期刊文献+

基于小波矩的图像复制粘贴篡改检测 被引量:1

Detection of Image Copy-Move Tampering Based on Wavelet Moment
在线阅读 下载PDF
导出
摘要 图像的局部复制粘贴篡改技术,是最常见的一种图像伪造方式,对此提出一种基于小波矩的图像复制粘贴篡改检测算法.首先通过变分水平集活动轮廓模型初步确定图像篡改的可疑区域;然后对每一块可疑区域利用小波矩算法提取其小波矩特征;接着利用余弦相关性测度判别可疑区域的相似性;最后定位图像的篡改区域.实验结果表明本算法能够有效提取可疑区域,并进一步定位篡改区域.此外,算法对图像前景篡改区域的平移、旋转和缩放具有较强的鲁棒性. The regional copy-move tampering for a digital image is one of the most common forgery methods. This paper proposes a detection algorithm based on wavelet moment to detect the location of image copy-move tampering. Firstly, we tentatively figure out the suspicious tampered areas in an image by the active contour model based on variational level sets. Secondly, the wavelet moment algorithm is employed to extract wavelet moment features from all suspicious areas. Finally, the real tampered areas are located by using cosine correlation measure to judge the similarity of those suspicious tampered areas. The experiment demonstrates the effectiveness of above mentioned algorithm and its good robustness to the operations of translation, rotation and scale for foreground tampered areas.
出处 《计算机系统应用》 2013年第12期108-112,共5页 Computer Systems & Applications
基金 福建省自然科学基金(2011J01346) 福州大学科研基金(022336)
关键词 图像盲取证 小波矩 图像复制粘贴篡改 活动轮廓模型 余弦相关性测度 blind image forensics wavelet moment image copy-move tampering active contour model cosinecorrelation measure
  • 相关文献

参考文献11

  • 1Yu GJ, Lu CS, Liao HY. Mean quantization blind watermarking for image authentication. IEEE International Conference on Image Processing. Vanc-ouver BC, Canada.2000. 706-709.
  • 2Fridrich AJ, Soukal BD, Mukluks AJ. Detection of Copy-Move forgery in digital images. Proc. of Digital Forensic Research Workshop. 2003. 5-8.
  • 3Popescu AC, Farid H. Exposing digital forgeries by detecting duplicated image region [Technical Report]. 2004-515.Hanover, Department of Computer Science, Dartmouth College. USA. 2004.
  • 4Christlein V. On rotation invariance Copy-Move forergydetection. Information Forensics and Security (WIFS). 2010.1-6.
  • 5康晓兵,张二虎,陈亚军.下采样对数字图像伪造检测的影响分析[J].计算机工程,2012,38(16):215-218. 被引量:3
  • 6吴琼,李国辉,涂丹,孙韶杰.面向真实性鉴别的数字图像盲取证技术综述[J].自动化学报,2008,34(12):1458-1466. 被引量:55
  • 7骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,30(11):1998-2007. 被引量:67
  • 8魏为民,唐振军.利用JPEG块效应不一致性的合成图像盲检测[J].中国图象图形学报,2009,14(11):2387-2390. 被引量:15
  • 9Shen D, Ip SH. Discriminative wavelet shape descriptors for recognition of 2-D patterns. Pattern Recognition, 1999 (32):151-165.
  • 10Li CM, Xu CY, Gui CF, Martin D. Fox. level set evolution without reinitialization: A New Variational Formulation.Conference Publications. 2005. 430-436.

二级参考文献97

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2朱秀明,宣国荣,姚秋明,童学锋,施云庆.信息取证中图像重采样检测[J].计算机应用,2006,26(11):2596-2597. 被引量:7
  • 3戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622. 被引量:6
  • 4Celik M U, Sharma G, Saber E, Tekalp A M. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing, 2002, 11(6): 585-595
  • 5Zhu B B, Swanson M D, Tewfik A H. When seeing isn't believing. IEEE Signal Processing Magazine, 2004, 21(2): 40-49
  • 6Wu Q, Li G H, Tu D. An image authentication watermarking with self-localization and recovery. In: Proceedings of the 11th Joint International Computer Conference. Chongqing, China: World Scientific, 2005. 960-963
  • 7Ng T T, Chang S F, Sun Q B. Blind Detection of Digital Photomontage Using Higher Order Statistics, Advent Technical Report 201-2004-1, Columbia University, June 2004
  • 8Khanna N, Mikkilineni A K, Martone A F, Ali G N, Chiu G T C, Allebach J P. A survey of forensic characterization methods for physical devices. In: Proceedings of the 6th Annual Digital Forensics Research Workshop. Lafayette, USA: Elsevier, 2006. 17-28
  • 9Sencar H T, Memon N. Overview of state-of-the-art in digital image forensics. Part of Indian Statistical Institute Platinum Jubilee Monograph Series Titled Statistical Science and Interdisciplinary Research. USA: World Scientific Press, 2008
  • 10Ng T T, Chang S F, Lin C Y, Qibin Sun Q B. Passive-blind image forensics. In: Multimedia Security Technologies for Digital Rights. New York: Elsevier, 2006

共引文献122

同被引文献9

  • 1Mahdian B, Saic S. A bibliography on blind methods for identifying image forgery[J]. Signal Processing:Image Communication, 2010,25(6) :389-399.
  • 2Fridrich J, Soukal D, Lukas J. Detecting of copy-move forgery in digital images [ C]// Proc. Digital Forensic Research Workshop. Cleveland, OH, 2003.
  • 3Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions[R]. Dartmouth Col- lege, Computer Science,TR2004-515, 2004.
  • 4Li G, Wu Q, Tu D, et al. A sorted neighborhood ap- proach for detecting duplicated regions in image forger- ies based on DWT and SVD[C] ff Multimedia and Ex- po, 2007 IEEE International Conference on. China, Beijing, 2007 : 1750-1753.
  • 5Mahdian B, Saic S. Detection of copy-move forgery u- sing a method based on blur moment invariants[J]. Forensic Science International, 2007, 171 ( 2/3 ): 180-189.
  • 6Li W, Yu N. Rotation robust detection of copy-move forgery[C]//Proc. IEEE International Conference on Image Processing ICIP' 10. China, Hongkong, 2010: 2113-2116.
  • 7Lee D D, Seung H S. Learning the parts of objects with non-negative matrix factorization [J]. Nature, 1999,130(401) : 788-791.
  • 8岳芹.基于DWT域数字水印的遥感图像机密信息隐藏[J].计算机与现代化,2009(8):150-151. 被引量:3
  • 9张小祥,周治平.小波低频子带提取特征的图像复制篡改检测[J].计算机工程与应用,2011,47(10):161-163. 被引量:3

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部