期刊文献+

基于JPEG压缩的数字化地质资料篡改探测方法及应用 被引量:1

Forgery detection and application of digital geological images based on JPEG compression techniques
下载PDF
导出
摘要 根据JPEG压缩原理,引入块伪影栅格、编码块后验概率以及ASAD等多种篡改探测方法,并将其应用于数字化成果地质资料的真伪检测。这些方法对于复制-粘贴、喷绘、填涂等篡改检测均为有效,且可以实现被篡改区域的定位。论文分别对不同的检测算法进行了验证和对比分析。实验结果表明:这些方法可有效应用于数字地质资料的篡改检测,从而进一步服务于地质资料信息集群化产业化工作,对海量数字化成果地质资料版权保护和真实性检测具有极高的理论和实用价值。 Based on the JPEG compression principle, the three forgery detection methods including block artifact grid (BAG), the block posterior probability map (BPPM) and the averaged sum of absolute difference (ASAD) methods were investigated, and the methods were applied to detecting the authenticity of the digital geological images. These methods are efficient for the detection of copy-paste, inpainting and filling tampered images, and can be used to locate the tampered regions. The efficiency and the detection results of three different tampered region detecting algorithms were verified and analyzed. The experimental results show that these methods can be effectively used for the digital geologic images tampering detection, and hence further the information service for the clustering and industry of digital geological image were provided. Besides, these methods have high theoretical and practical value for the copyright protection and authenticity detection of massive digital geological image.
出处 《中国有色金属学报》 EI CAS CSCD 北大核心 2012年第3期961-969,共9页 The Chinese Journal of Nonferrous Metals
基金 国家自然科学基金资助项目(61172184)
关键词 篡改探测 JPEG压缩 数字地质资料 forgery detection JPEG compression digital geological image
  • 相关文献

参考文献3

二级参考文献11

共引文献43

同被引文献21

  • 1KEE E, JOHSON M, FARID H. Digital image authentication from JPEG headers [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 393-402.
  • 2KANG X, LI Y, QU Z, HUANG J. Enhancing source camera identification performance with a camera reference phase sensor pattern noise [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 393-402.
  • 3MAHALAKSHMI D S, VIJAVALAKSHMI K, PR/YADHARSINI S. Digital image forgery detection and estimation by exploring basic image manipulations [J]. Digital Investigation, 2012, 8(3/4): 215-225.
  • 4AMERINI I, BALLAN L, CALDELLI R, BIMBO A D, TONGO L D, SERRA G. Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J]. Signal Processing: Image Communication, 2013, 28(6): 659-669.
  • 5KAKAR P, SUDHA N. Exposing post processed copy-paste forgeries through transform-invariant features [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 1018-1028.
  • 6LYNCH G, SHIH F Y, LIAO H Y M. An efficient expanding block algorithm for image copy-move forgery detection [J]. Information Sciences, 2013, 239: 253-265.
  • 7LI Yue-nan. Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching [J]. Forensic Science International, 2013, 224(1/3): 59-67.
  • 8HUANG Yah-ping, LU Wei, SUN Wei, LONG Ding-yang. Improved DCT-based detection of copy-move forgery in images [J]. Forensic Science International, 2011, 206(1/3): 178-184.
  • 9FRIDRICH J, SOUKAL D, LUKAS J. Detection of copy-move forgery in digital images [C]// Proceedings of Digital Forensic Research Workshop. Cleveland, OH, USA, 2003: 55-61.
  • 10POPESCU A C, FAR/D H. Exposing digital forgeries by detecting duplicated image regions [R]. Technical Report, TR2004-515, 2004.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部