期刊文献+

利用小波域同态滤波的伪造图像检测方法 被引量:1

Digital forgery image detection method using wavelet homomorphic filtering
下载PDF
导出
摘要 针对伪造图像中常用的模糊操作,提出一种伪造图像的检测方法,该方法首先对伪造图像进行小波域同态滤波,增强处于高频段的人为模糊边缘,然后利用数学形态方法腐蚀掉自然边缘,保留增强的模糊边缘,最后对腐蚀后的边缘图像进行区域标定,从而定位出伪造区域。实验证明该算法相对基于传统同态滤波伪造检测方法,能够较准确定位伪造区域,降低误检率。 A novel forgery image detection algorithm is proposed to recognise some traces of artifical blur operation that is one of common ways to forge an digital image.Firstly,a wavelet homonorphic filtering is applied to enhance the high frequency edges after the blurring process.Secondly,the natural edges are eroded by mathematical morphology method,then the enhanced artifical blur edges are preserved.Finally,the forgery image regions are detected by the region labeling method.Experimental results demonstrate the superiority of this proposed method over the traditional homonorphic filtering method.In addition,it can detect forgery area accurately and reduce the detecting errors.
作者 刘苗 郑江滨
出处 《计算机工程与应用》 CSCD 北大核心 2009年第34期169-170,179,共3页 Computer Engineering and Applications
基金 教育部博士点新教师基金(No.2008-2010) 西北工业大学基础研究基金(No.2007-2009)
关键词 小波同态滤波 伪造图像检测 模糊边缘 wavelet homomorphic filtering digital forgery image detection blur edges
  • 相关文献

参考文献6

  • 1Popescu A,Farid H.Statistical tools for digital forensics [C]//6th International Workshop on Information Hiding,2004.
  • 2Popesu A,Farid H.Exposing digital forgeries by detecting traces of re-sampling[J].IEEE Transactions on Signal Processing,2004,53: 758-767.
  • 3Popescu A,Farid H.Exposing digital forgeries by detecting duplicated image regions[J1.Cemputer Science,2004.
  • 4骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,30(11):1998-2007. 被引量:65
  • 5Zhou Lin-na,Wang Dong-ming,Guo Yun-biao,et al.Blue detection of digital forgery using mathematical morphology [C]//LNCS:KES AMSTA2007,2007.
  • 6张新明,沈兰荪.基于小波的同态滤波器用于图像对比度增强[J].电子学报,2001,29(4):531-533. 被引量:72

二级参考文献27

  • 1Laine A F,IEEE Trans Medical Imaging,1994年,13卷,4期,725页
  • 2Lu J,Opt Eng,1994年,13卷,7期,2151页
  • 3Lee J S,IEEE Trans Pattern Anal Mach Intell,1980年,2卷,3期,165页
  • 4Light K.Fonda,Kerry and Photo Fakery.The Washington Post,Saturday,Feb.28,2004:A21
  • 5Farid H.A picture tells a thousand lies.New Scientist,2003,179(2411):38-41
  • 6Zhu B B,Swanson M D,Tewfik A H.When seeing isn't believing.IEEE Signal Processing Magazine,2004,21 (2):40-49
  • 7Schneider M,Chang S F.A robust content based digital signature for image authentication//Proceedings of the Image Processing.Lausanne,Switzerland,1996,3:227-230
  • 8Swaminathan A,Mao Y,Wu M.Robust and secure image hashing.IEEE Transactions on Information Forensics and Security,2006,1(2):215-230
  • 9Cox I J,Miller M,Bloom J.Digital Watermarking.San Francisco,USA:Morgan Kaufmann Publishers,2002
  • 10Katzenbeisser S,Petitcolas F.Information Techniques for Steganography and Digital Watermarking.Boston,MA:Artec House,2000

共引文献135

同被引文献8

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部