期刊文献+

基于压缩特征的数字图像篡改取证研究

Research on Tampering Forensics Digital Image Based on Compression Feature
下载PDF
导出
摘要 随着计算机网络和多媒体技术的迅速发展,数字图像的恶意篡改和伪造也越来越容易,判断图像真实性和完整性显得尤为重要.对最流行的JPEG图像进行研究,图像篡改操作会破坏、打乱图像数据之间彼此关联性和内在连续性,通过图像压缩特征的差值曲线发现:单次压缩后图像的差值曲线只有一个波谷,而双重JPEG压缩图像的差值曲线有两个波谷,因此可以根据图像的差值曲线来检测图像是否被篡改. With the rapid development of computer network and multimedia technology, the digital image forgery tampering and also more and more easily, to judge the authenticity and integrity of the image is very important. The research of image in JPEG format is currently the most popular, because the image tampering operation will destroy, disrupt the image data between the relevance and the inherent continuity, found by the difference curve of image compression features: a single compressed image difference curve is only one wave valley, and double JPEG compression curve of the difference image two trough, so it can be judged according to the difference curve of image to the image has been tampered with.
出处 《湖南城市学院学报(自然科学版)》 CAS 2013年第4期59-62,共4页 Journal of Hunan City University:Natural Science
基金 湖南省教育厅科研基金资助项目(11C0250 11C0244)
关键词 数字图像 篡改 压缩特征 digital image forgery compression feature
  • 相关文献

参考文献8

二级参考文献69

  • 1Kharrazi M, Sencar H T, Memon N. Blind source camera identification//Proceedings of the IEEE International Conference on Image Processing (ICIP). Singapore, 2004:709-712
  • 2Bayram S, Sencar H T, Memon N. Source camera identification based on CFA interpolation//Proceedings of the IEEE International Conference on Image Processing (ICIP). Genova, Italy, 2005:69-72
  • 3Long Y, Huang Y. Image based source camera identification using demosaicing//Proceedings of the IEEE MMSP. Victoria, BC, Canada, 2006:419-424
  • 4Swaminathan Ashwin, Wu Min, Liu K J Ray. Image tampering identification using blind deeonvolution//Proceedings of the IEEE International Conference on Image Processing (ICIP). Atlanta, GA: 2006: 2311-2314
  • 5Swaminathan A, Wu M, Liu K J Ray. Non-intrusive forensics analysis of visual sensors using output images//Proceedings of the IEEE ICIP. Hyatt Regency,San Antonio, USA, 2007:401-405
  • 6Geradts Z J, Bijhold J, Kieft M, Kurusawa K, Kuroki K, Saitoh N. Methods for identification of images acquired with digital camera//Proceedings of the SPIE. Boston, USA, 2001, 4232:505-512
  • 7Chen M, Fridrich J, Goljan M. Digital imaging sensor identification (further study)//Proceedings of the SPIE. Florence, Italy, 2007:6505-6518
  • 8Dirik E, Sencar H T, Memon N. Source camera identification based on sensor dust characteristics//Proceedings of the IEEE SAFE. Washington, DC, USA, 2007:1-6
  • 9Celiktutan O, Aveibas I, Sankur B, Memon N. Source cellphone identification//Proceedings of the IEEE 14th Signal Processing and Communications Application. Antalya, Turkey, 2005:1-3
  • 10Khanna N, Mikkilineni A K, Chiu G T-C, Allebach J P, Delp E J. Forensic classification of imaging sensor types// Proceedings of the IS&T SPIE Conference on Security, Steganography and Watermarking of Multimedia Contents Ⅸ, San Jose, CA, USA, 2007: 6505(65050Q)

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部