期刊文献+

一种新的区域复制图像篡改盲检测技术 被引量:3

New passive-blind detection of copy-move forgery in digital images
下载PDF
导出
摘要 提出了一种新的图像盲检测技术,该技术先对图像进行两次分块得到两个子块集,分别对这两个子块集中的子块进行小波变换,将最大变换尺度的小波近似系数以向量形式表示各子块,一个子块集组成一个矩阵,利用主成分分析方法(PCA)对这两个特征矩阵进行二次特征提取,利用Pearson相关系数法对二次提取后的子块特征进行篡改检测,标记出篡改块。实验结果表明,该技术在降低运算复杂度的基础上,不仅能较好地检测进行了多处复制粘贴篡改的图像,且在抗高斯模糊、JPEG有损压缩和噪声方面都有较强的鲁棒性,尤其在篡改图像经过滤波和加性噪声混合严重干扰后,仍能检测出大部分篡改区域。 A new technology of passive authentication in image forgery is proposed. It obtains two kinds of sub-block collections by seg- menting the test image with two methods. Wavelet transform is performed on each block of the collections. The approximate coefficients in the highest level of the wavelet transform which represent the sub-blocks are expressed as row vectors. The vectors of each collection form a matrix. The PCA method is used to compress the data of the two matrices respectively. Tamper detection is carried out on the compressed data (the principal components of PCA). The tamper areas are marked with labels. The experimental results indicate that the proposed algo- rithm can not only decrease computational complexity, but also is of good robustness to blurring, JPEG operation and noise contaminating as well as the mixture of these operations. It can detect most tampered areas in copy-move tampered images which are badly contaminated.
出处 《计算机工程与应用》 CSCD 2012年第9期161-164,171,共5页 Computer Engineering and Applications
关键词 小波变换:主成分分析:图像篡改:盲检测 wavelet transform principal component analysis image forgery passive-blind detection
  • 相关文献

参考文献15

  • 1吴琼,李国辉,涂丹,孙韶杰.面向真实性鉴别的数字图像盲取证技术综述[J].自动化学报,2008,34(12):1458-1466. 被引量:55
  • 2张瑾,方勇.基于内容的图像认证技术的回顾与展望[J].系统仿真技术,2006,2(1):19-24. 被引量:2
  • 3李秀怡,黄继风.盲被动图像检测技术的研究[J].微计算机应用,2007,28(12):1237-1241. 被引量:8
  • 4Fdirgiditrailc hi mJa,gSeosu[Cka]/l/PDro,cLeeudkiáng sJ.oDfe tDecigtiiotanl oFfo rceonpsiyc-mRoevsee arfcohrg eWryo rkin-shop,Cleveland,2003.
  • 5Popescu A C,Farid H.Exposing digital forgeries by detecting du-plicated image regions,TR2004-515[R].Dartmouth College,2004.
  • 6Li G H,Wu Q,Tu D,et al.A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[C]//Proceedings of2007IEEE International Conference on Multimedia and Expo.Beijing,China:IEEE,2007:1750-1753.
  • 7Mahdian B,Saic S.Detection of copy-move forgery using a meth-od based on blur moment invariants[J].Forensic Science Interna-tional,2007,171:180-189.
  • 8Mallat S G.A theory for multiresolution signal decomposition:the wavelet representation[J].IEEE Trans on Pattern Analysis and Machine Intelligence,1989,11(7):674-693.
  • 9Mallat S G.A wavelet tour of signal processing[M].[S.l.]:Aca-demic Press,1998.
  • 10方洁,朱海军,吴华意.主成分分析用于图像压缩预处理的比较研究[J].计算机工程与应用,2005,41(32):53-55. 被引量:4

二级参考文献100

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2董火明,高隽,汪荣贵.多分类器融合的人脸识别与身份认证[J].系统仿真学报,2004,16(8):1849-1853. 被引量:17
  • 3吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 4朱秀明,宣国荣,姚秋明,童学锋,施云庆.信息取证中图像重采样检测[J].计算机应用,2006,26(11):2596-2597. 被引量:7
  • 5戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622. 被引量:6
  • 6Celik M U, Sharma G, Saber E, Tekalp A M. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing, 2002, 11(6): 585-595
  • 7Zhu B B, Swanson M D, Tewfik A H. When seeing isn't believing. IEEE Signal Processing Magazine, 2004, 21(2): 40-49
  • 8Wu Q, Li G H, Tu D. An image authentication watermarking with self-localization and recovery. In: Proceedings of the 11th Joint International Computer Conference. Chongqing, China: World Scientific, 2005. 960-963
  • 9Ng T T, Chang S F, Sun Q B. Blind Detection of Digital Photomontage Using Higher Order Statistics, Advent Technical Report 201-2004-1, Columbia University, June 2004
  • 10Khanna N, Mikkilineni A K, Martone A F, Ali G N, Chiu G T C, Allebach J P. A survey of forensic characterization methods for physical devices. In: Proceedings of the 6th Annual Digital Forensics Research Workshop. Lafayette, USA: Elsevier, 2006. 17-28

共引文献70

同被引文献34

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部