期刊文献+

剪切和缩放图像的作伪检测

Improved Digital Image Forgeries Detection Based on Sensor Noise
在线阅读 下载PDF
导出
摘要 为了将基于传感器噪声的数字图像区域作伪检测技术扩展到更普遍的情况,即嫌疑图片同时受到剪切和缩放的情况,提出在作伪检测前,先对嫌疑图片的残留噪声进行预处理。预处理过程为:先在一定范围内用蛮力搜索寻找缩放因子;根据两个信号的标准互相关性最大值来估计剪切参数;利用估计出的参数对嫌疑图片的残留噪声进行反向操作,从而恢复图片噪声与参考相机(拍摄嫌疑图片所用的相机)指纹的同步性。实验结果显示,预处理后能成功检测出作伪区域。 In order to extend the image forgeries detection technology to a more general setting when the image under investigation has been simultaneously cropped and scaled.We proposed to make image preprocessing before detection.The scaling factor is found using a brute force search in a special range,and the cropping parameters are determined from the maximum of the normalized between two signals.At last the noise residual from the suspicious image is reverse-operated using the estimated parameters to recover the synchronization between the image noise and the camera fingerprint.The experiment results show that the tamper area can be detected successfully after preprocessing.
作者 谭莉玲
出处 《贵州大学学报(自然科学版)》 2011年第2期74-77,共4页 Journal of Guizhou University:Natural Sciences
关键词 相机指纹 数字取证 复制-粘贴篡改 作伪检测 camera fingerprint digital forensics copy-past tamper forgeries detection
  • 相关文献

参考文献4

  • 1Chen M, Fridfich J, Goljan M. Determining Image Origin and Integrity Using Sensor Noise [ J -. IEEE Transactions on Information Forensics and Security, 2008, 3 ( 1 ) : 74 - 90.
  • 2崔夏荣,苏光大.基于噪音相关性的数字图像区域作伪检测[J].光子学报,2008,37(10):2108-2113. 被引量:8
  • 3F Luisier, T Blu, M Unser. A New SURE Approach to Image Denoising: Interscale Orthonormal Wavelet Thresholding [ J]. IEEE Transactions on Image Processing,2007, 16 ( 3 ) : 593 - 606.
  • 4B V K Vijaya Kuma, L Hassebrook. Performance Measures for Correlation Filters [ J ]. Appl Opt, 1990 (29) :2997 - 3006.

二级参考文献11

  • 1汪太月,李志明.一种广义高斯分布的参数快速估计法[J].工程地球物理学报,2006,3(3):172-176. 被引量:38
  • 2刘薇,顾济华,尉迟亮,陶智.一种基于数字全息技术的盲音频水印算法[J].光子学报,2006,35(11):1788-1792. 被引量:7
  • 3POPESCU A C. Statistical tools for digital image forensics [D]. Department of Computer Science, Dartmouth College, 2005. http://www.ists. dartmouth.edu/library/233. pdf.
  • 4JOHSON M K, FARID H. Exposing digital forgeries by detecting inconsistencies in lighting[C]. International Multimedia Conference, Proceedings of the 7th workshop on Multimedia and security, 2005 : 1-10.
  • 5GERADTS Z, BIJHOLD J, KIEFT M, et al. Methods for identification of images acquired with digital cameras [C]. SPIE,2001,4232: 505-512.
  • 6BAYRAM S, SENCAR H, MEMON N, et al. Source camera identification based on CFA interpolation[C]. IEEE, 2005,3 69-72.
  • 7LIN Zhou-chen, WANG Rong-rong, TANG Xiao-ou, et al. Detecting doctored images using camera response normality and consistency [C]. IEEE Computer Society Conference, Computer Vision and Pattern Recognition, 2005, 1: 1087- 1092.
  • 8LUKAS J, FRIDRICH J, GOLJAN M. Determining digital image origin using sensor imperfections [C]. SPIE, 2005, 5685:249-260.
  • 9KHARRAZI M, SENCAR H, MEMON N. Blind source camera identification [C]. Proceeding of IEEE International ,Conference on Image Processing, 2004,1 : 709-712.
  • 10HOLST G C. CCD arrays, Cameras, and Displays[M], 2th ed. Winter Park,FL,and Bellingham,Wa: JCD & SPIE,1998: 79- 144.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部