期刊文献+

一种新的基于DCT域系数对直方图的图像篡改取证方法 被引量:8

A novel image forensic method based on coefficient-pair histogram in DCT domain
原文传递
导出
摘要 提出了一种基于离散系数变换(DCT)域系数对直方图特征的图像篡改取证方法。首先对图像进行DCT,并在给定的阈值下,对变换后的DCT系数进行系数对直方图化;而后对直方图化后的值进行归一化处理,再用主成分分析(PCA)对上述数据进行降维处理取得系数对直方图特征;最后将真实图像和篡改后图像的系数对特征用支持向量机(SVM)进行分类识别。实验结果证明,和现有的一些算法相比,提出的方法计算复杂度低,在CASIA v1.0平均识别率为97.92%,CASIA v2.0平均识别率为91.20%,对未压缩图像和压缩图像的拼接篡改都具有良好的识别性能。 Digital images can be forged easily with today's widely available image processing software. One of the most common practices in image tampering involves cropping a patch from a source and pas- ting it onto a target. This task,when images are used as evidence to influence or decide judgment such as in a court of law, can be crucial. A novel image forensic method based on coefficient-pair histogram in discrete cosine transform (DCT) domain is proposed. In the method, firstly, the image is transformed by DCT, then with the given threshold, coefficienvpair histogram is computed for the DCT coefficients, and normalization processing is excuted on the coefficient-pair histogram. After that, principal component a nalysis (PCA) is used to reduce the dimension of the above data to get the final image features. Lastly, support vector machine (SVM) is exploited to classify the authentic and spliced images through training the feature vectors of them. In CASIA vl. 0, the recognition rate reach 97. 92~/00, and it is 91.20%o in CASIA v2.0. The experimental results show that compared with some existing methods, the proposed approach has low computing complexity and good recognition performance in both uncompressed and compressed images.
出处 《光电子.激光》 EI CAS CSCD 北大核心 2014年第11期2196-2202,共7页 Journal of Optoelectronics·Laser
基金 天津市自然科学基金重点(11JCZDJC16000)资助项目
关键词 图像取证 像素对直方图 系数对直方图 支持向量机(SVM) image forensics pixel-pair histogram coefficient-pair histogram support vector machine (SVM)
  • 相关文献

参考文献18

  • 1Popescu A C, Farid H. Exposing digital forgeries by de- tecting traces of re-sampling[J]. IEEE Transactions on Signal Processing,2005,53(2) :758-767.
  • 2Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tubaro. Revealing the traces of JPEG compression anti-forensics[J]. IEEE Transactions on information forensics and secu- rity, 2013,8(2) : 335-349.
  • 3LUO Wei-qi, HUANG Ji-wu, QlU Guo-ping. JPEG error a- nalysis and its applications to digital image forensics[J]. IEEE Trans on Information Forensics and Security, 2010,5 (3) :480-491.
  • 4CAO Gang,ZHAO Yao, NI Rong-rong, et al. Contrast en- hancement-based forensics in digital images [J]. IEEE Transactions on Information Forensics and Security, 2014,9(3) :515-525.
  • 5盛国瑞,高铁杠,曹雁军,高琳,范礼.基于脊波变换的图像篡改检验算法[J].光电子.激光,2013,24(2):352-358. 被引量:3
  • 6王晶,蒋刚毅,王晓东,郁梅,骆挺,彭宗举,邵枫.基于BJND的立体图像篡改定位及恢复水印方法[J].光电子.激光,2013,24(4):785-793. 被引量:8
  • 7Ng T T, Chang S F, Sun Q. Blind detection of photomon- tage using higher order statistics[A]. Proc. of the 2004 International Symposium on Circuits and Systems [C]. 2004,5 : 688-691.
  • 8FU D,Shi Y Q,Su W. Detection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition[A]. Proc. of Lec- ture Notes in Computer Science[C]. 2006,177-187.
  • 9Chen W,Shi Y Q,Su W, Image splicing detection using 2- d phase congruency and statistical moments of character- istic function[A]. Proc. of SPIE[C]. 2007,65ese: 27.
  • 10Shi Y Q,Ohen C,Chen A. Natural image model approach to splicing detection [A]. Proc. of MM & Sec" 07, ACM [C]. 2007,5142.

