期刊文献+

篡改图像边缘模糊操作的被动取证算法 被引量:5

Passive Forensics Algorithm of Tampered Image by Detecting Edge Blurring Manipulation
下载PDF
导出
摘要 针对图像篡改中常见的边缘模糊操作的鉴别取证,提出一种新的取证算法.该算法首先利用模糊数学对篡改过的人工模糊边缘进行图像模糊增强,得到人工模糊操作边缘被增强而其它部分被减弱的图像;然后对原篡改图像进行分块,利用粗糙集理论获得约减属性和约减规则对子图像块进行分类,排除平坦区域和自然清晰强边缘图像块后得到另外一个图像;最后将前面得到的两个图像融合得到结果图像.实验结果表明该算法能较好地排除平坦区域和强边缘而保留人工模糊边缘,从而达到被动取证的目的. Aiming at the edge blurring manipulation in image tampering,a new algorithm for image forensics is presented.In this algorithm,first,the tampered blurring edge is enhanced based on the fuzzy mathematics,while the real clear edge and flat region is weakened,thus obtaining an image.Next,the tampered image is divided into many sub-images,which are then classified to remove flat regions and real clear sharp edges by using the attribute reduction of rough set theory,thus obtaining another image.Finally,a fusion of the two above-mentioned images is performed to obtain the resulting image.Experimental results show that the proposed algorithm is an effective passive forensics method that reveals the blurred regions but excludes flat regions and real clear sharp edges.
作者 赵俊红
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第7期77-82,共6页 Journal of South China University of Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60772115)
关键词 图像处理 被动取证 模糊增强 粗糙集 image processing passive forensics fuzzy enhancement rough set
  • 相关文献

参考文献9

  • 1Fridrich J. Image watermarking for tamper detection [ C]// Proceedings of International Conference on Image Proce- ssing. Chicago : IEEE, 1998:404-408.
  • 2Farid Hany. Creating and detecting doctored and virtual image: implications to the child pornography prevention act [ R ]. Hanover: Department of Computer Science and Center for Cognitive Neuroscience, Dartmouth College, 2004.
  • 3孙堡垒 周琳娜 张茹.基于Benford定律的高斯模糊篡改取证.计算机研究与发展,2009,46:211-216.
  • 4Hsiao Dun-yu, Pei Soo-chang. Detecting digital tampering by blur estimation [ C] //Proceedings of the First Interna- tional Workshop on Systematic Approaches to Digital Fo- rensic Engineering. Taipei: IEEE,2005:264- 278.
  • 5Sutcu Y, Coskun B, Sencar H T, el al. Tamper detection based on regularity of wavelet transform coefficients [ C ]// Proceedings of IEEE International Conference on Image Processing. San Antonio : IEEE, 2007 : 397-400.
  • 6王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 7陈英 赵鹏 王瑀屏.基于边界平滑检测的虚假图像盲识别算法[J].软件学报,2008,19:59-68.
  • 8Zadeh L A. Fuzzy sets [ J ]. Information and Control, 1965,8(3) :338-353.
  • 9Pawlak Z. Rough sets [ J ]. International Journal of Com- puter and Information Sciences, 1982,11 ( 5 ) :341-356.

二级参考文献8

  • 1Lyu Siwei. Natural Image Statistics for Digital Image Forensics[ D]. USA : Department of Computer Science, Dartmouth College, 2005.
  • 2Hany Farid. Creating and Detecting Doctored and Virtual Images: Implications to the Child Pornography Prevention Act[R]. USA: Department of Computer Science, Dartmouth College, 2004.
  • 3Alin C. Popescu, Hany Farid. Statistical tools for digital forensics[ A]. 6th International Workshop on Information Hiding,LNCS vol. 3200 [ C ]. New York : Springer-Verlag, Berlin-Heidelberg ,2004.128 - 147.
  • 4Alin C Popescu, Hany Farid. Exposing Digital Forensics by Detecting Duplicated Image Regions [ R ]. USA: Department of Computer Science, Dartmouth College, 2004.
  • 5Tian-Tsong NG, Shih-Fu Chang. Blind Detection of Photomonrage Using Higher Order Statistics[ DB/OL]. http://www, ee.columbia, edu/dvmm/, Jan, 2004.
  • 6Tian-Tsong NG, Shih-Fu Chang. A model for image splicing[ A ]. IEEE Conference Proceedings on Image Processing[ C ].New York. IEEE Press, 2004.1169 - 1172.
  • 7Fridrich J, Soukal D, Lukas J. Detection of Copy-move Forgery in Digital Images [ DB/OL ]. http://www, ws. binghamton,edu/fridrich/publications, html, 2004.
  • 8刘文锋.基于图像连续性的数字图像取证技术研究[D].大连:大连理工大学,2005.

共引文献41

同被引文献46

  • 1阳广元,邓进.2007-2011年国内基于数字水印的版权保护研究综述[J].图书情报工作,2013,57(S2):46-49. 被引量:6
  • 2周军.对数字图书馆的版权保护技术的比较研究[J].图书馆论坛,2006,26(3):104-106. 被引量:7
  • 3秦运龙 孙广玲 张新鹏.利用运动矢量进行视频篡改检测.计算机研究与发展,2009,46:227-233.
  • 4陈春宁,王延杰.在频域中利用同态滤波增强图像对比度[J].微计算机信息,2007(02X):264-266. 被引量:60
  • 5周琳娜,张茹,郭云彪.数字图像内容取证[M].北京:高等教育出版社.2011:81-109.
  • 6Luo W Q. Wu M. Huang J W. MPEG recompression detection based on block artifacts. In: Proceedings of the SPIE on Security, Forensics. Steganography. andWatermarking of Muhimedia Conlents,2008.1 - 12.
  • 7Wang W H, Farid H. Exposing digital forgeries in video by detecting double MPEG compression. In: Proceedings of the Muhimedia and Security Workshop. Geneva. Switzerland: ACM SIGMM. 2006,37-.17.
  • 8Zhang J. Su Y T. Zh-mg video forgery by ghost M Y. Exposing digital shadow artifam. In:Proceedings of the 1-t Multimedia in Forensics. 49-$4. ACM Workshop on Beijing, China, 2009.
  • 9Su Y T,Zhang J, Han Y,et al. Exposing digital video logo-removal forgery by inconsistency of blur. International Journal of Pattern Recognition and Artificial Intelligence, 2010,24 (7) : 1027 1046.
  • 10陈天华.数字图像处理.北京:清华大学出版社,2008,121-123.

引证文献5

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部