期刊文献+

基于复合特征的复制粘贴伪造图像盲检测 被引量:9

Blind detection of copy-paste forgery image based on feature combination
在线阅读 下载PDF
导出
摘要 提出了一种基于复合图像特征的复制粘贴伪造图像盲检测算法。复合图像特征由一维特征矩、二维特征矩、马尔科夫特征组成,从时空、局部和全局综合提取图像特征描述,提高了图像特征描述符的表示能力。本文所提的伪造图像盲检测算法基于复合图像特征,分析图像块间的相似度,搜索复制粘贴伪造区域。通过哥伦比亚大学伪造图像数据集的测试结果表明,在灰度值变化明显和细节轮廓清晰的图像中,所提算法能达到比较理想的检测效果,准确率较高。 An efficient approach based on feature combination for detecting the copy-paste forgery image is presented. The combinated feature includes 1D moment, 2D moment and Markov feature, which could efficiently grasp the most representative features. Based on the feature combination, the proposed algorithm extracts the block descriptor, compares the descriptors blockby-block. Experiments on Columbia spliced image datbase demonstrate that the copy-paste forgery regions are accurately detected in the images with significantly gray changes and clear outline.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第11期4264-4267,共4页 Computer Engineering and Design
基金 江苏省高校自然科学基金项目(09KJB520006 11KJD520007) 南京大学软件新技术国家重点实验室开放基金项目(KFKT2008B15) 东南大学计算机网络和信息集成教育部重点实验室基金项目(K93-9-2010-04) 南京工业大学学科预研基金项目(44209105)
关键词 图像伪造 复制粘贴 复合图像特征 马尔可夫特征 矩特征 spliced image copy-paste forgery feature combination Markov feature moment feature
  • 相关文献

参考文献14

  • 1Dong Jing, Wang Wei, Tan Tieniu, et al. Run-length and edge statistics based approach for image splicing detection [C]. Lecture Notes in Computer Science 5450: Digital Watermarking, 2009: 76-87.
  • 2Fu D, Shi Y Q, Su W. Detection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition [C]. Jeju Island, Korea: International Workshop on Digital Watermarking, 2006.
  • 3Chen W, Shi Y Q, Su W. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function [C]. San Jose, CA, USA: Security, Steganography and Watermarking of Multimedia Contents IX, SPIE, 2007.
  • 4Yun Q Shi, Chunhua Chen, Wen Chen. A natural image model approach to splicing detection [C]. Proceedings of the 9th workshop on Multimedia & Security. New York: ACM Press, 2007: 51-62.
  • 5Robert M Gray. Probability, random process, and ergodic properties [M]. Springer Science & Business Media, LLC, 2009.
  • 6Sutthiwan P, Shi Yun-Qing, Dong Jing, et al. New developments in color image tampering detection [C]. Paris: IEEE International Symposium on Circuits and Systems, 2010:3064-3067.
  • 7Jessiea Fridrich, David Soukal, Jan Lukas. Detection of copymove forgery in digital images [J]. IEEE Transactions on Information Forensics and Security, 2008, 3 (4) 582-592.
  • 8Ng Tian-Tson, Chang Shih-Fu. A data set of authentic and spliced image blocks [R]. Advent Technical Report, Columbia University, 2004.
  • 9Wang W, Dong J, Tan Tieniu. Effective image splicing detection based on image chroma [C]. IEEE International Conference on Image Processing. Cario, Egypt: IEEE, 2009: 1257-1260.
  • 10Wang Jun-wen, Liu Guang-jie, Li Hong-yuan, et al. Detection of image region duplication forgery using model with circle Mock [C]. International Conference on Multimedia Information Networking and Security, 2009: 25-29.

二级参考文献27

  • 1曹文伦,彭国华,秦洪元,张军.利用色彩分量相关性的彩色图像分形编码方法[J].计算机工程与应用,2004,40(22):51-55. 被引量:21
  • 2Yan-Bo Han Zhi-Wei Xu Hai Zhuge.Preface[J].Journal of Computer Science & Technology,2006,21(4):465-465. 被引量:18
  • 3祝玉新,孙星明,杨恒伏.基于Harr小波的彩色图像可逆水印算法[J].计算机应用研究,2007,24(6):165-166. 被引量:10
  • 4Farid H.Digital image forensics[J].Scientific American,2008,298(6):66-71.
  • 5Fridrich J,Soukal D,Lukas J.Detection of Copy-Move Forgery in Digital Images[EB/OL].http://www.ws.binghamton.edu/fridrich/Research/copymove.pdf,2008-08-02.
  • 6Popescu A C,Farid H.Exposing Digital Forgeries by Detecting Duplicated Image Regions[EB/OL].http://www.cs.dartmouth.edu/farid/publications/tr04.html,2008-08-02.
  • 7Li Guohui,Wu Qiong,Tu Dan,et al.A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[C]//IEEE Inter-national Conference on Multimedia and Expo.Beijing,China,2007:1750-1753.
  • 8Wang Weihong,Farid H.Exposing Digital Forgeries in Video by Detecting Duplication[EB/OL].http://www.cs.dartmouth.edu/farid/publications/acm07.html,2008-08-02.
  • 9Foroosh H,Zerubia J B,Berthod M.Extension of phase correlation to subpixel registration[J].IEEE Transactions on Medical Imaging,2002,11(3):187-200.
  • 10William S H.A subspace identification extension to the phase correlation method[J].IEEE Transactions on Medical Imaging,2003,22(2):277-280.

共引文献21

同被引文献55

  • 1刘艳,李宏东.DCT域图象处理和特征提取技术[J].中国图象图形学报(A辑),2003,8(2):121-128. 被引量:21
  • 2谢世朋,胡茂林.稀疏纹理的特征提取和分类研究[J].计算机应用研究,2007,24(3):306-308. 被引量:3
  • 3骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,30(11):1998-2007. 被引量:67
  • 4Hany Farid. Creating and detecting doctored and virtual ima-ges: implications to the child pornography prevention act [ R ]. USA : Dartmouth College ,2012.
  • 5Maryam Jaberi, George Bebis, Muhammad Hussain. Accurate and robust localization of duplicated region in copy-move image forgery [J]. Machine Vision and Applications, 2014, 25 (2) : 451-475.
  • 6Ghulam Muhammad, Munner H A1-Hamma& Image forgery detec- tion usiv steerable pyramid transform and local binary pattern [J]. Machine Vision and Applications, 2014, 25 (4): 985-995.
  • 7Christlein V, Riess C, Jordan J. An evaluation of popular co- py-move forgery detection approaches [J]. IEEE Transaction on Information Forensics and Security, 2012, 7 ( 6 ): 1841-1854.
  • 8Mahdian B, Saie S. A bibliography on blind methods for identi- fying image forgery [J]. Signal Processing: Image Communi- cation, 2010, 25 (8):389-399.
  • 9Amerini I, Ballan L, Caldelli R. ASIFT-Based forensic met- hod for copy-move attack detection and transformation recovery [J]. IEEE Transaction on Information Forensics and Security, 2011, 6 (3): 1099-1110.
  • 10Ghulam Muhammad, George Bebis. Passive copy move image forgery detection using undecimated dyadic wavelet transform [J]. Digital Investigation, 2012, 9 (1): 49-57.

引证文献9

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部