期刊文献+

基于SIFT和区域生长的图像复制粘贴盲检测算法 被引量:7

An Image Copy-move Blind Detection Algorithm Based on SIFT Descriptors and Region Growing
下载PDF
导出
摘要 为了检测出经过缩放、旋转等操作的篡改区域,提出了一种基于尺度不变特征(SIFT)特征点和区域生长的复制篡改盲检测算法。该算法首先采用SIFT描述符提取图像的关键点,对关键点进行匹配;然后对匹配的关键点进行聚类,计算出每个聚类的中心;最后以聚类的中心为种子进行区域生长得出篡改区域。实验结果表明,该算法能较好的检测经过几何变换的篡改区域,可用于面向图像内容的真实性认证。 An image copy-move blind detection algorithm based on SIFT( scale-invariant feature transform) de- scriptors and region growing is proposed in order to detect those areas which are tampered because of rotation and scaling. Firstly, the algorithm extracts the key points of the images with SIFT descriptors and matches the key points. Then the matched key points are clustered, and the center of each cluster is calculated. Finally, the tampe- red region is obtained after the growing of the region with the center of each cluster as the seed. The experiment re- sults show that the proposed algorithm is effective enough to test the tampered areas with geometric transformation so as to be used for image authenticity certification.
出处 《科学技术与工程》 北大核心 2013年第4期917-920,925,共5页 Science Technology and Engineering
关键词 盲检测 复制-粘贴 尺度不变特征 聚类 区域生长 blind detection copy-move SIFT cluster region growing
  • 相关文献

参考文献9

  • 1周琳娜;王东明.数字图像取证技术[M]北京:北京邮电学院出版社,200867-87.
  • 2Fridrich J,Soukal D,Luk A S J. Detection of copy-move forgery in digital images[A].2003.
  • 3Popescu A C,Farid H. Exposing digital forgeries by detecting duplicated image regions[R].Dartmouth College,Computer Science,2004.376-385.
  • 4Li G,Wu Q,Tu D. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[A].New York:IEEE Press,2007.
  • 5Lowe D G. Distinctive image features from scale-invariant keypoints[J].International Journal of Computer Vision,2004,(60):91-110.doi:10.1023/B:VISI.0000029664.99615.94.
  • 6Cordelia Schmid,Roger Mohr. Local greyvalue invariants for image retrieval[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1997,(15):530-535.
  • 7程德志,李言俊,余瑞星.基于改进SIFT算法的图像匹配方法[J].计算机仿真,2011,28(7):285-289. 被引量:50
  • 8贺向前,邓世雄,甘平,周丽华.基于K-均值和区域生长计算法医损伤面积[J].重庆医科大学学报,2009,34(5):597-599. 被引量:7
  • 9李海军.计算机图形学若干基本算法的实现研究[M]长春:吉林大学,2008.

二级参考文献8

共引文献55

同被引文献42

  • 1罗菊,袁泉.对TD-SCDMA基站的无线网络勘察设计的思考[J].重庆邮电大学学报(自然科学版),2008,20(z1):31-34. 被引量:4
  • 2陈泽宾.基于形状特征的图像检索研究.东南大学硕士学位论文.
  • 3刘婷婷.基于颜色亮度特征的图像Hash技术.上海大学硕士学位论文.
  • 4T.Ying.Kuo, Y.C.Lo, S.N.Huang. Image Forgery Detection for Region Duplication Tampering. National science Council.
  • 5S. Bayram, H.T. Sencar, and N. Memon,"An efficient and robust method for detecting copy-move forgery", Proc. IEEE ICASSP09, pp.1053-1056,2009.
  • 6Haralick R, Shanmugam K, Dinstein I, Texture feature for image classification[J]. IEEE Transactions System, Man, and Cybernetics,1973, 3(6): 610-623.
  • 7Z.Mohamadian, A.A.Pouyan, "Detection of Duplication Forgery in Digital Images in Uniform and Non-Uniform Regions," IEEE Computer Society(UKSim), p.455-460,2013.
  • 8Yan Zhao, Shuozhong Wang, Xinpeng Zhang, Heng Yao. Robust Hashing for Image Authentication Using Zemike Moments and Local Features. IEEE Transactions on Information Forensics and Security,2013,8(1):55-63.
  • 9Ghulam Muhammad. Multi-Scale Local Texture Descriptor for Image Forgery Detection. IEEE,2013.
  • 10G. Muhammad and M. S. Hossain, "Robust Copy-Move Image Forgery Detection using Undecimated Wavelets and Zemike Moments," ACM Third International Conference on Internet Multimedia Computing and Service (ICIMCS), p. 95-98, 2011.

引证文献7

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部