期刊文献+

具有双重检测机制的图像篡改检测算法 被引量:3

Image Tampering Detection Algorithm Based on Double Detection Mechanisms
在线阅读 下载PDF
导出
摘要 针对单一基于相关性的图像篡改检测算法难以同时解决虚警和漏检的缺陷,提出一种具有双重检测机制的图像篡改检测算法——第一重检测利用待测图像各区域的相机指纹是否与参考相机的指纹具有相关性来确定疑似篡改图像块;第二重检测从疑似篡改图像块中抽取特征,送到训练好的支持向量机(SVM),由基于图像特征的SVM对其分类,把误判块和真实篡改块区分开来.实验结果表明,该算法优于经典的单一基于相机指纹相关性的篡改检测算法. As the classical correlation-based image tampering detection algorithms cannot avoid false alarm and mis- detection, a novel algorithm based on double detection mechanisms is proposed. In this algorithm, first, tampered image blocks under suspicion are picked out according to the correlation between the camera fingerprint in each re- gion of the detected image and that for reference. Then, image features are extracted from each suspicious image block and are sent to a trained SVM (Support Vector Machine) to construct an image features-based SVM classifier for distinguishing the mis-deteeted blocks from the real tampered ones. Experimental results demonstrate that the proposed method outperforms the classical one only based on the correlation of camera fingerprints.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第4期16-22,共7页 Journal of South China University of Technology(Natural Science Edition)
基金 华南理工大学中央高校基本科研业务费专项资金资助项目(2012ZM0027)
关键词 相机指纹 相关性检测 模式分类 篡改检测 双重检测机制 camera fingerprint correlation detection pattern classification tampering detection double detection mechanism
  • 相关文献

参考文献12

  • 1Fridrich J, Soukal D, Lukas J. Detection of copy-move forgery in digital images [ C]//Proceedings of Digital Forensic Research Workshop. Cleveland:IEEE Computer Society,2003:55-61.
  • 2Bayram S, Sencar H T, Memon N. An efficient and robust method for detecting copy-move forgery [ C ] //Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing. Washington, D C :IEEE Computer Society,2009 : 1053-1056.
  • 3Wang J, Liu G, Li H, et al. Detection of image region duplication forgery using model with circle block [ C ] //International Conference on Multimedia Information Networking and Security ,2009. Wuhan : IEEE Computer Society, 2009 : 25- 29.
  • 4Ting Z, Rang-ding W. Copy-move forgery detection based on SVD in digital image [ C] //2nd International Congress on Image and Signal Processing, 2009. Tianjin: IEEE, 2009 : 1-5.
  • 5胡永健,刘琲贝,贺前华.数字多媒体取证技术综述[J].计算机应用,2010,30(3):657-662. 被引量:20
  • 6Lukas J, Fridrich J, Goljan M. Detecting digital image forgeries using sensor pattern noise [ C ]//Proc SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII. San Jose : SPIE, 2006 : OY1-0Y11.
  • 7Chen M, Fridrich J, Goljan M, et al. Determining image origin and integrity using sensor noise [ J ]. IEEE Transactions on Information Forensics and Security, 2008,3 ( 1 ) :74-90.
  • 8Luisier F, Blu T, Unser M. A new SURE approach to image denoising:interscale orthogonal wavelet thresholding [ J ]. IEEE Transactions on Image Processing, 2007, 16(3) :593-606.
  • 9Mihcak M K, Kozintsev I, Ramchandran K. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising [ C]//Proc IEEE Int Conf Acoustics, Speech, and Signal Processing. Phoenix : IEEE, 1999:3253-3256.
  • 10Kharrazi M, Sencar H T, Memon N. Blind source camera identification [ C ]//Proceedings of the 2004 IEEE Inter- national Conference on Image Processing. Singapore: IEEE,2004:709-712.

二级参考文献71

  • 1高阳,黄征,徐彻,施少培,杨旭.基于高阶频谱分析的音频篡改鉴定[J].信息安全与通信保密,2008,30(2):94-96. 被引量:8
  • 2付丽华,李宏伟,张猛.基于小波变换的复杂噪声背景中谐波恢复方法[J].工程地球物理学报,2005,2(1):22-28. 被引量:10
  • 3姚秋明,柴佩琪,宣国荣,杨志强,施云庆.基于期望最大化算法的音频取证中的篡改检测[J].计算机应用,2006,26(11):2598-2601. 被引量:13
  • 4王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 5[1]Joshi R J,Fischer T R.Comparison of generalized Gaussian and laplacian modeling in DCT image coding[J].IEEE Trans.on signal processing letters,1995,2(5):81-82.
  • 6[2]Do M N,Vetteli M.Wavelet based texture retrieval using generalized Gaussian density and Kullback leibler distance[J].IEEE Trans.on image processing,2002,11(2):146-158.
  • 7[3]Mallat S.A theory for multiresolution signal decomposition:The wavelet representation[J].IEEE Trans.on Pattern Recognit Machine Intell,1989,11(7):674-693.
  • 8[4]Walden A T,Hosken J W J.The nature of the nonGaussianity of primary reflection coefficients and its significance for deconvolution[A].The 47th meeting of the EAEG,Budapest,1985.1038-1066.
  • 9[5]Cao J,Murara N.A stable and robust ICA algorithm based on T-distribution and generalized Gaussian distribution on model[A].Neural Networks for Signal Processing[C].New York:IEEE Press,1999,283-292.
  • 10[6]Stacy E W.A generalization of gamma distribution[J].Ann Math Stat,1962,28(3):1187-1192.

共引文献56

同被引文献26

  • 1徐祗军,吴晓娟,董文会.基于Chebyshev混沌序列的数字图像扩频水印[J].电子技术应用,2005,31(9):11-13. 被引量:7
  • 2LIN C Y, CItANG S F. A robust image anthentication method distin- guishing JPEG compression from malicious maniptdation [ J ]. IEEE Trans on Circuits and Systems for Video Technology,2001,11 (2) :153-168.
  • 3LU C S, LIAO H Y M. Structural digital signature for image anthenti- cation : an incidental distortion resistant scheme[ C ]//Proe of the 8th ACM International Cont'rence on Muhimedia. 2000 : 115-118.
  • 4CHESSA S. Mobile application security tot video streaming authenti- cation and data integrity combining digital signature and watermarking techniques[ C ]//Proc of the 65th IEEE Vehicular Technology Confe- rence. 2007:634-638.
  • 5SUN Qi-bin, CHANG S F. A secure and robust digital signaturescheme for JPEG2000 image authentication [ J ]. Proceedings of the IEEE Trans on Multimedia,2005,7(3 ) :480-494.
  • 6STALLINGS W. Network security essentials: application and stan- dards[ M ]. Upper Saddle River, NJ : Prentice-Hall ,2000.
  • 7WALTON S. Image authentication for a slippery new age [ J]. Dr. Dobb' s Journal, 1995,20(4 ) : 18-26.
  • 8WONG P W. A public key watermark for image verification and au- thentication[ C]//Proc of IEEE International Conference on Image Processing. 1998:455-459.
  • 9WONG P W, MEMON N. Secret and public key image watermarking schemes for image authentication and ownership verification [ J ]. IEEE Trans on Image Processing,200[ ,10(10) :1593-1601.
  • 10HOLLIMAN M, MEMON N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [ J ]. IEEE Trans on Image Processing ,2000,9( 3 ) :432 -441.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部