Amplitude SAR Imagery Splicing Localization

IEEE ACCESS(2022)

引用 2|浏览5
暂无评分
摘要
Synthetic Aperture Radar (SAR) images are a valuable asset for a wide variety of tasks. In the last few years, many websites have been offering them for free in the form of easy to manage products, favoring their widespread diffusion and research work in the SAR field. The drawback of these opportunities is that such images might be exposed to forgeries and manipulations by malicious users, raising new concerns about their integrity and trustworthiness. Up to now, the multimedia forensics literature has proposed various techniques to localize manipulations in natural photographs, but the same problem has never been investigated on SAR images. Forensics methods developed for natural photographs are not guaranteed to succeed on SAR images, as their generation pipeline is completely different from that of digital pictures. In this paper, we investigate the problem of localizing splicing attacks in amplitude SAR imagery. Our goal is to identify the pixels of an amplitude SAR image that have been copied and pasted from another image for malicious purposes, considering also that the attacker might have applied some editing to conceal this manipulation. To do so, we leverage a Convolutional Neural Network (CNN) to extract a fingerprint highlighting inconsistencies in the processing traces of the analyzed input. Then, we examine this fingerprint to produce a binary tampering mask indicating the pixel region under splicing attack. Results show that our proposed method, tailored to the nature of SAR signals, provides better performances than state-of-the-art forensic tools developed for natural images.
更多
查看译文
关键词
Splicing, Forensics, Radar polarimetry, Location awareness, Synthetic aperture radar, Task analysis, Deep learning, SAR, GRD, image splicing localization, deep learning, multimedia forensics, satellite imagery
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要