期刊文献+
共找到927篇文章
< 1 2 47 >
每页显示 20 50 100
Passive detection of copy-paste forgery between JPEG images 被引量:5
1
作者 李香花 赵于前 +2 位作者 廖苗 F.Y.Shih Y.Q.Shi 《Journal of Central South University》 SCIE EI CAS 2012年第10期2839-2851,共13页
A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed forma... A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed format or in a JPEG compressed format.Then the proposed detection method was analyzed and simulated for all the cases of the two tampering scenarios.The tampered region is detected by computing the averaged sum of absolute difference(ASAD) images between the examined image and a resaved JPEG compressed image at different quality factors.The experimental results show the advantages of the proposed method:capability of detecting small and/or multiple tampered regions,simple computation,and hence fast speed in processing. 展开更多
关键词 image forensic JPEG compression copy-paste tbrgery passive detection tampered image compressed image
在线阅读 下载PDF
图像抠图与copy-paste结合的数据增强方法 被引量:1
2
作者 杨天成 杨建红 陈伟鑫 《华侨大学学报(自然科学版)》 CAS 2023年第2期243-249,共7页
提出一种基于图像抠图与copy-paste结合的数据增强方法(matting-paste),采用图像抠图法获取单个垃圾实例的准确轮廓,并对单个实例进行旋转和亮度变换.根据物体轮廓信息,把实例粘贴到背景图上,无需额外的人工标注即可生成新的带有标注的... 提出一种基于图像抠图与copy-paste结合的数据增强方法(matting-paste),采用图像抠图法获取单个垃圾实例的准确轮廓,并对单个实例进行旋转和亮度变换.根据物体轮廓信息,把实例粘贴到背景图上,无需额外的人工标注即可生成新的带有标注的数据,从而提高数据集的多样性和复杂性.结果表明:数据集扩充后的mask比数据集扩充前的识别精度提高了0.039,matting-paste能在已有数据集上有效地扩充数据,进一步提高模型的识别精度. 展开更多
关键词 数据增强 图像抠图 copy-paste 实例分割
在线阅读 下载PDF
Face Forgery Detection via Multi-Scale Dual-Modality Mutual Enhancement Network
3
作者 Yuanqing Ding Hanming Zhai +3 位作者 Qiming Ma Liang Zhang Lei Shao Fanliang Bu 《Computers, Materials & Continua》 2025年第10期905-923,共19页
As the use of deepfake facial videos proliferate,the associated threats to social security and integrity cannot be overstated.Effective methods for detecting forged facial videos are thus urgently needed.While many de... As the use of deepfake facial videos proliferate,the associated threats to social security and integrity cannot be overstated.Effective methods for detecting forged facial videos are thus urgently needed.While many deep learning-based facial forgery detection approaches show promise,they often fail to delve deeply into the complex relationships between image features and forgery indicators,limiting their effectiveness to specific forgery techniques.To address this challenge,we propose a dual-branch collaborative deepfake detection network.The network processes video frame images as input,where a specialized noise extraction module initially extracts the noise feature maps.Subsequently,the original facial images and corresponding noise maps are directed into two parallel feature extraction branches to concurrently learn texture and noise forgery clues.An attention mechanism is employed between the two branches to facilitate mutual guidance and enhancement of texture and noise features across four different scales.This dual-modal feature integration enhances sensitivity to forgery artifacts and boosts generalization ability across various forgery techniques.Features from both branches are then effectively combined and processed through a multi-layer perception layer to distinguish between real and forged video.Experimental results on benchmark deepfake detection datasets demonstrate that our approach outperforms existing state-of-the-art methods in terms of detection performance,accuracy,and generalization ability. 展开更多
关键词 Face forgery detection dual branch network noise features attention mechanism multiple scale
在线阅读 下载PDF
An adaptive dual-domain feature representation method for enhanced deep forgery detection
4
