期刊文献+

基于光学特性及其线性约束的图像检测算法 被引量:2

Detecting image forgery based on shading and shadows
下载PDF
导出
摘要 基于图像纹理和阴影的信息判断物理光学特性,根据该特性是否一致提出一种检测图像真实性的算法。通过建立线性规划方程限定楔形方向和角度,并运用共轭梯度法去判定正确的纹理信息。纹理限定的光源位置或楔形的交集都可以作为判定图像真实性的依据。结合阴影和纹理的约束条件,使得楔形的参数更加精确。实验结果显示,所建立的算法可以正确显示光源的信息和图像中物体的光学特性,并判断图像是否被篡改。 The linear programming problem is employed to confine the direction and angle in the wedge, and the conjugate gradient methods are employed to describe the shading. Combining both the shading and shadow make the parameters in wedge more accurate. By the improved corresponding algorithms, the experimental results show that the light source direction and consistency can be calculated accurately.
出处 《微型机与应用》 2015年第22期37-40,共4页 Microcomputer & Its Applications
关键词 纹理 阴影 光学特性 线性规划 shading shadow optical characteristics linear programming
  • 相关文献

参考文献4

  • 1RAFAELCG,RICHARDEW.数字图像处理[M].阮秋琦,阮宇智,等译.北京:电子工业出版社,2011.
  • 2唐坤,葛华勇,房树娟.基于视觉特性的JPEG图像自适应隐写算法[J].微型机与应用,2015,34(8):39-40. 被引量:2
  • 3Ge Huayong, MALIK H. Exposing image forgery using in- consistent reflection vanishing point [C]. 2014 International Conference on Audio, Language and Image Processing(I- CALIP) , 2014(4) :282-286.
  • 4FARID H. Exposing digital forgeries from JPEG ghosts[J]. IEEE Transactions on Information Forensics and Security, 2009(4) : 154-160.

二级参考文献9

  • 1向德生,熊岳山,朱更明.基于视觉特性的灰度水印自适应嵌入与提取算法[J].中国图象图形学报,2006,11(7):1026-1035. 被引量:22
  • 2UPHAM D. JPEG-Jsteg-v4[EB/OL].[1993-05-26](2014-11- 01). http://www.funet.fi/pub/crypt/steganography/jpeg -jsteg - v4.diff.gz.
  • 3WESTFIELD A. F5-Asteganographic algrithm high capacity despite better steganalysis. IH2001, 2001:289-302.
  • 4KAWAGUCHI E, EASON R O. Principle and applications of BPCS-Steganography[A], Proceedings of SPIE: Multime- dia Systems and Applications [M]. Bellingham, WA: SPIE, 1999 : 464-472.
  • 5Wu Dachun, TSAI W H. A steganographic method for im- ages by pixel-value differencing [J].Pattern Recognition Let- ters, 2005,24(9-10) : 1613-1626.
  • 6WANG C M, WU N I, TSAI C S, et al. A high quality steganographic method with pixel-value differencing and modulus function [J]. Journal of Systems and Software, 2008, 81(1):150-158.
  • 7JOHNSON N, JAJODIA S. Steganalysis of images created using current steganography software [C]. Proceedings of the 2nd International Information Hiding Workshop, Berlin/Hei- delberg: Springer, 1988:273-289.
  • 8周清雷,黄明磊.JPEG图像的信息隐藏方法[J].计算机工程与设计,2010,31(19):4178-4181. 被引量:11
  • 9龚发根,秦拯.分块自适应JPEG图像数据隐藏算法[J].计算机应用研究,2010,27(10):3883-3884. 被引量:9

共引文献1

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部