期刊文献+

基于Tchebichef矩的区域复制窜改检测算法

Detection algorithm for region duplication forgery based on Tchebichef moments
下载PDF
导出
摘要 提出了一种新的数字图像被动认证算法,用于检测同幅图像的区域复制窜改问题。算法首先利用离散小波变换提取图像的低频分量,再对低频分量进行分块并提取每一块的离散正交Tchebichef矩特征;然后将特征矢量进行字典排序,比较相邻两组特征矢量的相似性;最后利用阈值判别实现窜改伪造区域的检测和定位。实验结果证明,算法能较好地检测及定位出图像中复制与窜改区域,且具有运算量小、检测效率高、鲁棒性好等特点。 This paper presented a new passive image authenticate algorithm which could detect the type of region duplication forgery in a single digital image.After extacting the image low-frequency by DWT,this algorithm applied the discrete orthogonal Tchebichef moments invariants to the fixed sized overlapping blocks of a low-frequency image in the wavelet sub-band.Then,it sorted the eigenvectors lexicographically,matched the similarity of neighboring eigenvectors,and identified the forgery part by the threshold finally.The experimental result verifies that the algorithm can detect the tampered region with the feature of small computational load,effective detection and good robustness.
出处 《计算机应用研究》 CSCD 北大核心 2011年第10期3842-3844,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60772122) 安徽省高等学校省级自然科学研究重点项目(KJ2007A045)
关键词 TCHEBICHEF矩 离散小波变换 区域复制窜改 窜改检测 被动认证 Tchebichef moments discrete wavelet transform(DWT) region duplication forgery forgery detection passive authentication
  • 相关文献

参考文献10

  • 1MAHDIAN B, SAIC S. Detection of copy-move forgery using a method based on blur moment invariants[ J]. Forensic Science Internatio- nal ,2007,171 (2) :180-189.
  • 2LUO Wei-qi, HUANG Ji-wu, QIU Guo-ping. Robust detection of re- gion duplication forgery in digital image[ C ]//Proc of the 18th Inter- national Conference on Pattern Recognition. Hong Kong:IEEE,2006 : 746-749.
  • 3FRIDRICH J, SOUKAL D, LUKAS J. Detection of copy-move forgery in digital images[ C ]//Proc of Digital Forensic Research Workshop. [ S. l. ] :IEEE,2003:289-302.
  • 4POPESCU A C, FARID H. Exposing digital forgeries by detecting du- plicated image regions, TR2004-515 [ R]. Hanover: Dartmouth Col- lege ,2004 : 1-11.
  • 5LI Guo-hui, WU Qiong, TU Dan, et al. A sorted neighborhood ap- proach for detecting duplicated regions in image forgeries based on DWT and SVD [ C ]//Proc of IEEE International Conference on Multi- media and Expo. [ S. l. ] :IEEE Press,2007:1750-1753.
  • 6BAYRAM S, SENCAR H T, MEMON N. An efficient and robust meth- od for detecting copy-move forgery [ C ]//Proc of IEEE International Conference on Acoustics, Speech and Signal Processing. Washington DC : IEEE Computer Society ,2009 : t053-1056.
  • 7吕皖丽,郭玉堂,罗斌.一种基于Tchebichef矩的半脆弱图像数字水印算法[J].中山大学学报(自然科学版),2009,48(1):16-21. 被引量:3
  • 8顾伟,吕皖丽,罗斌.基于图像分类的矢量量化数字水印算法[J].计算机应用研究,2009,26(7):2738-2740. 被引量:4
  • 9DAI Shi-jie, HUANG He, GAO Zhang-ying, et al. Vehiclelogo recogni- tion method based on Tchebichef moment invariants and SVM [ C ]// Proc of World Congress on Software Engineering. Washington DC: IEEE Computer Society ,2009 : 18-21.
  • 10MUKUNDAN R, ONG S H, LEE P A. Image analysis by Tchebichef moments [ J]. IEEE Trans on Image Processing, 2001,10 (9) : 1143- 1147.

二级参考文献25

  • 1马文龙,余宁梅,银磊,高勇.图像块动态划分矢量量化[J].计算机辅助设计与图形学学报,2005,17(2):279-283. 被引量:10
  • 2高珍,张伟,张志浩.一种新的基于图块分类的水印算法[J].计算机工程,2005,31(24):177-179. 被引量:4
  • 3VAN SCHYNDEL R G, TIRKEL A Z, OSBOME C F. A digital watermark [ C ]. Proceedings of the IEEE International Conference on Image Processing, Austin, Texas, USA. 1994:86-90.
  • 4NIKOLAIDIS N, PITAS I. Copyright protection of images using robust digital signatures [ C ]. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Atlanta, Georagia, USA. 1996: 2168 -2171.
  • 5COX I J, KILIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia [ J ]. IEEE Transactions on Image Processing, 1997, 12 (6) : 1673 - 1687.
  • 6HSU C T, WU J L. Multiresolution watermarking for digital image [ J ]. IEEE Transactions on Circuits and System-Ⅱ: Analog and Digital Signal Processing, 1998, 45 (8) : 1097-1101.
  • 7LOUD C, LIU J L, HUM C. Adaptive digital watermarking using network technique [ C ]. Proceeding of the IEEE International Carnahan Conference on Security Technology, Taipei, 2003 : 325 - 332.
  • 8DAVIS K J, NAJARIAN K. Maximizing strength of digital watermarks using neural networks[ C ] . Proceedings of the International Joint Conference on Neural Networks, Washington DC, USA, 2001 : 2893 -2898.
  • 9HUNG H T, DUEN W S. Color image extraction based on support vector machines [ J ]. Information Sciences, 2007,177 : 550 - 569.
  • 10HUM. Visual pattern recognigion by moment invariants [J]. IRE Trans Inf Theory, 1962, 8 : 179-187.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部