期刊文献+

数字图像区域复制篡改的盲取证技术研究进展 被引量:1

Research Advances on Blind Forensics Technology of Digital Image Region Duplication Forgery
下载PDF
导出
摘要 由于盲取证技术不需要任何预先嵌入的认证信息,而仅根据图像本身的统计特性就能鉴别数字图像的原始性、真实性和完整性,已经成为数字媒体安全领域的研究热点.文中介绍了数字图像中常见的区域复制篡改方式,分析实际篡改过程中可能涉及到的图像处理操作,总结归纳了区域复制篡改盲取证方法的一般流程.最后,指出现有目前方法存在的问题,并对盲取证技术未来的研究方向进行展望. Blind forensics technology has become a hot research topic in the field of digital media security, due to the ad- vantage that it does not need any authentication information embedded in advance, only to identify image primitiveness, authenticity and integrity according to the statistical features of the image itself. In this paper, region duplication which is a common forgery in digital images is introduced. The image processing operations which may be involved in the practical tampering are analyzed. The general process of blind forensics method for detecting region duplication forgery is summa- rized. Finally, limitations existing in available methods are analyzed, and perspectives of further research work on blind forensics technology are presented.
出处 《华侨大学学报(自然科学版)》 CAS 北大核心 2016年第1期48-53,共6页 Journal of Huaqiao University(Natural Science)
基金 天津市高等学校科技发展基金计划项目(20120712) 天津城建大学教育教学改革与研究项目(JG-1220)
关键词 盲取证 区域复制 篡改检测 数字取证 blind forensics region duplication forgery detection digital forensics
  • 相关文献

参考文献7

二级参考文献93

  • 1戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622. 被引量:6
  • 2Light K.Fonda,Kerry and Photo Fakery.The Washington Post,Saturday,Feb.28,2004:A21
  • 3Farid H.A picture tells a thousand lies.New Scientist,2003,179(2411):38-41
  • 4Zhu B B,Swanson M D,Tewfik A H.When seeing isn't believing.IEEE Signal Processing Magazine,2004,21 (2):40-49
  • 5Schneider M,Chang S F.A robust content based digital signature for image authentication//Proceedings of the Image Processing.Lausanne,Switzerland,1996,3:227-230
  • 6Swaminathan A,Mao Y,Wu M.Robust and secure image hashing.IEEE Transactions on Information Forensics and Security,2006,1(2):215-230
  • 7Cox I J,Miller M,Bloom J.Digital Watermarking.San Francisco,USA:Morgan Kaufmann Publishers,2002
  • 8Katzenbeisser S,Petitcolas F.Information Techniques for Steganography and Digital Watermarking.Boston,MA:Artec House,2000
  • 9Craver S A,Wu M,Liu B et al.Reading between the lines:Lessons from the SDMI challenge//Proceedings of the 10th Usenix Security Symposium.Washington DC,2001
  • 10Lyu S.Natural image statistics for digital image forensics[Ph.D.dissertation].Dartmouth College,Hanover,New Hampshire,USA,2005

共引文献100

同被引文献2

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部