期刊文献+

面向JPEG压缩的篡改取证综述 被引量:3

Summarization of tampering evidence for JPEG compression
原文传递
导出
摘要 随着图像处理技术的不断探索与发展,对数字图像进行的各式各样篡改随之而来,如何对篡改图像进行取证成为当前研究的热点问题之一。本文重点对基于JPEG压缩的篡改取证技术进行了综述,根据JPEG图像的压缩原理,将现有的取证算法分为三大类:块效应的图像真伪盲检测的算法、压缩量化相关性的图像真伪盲检测的算法和基于双压缩特性的JPEG伪造图像取证方案。分别阐述了国内外学者在面向JPEG压缩的篡改取证技术方面的主要研究成果,最后提出了JPEG图像的被动取证技术的不足之处。 With the continuous exploration and development of image processing technology, the various tampering of digital images is followed, and how to extract the tampering image becomes one of the hot issues in the current research. Based on the compression principle of JPEG image, this paper divides the existing forensics algorithm into three categories:the algorithm of image false and false detection of block effect, the image of compression quantization correlation, and the method of compressing and quantifying the image based on JPEG compression. The algorithm of true and false blind detection and JPEG forgery image forensics scheme based on double compression. This paper expounds the main research achievements of scholars at home and abroad for JPEG compression, and finally puts forward the shortcomings of passive forensics technology of JPEG image.
出处 《自动化与仪器仪表》 2018年第2期5-8,共4页 Automation & Instrumentation
基金 甘肃政法学院科研资助项(2017XQNLW03) 甘肃政法学院教学改革项目(GZJG2016-B05) 甘肃省省青年科技基金计划(17JR5RA159)
关键词 图像取证 JPEG图像取证 被动取证 image forensics JPEG image forensics passive evidence
  • 相关文献

参考文献7

二级参考文献79

  • 1汪太月,李志明.一种广义高斯分布的参数快速估计法[J].工程地球物理学报,2006,3(3):172-176. 被引量:38
  • 2刘薇,顾济华,尉迟亮,陶智.一种基于数字全息技术的盲音频水印算法[J].光子学报,2006,35(11):1788-1792. 被引量:7
  • 3王华,汶德胜,邱跃洪,冉小强.CCD功耗分析与计算[J].光子学报,2007,36(1):174-179. 被引量:2
  • 4LUKAS J, FRIDRICH J, GOLJAN M. Determining digital image origin using sensor imperfections [C]. SPIE, 2005, 5685:249-260.
  • 5LUKAS J, FRIDRICH J, GOLJAN M. Digital camera identification from sensor pattern noise[J]. IEEE Transactions on Information Foresics and Security, 2006,1 (2):205-214.
  • 6WALLACE G K. The JPEG still picture compression standard [J]. Communications of the ACM , 1991,34(10) : 30-44.
  • 7POPESCU A C. Statistical tools for digital image forensics [D]. Department of Computer Science, Dartmouth College, 2005. http://www, ists. dartmouth, edu/ library/233, pdf.
  • 8朱秀明 宣国荣 姚秋明 等.基于EM算法的数字取证中图像重采样检测.哈尔滨工业大学学报,2006,38:868-871.
  • 9Luo W, Qu Z, Pan F, et al. A survey of passive technology for digital image forensics[J]. Frontiers of Computer Science in China, 2007,1(2) : 166-179.
  • 10Ng Tian-Tson, Chang Shih-Fu, Lin Ching-Yung, et al. Passiveblind image forensics[M]//Zeng W, Yu H, I.in C Y. Multimedia Security Technologies for Digital Rights Management. Orlando: Academic Press, 2006 : 383-412.

共引文献30

同被引文献38

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部