期刊文献+

被动式数字图像真实性检测技术综述 被引量:1

Survey on passive digital image authenticity check techniques
下载PDF
导出
摘要 借助于先进的数码摄影技术和数字图像处理软件,数字图像比传统图像更容易篡改和伪造,伪造数字图像现象不仅很普遍,而且在新闻界、娱乐界、学术界和法律界都产生了非常坏的影响。而仅凭人眼视觉难以对数字图像的真实性进行检测和鉴别,借助于计算机强大的处理能力对数字图像的真实性进行检测是当前研究的一大热点。从统计学、传感器噪声模式、彩色滤镜矩阵偏差、透视几何、光照分析等几个方面介绍了被动式数字图像真实性检测这一研究领域当前研究进展,并提出了当前这一领域的不足之处和未来发展方向。 With the aid of advanced digital cameras and sophisticated digital image processing software,digital images can be more easily manipulated and altered than traditional images.Now digital forgeries are widely used,and take very bad effects on news community,entertainment world,academic community and law circle.But people cannot check the authenticity of digital images by naked eyes,so nowadays digital images authenticity check with powerful computer has become hot investigation.This paper presents recent advances in passive digital images authenticity check from statistical techniques,camera's sensor noise pattern,color filter array aberrations,perspective geometric and lighting analysis,also gives disadvantages of these techniques and predict some ways of future developing.
作者 柳林
出处 《计算机工程与应用》 CSCD 北大核心 2009年第26期1-4,共4页 Computer Engineering and Applications
基金 浙江省教育厅科研项目(No.Y20070577)
关键词 数字图像真实性 噪声模式 彩色滤镜矩阵偏差 光照分析 透视几何 digital images authenticity noise pattern color filter array aberrations lighting analysis perspective geometric
  • 相关文献

参考文献7

二级参考文献55

  • 1[1]Lin C-Y, Chang S-F. Issues and solutions for authenticating MPEG video. SPIE Storage and Retrieval for Image and Video Databases, San Jose, CA, USA, Jan. 1999
  • 2[2]Queluz M P. Authentication of digital images and video: Generic models and a new contribution. Signal Processing: Image Communication, 2001,16: 461 ~ 475
  • 3[3]Dittmann J,Steinmetz A,Steinmetz R. Content-based digital signature for motion pictures authentication and content-fragile watermarking. IEEE ICMCS'99, 1999,2: 209~213
  • 4[4]Lu C-S,Liao H-Y M. Multipurpose watermarking for image authentication and protection. IEEE Transactions on Image Processing, 2001,10(10): 1579~1592
  • 5[5]Wolfgang R B,Delp E J. Fragile watermarking using the VW2D watermark. In: Proc of the IS&T/SPIE Conf. on Security and Watermark of Multimedia Contents, San Jose, California, 1999. 204~213
  • 6[6]Schneider M,Chang S-F. A robust content based digital signature for image authentication. In: Proc. of the IEEE Intl Conf. on Image Processing, 1996,3: 227~230
  • 7[7]Bhattacharjee S,Kutter M. Compression tolerant image authentication. In: Proc. of the IEEE Intl. Conf. on Image Processing. Vol. 1, Oct. 1998. 435~439
  • 8[8]Lou D-C,Liu J-L. Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics, 2000,46 (1): 31~39
  • 9[9]Lin C-Y,Chang S-F. A robust image authentication method surviving JPEG lossy compression. SPIE Storage and Retrieval for Image and Video Databases, San Jose, CA, USA, Jan. 1998
  • 10[10]Walton S. Information authentication for a slippery new age. Dr. Dobbs Journal, 1995,20(4) :18~26

共引文献96

同被引文献12

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部