作者 Ming Li Yan Qin +1 位作者 Heng Zhang Zhiguo Shi 《Journal of Automation and Intelligence》 2025年第4期273-281,共9页
Deep forgery detection technologies are crucial for image and video recognition tasks,with their performance heavily reliant on the features extracted from both real and fake images.However,most existing methods prima... Deep forgery detection technologies are crucial for image and video recognition tasks,with their performance heavily reliant on the features extracted from both real and fake images.However,most existing methods primarily focus on spatial domain features,which limits their accuracy.To address this limitation,we propose an adaptive dual-domain feature representation method for enhanced deep forgery detection.Specifically,an adaptive region dynamic convolution module is established to efficiently extract facial features from the spatial domain.Then,we introduce an adaptive frequency dynamic filter to capture effective frequency domain features.By fusing both spatial and frequency domain features,our approach significantly improves the accuracy of classifying real and fake facial images.Finally,experimental results on three real-world datasets validate the effectiveness of our dual-domain feature representation method,which substantially improves classification precision. 展开更多
关键词 Dynamic convolution module Dynamic filter Feature representation Facial images Deep forgery detection
在线阅读 下载PDF
Lip-Audio Modality Fusion for Deep Forgery Video Detection
5
作者 Yong Liu Zhiyu Wang +3 位作者 Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng 《Computers, Materials & Continua》 2025年第2期3499-3515,共17页
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by fusing lip images and audio signals. The main method used is lip-audio matching detection technology based on the Siamese neural network, combined with MFCC (Mel Frequency Cepstrum Coefficient) feature extraction of band-pass filters, an improved dual-branch Siamese network structure, and a two-stream network structure design. Firstly, the video stream is preprocessed to extract lip images, and the audio stream is preprocessed to extract MFCC features. Then, these features are processed separately through the two branches of the Siamese network. Finally, the model is trained and optimized through fully connected layers and loss functions. The experimental results show that the testing accuracy of the model in this study on the LRW (Lip Reading in the Wild) dataset reaches 92.3%;the recall rate is 94.3%;the F1 score is 93.3%, significantly better than the results of CNN (Convolutional Neural Networks) and LSTM (Long Short-Term Memory) models. In the validation of multi-resolution image streams, the highest accuracy of dual-resolution image streams reaches 94%. Band-pass filters can effectively improve the signal-to-noise ratio of deep forgery video detection when processing different types of audio signals. The real-time processing performance of the model is also excellent, and it achieves an average score of up to 5 in user research. These data demonstrate that the method proposed in this study can effectively fuse visual and audio information in deep forgery video detection, accurately identify inconsistencies between video and audio, and thus verify the effectiveness of lip-audio modality fusion technology in improving detection performance. 展开更多
关键词 Deep forgery video detection lip-audio modality fusion mel frequency cepstrum coefficient siamese neural network band-pass filter
在线阅读 下载PDF
A Survey of Image Forensics:Exploring Forgery Detection in Image Colorization
6
作者 Saurabh Agarwal Deepak Sharma +2 位作者 Nancy Girdhar Cheonshik Kim Ki-Hyun Jung 《Computers, Materials & Continua》 2025年第9期4195-4221,共27页
