期刊文献+

基于边缘CFA内插特征一致性的图像拼接检测 被引量:5

Image splicing detection based on consistency of edge-based CFA interpolation features
下载PDF
导出
摘要 为了有效检测数字图像是否被篡改,提出了一种新颖的数字图像拼接快速检测算法.首先,利用Canny边缘检测算子,依据阶跃性约束条件,筛选出阶跃型边缘像素点.分别针对自然图像中的阶跃型边缘和由拼接操作所形成的阶跃型边缘,建立垂直于边缘方向单像素序列的颜色滤波阵列(CFA)内插模型.通过计算该单像素序列的局部灰度直方图,设计CFA内插特征量,以测度拼接前后灰度水平级在直方图两端分布的差异.然后,基于此特征量,利用阈值法实现对自然边缘像素点和拼接边界像素点的分类,进而实现图像拼接检测与定位.标准拼接图像数据集上的测试结果表明,虚警概率仅为0.05时,本检测算法仍能达到0.97的高准确率.此外,该算法还具有较好的鲁棒性,可抵抗一定程度的JPEG压缩和模糊等后处理. A novel digital image splicing detection algorithm is proposed to detect image tamper. First, step edge pixels are screened out by Canny a detector and step constraint conditions. A color filter array (CFA) interpolation model of a single-pixel sequence is created for the natural step edges and the splicing step edges. Such a sequence centers at an edge pixel and arranges along the vertical direction of the located edge. By calculating the sequence's local gray-level histogram, a CFA interpolation metric is designed to measure the distribution discrepancy between the natural edges and the splicing edges. Finally, a threshold-based method is employed to classify the natural edge pixels and the splicing edge pixels, and further to detect and discover the splicing trails. The results on a standard test dataset show that with a low false positive rate of 0. 05, the precision of the proposed method can reach as high as 0. 97. Besides, the splicing detector is so robust that it can resist post-processing such as JPEG compression and blur operation to a certain extent.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第3期459-463,共5页 Journal of Southeast University:Natural Science Edition
基金 国家重点基础研究发展计划(973计划)资助项目(2006CB303104) 国家高技术研究发展计划(863计划)资助项目(2007AA01Z175) 国家自然科学基金资助项目(60702013 60776794) 北京市自然科学基金资助项目(4073038)
关键词 图像拼接 CFA内插 阶跃型边缘 局部直方图 image splicing color filter array interpolation step edge local histogram
  • 相关文献

参考文献10

  • 1Popescu A C.Statistical tools for digital forensics[D].Dartmouth:Dartmouth College,2005.
  • 2Popescu A C,Farid H.Exposing digital forgeries by detecting traces of re-sampling[J].IEEE Transactions on Signal Processing,2005,53(2):758-767.
  • 3Johnson M K,Farid H.Exposing digital forgeries in complex lighting environments[J].IEEE Transactions on Information Forensics and Security,2007,2(3):450-461.
  • 4Lukas,Fridrich J,Goljan M.Detecting digital image forgeries using sensor pattern noise[C]//Proc of the Security,Steganography,and Watermarking of Multimedia Contents Ⅷ.San Jose,USA:SPIE,2006:362-372.
  • 5Chen M,Fridrich J,Goljan M,et al.Determining image origin and integrity using sensor noise[J].IEEE Transactions on Information Forensics and Security,2008,3 (1):74-90.
  • 6Hsu Y F,Chang S F.Detecting image splicing using geometry invariants and camera characteristics consistency[C]//Proc of International Conference Multimedia and Expo.Toronto,Canada:IEEE,2006:549-552.
  • 7Hsu Y F,Chang S F.Image splicing detection using camera response function consistency and automatic segmentation[C]//Proc of International Conference Multimedia and Expo.Beijing:IEEE,2007:28-31.
  • 8Bahadir K G,John G,Yucel A,et al.Demosaicking:color filter array interpolation[J].IEEE Signal Processing Magazine,2005,22(1):44-54.
  • 9Swaminathan A,Wu M,Liu K J Ray.Non-intrusive component forensics of visual sensors using output images[J].IEEE Transactions on Information Forensics and Security,2007,2(1):91-106.
  • 10Canny J.A computational approach to edge detection[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1986,8(6):679-698.

同被引文献108

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部