期刊文献+

基于SIFT的图像复制遮盖篡改检测技术 被引量:5

Detection of copy-move image forgeries based on SIFT
下载PDF
导出
摘要 针对现有的图像复制遮盖篡改检测算法需要某些先验信息、对后处理操作失效且计算量大等问题,借鉴图像匹配技术中的SIFT(scale invariant feature transform)特征匹配算法,首次提出将其用于检测复制遮盖的篡改操作。该方案首先计算出待鉴定图像的所有特征向量,然后进行特征向量集的划分与匹配。待鉴定图像的匹配点对用点与点之间连线标记。如果图像被复制篡改过,所标记的线段将明显集中于某两个区域之间。实验表明,SIFT应用于复制遮盖及各种后处理篡改操作,如旋转、缩放、亮度调整等,都有很好的检测和定位效果。 In view of the problem that the existing detection algorithms of the copy-move image forgeries have to rely on some premises,invalidation to post processing and have heavy computation,a new detection method using scale invariant feature transform(SIFT) for image registration was proposed. The scheme calculated all the eigenvestors of the tested image and performed division and matching operations on the set of eigenvestors. All the matching points were linked with lines located between the two regions obviously in a copy-move falsified image. Experimental results show a good performance for detecting and locating the copy-move image blocks in post processings such as rotation,scaling and intensity adjustment.
出处 《解放军理工大学学报(自然科学版)》 EI 北大核心 2009年第4期339-343,共5页 Journal of PLA University of Science and Technology(Natural Science Edition)
基金 国家863计划资助项目(2007AA01Z455) 国家自然科学基金资助项目(60772098 60772042) 教育部新世纪优秀人才支持计划资助项目(NCET-06-0393) 2007年上海市曙光计划资助项目
关键词 自然图像 篡改检测 尺度不变特征变换 复制遮盖 natural image forgeries detection SIFT(scale invariant feature transform) copy-move forgery
  • 相关文献

参考文献8

二级参考文献87

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2朱秀明,宣国荣,姚秋明,童学锋,施云庆.信息取证中图像重采样检测[J].计算机应用,2006,26(11):2596-2597. 被引量:7
  • 3戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622. 被引量:6
  • 4Celik M U, Sharma G, Saber E, Tekalp A M. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing, 2002, 11(6): 585-595
  • 5Zhu B B, Swanson M D, Tewfik A H. When seeing isn't believing. IEEE Signal Processing Magazine, 2004, 21(2): 40-49
  • 6Wu Q, Li G H, Tu D. An image authentication watermarking with self-localization and recovery. In: Proceedings of the 11th Joint International Computer Conference. Chongqing, China: World Scientific, 2005. 960-963
  • 7Ng T T, Chang S F, Sun Q B. Blind Detection of Digital Photomontage Using Higher Order Statistics, Advent Technical Report 201-2004-1, Columbia University, June 2004
  • 8Khanna N, Mikkilineni A K, Martone A F, Ali G N, Chiu G T C, Allebach J P. A survey of forensic characterization methods for physical devices. In: Proceedings of the 6th Annual Digital Forensics Research Workshop. Lafayette, USA: Elsevier, 2006. 17-28
  • 9Sencar H T, Memon N. Overview of state-of-the-art in digital image forensics. Part of Indian Statistical Institute Platinum Jubilee Monograph Series Titled Statistical Science and Interdisciplinary Research. USA: World Scientific Press, 2008
  • 10Ng T T, Chang S F, Lin C Y, Qibin Sun Q B. Passive-blind image forensics. In: Multimedia Security Technologies for Digital Rights. New York: Elsevier, 2006

共引文献116

同被引文献48

  • 1贺钦,刘文予.数字图像传感器颜色插值算法研究[J].小型微型计算机系统,2007,28(8):1482-1485. 被引量:15
  • 2ZITOVA B,FLUSSER J.Image registration methods:a survey[J].Image and Vision Computing,2003,21(11):977-1 000.
  • 3LOWED G.Distinctive image features from scale-invariant keypoints[J].International Journal of Computer Vision,2004,60(2):91-110.
  • 4Popescu A, Farid H. Exposing digital forgeries in color filter array interpolated images[J]. IEEE Transactions on Signal Processing, 2005, 53(12):3948-3959.
  • 5Lukac R, Plataniotis K N. Color filter arrays: design and performance analysis[J]. IEEE Transactions on Consumer Elec- tronics, 2005, 51(4): 1260-1267.
  • 6武伟,詹玲超.基于数码相机固有特性的篡改检测[J].微计算机信息,2007,23(28):131-132. 被引量:4
  • 7Bravo M J, Farid H. Diagnostic features are prominent in object representations [J ] . Journal of Vision, 2011, 11 ( 11 ) : B65. [DOI: 10. 1167/11.11. 865].
  • 8Farid H. A survey of image forgery detection [ J ]. IEEE Signal Processing Magazize, 2009, 26 ( 2 ) : 16-25. [ DOI: 10. 1109/ MSP. 2008. 931079 ].
  • 9Pevny T,Fridrich J. Merging Markov and DCT features for multi- class JPEG steganalysis [ C ]// Delp E, Wong P. Proceedings of Security, Steganography, and Watermarking of Multimedia Con-tents IX. Washington: SPIE Press, 2006:6505 (3): 1-13. [DOI : 10. 1117/12. 696774 ].
  • 10Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions, TR 2004-515 [ R. Hanover, USA: Dartmouth College, 2004.

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部