In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulat... In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulated images across various domains.One of the pressing challenges stemming from this advancement is the increasing difficulty in discerning between unaltered and manipulated images.This paper offers a comprehensive survey of existing methodologies for detecting image tampering,shedding light on the diverse approaches employed in the field of contemporary image forensics.The methods used to identify image forgery can be broadly classified into two primary categories:classical machine learning techniques,heavily reliant on manually crafted features,and deep learning methods.Additionally,this paper explores recent developments in image forensics,placing particular emphasis on the detection of counterfeit colorization.Image colorization involves predicting colors for grayscale images,thereby enhancing their visual appeal.The advancements in colorization techniques have reached a level where distinguishing between authentic and forged images with the naked eye has become an exceptionally challenging task.This paper serves as an in-depth exploration of the intricacies of image forensics in the modern age,with a specific focus on the detection of colorization forgery,presenting a comprehensive overview of methodologies in this critical field. 展开更多
关键词 Image colorization image forensic digital image forgery machine learning convolutional neural network deep learning generative adversarial network
在线阅读 下载PDF
面向人脸视频防伪检测的大规模中文数据测评基准
7
作者 贝毅君 娄恒瑞 +7 位作者 高克威 宋杰 王蕊 金苍宏 雷杰 宋明黎 胡秉德 冯尊磊 《中国图象图形学报》 北大核心 2026年第1期82-98,共17页
目的针对生成式人工智能(artificial intelligence generated content,AIGC)技术生成的高逼真伪造人脸视频对人类视觉感知的欺骗性问题,以及当前人脸防伪检测算法评估体系在中文数据层面有效性和应用性验证方面的空白,旨在构建面向中文... 目的针对生成式人工智能(artificial intelligence generated content,AIGC)技术生成的高逼真伪造人脸视频对人类视觉感知的欺骗性问题,以及当前人脸防伪检测算法评估体系在中文数据层面有效性和应用性验证方面的空白,旨在构建面向中文场景的量化评估基准以推动防伪检测技术迭代发展。方法提出面向大规模中文人脸伪造视频的CHN-DF(Chinese-deepfake)数据集,详细阐述数据采集、伪造样本生成及质量评估的全流程构建方法。通过多维度实验验证数据集复杂性,兼顾跨模态伪造技术覆盖、环境干扰因子完备性等复杂因素,并建立基于深度检测模型的系统性评测基准。结果发布全球首个包含434727样本的中文人脸视频防伪数据集,实验显示该数据集鉴别难度高,在16种包含SOTA(state-of-the-art)与主流防伪模型的测评中视觉与视听结合的准确率分别控制在85%与70%以下。构建的评测基准覆盖了视觉与听觉模态场景,在跨域泛化性测试中显示模型准确率性能波动平均幅度达19.6%,显著揭示现有算法的应用局限性。结论构建的中文防伪评测基准有效填补领域空白,通过系统性实验阐明数据集特性与算法性能的关联机制,提出针对模型鲁棒性增强、跨模态泛化能力提升等关键发展方向,为面向中文场景的量化评估以及人脸视频防伪技术的实际部署提供数据支撑与实践指导。CHN-DF数据集在线发布地址为:https://doi.org/10.57760/sciencedb.j00240.00067和https://github.com/HengruiLou/CHN-DF. 展开更多
关键词 深度伪造 人脸伪造视频 人脸防伪评测基准 中文数据集 多模态
原文传递
基于间接伪造方式的硅胶指纹膜制备及其应用研究
8
作者 颜磊 黄芳珊 +1 位作者 罗茜 喻彦林 《刑事技术》 2026年第1期36-43,共8页
指印的间接伪造是指以手指遗留的现成指印为母版进行伪造,因不需要捺印人配合且隐蔽性强,在现实中具有较大危害。但若将间接伪造指印应用到电子证据取证中用以破解电子设备,将会极大程度上为取证流程提供便利。本文探究了以间接伪造方... 指印的间接伪造是指以手指遗留的现成指印为母版进行伪造,因不需要捺印人配合且隐蔽性强,在现实中具有较大危害。但若将间接伪造指印应用到电子证据取证中用以破解电子设备,将会极大程度上为取证流程提供便利。本文探究了以间接伪造方法制成的仿生指纹膜对各类搭载指纹识别系统的电子设备的破解效果。实验中采集已经形成的可见指印与潜指印作为样本,制作普通硅胶和电容硅胶指纹膜,破解手机、平板电脑、指纹考勤机和智能门锁等设备;考察了指印样本质量、光敏印章的制作条件、指纹膜的制作条件等因素对破解效果的影响。结果表明,通过对已经形成的真实指印样本进行扫描、打印、刻制光敏印章后制成指纹膜,能够成功破解搭载指纹识别系统的一系列电子设备,并达到较高的成功率。间接伪造硅胶指纹膜的制作过程便利快捷,并提供了一种无需拆机或侵入系统即可破解相关电子设备的方法,能更好地保护物证原始性、完整性。但也需要意识到此方法的危害性,应呼吁公众在日常生活中注重保护自身指纹信息安全。 展开更多
关键词 指纹识别 仿生指纹膜 硅胶指纹膜 间接伪造 解锁
在线阅读 下载PDF
走马楼西汉简“驾、纵、野劾不审案”所见汉代司法问题
9
作者 袁延胜 贾蕾 《南都学坛》 2026年第1期8-15,共8页
长沙走马楼西汉简所载“驾、纵、野劾不审案”起因于官吏“僮”冒用同僚“卯”之名伪造券书,以逃避佣钱支付,继而引发了一系列相关司法调查与弹劾。该案中诈为券书、劾不审、官吏逃亡等犯罪行为的法律界定与刑罚适用,鲜活展现了秦汉法... 长沙走马楼西汉简所载“驾、纵、野劾不审案”起因于官吏“僮”冒用同僚“卯”之名伪造券书,以逃避佣钱支付,继而引发了一系列相关司法调查与弹劾。该案中诈为券书、劾不审、官吏逃亡等犯罪行为的法律界定与刑罚适用,鲜活展现了秦汉法律对官吏违法行为的司法惩治程序,为研究西汉前期司法实践和司法制度提供了典型案例。 展开更多
关键词 走马楼西汉简 诈为券书 劾不审
在线阅读 下载PDF
对基于Bell态的量子指定验证者签名协议的伪造攻击与改进
10
作者 吴健雄 邹祥福 《五邑大学学报(自然科学版)》 2026年第1期1-8,共8页
