversarial networks) to reconstruct covered parts of input images and calculate the difference between the input and reconstructed images. However, convolutional operations are effective at extracting local features, making it difficult to identify larger image anomalies. Method To this end, we propose a transformer architecture based on mutual attention for image-anomaly separation. This architecture can capture long-term dependencies and fuse local and global features to facilitate better image-anomaly detection. Result Our method was extensively evaluated on several benchmarks, and experimental results showed that it improved the detection capability by 3.1% and localization capability by 1.0% compared with state-of-the-art reconstruction-based methods.展开更多
Image forgery detection remains a challenging problem.For the most common copy-move forgery detection,the robustness and accuracy of existing methods can still be further improved.To the best of our knowledge,we are t...Image forgery detection remains a challenging problem.For the most common copy-move forgery detection,the robustness and accuracy of existing methods can still be further improved.To the best of our knowledge,we are the first to propose an image copy-move forgery passive detection method by combining the improved pulse coupled neural network(PCNN)and the self-selected sub-images.Our method has the following steps:First,contour detection is performed on the input color image,and bounding boxes are drawn to frame the contours to form suspected forgery sub-images.Second,by improving PCNN to perform feature extraction of sub-images,the feature invariance of rotation,scaling,noise adding,and so on can be achieved.Finally,the dual feature matching is used to match the features and locate the forgery regions.What’s more,the self-selected sub-images can quickly obtain suspected forgery sub-images and lessen the workload of feature extraction,and the improved PCNN can extract image features with high robustness.Through experiments on the standard image forgery datasets CoMoFoD and CASIA,it is effectively verified that the robustness score and accuracy of proposed method are much higher than the current best method,which is a more efficient image copy-move forgery passive detection method.展开更多
1 Introduction and main contributions Location-based services are springing up around us,while leakages of users'privacy are inevitable during services.Even worse,adversaries may analyze intercepted service data,a...1 Introduction and main contributions Location-based services are springing up around us,while leakages of users'privacy are inevitable during services.Even worse,adversaries may analyze intercepted service data,and extract more privacy like health and property.Therefore,privacy preservation is an indispensable guarantee on LBS security.Among the previous approaches to privacy preservation,k-anonymity-based ones have drawn much research attention[1-3].However,some privacy concern will be aroused if these schemes are adopted directly.For instance,Ut issues a query"Find the nearest hotel around me"in such an area as Fig.1(privacy profile k=4).DLS algorithm[2]constructs anonymity set A because these four cells have similar probabilities of being queried in the past.However,experienced adversaries can exclude some cells if they have learned rich contextual knowledge(side information)from historical data,such as features of each cell and LBS users.展开更多
基金Supported by the National Natural Science Foundation of China (No. 61772327)State Grid Gansu Electric Power Company(No. H2019-275)Shanghai Engineering Research Center on Big Data Management System (No.H2020-216)。
文摘Image-anomaly detection, which is widely used in industrial fields. Previous studies that attempted to address this problem often trained convolutional neural network-based models(e.g., autoencoders and generative adversarial networks) to reconstruct covered parts of input images and calculate the difference between the input and reconstructed images. However, convolutional operations are effective at extracting local features, making it difficult to identify larger image anomalies. Method To this end, we propose a transformer architecture based on mutual attention for image-anomaly separation. This architecture can capture long-term dependencies and fuse local and global features to facilitate better image-anomaly detection. Result Our method was extensively evaluated on several benchmarks, and experimental results showed that it improved the detection capability by 3.1% and localization capability by 1.0% compared with state-of-the-art reconstruction-based methods.
基金supported by the Strategic Priority Research Program of the Chinese Academy of Sciences grant number XDA17010105the National Key Research and Development Program grant number2018YFC1507104+3 种基金the Key Scientific and Technology Research and Development Program of Jilin Province grant number 20180201035SFthe National Natural Sciences Foundation of China grant numbers417751404157506541790471。
基金supported by National Natural Science Foundation of China(Grants Nos 61772327,61532021)Project of Electric Power Research Institute of State Grid Gansu Electric Power Company(H2019-275).
文摘Image forgery detection remains a challenging problem.For the most common copy-move forgery detection,the robustness and accuracy of existing methods can still be further improved.To the best of our knowledge,we are the first to propose an image copy-move forgery passive detection method by combining the improved pulse coupled neural network(PCNN)and the self-selected sub-images.Our method has the following steps:First,contour detection is performed on the input color image,and bounding boxes are drawn to frame the contours to form suspected forgery sub-images.Second,by improving PCNN to perform feature extraction of sub-images,the feature invariance of rotation,scaling,noise adding,and so on can be achieved.Finally,the dual feature matching is used to match the features and locate the forgery regions.What’s more,the self-selected sub-images can quickly obtain suspected forgery sub-images and lessen the workload of feature extraction,and the improved PCNN can extract image features with high robustness.Through experiments on the standard image forgery datasets CoMoFoD and CASIA,it is effectively verified that the robustness score and accuracy of proposed method are much higher than the current best method,which is a more efficient image copy-move forgery passive detection method.
基金supported by the National Natural Science Foundation of China(NSFC)(Grant Nos.61532021,U1811264 and U1501252).
文摘1 Introduction and main contributions Location-based services are springing up around us,while leakages of users'privacy are inevitable during services.Even worse,adversaries may analyze intercepted service data,and extract more privacy like health and property.Therefore,privacy preservation is an indispensable guarantee on LBS security.Among the previous approaches to privacy preservation,k-anonymity-based ones have drawn much research attention[1-3].However,some privacy concern will be aroused if these schemes are adopted directly.For instance,Ut issues a query"Find the nearest hotel around me"in such an area as Fig.1(privacy profile k=4).DLS algorithm[2]constructs anonymity set A because these four cells have similar probabilities of being queried in the past.However,experienced adversaries can exclude some cells if they have learned rich contextual knowledge(side information)from historical data,such as features of each cell and LBS users.