期刊文献+

基于SGF-IABC的JPEG图像下采样因子检测算法

Downscaling factor estimation of JPEG image based on SGF-IABC
下载PDF
导出
摘要 对图像进行重采样操作是图像篡改的重要手段,JPEG图像作为最广泛的应用载体,对其进行重采样检测研究具有重要意义。JPEG图像由于重采样引起的块效应移位,差分其相邻极值间隔分布直方图呈周期性,且周期性受到图像纹理和边缘的干扰较大,为削弱下采样因子估计时易受到此类干扰,本文提出一种可抵抗图像纹理边缘的JPEG图像下采样因子估计模型。首先,将JPEG图像经过二次引导滤波(Secondary Guidance Filtering,SGF)的预处理去除图像的纹理噪声;其次,使用改进人工蜂群算法(Improved Artificial Bee Colony algorithm,IABC)对其进行边缘检测、提取和移除,弱化图像边缘周期性特征,以此减少图像极值区间直方图的统计误差,提升下采样因子估计值的准确性;最后,计算图像差分极值直方图,得到最终估计。实验结果表明,本文方法比现有算法具有更小的平均误差,对图像纹理和边缘在像素域的周期性干扰具有更好的鲁棒性,能有效抵抗纹理和边缘的双重干扰。 Image resampling is an important means of image tampering.As the most widely used carrier,it is of great significance to resample and detect JPEG images.According to the block effect shift of JPEG image caused by resampling,the histogram of the adjacent extreme interval distribution of the difference is periodic,and the periodicity is greatly disturbed by the texture edge of the image,in order to weaken this kind of interference in downscaling factor estimation.In this paper,a downscaling factor estimation model of JPEG image is proposed,which can resist the texture edge of the image.Firstly,the image is preprocessed by secondary guided filtering(Secondary Guidance Filtering,SGF)to remove the texture noise of the image.On this basis,the improved artificial bee swarm algorithm(Improved Artificial Bee Colony algorithm,IABC)is used to detect,extract and remove the edge of the image,so as to weaken the periodic features of the image edge,so as to reduce the statistical error of the image extreme interval histogram.Finally,the image difference extreme histogram is calculated to improve the accuracy of downscaling factor estimation.The experimental results show that this algorithm has smaller average error than the existing algorithms,has better robustness to the periodic interference of image texture and edge in pixel domain,and can effectively resist the double interference of texture and edge.
作者 郭静 张玉金 张立军 孙冉 GUO Jing;ZHANG Yujin;ZHANG Lijun;SUN Ran(School of Electronic and Electrical Engineering,Shanghai University of Engineering Science,Shanghai 201620,China)
出处 《智能计算机与应用》 2023年第5期190-196,共7页 Intelligent Computer and Applications
基金 上海市自然科学基金(17ZR1411900) 上海市科委重点项目(18511101600) 上海高校青年教师培养资助计划项目(ZZGCD 15090)。
关键词 重采样 图像篡改 下采样因子估计 二次引导滤波 改进人工蜂群算法 resample image tampering downscaling factor estimation secondary guided filtering improved artificial bee colony algorithm
  • 相关文献

参考文献3

二级参考文献33

  • 1Popescu A C.Statistical tools for digital image forensics[C] //Proceedings of the 6th International Workshop on Information Hiding,New York,2004:128-147.
  • 2Popescu A C,Farid H.Exposing digital forgeries by detecting traces of resampling[J].IEEE Transactions on Signal Processing,2005,53(2):758-767.
  • 3Gallagher A C.Detection of linear and cubic interpolation in JPEG compressed images[C] //Proceedings of the 2nd Canadian Conference on Computer Robot Vision,Washington D C,2005:65-72.
  • 4Prasad S,Ramakrishnan K R.On resampling detection and its application to detect image tampering[C] //Proceedings of IEEE International Conference on Multimedia and Expo,Toronto,2006:1325-1328.
  • 5Mahdian B,Saic S.Blind authentication using periodic properties of interpolation[J].IEEE Transactions on Information Forensics and Security,2008,3(3):529-538.
  • 6Wei W M,Wang S Z,Tang Z J.Estimation of rescaling factor and detection of image splicing[C] //Proceedings of the 11th IEEE International Conference on Communication Technology,Hangzhou,2008:676-679.
  • 7Gül G,Dirik A E,Avcbas I.Steganalytic features for JPEG compression-based perturbed quantization[J].IEEE Signal Processing Letters,2007,14(3):205-208.
  • 8Schaefer G,Stich M.UCID-an uncompressed colour image database[R].Nottingham:Nottingham Trent University,2003.
  • 9Popescu A C, Farid H. Exposing digital forgeries by de- tecting traces of re-sampling[J]. IEEE Transactions on Signal Processing,2005,53(2) :758-767.
  • 10Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tubaro. Revealing the traces of JPEG compression anti-forensics[J]. IEEE Transactions on information forensics and secu- rity, 2013,8(2) : 335-349.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部