量子签名是量子密码学的一个重要分支,在信息安全领域具有重要应用价值.为了揭示一个基于Bell态的量子指定验证者签名协议隐藏的安全漏洞,本文通过构造一种针对该签名协议的有效伪造攻击方法,证明了攻击者可以成功伪造任何消息的有效签... 量子签名是量子密码学的一个重要分支,在信息安全领域具有重要应用价值.为了揭示一个基于Bell态的量子指定验证者签名协议隐藏的安全漏洞,本文通过构造一种针对该签名协议的有效伪造攻击方法,证明了攻击者可以成功伪造任何消息的有效签名.这证明了上述签名协议是不安全的.为抵御上述构造的伪造攻击,本文通过替换原协议中的签名酉操作,提出了一个改进的量子指定验证者签名协议.分析表明,改进后的协议既能保持原协议的效率,又能够抵御前面构造的伪造攻击,提升了协议的安全性能. 展开更多
关键词 量子签名 指定验证者 伪造攻击 BELL态
在线阅读 下载PDF
融合时间空间的多尺度Transformer人脸伪造检测
11
作者 杜利莎 杨高明 《兰州工业学院学报》 2026年第1期15-20,共6页
针对目前人脸伪造检测无法充分提取时间特征、检测效率低等问题,提出一种融合时间特征和空间特征的多尺度人脸伪造检测方法MST-ViT。MST-ViT方法设计双流结构提取包含全局信息和细节信息的多尺度特征,设计帧间差异捕获模块增强对时间伪... 针对目前人脸伪造检测无法充分提取时间特征、检测效率低等问题,提出一种融合时间特征和空间特征的多尺度人脸伪造检测方法MST-ViT。MST-ViT方法设计双流结构提取包含全局信息和细节信息的多尺度特征,设计帧间差异捕获模块增强对时间伪影的提取,并通过时空Transformer提取时间特征和空间特征。实验结果表明:所提模型在FF++数据集内的AUC结果提升1.71%;在具有挑战性的DFDC跨数据集实验中AUC提升2.06%。 展开更多
关键词 人脸伪造检测 空间特征 时间特征 多尺度特征 TRANSFORMER
在线阅读 下载PDF
论清代中期边缘人群的同乡诈伪行为
12
作者 李甜 《复旦学报(社会科学版)》 北大核心 2026年第1期115-124,共10页
在清代中期的中国,伴随着商贸活动的频繁、社会流动之加剧,平民犯罪的社会现象也格外突出。除了叫魂案等异乡人犯罪,针对同乡人的犯罪行为也在增多。同乡诈骗案的施害者与受害者,他们既是互不相识的陌生人,又是共享一些社会关系的“熟... 在清代中期的中国,伴随着商贸活动的频繁、社会流动之加剧,平民犯罪的社会现象也格外突出。除了叫魂案等异乡人犯罪,针对同乡人的犯罪行为也在增多。同乡诈骗案的施害者与受害者,他们既是互不相识的陌生人,又是共享一些社会关系的“熟人”。在儒家伦理持续灌输、支配的大环境下,一些在异乡游荡的社会边缘人群,将他们对社会的不满、对人生的不甘转化为犯罪行为,首当其冲的受害者就是身边的同乡们。同乡诈骗犯依靠地缘、血缘、业缘等社会网络寻找诈骗对象,通过假冒官员等手段,伺机牟取经济利益。这种利用信息不对称来诓骗同乡的犯罪行为,不仅令受害者蒙受经济损失,也造成人际关系上的困扰,还给当时的社会治理带来一定挑战。 展开更多
关键词 诈伪 假冒官员 边缘人群 叫魂 徽商
原文传递
基于ConvNeXt-Mamba的双编码器图像伪造检测
13
作者 潘苗绒 王燚 《计算机工程与应用》 北大核心 2026年第5期336-345,共10页
图像伪造检测在网络安全领域中是一项基础且关键的任务。卷积神经网络(CNN)是当前图像伪造检测领域的主流方法,但CNN通常只能提取局部特征,难以捕获全局特征。为此,该研究提出了融合Mamba和ConvNeXt的双编码器结构,其中Mamba负责捕获全... 图像伪造检测在网络安全领域中是一项基础且关键的任务。卷积神经网络(CNN)是当前图像伪造检测领域的主流方法,但CNN通常只能提取局部特征,难以捕获全局特征。为此,该研究提出了融合Mamba和ConvNeXt的双编码器结构,其中Mamba负责捕获全局上下文特征,ConvNeXt则聚焦于局部细节特征,通过两者的协同实现特征的综合提取。为了进一步强化关键特征表达,引入通道注意力模块(SE block),通过自适应调整特征通道的权重提升特征表达能力。针对伪造区域边界复杂带来的漏检问题,增加了边缘损失以提高模型对伪造轮廓的识别准确性。在CASIAv1等4个基准数据集上的实验表明,该方法在曲线下面积(AUC)分数和F1分数上分别平均提升0.015和0.054,显著优于现有方法,尤其在复杂伪影和模糊边界场景下展现出更强鲁棒性。 展开更多
关键词 图像伪造检测 网络安全 卷积神经网络(CNN) Mamba 全局特征 局部特征
在线阅读 下载PDF
Video Inter-Frame Forgery Identification Based on Consistency of Correlation Coefficients of Gray Values 被引量:4
14
作者 Qi Wang Zhaohong Li +1 位作者 Zhenzhen Zhang Qinglong Ma 《Journal of Computer and Communications》 2014年第4期51-57,共7页
Identifying inter-frame forgery is a hot topic in video forensics. In this paper, we propose a method based on the assumption that the correlation coefficients of gray values is consistent in an original video, while ... Identifying inter-frame forgery is a hot topic in video forensics. In this paper, we propose a method based on the assumption that the correlation coefficients of gray values is consistent in an original video, while in forgeries the consistency will be destroyed. We first extract the consistency of correlation coefficients of gray values (CCCoGV for short) after normalization and quantization as distinguishing feature to identify interframe forgeries. Then we test the CCCoGV in a large database with the help of SVM (Support Vector Machine). Experimental results show that the proposed method is efficient in classifying original videos and forgeries. Furthermore, the proposed method performs also pretty well in classifying frame insertion and frame deletion forgeries. 展开更多
关键词 INTER-FRAME Forgeries CONTENT CONSISTENCY VIDEO FORENSICS
在线阅读 下载PDF
Image Copy-Move Forgery Detection Using SURF in Opponent Color Space 被引量:4
15
作者 巩家昌 郭继昌 《Transactions of Tianjin University》 EI CAS 2016年第2期151-157,共7页
Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identif... Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identify the flat duplicated regions without reliable extracted features. In this paper, we propose a new CMFD method by using speeded-up robust feature(SURF)in the opponent color space. Our method starts by converting the inspected image from RGB to the opponent color space. The color gradient per pixel is calculated and taken as the work space for SURF to extract the keypoints. The matched keypoints are clustered and their geometric transformations are estimated. Finally, the false matches are removed. Experimental results show that the proposed technique can effectively expose the duplicated regions with various transformations, even when the duplication regions are flat. 展开更多
关键词 copy-move forgery flat region color descriptor OwSURF
在线阅读 下载PDF
Image Forgery Detection Using Segmentation and Swarm Intelligent Algorithm 被引量:2
16
作者 ZHAO Fei SHI Wenchang +1 位作者 QIN Bo LIANG Bin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期141-148,共8页
Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm ... Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm is proposed. This method segments image into small nonoverlapping blocks. A calculation of smooth degree is given for each block. Test image is segmented into independent layers according to the smooth degree. SI algorithm is applied in finding the optimal detection parameters for each layer. These parameters are used to detect each layer by scale invariant features transform (SIFT)-based scheme, which can locate a mass of keypoints. The experimental results prove the good performance of the proposed method, which is effective to identify the CMF image with small or smooth cloned region. 展开更多
关键词 copy-move forgery detection scale invariant features transform (SIFT) swarm intelligent algorithm particle swarm optimization
原文传递
An effective copy-move forgery detection algorithm using fractional quaternion Zernike moments and improved PatchMatch algorithm 被引量:4
17
作者 Chen Beijing Gao Ye +2 位作者 Yu Ming Wu Peng Shu Huazhong 《Journal of Southeast University(English Edition)》 EI CAS 2019年第4期431-439,共9页
An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSA... An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSANNA)to modify the propagation process.Then,fractional quaternion Zernike moments(FrQZMs)are considered to be features extracted from color forged images.Finally,the extracted FrQZMs features are matched by the improved PatchMatch algorithm.The experimental results on two publicly available datasets(FAU and GRIP datasets)show that the proposed algorithm performs better than the state-of-the-art algorithms not only in objective criteria F-measure value but also in visual.Moreover,the proposed algorithm is robust to some attacks,such as additive white Gaussian noise,JPEG compression,rotation,and scaling. 展开更多
关键词 QUATERNION fractional Zernike moments PatchMatch algorithm copy-move forgery detection
在线阅读 下载PDF
Detecting JPEG image forgery based on double compression 被引量:1
18
作者 Wang Junwen Liu Guangjie Dai Yuewei Wang Zhiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第5期1096-1103,共8页
Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilis... Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilistic model with periodic effects in double quantization is analyzed, and the probability of quantized DCT coefficients in each block is calculated over the entire iraage. Secondly, the posteriori probability of each block is computed according to Bayesian theory and the results mentioned in first part. Then the mean and variance of the posteriori probability are to be used for judging whether the target block is tampered. Finally, the mathematical morphology operations are performed to reduce the false alarm probability. Experimental results show that the method can exactly locate the doctored part, and through the experiment it is also found that for detecting the tampered regions, the higher the second compression quality is, the more exact the detection efficiency is. 展开更多
