期刊文献+

鲁棒的复制-缩放-粘贴篡改检测方法 被引量:4

Robust copy-scale-move forgery detection method
下载PDF
导出
摘要 为了能够检测图像的复制-缩放-粘贴(CSM)篡改操作,提出了一种基于金字塔模型的CSM图像篡改检测方法.首先,将一幅测试图像缩放成不同尺度的降采样子图像,采用非均匀采样选择子图像,并建立金字塔篡改伪造检测模型;然后,对模型中每一层子图像进行非重叠分块,提取该模型所有图像子块的Zernike矩特征;最后,模型中每一层的所有块特征分别与底层特征建立KD树,以便于搜索图像块的所有近似匹配对,并从匹配对中寻找CSM篡改操作的伪造痕迹平移向量,以便于确定篡改区域.实验结果表明,与现有的图像篡改检测方法相比,所提方法获得了更好的检测结果,且篡改图像检测的查准率和查全率均超过93%. In order to detect the image copy-scale-move (CSM)forgery,a CSM forgery detection method based on a pyramid model is proposed.First,a test image is rescaled into down sampling sub-images with different scale factors,which are used to build the pyramid model for forgery detec-tion according to non-uniform sampling.Then,each sub-image in the pyramid model is divided into non-overlapping sub-blocks.The Zernike moment features of all sub-block are extracted.Finally, the block features of each sub-image and those of the original image are used to build a KD-tree to search all approximate matching pairs,from which the forged trace shift vector can be found so as to determine the tampering region.The experimental results show that compared with the existing image tampering detection methods,the proposed method provides better detection results for large scaling attacks of region-duplication.The precision and recall of detection are more than 93%.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第6期1116-1120,共5页 Journal of Southeast University:Natural Science Edition
基金 国家重点基础研究发展计划(973计划)资助项目(2011CB707904) 国家自然科学基金资助项目(61073138 6110314 61271312 61201344)
关键词 篡改检测 复制 粘贴伪造 金字塔模型 图像取证 tampering detection copy-move forgery pyramid mode image forensics
  • 相关文献

参考文献12

  • 1Coatrieux G, Huang H, Shu H Z, et al. A watermark- ing based medical image integrity control system and an image moment signature for tampering characterization [ J]. IEEE Journal of Biomedical and Health Informat- ics, 2013, 17(6) : 1057 - 1067.
  • 2Huang H, Guo W, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm [ C]//Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Wuhan, China, 2008 : 272 - 276.
  • 3Pan X, Lyu S. Region duplication detection using im- age feature matching [ J ]. IEEE Transactions on Infor- mation Forensics and Security, 2010, 5 ( 4 ) : 857 - 867.
  • 4Amerini I, Ballan L, Caldelli R, et al. A sift-based fo- rensic method for copy-move attack detection and trans- formation recovery [ J ]. IEEE Transactions on Informa- tion Forensics and Security, 2011, 6(3) : 1099 - 1110.
  • 5Fridrich A J, Soukal B D, Luk6g A J. Detection of copy-move forgery in digital images [ C ]//Proceedings of Digital Forensic Research Workshop. Cleveland, Ohio, USA, 2003 : 1 - 10.
  • 6Luo W, Huang J, Qiu G. Robust detection of region- duplication forgery in digital image[ C]//1EEE 18th ln- ternation Conference on Pattern Recognition. Hongkong, China, 2006 : 746 - 749.
  • 7Popescu A C, Fafid H. Exposing digital forgeries by detecting duplicated image regions [ R ]. Hanover, NH, USA: Dartmouth College, 2004.
  • 8Ryu S J, Lee M J, Lee H K. Detection of copy-rotate- move forgery using Zemike moments [ C]//The 12th International Conference on Information Hiding. Cal- gary, Canada, 2010:51-65.
  • 9Lin H J, Wang C W, Kao Y T. Fast copy-move forgery detection[ J ]. WSEAS Transactions on Signal Process- ing, 2009, 5(5): 188-197.
  • 10Christlein V, Riess C, Jordan J, et al. An evaluation of popular copy-move forgery detection approaches [ J ]. IEEE Transactions on Information Forensics and Security, 2012, 7(6) : 1841 - 1854.

同被引文献21

  • 1DOYODDORJ M,RHEE K H.Robust copy-move forgery detection based on dual-transform[C]//Proceedings of 2013 Fifth International Conference on ICDF2C.Mscow:Springer,2013:3-16.
  • 2IMAMOGLU M B,ULUTAS G,ULUTAS M.Detection of copymove forgery using Krawtchouk moment[C]//Proceedings of2013 8th International Conference on Electrical and Electronics Engineering.Bursa:IEEE,2013:311-314.
  • 3SINGH C,RANADE S K.A high capacity image adaptive watermarking scheme with radial harmonic Fourier moments[J].Digital signal processing,2013,23(5):1470-1482.
  • 4WANG Xiangyang,LI Weiyi,YANG Hongying,et al.Invariant quaternion radial harmonic Fourier moments for color image retrieval[J].Optics&laser technology,2015,66:78-88.
  • 5ZHAO J,GUO J.Passive forensics for copy-move image forgery using a method based on DCT and SVD[J].Forensic science international,2013,233(1):158-166.
  • 6JABERI M,BEBIS G,HUSSAIN M,et al.Accurate and robust localization of duplicated region in copy-move image forgery[J].Machine vision&applications,2014,25(2):451-475.
  • 7GOYAL H,GULATI T.Robust copy move image forgery detection using scale invariant features transform[J].International journal of computer applications,2014,97(9):14-19.
  • 8胡海涛,平子良,吴斌.具有旋转不变性的图像矩的快速算法[J].光学学报,2010,30(2):394-398. 被引量:11
  • 9余永维,殷国富,蒋红海,黄强.磁瓦表面图像的自适应形态学滤波缺陷提取方法[J].计算机辅助设计与图形学学报,2012,24(3):351-356. 被引量:40
  • 10赵洁,郭继昌,武斌.基于几何均值分解的图像区域复制篡改检测方法[J].小型微型计算机系统,2012,33(9):2105-2108. 被引量:4

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部