期刊文献+

基于光照方向不一致的图像盲取证技术 被引量:17

Exposing Digital Image Forgeries by Detecting Inconsistence in Light Source Direction
原文传递
导出
摘要 通过提取单一数字图像中目标物体的边缘信息,可估计图像拍摄场景中的光照方向.为了提高光照方向的估计效率,引入图像边缘检测算子,实现了待取证图像中目标物体的准确定位和边缘拟合,并进行了数据分析,建立了系统的基于光照方向不一致的图像篡改检测流程.实验结果表明,边缘检测算子优化了图像检测流程,提高了该取证技术的可行性和可扩展性. By extracting the edge information of the target object in single digital image, the light direction can be estimated. In order to improve the efficiency of the estimated light direction, the image edge detection operators are brought in which achieves the accurate orientation of the target object in the fake image. With the combination of border fitting and data analysis, thus a procedure of detecting image tampering whieh is based on the inconsistencies in light source direction is formed. Experimental results show that edge detection operators optimize the detecting process, also improve the feasibility and expandability of this forensic technology.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2011年第3期26-30,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61070207)
关键词 图像篡改 边缘检测算子 盲取证 数学规划 image tampering edge detection operators blind forensics mathematical programming
  • 相关文献

参考文献6

二级参考文献21

  • 1刘勃,魏铭旭,周荷琴.混合交通环境中的阴影检测算法[J].信号处理,2005,21(2):172-177. 被引量:8
  • 2杜学武,杨永建,李铭明.对等式约束非线性规划问题的Hestenes-Powell增广拉格朗日函数的进一步研究(英文)[J].运筹学学报,2006,10(1):38-46. 被引量:3
  • 3Zhao Tao, Nevatia R. Tracking Multiple Humans in Complex Situations[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004, 26(9): 1208-1221.
  • 4Cucchiara R, Grana C, Piccardi M, et al. Statistic and Know Ledgebased Moving Object Detection in Traffic Scenes[C]//Proc. of the 3rd IEEE Conference on Intelligent Transportation Systems. Dearborn, Indiana, USA: IEEE Computer Society Press, 2000.
  • 5Rosin P L, Ell I S T. Image Difference Threshold Strategies and Shadow Detection[M]. Birmingham, UK: BMVA Press, 1995: 347-356.
  • 6Cucchiara R, Grana C, Piccardi M, et al. Improving Shadow Suppression in Moving Object Detection with HSV Color Information[C]//Proc. of IEEE Intelligent Transportation Systems Conference. Oakland, USA: IEEE Press, 2001: 334-339.
  • 7Mohanty S P,Guturu P, Kougianos E, et al. Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks [J]. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 2008,5(2) : 1-22.
  • 8Haouzia A, Noumeir R. Methods for image authentication: a survey[J]. Multimedia Tools and Applications,2008,39(1) :1-46.
  • 9Dybala B, Jennings B, Letscher D. Detecting filtered cloning in digital images [C]//International Multimedia Conference,2007 : 43-50.
  • 10Johnson M K, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting [C]//Proc ACM Multimedia and Security Workshop, New York, 2005:1-10.

共引文献22

同被引文献151

引证文献17

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部