期刊文献+

基于Zernike矩的图像区域旋转篡改检测 被引量:2

Detection by Region Rotation Duplication Based on Zernike Moments
下载PDF
导出
摘要 区域旋转复制粘贴是极为常见的图像篡改方式之一,为了有效地检测这种图像篡改,该文提出一种基于Zernike矩旋转不变性的篡改检测算法。首先,将图像划分为相互重叠的小块并计算各小块的Zernike矩特征值,对其进行字典式向量排序;其次,计算字典式矩阵相邻行之间的相关系数确定旋转篡改区域;最后,估计区域的旋转角度。实验结果表明,该算法不仅能够精确定位图像中旋转篡改的区域,而且能估算出区域旋转角度。可用于面向图像内容的真实性认证。 The region rotation copy-move is a common method in digital image manipulation,based on Zernike moments, a detection algorithm of rotation invariance is proposed. Firstly, the image is processed with block-based Zernike. Then the Zernike moments vectors are lexicographically sorted and duplicated image blocks will be close in the sorted list, and therefore the correlation of neighbor rows is calculatcd during the detection steps. Experimental results demonstrate that the proposed approach can not only localize the duplicated regions accurately ,but also evaluate the rotation angle effectively. The method suits to the forensics for image contents.
作者 姜丽 周少琼
出处 《计算机技术与发展》 2011年第5期48-51,共4页 Computer Technology and Development
基金 国家自然科学基金(60772122) 安徽省自然科学基金资助重点项目(KJ2007A045 KJ2008A033)
关键词 ZERNIKE矩 图像篡改 区域检测 旋转不变性 字典式排列 Zernike moment image forgery region detection rotation invariance lexicographic order
  • 相关文献

参考文献12

  • 1Zhu B B, Swanson M D, Tewfik A H. When Seeing isn't Believing [ J ]. IEEE Signal Processing Magazine, 2004, 21 (2) :40-49.
  • 2吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 3Lu C S, Liao H Y M. Structural digital signature for image authentication: an incidental distortion resistant scheme [ J ]. IEEE Transactions on Multimedia, 2003, 5 (2) : 161 - 173.
  • 4王波,孔祥维,沈林杰,等.司法文检中的数字取证技术[C].南京:第7届全国信息隐藏暨多媒体信息安全学术大会,2007:271-275.
  • 5王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 6朱秀明 宣国荣 姚秋明 等.基于EM算法的数字取证中图像重采样检测.哈尔滨工业大学学报,2006,38:868-871.
  • 7Popescu A C, Farid H. Exposing Digital Forgeries by Detecting Duplicated Image Regions [ D ]. Hanover, New Hampshire, USA : Dartmouth College ,2004.
  • 8Fridrich J, Soukal D, LukaS J. Detection of Copy-move Forgery in Digital Images[ C ]//Proceedings of Digital Forensics Research Workshop. Cleveland:[ s. n. ] ,2003.
  • 9Popescu A C, Farid H. Exposing Digital Forgeries by Detecting Traces of Resampling [ J ]. IEEE Transactions on Signal Processing ,2005,55 (2) :758-768.
  • 10Ng T T, Chang S F, Sun Q. Blind Detection of Photomontage Using Higher Order Statistics [ R ]. New York : Department of Electrical Engineering, Columbia University ,2004.

二级参考文献87

  • 1赵玉鑫,刘光杰,戴跃伟,王执铨.一种新的视觉Hash算法[J].光学精密工程,2008,16(3):551-557. 被引量:5
  • 2吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 3亓波,陈洪斌,刘顺发.Zernike多项式波面拟合的回归分析方法[J].光学精密工程,2007,15(3):396-400. 被引量:20
  • 4王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 5Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 6Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 7Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 8Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 9Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 10Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004

共引文献112

同被引文献14

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部