期刊文献+

一种改进的SURF古籍图像复制粘贴篡改检测算法 被引量:1

An Algorithm of Improved Copy-paste Tamper Detection forSURF Ancient Images
下载PDF
导出
摘要 针对古籍图像复制粘贴篡改检测需求设计了一种算法。该算法以SURF算法为基础,引入小波变换并改进,清除图像中的噪声斑点,提高了Hessian矩阵构建的准确性;引入SLIC(Simple Linear Iterative Clustering)算法并改进,对图像进行分块,减少了图像匹配检索用时;改进欧氏距离匹配阈值选取方式,降低了特征点检测误匹配率;引入图像局部色彩方差,提升图像特征点匹配准确性。结合多种类型的古籍图像篡改实例,并与当前其他主流算法就检测结果进行比较分析。结果表明,该算法在匹配检测准确度和检测用时方面更具优势,更能有效地鉴定出篡改的图像信息。 An algorithm for the detection of copy-paste tampering of ancient images is designed in this paper.Based on SURF algorithm,wavelet transform is introduced in the algorithm to clear the irrelevant spots in the image and improve the accuracy of Hessian matrix.SLIC(Simple Linear Iterative Clustering)algorithm is introduced to partition the image into blocks to improve the efficiency of image matching and retrieval.The Euclidean distance matching threshold selection method is improved to reduce the mismatching rate of feature point detection.Local color variance is introduced to improve the accuracy of image feature point matching.Combined with many kinds of ancient image tampering examples,the detection results are compared with other mainstream algorithms.Experimental results show that this algorithm greatly improves the matching detection accuracy and detection time,and identifies image tampering information more effectively.
作者 王永飞 WANG Yongfei(Tongling Vocational and Technical College,Tongling Anhui 244061,China)
出处 《重庆科技学院学报(自然科学版)》 CAS 2021年第5期93-101,共9页 Journal of Chongqing University of Science and Technology:Natural Sciences Edition
基金 安徽省高等学校质量工程项目“MOOC《PHOTOSHOP实用教程》”(2017mooc348) 铜陵职业技术学院自然科学重点研究项目“数字噪声图像损伤修复技术分析研究”(tlpt2020NK014)。
关键词 古籍图像 篡改匹配 小波变换 SLIC ancient images match with tamper wavelet transform SLIC
  • 相关文献

参考文献8

二级参考文献54

  • 1王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 2Hsu Yu, Chang Shih Fu. Camera response functions for image fo- rensics:An automatic algorithm for splicing detection [ J ]. IEEE Transactions on Information Forensics and Security,2010,5 (4 : 816 -825.
  • 3Johnson M K,Farid H. Exposing digital forgeries by detecting m- consistencies in lighting[ C ]///Proceeding of the 7th Workshop on Multimedia and Security, New York :2005 : 1 -10.
  • 4Bianchi T,Piva A. Image forgery localization via block-grained a- nalysis of JPEG artifacts [ J ]. IEEE Transactions on Information Forensics and Security,2012,7(3 ) : 1003 -1017.
  • 5Peng Yuanyuan, Liu Benyong. Accurate estimation of primary quantisation table with application to tampering[ J ]. IET Electron Lett ,2013,49 (23) :1452 -1454.
  • 6Fillatre L. Adaptive steganalysis of least significant bit replace- ment in grayscale natural images[ J ]. IEEE Trans on Signal Pro- cessing ,2012,60 (2) :556 -569.
  • 7WeI Weimin, Wang Shuozhong,Zhang Xinpeng. Estimation of im- age rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery [ J ]. IEEE Trans on Information Forensics and Security,2010,5(3 ) : 507 - 517.
  • 8Chen Chenglong, Ni Jiangqun, Huang Jixu. Blind detection of me- dian filtering in digital images: A difference domain based approach[J]. IEEE Trans on Image Processing,2013,22 ( 12 ) : 4699 -4710.
  • 9Fan Jiayuan, Cao Hong, ALEX C. Estimating EXIF parameters based on noise features for image manipulation detection [ J ]. IEEE Transactions on Information Forensics and Security,2013, 8(4) :608-618.
  • 10Kee E, O'Brien J, FARID H. Exposing photo manipulation with in- consistent shadows [ J ]. ACM Transactions on Graphics, 2013, 32(4) :1 -12.

共引文献18

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部