二级参考文献23

  • 1祝瑞玲,王欣.基于有限脊波变换的图像内容认证算法[J].光电子.激光,2009,20(8):1087-1091. 被引量:2
  • 2Smolic A, Kauff P, Knorr S, et al. Three-dimensional video postproduction and processing[ J]. Proceedings of the IEEE, 2011,99(4) : 607-625.
  • 3Tanimoto M,Tehrani M,Fujii T,et al. FTV for 3-D spatial communication[J]. Proceedings of the IEEE, 2012,100 (4) :905-917.
  • 4Ekici O, Sankur B, Coukum B, et ai. Comparative evalua- tion of semifragile watermarking algorithms[J].Journal of Electronic Imaging, 2004,13 (1 ) .. 209-216.
  • 5Lee T,Lin S. Dual watermark for image tamper detection and recovery [J]. Pattern Recognition, 2008, 41 ( 11 ) : 3497-3506.
  • 6Tsai M,Chien C. Authentication and recovery for wavelet- based semifragile watermarking[J]. Optical Engineering, 2008,47(6) :067005-1-10.
  • 7LIN Yu-hsun,WU Ja-ling. A digital blind watermarking for depth-image-based rendering 3D images[J]. IEEE Trans- actions on Broadcasting, 2011,57(2) : 602-611.
  • 8Bhatnagar G, Kumar S, Raman B, et al. Stereo image coding via digital watermarking[J].Journal of Electronic Imaging, 2009,18 (3) .. 033012-033012-9.
  • 9LUO Ting, YU Mei, JIANG Gang-yi, et al. Novel DCT- based blind stereo image watermarking algorithm [A] Proc. of Lecture Notes in Electrical Engineering [C]./ 2011,143 : 297-304.
  • 10Campisi P. Object-oriented stereo-image digital water- marking[J]. Journal of Electronic Imaging, 2008, 17 (4) .. 602-611.

共引文献9

同被引文献70

  • 1罗棻,陈华富,尧德中.基于投影的fMRI时间序列图像配准方法研究[J].电子科技大学学报,2004,33(4):410-413. 被引量:4
  • 2石雅笋.改进的SURF图像配准算法研究[D].成都:电子科技大学,2008.
  • 3Gary J. Sullivan, ens-Rainer Ohm, Woo-Jin Han, et al. O- verview of the high efficiency video coding (HEVC) standard[J]. IEEE Transactions on Circuits and Systems for Video Technology. 2012,12(22) : 1649-1668.
  • 4Alin C Popescu, Hany Farid. Statistical tools for digital image forensics [D]. Dartmouth College, Hanover, NH, USA,2004.
  • 5FU Dong-d0ng,SHI Yun-qing,SU Wei. A generalized Ben- ford's law for JPEG coefficients and its applications in im- age forensics[C]. Proceedings of the 9th Conference on Security,Steganography and Watermarking of Multimedia Contents IX[O-I. 2007,6505 : L5051.
  • 6Chen C H, Shi Y Q, Su W. A machine learning based scheme for double JPEG compression detection [A]. Proc. of Int. Conf. Pattern Recognit. (ICPR), 2008,1814- 1817.
  • 7WANG Wei-hong, Farid H. Exposing digital forgeries in video by detecting double MPEG compression[A]. Proc. of the Multimedia and Security Workshop Geneva[C]. 2006,37-47.
  • 8Chen W,Shi Y Q, Detection of double MPEG compression based on first digit statistics[A]. Proc. of Lect. Notes Comput. Sci. (IWDW 2008) [C]. 2009,5450 : 16-30.
  • 9JIANG Xing-hao, WANG Wan, SUN Tan-feng, et al. Detec- tion of double compression in MPEG-4 videos based on Markov statistics [J]. IEEE signal processing letters, 2013,20(5) : 447-450.
  • 10Chang Chih-Chung, Lin Ohih-Jen. LIBSVM= A library for support vector machines[ CP/OL ]. http://www, csie. ntu. edu. tw/-,cjlin/libsvm/, 2001.

引证文献8

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部