期刊文献+

基于光照方向不一致性的图像盲鉴别方法 被引量:7

Blind Identification for Digital Images Based on Inconsistency of Illuminant Direction
下载PDF
导出
摘要 图像篡改破坏了自然图像的光照一致性,为了保证图像内容的安全性,提出一种基于光照方向一致性的图像盲鉴别方法鉴别图像真伪。该方法根据图像的实际强度与计算强度间的误差函数以及适合不同光源模式的约束条件,估计不同光源模式下图像的光照方向。通过分析图像中不同对象或对象与背景之间的光照方向是否一致,判断图像是否被篡改。实验结果表明,无限光源模式的数字图像盲鉴别方法的正确检测率可达到81.8%,从而证明了局部光源和复合光源模式的数字图像盲鉴别方法的有效性。 Image tampering will destroy the light coherence of natural images. In order to ensure the security of image content, this paper presents a blind identification method based on the consistency of illuminant direction to identify the image authenticity. In accordance with the error function between the measured intensity and calculated intensity, and the regularization terms for different source models, this method estimates the illuminant direction for images of different source models. Analyzing if the illumination directions between different objects and background in one image are consistent to determine whether the image has been tampered with. Experimental results show that the correct detection rates for blind identification technology for digital images based on infinite light source model has reached up to 81.8%. In addition, experiments also show the effectiveness of blind identification base on local light source and composite light sources.
出处 《吉林大学学报(信息科学版)》 CAS 2009年第3期293-298,共6页 Journal of Jilin University(Information Science Edition)
基金 吉林省科技发展计划基金资助项目(20050503)
关键词 图像篡改 光照方向 盲鉴别 图像真实性 image tampering illuminant direction blind identification image authenticity
  • 相关文献

参考文献11

  • 1张震,康吉全,平西建,任远.用统计特征量实现的图像拼接盲检测[J].计算机应用,2008,28(12):3108-3111. 被引量:10
  • 2SARAJU P MOHANTY, BHARAT K BHARGAVA. Invisible Watermarking Based on Creation and Robust Insertion-Extraction of Image Adaptive Watermarks [ J]. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 2008, 5 (2): 1-24.
  • 3施化吉,周新法,李星毅,丁秋林.同步数字音频盲水印[J].吉林大学学报(信息科学版),2006,24(1):56-61. 被引量:3
  • 4ADIL HAOUZIA, RITA NOUMEIR. Methods for Image Authentication: A Survey [ J ]. Multimedia Tools and Applications, 2008, 39 (1): 1-46.
  • 5吴琼,李国辉,涂丹,孙韶杰.面向真实性鉴别的数字图像盲取证技术综述[J].自动化学报,2008,34(12):1458-1466. 被引量:55
  • 6BRANDON DYBALA, BRIAN JENNINGS, DAVID LETSCHER. Detecting Filtered Cloning in Digital Images [ C ] //International Multimedia Conference. New York, USA : ACM, 2007 : 43-50.
  • 7JOHNSON M K, FARID H. Exposing Digital Forgeries by Detecting Inconsistencies in Lighting [ C ] //Proc ACM Multimedia and Security Workshop. New York, USA : ACM, 2005 : 1-10.
  • 8杨杰,邓志鹏,郭英凯,李介谷.两种新的光照方向估计方法[J].上海交通大学学报,2002,36(6):894-896. 被引量:10
  • 9ELIAS JARLEBRING, TOBIAS DAMM. Technical Communique : The Lambert Wfunction and the Spectrum of Some Multidimensional Time-Delay Systems [J]. Automatica (Journal of IFAC), 2007, 43 (12) : 2124-2128.
  • 10NILLIUS P, EKLUNDH J O. Automatic Estimation of the Projected Light Source Direction [ C ] //Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. [ S. l. ] : IEEE, 2001 : 1076-1083.

二级参考文献81

共引文献73

同被引文献59

  • 1张静,张春田.二值图像数字水印技术综述[J].计算机工程,2005,31(3):1-3. 被引量:9
  • 2张智斌,赖剑煌,邓东皋.未知光源参数的人脸光照恢复方法[J].计算机研究与发展,2005,42(4):629-634. 被引量:2
  • 3卿来云,山世光,陈熙霖,高文.基于球面谐波基图像的任意光照下的人脸识别[J].计算机学报,2006,29(5):760-768. 被引量:27
  • 4王岳传,邹北骥计算机图像学[M].北京:人民邮电出版社,2002.13.
  • 5H.Farid.Exposing Digital Forgeries from JPEG Ghosts.IEEE Transactions on Information Forensics and Security,2009(in press).
  • 6Haouzia A, Noumeir R. Methods for image authentication: A survey [J]. Multimedia Tools and Applications, 2008, 39 (1): 1-46.
  • 7Mohanty Saraju P, Bhargava Bharat K. Invisible watermarking based on creation and robust insertion- extraction of image adaptive watermarks[J]. ACM Trans on Multimedia Computing, Communications, and Applications (TOMCCAP), 2008, 5(2): 1-22.
  • 8Popescu A (3, Farid H. Exposing digital forgeries in color filter array Interpolated Images [J].IEEE Trans on Signal Processing, 2005, 53(10): 3948-3959.
  • 9张砒.数字图像拼接篡改取证研究[D].大连:大连理工大学,2008.
  • 10Johnson M K, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting [C] //Proc of ACM Multimedia and Security Workshop. New York: ACM, 2005: 1-10.

引证文献7

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部