期刊文献+

基于边缘羽化检测的虚假图像盲识别算法 被引量:1

Blind Detection of Digital Forgeries Using Detection Trace of Eclosion
在线阅读 下载PDF
导出
摘要 本文针对羽化操作的篡改方式,提出了一种新的图像盲识别算法,这种算法使用纹理分析方法。该方法的基本思想是首先进行图像分解,根据纹理图像进行轮廓构建。在轮廓构建中先对纹理图像进行类似纹理再提取,去除当中少量的噪声,其中使用了双树复小波变换。利用得到的数据,进行轮廓构建。实验表明,该算法在没有任何数字水印和数字签名的前提下,能提高篡改区域的检测精度,有效的检测大面积光滑的图像。 A novel method is presented for blinding detection of digital forgeries based on employing the eclosion when someone forges the digital image. The basic idea of the presented method in this article is that analyzing the texture of the image. In other words, at the first place, we decompose the image and then reconstruct the profile. In order to remove a small amount of noise in the texture image, we employ the dual tree complex wavelet transform, and then reconstruct the profile. The experimental results show that the algorithm can locate the edge eclosion exactly without any embedded information such as digital watermark and digital signature.
出处 《信号处理》 CSCD 北大核心 2009年第12期1922-1927,共6页 Journal of Signal Processing
基金 国家自然科学基金(批准号:60772040 60772042)资助的课题
关键词 羽化 图像分解 双树复小波变换 软阈值 edge eclosion image decomposition dual tree complex wavelet transform soft tbreshold
  • 相关文献

参考文献17

  • 1Popescu A C, Farid H. Exposing Digital Forgeries by Detecting Duplicated Image Regions, Technical Report TR2004-515, Department of Computer Science, Dartmouth College ,200d.
  • 2Fridrich J, Lukas J. Estimation of primary quantization matrix in double compressed JPEG images. In: Proceedings of Digital Forensic Research Workshop, Cleveland, OH, USA, 2003.
  • 3Popescu A C, Farid H. Exposing digital forgeries by detecting traces of re-sampling. IEEE Transactions on Signal Processing, 53 ( 2 ) : 758-767,2005.
  • 4Dnn-Yu Hsiao, Soo-Chang Pei. Detecting Digital Tampering by Blur Estimation. In : Proc. of the 1 st Int' l Workshop on Systematic Approaches to Digital Forensic Engineering. 2005.
  • 5陈英 赵鹏 王瑀屏.基于边界平滑检测的虚假图像盲识别算法[J].软件学报,2008,19:59-68.
  • 6Popescu A C, Farid H. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing,53 (10) : 3948-3959,2005.
  • 7Long Y J, Huang Y Z. Image based source camera identification using demosaicking. In: proceedings of 8th Workshoop on Multimedia Signal Processing, Victoria, BC : IEEE ,419-424,2006.
  • 8Johnson M K, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th Workshop on Multimedia and Security, New York, NY, USA, 1-10,2005.
  • 9Johnson M K, Farid H. Exposing digital forgeries through specular highlights on the eye. In: Proceedings of the 9^th International Workshop on Information Hiding, Saint Malo, France, 311-325,2007.
  • 10Lyu S W, Farid H. How realistic is photorealistic? IEEE Transactions on Signal Processing, 53 ( 2 ) : 845-850, 2005.

二级参考文献15

  • 1杨鸿波,时永刚,邹谋炎.一种非参数估计的活动围道图像分割方法[J].电子与信息学报,2004,26(12):1849-1855. 被引量:5
  • 2蔡国雷,杨鸿波,邹谋炎.一种基于活动围道的纹理图像分割方法[J].中国科学院研究生院学报,2005,22(5):624-630. 被引量:2
  • 3冯象初,杨永东,王义龙.基于小波尺度空间的中值函数[J].西安电子科技大学学报,2006,33(2):295-298. 被引量:1
  • 4Meyer Y. Oscillating Patterns in Image Processing and Nonlinear Evolution Equations [M]. Boston: University Lecture Series, American Mathematical Society, 2001.
  • 5Vese L, Osher S. Modeling Textures with Total Variation Minimization and Oscillating Patterns in Image Processing [J]. Journal of Sci Comput, 2003, 19(3) : 553-572.
  • 6Osher S, Sole A, Vese L A. Image Decomposition and Restoration Using Total Variation Minimization and the H^-1 Norm [J]. Multiscale Modeling and Simulation, 2003, 1(3) : 349-370.
  • 7Lieu L, Vese L. Image Restoration and Decomposition Via Bounded Total Variation and Negative Hilbert-sobolev Spaces [EB/OL]. [2006-10-15-]. http://www. math. ucla. edu/-Uieu/ams-meeting/009-slides. pdf.
  • 8Le T, Vese L. Image Decomposition Using the Total Variation Anddiv (BMO)[J]. SIAM Journal on Multiscale Modeling and Simulation, 2005, 4(2): 390-423.
  • 9Starek J L, Elad M, Donoho D L. Image Decomposition Via the Combination of Sparse Representations and a Variational Approaeh [J]. IEEE Trans on Image Proeessing, 2005, 14(10) : 1 570-1 582.
  • 10Chen S, Donoho D, Saunder M. Atomic Decomposition by Basis Pursuit [J]. SIAM J Sci Comput, 1998, 20(1) : 33-61.

共引文献7

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部