期刊文献+

基于Lambert光照模型的图像真伪盲鉴别算法 被引量:9

Blind Identification for Image Authenticity Based on Lambert Illumination Model
下载PDF
导出
摘要 依据Lambert光照模型,提出了基于Lambert光照模型的图像真伪盲鉴别算法.针对无限光源图像和局部光源图像,根据其实际的光强度与计算出的光强度之间的误差函数以及光源对光线的约束函数,分别提出了相应的算法用以计算图像中不同区域的光源方向,并根据这些不同区域的光源方向是否一致判定图像是否被篡改,从而对图像真伪进行盲鉴别.实验结果及分析表明,针对这2种图像各自提出的光源方向计算方法,能够准确地计算出图像中不同区域的光源方向,从而有效地鉴别出图像的真伪. Based on Lambert illumination model, blind identification algorithm for image authenticity is proposed. For an image, there is an error function between its actual light intensity and calculated light intensity; and for different light source models, there are different constraint functions of light source to light beam. Therefore, for infinite light source images and local light source images, a corresponding algorithm is presented, which calculates the light source direction of different areas in an image according to the error function and the corresponding constraint function. And the image tampering can be determined by the inconsistency in light source direction of different areas in an image. That is to say, if light source directions of different areas in an image are inconsistent, it can be considered that the image has been tampered;on the other hand, if light source directions of different areas in an image are consistent, it can be considered that the image has not been tampered. This has realized blind identification for image authenticity. Experimental results show that the light source direction of different areas in an image could be calculated accurately by the proposed corresponding algorithms for the two kinds of images mentioned above. Thus, the image authenticity could be identified effectively.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第7期1237-1245,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60973090) 吉林省科技发展计划基金项目(20050305) 吉林大学研究生创新基金项目(20111063)
关键词 Lambert光照模型 无限光源图像 局部光源图像 光源方向 图像真伪盲鉴别 Lambert illumination model infinite light source image local light source image lightsource direction blind identification for image authenticity
  • 相关文献

参考文献12

  • 1Haouzia A, Noumeir R. Methods for image authentication: A survey [J]. Multimedia Tools and Applications, 2008, 39 (1): 1-46.
  • 2Mohanty Saraju P, Bhargava Bharat K. Invisible watermarking based on creation and robust insertion- extraction of image adaptive watermarks[J]. ACM Trans on Multimedia Computing, Communications, and Applications (TOMCCAP), 2008, 5(2): 1-22.
  • 3吴琼,李国辉,涂丹,孙韶杰.面向真实性鉴别的数字图像盲取证技术综述[J].自动化学报,2008,34(12):1458-1466. 被引量:55
  • 4王俊文,刘光杰,戴跃伟,张湛,王执铨.基于非抽样Contourlet变换的图像模糊取证[J].计算机研究与发展,2009,46(9):1549-1555. 被引量:16
  • 5Popescu A (3, Farid H. Exposing digital forgeries in color filter array Interpolated Images [J].IEEE Trans on Signal Processing, 2005, 53(10): 3948-3959.
  • 6张砒.数字图像拼接篡改取证研究[D].大连:大连理工大学,2008.
  • 7Johnson M K, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting [C] //Proc of ACM Multimedia and Security Workshop. New York: ACM, 2005: 1-10.
  • 8Elias Jarlehring, Tobias Damm. Technical communique: The Lambert W function and the spectrum of some multidimensional time-delay systems [J]. Automatica (Journal of IFAC), 2007, 43(12) : 2124-2128.
  • 9吕颖达,申铉京,陈海鹏,王友卫.基于光照方向不一致性的图像盲鉴别方法[J].吉林大学学报(信息科学版),2009,27(3):293-298. 被引量:7
  • 10Nillius P, Eklundh J O. Automatic estimation of the projected light source direction [C] //Proc of the IEEE Conf on Computer Vision and Pattern Recognition. Los Alamitos, CA: IEEEComputer Society, 2001:1076-1083.

二级参考文献66

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2施化吉,周新法,李星毅,丁秋林.同步数字音频盲水印[J].吉林大学学报(信息科学版),2006,24(1):56-61. 被引量:3
  • 3朱秀明,宣国荣,姚秋明,童学锋,施云庆.信息取证中图像重采样检测[J].计算机应用,2006,26(11):2596-2597. 被引量:7
  • 4戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622. 被引量:6
  • 5王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 6Celik M U, Sharma G, Saber E, Tekalp A M. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing, 2002, 11(6): 585-595
  • 7Zhu B B, Swanson M D, Tewfik A H. When seeing isn't believing. IEEE Signal Processing Magazine, 2004, 21(2): 40-49
  • 8Wu Q, Li G H, Tu D. An image authentication watermarking with self-localization and recovery. In: Proceedings of the 11th Joint International Computer Conference. Chongqing, China: World Scientific, 2005. 960-963
  • 9Ng T T, Chang S F, Sun Q B. Blind Detection of Digital Photomontage Using Higher Order Statistics, Advent Technical Report 201-2004-1, Columbia University, June 2004
  • 10Khanna N, Mikkilineni A K, Martone A F, Ali G N, Chiu G T C, Allebach J P. A survey of forensic characterization methods for physical devices. In: Proceedings of the 6th Annual Digital Forensics Research Workshop. Lafayette, USA: Elsevier, 2006. 17-28

共引文献72

同被引文献62

  • 1周荣政,何捷,洪志良.自适应的数码相机自动白平衡算法[J].计算机辅助设计与图形学学报,2005,17(3):529-533. 被引量:37
  • 2高宇,邓宝松,杨冰,宋汉辰,吴玲达.基于增强现实的虚拟实景空间的研究与实现[J].小型微型计算机系统,2006,27(1):146-150. 被引量:17
  • 3姚远,朱淼良,卢广.增强现实场景光源的实时检测方法和真实感渲染框架[J].计算机辅助设计与图形学学报,2006,18(8):1270-1275. 被引量:4
  • 4王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 5新华网.华南虎照片为假虎照[EB/OL].[2009-05-08].http://news, xinhuanet, com/newscenter/2008-06/29/content_8457529. htm.
  • 6FARIDH. Image forgery detection, a survey [ J]. IEEE Signal Processing Magazine, 2009, 26(2): 16-25.
  • 7PENTLAND A. Local shading analysis [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1984, 16(2) : 170 - 187.
  • 8LEE C H, ROSENFELD A. Albedo estimation for scene segmentation [ J]. Pattern Recognition Letters, 1983, 1(3): 155 -160.
  • 9JOHNSON M K, FARID H. Exposing digital forgeries by detecting inconsistencies in lighting [ C] // Processing of ACM Multimedia and Security Workshop. New York: ACM, 2005:1 -10.
  • 10Department of Computer Science and Engineering, University of Washington. Object and concept recognition for content-based image retrival[ DB/OL]. [ 2009 - 05 - 08]. http://www. cs. washington. edu/research/imagedatabase.

引证文献9

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部