期刊文献+

一种检测图像Copy-Move篡改鲁棒算法 被引量:5

A Robust Algorithm for Detecting Image Copy-Move Forgery
原文传递
导出
摘要 针对现有的复制粘贴(Copy-Move)检测算法鲁棒性较差,时间复杂度高,提出一种有效快速的检测与定位篡改区域算法.利用小波变换获取图像低频区域,引入几何矩提取分块鲁棒特征,通过特征向量排序缩小匹配空间,最后通过经验阈值和数学形态学定位篡改区域.实验结果表明该算法不仅能有效抵抗如高斯白噪声、JPEG压缩等常规图像后处理操作,而且减少块总数,算法的时间复杂度大大降低. Most have high localizing of the existing region duplication detection algorithms are not robust to the post processing and time complexity. Therefore, an efficient and robust algorithm is proposed for detecting and malicious tampering. The dimension of image is firstly reduced by DWT, and the geometric moment is applied to the fixed sized overlapping blocks of low-frequency in wavelet sub-band. Then, the eigenvectors are lexicographically sorted. Finally, the experimental threshold value and mathematical morphology operations are performed to locate the tampered part. The experimental results show that the proposed algorithm successfully detects the tampered image with various post region duplication image processing, including noise contamination and JPEG compression. Furthermore, the proposed algorithm reduces the total number of blocks to decrease time complexity.
出处 《模式识别与人工智能》 EI CSCD 北大核心 2009年第4期630-634,共5页 Pattern Recognition and Artificial Intelligence
基金 江苏省自然科学基金(No.BK2008403) 中国博士后科学基金(No.20070421017)资助项目
关键词 复制粘贴 篡改 几何矩 鲁棒检测 Copy-Move, Tampering, Geometric Moment, Robust Detection
  • 相关文献

参考文献6

  • 1Luo Weiqi, Qu Zhenhua, Pan Feng, et al. A Survey of Passive Technology for Digital Image Forensics. Frontiers of Computer Science in China, 2007, 1(2) : 166 -179.
  • 2Swaminathan A, Mao Yinian, Wu Min. Robust and Secure Image Hashing. IEEE Trans on Information Forensics and Security, 2006, 1(2) : 215 -230.
  • 3Popescu A C, Farid H. Exposing Digital Forgeries by Detecting Duplicated Image Regions. Technical Report, TR2004-515, Hanover, USA : Dartmouth College. Department of Computer Science, 2004.
  • 4Fridrich J, Soukal D, Lukas J. Detection of Copy-Move Forgery in Digital Images [ EB/OL ]. [ 2003- 08- 06 ]. http://www. ws. binghamton, edu/fridrich/Research/copymove.pdf.
  • 5骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,30(11):1998-2007. 被引量:65
  • 6Hu M K. Visual Pattern Recognition by Moment Invariants. IRE Trans on Information Theory, 1962, 8(2) : 179 - 187.

二级参考文献24

  • 1Light K.Fonda,Kerry and Photo Fakery.The Washington Post,Saturday,Feb.28,2004:A21
  • 2Farid H.A picture tells a thousand lies.New Scientist,2003,179(2411):38-41
  • 3Zhu B B,Swanson M D,Tewfik A H.When seeing isn't believing.IEEE Signal Processing Magazine,2004,21 (2):40-49
  • 4Schneider M,Chang S F.A robust content based digital signature for image authentication//Proceedings of the Image Processing.Lausanne,Switzerland,1996,3:227-230
  • 5Swaminathan A,Mao Y,Wu M.Robust and secure image hashing.IEEE Transactions on Information Forensics and Security,2006,1(2):215-230
  • 6Cox I J,Miller M,Bloom J.Digital Watermarking.San Francisco,USA:Morgan Kaufmann Publishers,2002
  • 7Katzenbeisser S,Petitcolas F.Information Techniques for Steganography and Digital Watermarking.Boston,MA:Artec House,2000
  • 8Craver S A,Wu M,Liu B et al.Reading between the lines:Lessons from the SDMI challenge//Proceedings of the 10th Usenix Security Symposium.Washington DC,2001
  • 9Lyu S.Natural image statistics for digital image forensics[Ph.D.dissertation].Dartmouth College,Hanover,New Hampshire,USA,2005
  • 10Popescu A C.Statistical tools for digital image forensics[Ph.D.dissertation].Dartmouth College,Hanover,New Hampshire,USA,2004

共引文献64

同被引文献79

  • 1陈娟,夏军,尹涵春.压缩视频码流中运动矢量的提取[J].电子器件,2006,29(4):1342-1345. 被引量:4
  • 2秦运龙 孙广玲 张新鹏.利用运动矢量进行视频篡改检测.计算机研究与发展,2009,46:227-233.
  • 3LUKAS J, FRIDRICH J, GOLJAN M. Digital camera identification from sensor pattern noise [ J ]. IEEE Trans- actions on Information Forensics and Security, 2006, 1 (2) : 205-214.
  • 4LUKAS J, FRIDRICH J, GOLJAN M. Detecting digital image forgeries using sensor pattern noise [ C ]//Proceedings of SPIE Electronic Imaging, Photonics West. San Jose, USA: the SPIE, 2006:362-372.
  • 5HSU C, HUNG T, LIN C, et al. Video forgery detection using correlation of noise residue [ C ]//Proceedings of the 10th Workshop on Multimedia Signal Processing. Cairns, Australia: IEEE Computer Society, 2008: 170-174.
  • 6KOBAYASHI M, OKABE T, SATO Y. Detecting video forgeries based on noise characteristics E C ]//Proceedings of the 3rd Pacific-Rim Symposium on Image and Video Technology. Berlin Heidelberg, Germany: Springer-Verlag, 2009: 306-317.
  • 7HEN M, FRIDRICH J, GOLJAN M, et al. Determining image origin and integrity using sensor noise [ J ]. IEEE Transactions on Information Forensics and Security, 2008, 3 ( 1 ) : 74-90.
  • 8BAYRAM S, SENCAR H, MEMON N. Source camera identification based on CFA interpolation[ C]//Proceedings of IEEE International Conference on Image Processing. Washington, USA: IEEE Signal Processing Society, 2005 : 69-72.
  • 9LONG Y, HUANG Y. Image based source camera identification using demosaicking [ C ]//Proceedings of the 8^th Workshop on Multimedia Signal Processing. Washington, USA: 1EEE Computer Society, 2006: 419-424.
  • 10CHOI K, IAM E, WONG K. Automatic source camera identification using the intrinsic lens radial distortion [J]. Optics Express, 2006, 14(24) : 11551-11565.

引证文献5

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部