期刊文献+

基于图像纹理复杂度和奇异值分解的重采样检测 被引量:7

Detection of Resampling Based on Texture Complexity and Singular Value Decomposition
下载PDF
导出
摘要 针对图像篡改时可能会经历重采样操作,而重采样过程中的插值步骤会对重采样图像像素引入一定的线性相关性的问题,提出一种重采样检测算法.采用奇异值分解度量像素间的线性相关性,针对纹理复杂程度不同的子像素块分析插值处理对其线性相关性的影响;以零奇异值个数和奇异值均值作为分类特征,结合SVM进行重采样检测.实验结果表明,该算法能够实现对重采样图像和原始图像的准确分类. When images are tampered,they may undergo resampling manipulation.A resampling detection algorithm is proposed,which is designed to detect the changes brought into the linear dependencies of the image pixels introduced by the interpolation process of resampling.The specific statistical changes with different texture complexity are analyzed by singular value decomposition,the number and mean value of small singular values are used as distinguishing features,and SVM is used to classify.The performance of resampling detection shown in experimental results indicates the validity of the algorithm.
作者 汪然 平西建
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2010年第9期1606-1612,共7页 Journal of Computer-Aided Design & Computer Graphics
基金 国家自然科学基金(60473022)
关键词 图像盲取证 篡改检测 重采样检测 奇异值分解 纹理复杂度 blind image forensics tempering detection resampling detection singular value decomposition texture complexity
  • 相关文献

参考文献9

  • 1Popescu A C.Statistical tools for digital image forensics[C] //Proceedings of the 6th International Workshop on Information Hiding,New York,2004:128-147.
  • 2吴琼,李国辉,涂丹,孙韶杰.面向真实性鉴别的数字图像盲取证技术综述[J].自动化学报,2008,34(12):1458-1466. 被引量:55
  • 3Popescu A C,Farid H.Exposing digital forgeries by detecting traces of resampling[J].IEEE Transactions on Signal Processing,2005,53(2):758-767.
  • 4Gallagher A C.Detection of linear and cubic interpolation in JPEG compressed images[C] //Proceedings of the 2nd Canadian Conference on Computer Robot Vision,Washington D C,2005:65-72.
  • 5Prasad S,Ramakrishnan K R.On resampling detection and its application to detect image tampering[C] //Proceedings of IEEE International Conference on Multimedia and Expo,Toronto,2006:1325-1328.
  • 6Mahdian B,Saic S.Blind authentication using periodic properties of interpolation[J].IEEE Transactions on Information Forensics and Security,2008,3(3):529-538.
  • 7Wei W M,Wang S Z,Tang Z J.Estimation of rescaling factor and detection of image splicing[C] //Proceedings of the 11th IEEE International Conference on Communication Technology,Hangzhou,2008:676-679.
  • 8Gül G,Dirik A E,Avcbas I.Steganalytic features for JPEG compression-based perturbed quantization[J].IEEE Signal Processing Letters,2007,14(3):205-208.
  • 9Schaefer G,Stich M.UCID-an uncompressed colour image database[R].Nottingham:Nottingham Trent University,2003.

二级参考文献48

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2朱秀明,宣国荣,姚秋明,童学锋,施云庆.信息取证中图像重采样检测[J].计算机应用,2006,26(11):2596-2597. 被引量:7
  • 3戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622. 被引量:6
  • 4Celik M U, Sharma G, Saber E, Tekalp A M. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing, 2002, 11(6): 585-595
  • 5Zhu B B, Swanson M D, Tewfik A H. When seeing isn't believing. IEEE Signal Processing Magazine, 2004, 21(2): 40-49
  • 6Wu Q, Li G H, Tu D. An image authentication watermarking with self-localization and recovery. In: Proceedings of the 11th Joint International Computer Conference. Chongqing, China: World Scientific, 2005. 960-963
  • 7Ng T T, Chang S F, Sun Q B. Blind Detection of Digital Photomontage Using Higher Order Statistics, Advent Technical Report 201-2004-1, Columbia University, June 2004
  • 8Khanna N, Mikkilineni A K, Martone A F, Ali G N, Chiu G T C, Allebach J P. A survey of forensic characterization methods for physical devices. In: Proceedings of the 6th Annual Digital Forensics Research Workshop. Lafayette, USA: Elsevier, 2006. 17-28
  • 9Sencar H T, Memon N. Overview of state-of-the-art in digital image forensics. Part of Indian Statistical Institute Platinum Jubilee Monograph Series Titled Statistical Science and Interdisciplinary Research. USA: World Scientific Press, 2008
  • 10Ng T T, Chang S F, Lin C Y, Qibin Sun Q B. Passive-blind image forensics. In: Multimedia Security Technologies for Digital Rights. New York: Elsevier, 2006

共引文献54

同被引文献62

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部