期刊文献+

针对一类JPEG图像伪造的被动盲取证 被引量:16

Passive-Blind Forensics for a Class of JPEG Image Forgery
下载PDF
导出
摘要 图像合成是一种最常见的图像伪造手段。该文针对一类JPEG图像合成伪造,根据篡改区域与非篡改区域块效应的不一致性,提出了一种简单有效的检测算法。首先利用估计的一次压缩质量因子对待检测图像进行裁剪再压缩,然后通过计算压缩前后的失真提取图像的块效应指数映射图,最后采用图像分割的方法实现篡改区域的自动检测与定位。实验结果表明,算法对于各种质量的JPEG图像和较小的篡改区域均能有效检测,当二次压缩与一次压缩的质量因子之差在15以上,虚警率控制在5%以内时,检测率可达93%以上。 Compositing is the most common form of digital image forging. For a class of JPEG image forgery, a simple and effective detecting algorithm is proposed on the basis of inconsistencies of blocking artifacts between tampered region and non-tampered region. Firstly, a testing image is cropped and recompressed with the estimated primary quality factor. Secondly, blocking artifacts factor map is extracted via computing the distortion caused by recompression. Finally, automatic detection and location of tampered region is realized by using image segmentation. Experimental results demonstrate that the proposed approach is applicable to images of various qualities and lesser-tampered regions. When the difference of quality factors between double compression and single compression is greater than 15, the accuracy reaches above 93% with a less than 5% false positive rate.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第2期394-399,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60473022)资助课题
关键词 图像取证 合成图像 JPEG二次压缩 块效应指数 Image forensics Composite image JPEG double compression Blocking artifacts factor
  • 相关文献

参考文献15

  • 1Fridrich J, Soukal D, and Lukas J. Detection of copy-move forgery in digital images[C]. Digital Forensic Research Workshop Proceedings, Cleveland, OH, USA, Aug. 6-8, 2003: 1-10.
  • 2Popescu A C and Farid H. Statistical tools for digital forensics[C]. 6th International Workshop on Information Hiding Proceedings, Toronto, Canada, May, 2004: 128-147.
  • 3Mahdian B and Saic S. Blind authentication using periodic properties of interpolation[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 529-538.
  • 4Lukas J, Fridrich J, and Goljan M. Detecting digital image forgeries using sensor pattern noise[C]. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII Proceedings, San Jose, California, USA, 2006, 6072: 362-272.
  • 5Shi Y Q, Chen C, and Chen W. A natural image model approach to splicing detection[C]. ACM 9th Workshop on Multimedia and Security Proceedings, Dallas, Texas, USA, September, 2007: 51-62.
  • 6Lukas J and Fridrich J. Estimation of primary quantization matrix in double compressed JPEG images[C]. Digital Forensic Research Workshop Proceedings, Cleveland, OH, USA, Aug. 6-8, 2003: 67-84.
  • 7王俊文,刘光杰,戴跃伟,周琳娜,郭云彪.一种估计JPEG双重压缩原始量化步长的新方法[J].电子与信息学报,2009,31(4):836-839. 被引量:10
  • 8Luo Wei-qi, Qu Zhen-hua, and Huang Ji-wu, et al.. A novel method for detecting cropped and recompressed image block[C]. International Conference on Acoustics, Speech and Signal Processing Proceedings, Hawaii, USA, 2007: 217-220.
  • 9He J F, Lin Z C, and Wang L F, et al.. Detecting doctored JPEG images via DCT coefficient analysis[C]. 9th European Conference on Computer Vision Proceedings, Graz, Austria, 2006: 423-435.
  • 10Li Wei-hai, Yu Neng-hai, and Yuan Yuan. Doctored JPEG image detection[C]. IEEE International Conference on Multimedia and Expo Proceedings, Hannover, Germany, 2008: 253-256.

二级参考文献17

  • 1Sencar H T and Memon Nasir. Overview of state-of-art in digital image forensics. Part of Indian Statistical Institute Platinum Jubilee Monograph series titled ‘Statistical Science and Interdisciplinary Research,' World Scientific Press, 2008.
  • 2Luo Weiqi, Qu Zhenhua, Pan Feng, and Huang Jiwu. A survey of passive technology for digital image forensics. Front. Comute. Sci. China, 2007, 1(2): 166-179.
  • 3Fan Z and de Queiroz R L. Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans. on Image Processing, 2003, 12(2): 230-235.
  • 4Fridrich J, Goljan M, and Du R. Steganalysis based on JPEG compatibility. Special session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, Multimedia Systems and Applications IV, Denver, Co, USA, August 19-24. 2001: 275-280.
  • 5Fridrich J, Goljan M, and Hogea D. Attacking the outguess. Proc. Multimedia and Security, Workshop at ACM Multimedia, Juan-les-Pins, France, December 6, 2002: 3-6.
  • 6Fridrich J, Goljan M, and Hogea D. Steganalysis of JPEG images: Breaking the F5 algorithm. Proc. 5th International Workshop on Information Hiding, Noordwijkerhout, The Nederlands, October 7-9, 2002: 310-323.
  • 7Lukas J and Fridrich J. Estimation of primary quantization matrix in double compressed JPEG images. Proc. Of DFRWS, Cleveland, OH, USA, August 6-8, 2003: 67-84.
  • 8Popescu A and Farid H. Statistical tools for digital forensics. 6th International Workshop on Information Hiding, Toronto, Canada, May, 2004: 128-147.
  • 9He J, Lin Z, Wang L, and Tang X. Detecting doctored JPEG images via DCT coefficient analysis. Proc. of ECCV, Berlin, 2006: 423-435.
  • 10KATZENBEISSER S, PETITCOLAS F. Information techniques for steganography and digital watermarking[ M ]. Norwood, MA: Artech House, 2000.

共引文献26

同被引文献173

引证文献16

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部