关键词 image forgery JPEG double compression QUANTIZATION posteriori probability.
在线阅读 下载PDF
Copy-Move Forgeries Detection and Localization Using Two Levels of Keypoints Extraction 被引量:1
19
作者 Soad Samir Eid Emary +1 位作者 Khaled Elsayed Hoda Onsi 《Journal of Computer and Communications》 2019年第9期1-18,共18页
Copy-move offense is considerably used to conceal or hide several data in the digital image for specific aim, and onto this offense some portion of the genuine image is reduplicated and pasted in the same image. There... Copy-move offense is considerably used to conceal or hide several data in the digital image for specific aim, and onto this offense some portion of the genuine image is reduplicated and pasted in the same image. Therefore, Copy-Move forgery is a very significant problem and active research area to check the confirmation of the image. In this paper, a system for Copy Move Forgery detection is proposed. The proposed system is composed of two stages: one is called the detection stages and the second is called the refine detection stage. The detection stage is executed using Speeded-Up Robust Feature (SURF) and Binary Robust Invariant Scalable Keypoints (BRISK) for feature detection and in the refine detection stage, image registration using non-linear transformation is used to enhance detection efficiency. Initially, the genuine image is picked, and then both SURF and BRISK feature extractions are used in parallel to detect the interest keypoints. This gives an appropriate number of interest points and gives the assurance for finding the majority of the manipulated regions. RANSAC is employed to find the superior group of matches to differentiate the manipulated parts. Then, non-linear transformation between the best-matched sets from both extraction features is used as an optimization to get the best-matched set and detect the copied regions. A number of numerical experiments performed using many benchmark datasets such as, the CASIA v2.0, MICC-220, MICC-F600 and MICC-F2000 datasets. With the proposed algorithm, an overall average detection accuracy of 95.33% is obtained for evaluation carried out with the aforementioned databases. Forgery detection achieved True Positive Rate of 97.4% for tampered images with object translation, different degree of rotation and enlargement. Thus, results from different datasets have been set, proving that the proposed algorithm can individuate the altered areas, with high reliability and dealing with multiple cloning. 展开更多
关键词 COPY MOVE forgery DETECTION Keypoint Based Methods SURF BRISK Bi-Cubic Interpolation
暂未订购
A Survey on Digital Image Copy-Move Forgery Localization Using Passive Techniques 被引量:2
20
作者 Weijin Tan Yunqing Wu +1 位作者 Peng Wu Beijing Chen 《Journal of New Media》 2019年第1期11-25,共15页
Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the mo... Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the most common types of image forgeries.Thus,an overview of the traditional and the recent copy-move forgery localization methods using passive techniques is presented in this paper.These methods are classified into three types:block-based methods,keypoint-based methods,and deep learning-based methods.In addition,the strengths and weaknesses of these methods are compared and analyzed in robustness and computational cost.Finally,further research directions are discussed. 展开更多
关键词 Image forgery copy-move forgery localization passive techniques
在线阅读 下载PDF
上一页 1 2 47 下一页 到第
使用帮助 返回顶部