期刊文献+

基于相位和幅度谱的数字图像被动认证算法 被引量:2

Passive digital image authentication algorithm based on phase and amplitude spectra
下载PDF
导出
摘要 针对一类单幅图像的复制遮盖篡改,提出一种基于快速傅立叶变换相位和幅度的自相关检测算法对篡改部位进行检测。利用Canny算子对篡改图像进行边缘提取,对提取的边缘图像进行分块傅立叶变换,比较块与块之间的相似性程度确认图像中被篡改的部位。实验结果表明该算法能够有效检测出图像被篡改部位,并且对图像复制部位的润饰处理和一般的噪声攻击具有鲁棒性。 To detect the forged parts in a single image with copy-move attack,an autocorrelation detection method based on phase and amplitude spectrum of FFT is proposed.Firstly,the edge of the tampered image is extracted using the canny operator.Then,the edge image is processed with block-based FFT.Finally,the similarity between blocks is calculated to locate the position of the tampered area.Experimental results indicate that the method can detect the forged parts effectively,and is robust to general attacks and retouching of the copied area.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第9期2121-2123,2126,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60772122) 安徽省高校省级自然科学重点研究项目(KJ2008A033)
关键词 快速傅立叶变换 被动认证 自相关检测 边缘提取 篡改定位 fast Fourier transform passive authentication autocorrelation detection edge extraction tamper localization
  • 相关文献

参考文献10

  • 1Celik M U,Sharma G,Saber E,et al.Hierachical watermarking for secure image authentication with localization[J].IEEE Transactions on Image Processing, 2002,11(6):585-595.
  • 2吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 3Lu C S, Mark Liao H Y. Structural digital signature for image authentication: an incidental distortion resistant schene[J].IEEE Transactions on Multimedia,2003, 5 (2): 161-173.
  • 4王波,孔祥维,沈林杰,等.司法文检中的数字取证技术[C].南京:第7届全国信息隐藏暨多媒体信息安全学术大会,2007:271-275.
  • 5王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 6Popescu A C, Farid H. Exposing digital forgeries by detecting traces of re-sampling [J]. IEEE Transactions on Signal Processing,2005,55(2):758-768.
  • 7Popescu A C,Farid H.Exposing digital forgeries by detecting duplicated image regions [R]. USA: Department of Computer Science, Dartmouth College, 2004.
  • 8Fridrich J, Soukal D,Lukas J.Detection of copy-move forgery in digital images[C].Cleveland: Proceedings of Digital Forensics Research Workshop,2003.
  • 9Ng T T, Chang S F, Sun Q.Blind detection ofphotomontage using higher order statistics[R].New York: Department of Electrical Engineering, Columbia University, 2004.
  • 10朱秀明 宣国荣 姚秋明 等.基于EM算法的数字取证中图像重采样检测.哈尔滨工业大学学报,2006,38:868-871.

二级参考文献63

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献107

同被引文献18

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 3王波,孔祥维,沈林杰,等.司法文检中的数字取证技术[C].南京:第7届全国信息隐藏暨多媒体信息安全学术大会,2007:271-275.
  • 4朱秀明 宣国荣 姚秋明 等.基于EM算法的数字取证中图像重采样检测.哈尔滨工业大学学报,2006,38:868-871.
  • 5Zhu B B, Swanson M D, Tewfik A H. When Seeing isn't Believing [ J ]. IEEE Signal Processing Magazine, 2004, 21 (2) :40-49.
  • 6Lu C S, Liao H Y M. Structural digital signature for image authentication: an incidental distortion resistant scheme [ J ]. IEEE Transactions on Multimedia, 2003, 5 (2) : 161 - 173.
  • 7Popescu A C, Farid H. Exposing Digital Forgeries by Detecting Duplicated Image Regions [ D ]. Hanover, New Hampshire, USA : Dartmouth College ,2004.
  • 8Fridrich J, Soukal D, LukaS J. Detection of Copy-move Forgery in Digital Images[ C ]//Proceedings of Digital Forensics Research Workshop. Cleveland:[ s. n. ] ,2003.
  • 9Popescu A C, Farid H. Exposing Digital Forgeries by Detecting Traces of Resampling [ J ]. IEEE Transactions on Signal Processing ,2005,55 (2) :758-768.
  • 10Ng T T, Chang S F, Sun Q. Blind Detection of Photomontage Using Higher Order Statistics [ R ]. New York : Department of Electrical Engineering, Columbia University ,2004.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部