Search papers, labs, and topics across Lattice.
The paper addresses the problem of limited and low-quality data for training models to detect tampered text in document images by proposing a novel data generation pipeline. This pipeline uses two auxiliary networks, one trained with contrastive learning to compare text crops and the other to evaluate crop tightness, to guide the generation of high-quality tampered document images. Experiments demonstrate that models trained on data generated by the proposed pipeline outperform those trained on data generated by existing methods across various architectures and datasets.
Forget rule-based generation: contrastive learning unlocks a new level of realism in tampered document image generation, boosting model performance on real-world data.
Detecting tampered text in document images is a challenging task due to data scarcity. To address this, previous work has attempted to generate tampered documents using rule-based methods. However, the resulting documents often suffer from limited variety and poor visual quality, typically leaving highly visible artifacts that are rarely observed in real-world manipulations. This undermines the model's ability to learn robust, generalizable features and results in poor performance on real-world data. Motivated by this discrepancy, we propose a novel method for generating high-quality tampered document images. We first train an auxiliary network to compare text crops, leveraging contrastive learning with a novel strategy for defining positive pairs and their corresponding negatives. We also train a second auxiliary network to evaluate whether a crop tightly encloses the intended characters, without cutting off parts of characters or including parts of adjacent ones. Using a carefully designed generation pipeline that leverages both networks, we introduce a framework capable of producing diverse, high-quality tampered document images. We assess the effectiveness of our data generation pipeline by training multiple models on datasets derived from the same source images, generated using our method and existing approaches, under identical training protocols. Evaluating these models on various open-source datasets shows that our pipeline yields consistent performance improvements across architectures and datasets.