期刊文献+

利用JPEG块效应不一致性的合成图像盲检测 被引量:15

Blind Detection of Composite Images by Measuring Inconsistencies of JPEG Blocking Artifact
下载PDF
导出
摘要 合成图像的篡改对象和背景区域一般来源于不同的JPEG图像。为了快速有效地检测这种图像篡改,提出了一种盲检测JPEG合成图像的方法。首先将图像与Laplacian模板卷积得到二阶差分图像,沿水平(垂直)方向平均后进行离散Fourier变换得到归一化的频谱,基于频谱幅值构造JPEG块效应测度;然后将待检测图像重叠分块并计算其相应块效应测度,利用块效应不一致性检测篡改区域。实验结果表明,该方法是快速有效的。 When creating a digital forgery, it is often necessary to combine several images which were originally of different JPEG compression qualities. This paper proposes a passive approach to detect digital forgeries by checking inconsistencies of blocking artifact. We calculate the second-order difference edge map by convolving the blocky image with a Laplacian kernel. Then compute the mean of the results along the horizontal (vertical) direction and obtain a vector. Discrete Fourier transform of this vector produces a normalized spectrum curve and builds a blocking artifact measure. Divide the composite image into overlapped blocks and calculate the measure of each block. The forged area can be effectively exposed by checking inconsistencies of blocking artifact. Simulation results show the efficiency of proposed algorithm.
出处 《中国图象图形学报》 CSCD 北大核心 2009年第11期2387-2390,共4页 Journal of Image and Graphics
关键词 数字取证 块效应 篡改检测 被动认证 digital forensics, blocking artifact, tampering identification, passive authentication
  • 相关文献

参考文献10

  • 1Farid H.Image forgery detection[].IEEE Signal Processing Magazine.2009
  • 2Fridrich J.Digital image forensics[].IEEE Signal Processing Magazine.2009
  • 3Fridrich J,Lukas J.Estimation of primary quantization matrix in double compressed JPEG images[].Proceedings of Digital Forensic Research Workshop.2003
  • 4Farid H.Exposing digital forgeries from JPEG ghosts[].IEEE Transactions on Information Forensics and Security.2009
  • 5Wang Z,Bovik A C,Evans B L.Blind measurement of blocking artifacts in images[].Proceedings of IEEE International Conference on Image Processing.2000
  • 6Ye S,Sun Q,Chang Ee-chien.Detecting digital image forgeries by measuring inconsistencies of blocking artifact [ A ][].Proceedings of IEEE International Conference on Multimedia and Expo.2007
  • 7Gallagher A C.Detection of linear and cubic interpolation in JPEG compressed images[].Proceedings of nd Canadian Conference on Computer and Robot Vision.2005
  • 8Schaefer G,Stich M.UCID-an uncompressed colour image database[].Proceedings of SPIE Storage and Retrieval Methods and Applications for Multimedia.2004
  • 9FAN Z,QUEIROZ R L.Identification of Bitmap Compression History:JPEG Detection and Quantizer Estimation[].IEEE Transactions onImage Processing.2003
  • 10POPESCU AC.TR2005-531, Statistical Tools for D igital Image Forensics[]..2004

同被引文献139

  • 1陈娟,夏军,尹涵春.压缩视频码流中运动矢量的提取[J].电子器件,2006,29(4):1342-1345. 被引量:4
  • 2王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 3秦运龙 孙广玲 张新鹏.利用运动矢量进行视频篡改检测.计算机研究与发展,2009,46:227-233.
  • 4Lukas J,Fridrich J.Estimation of Primary Quantization Matrix in Double Compressed JPEG Images[C].Proceedings of Digital Forensic Research Workshop,Cleveland,OH,USA,August 6-8,2003:67-84.
  • 5Ye Shui-ming,Sun Qi-bin and Chang Ee-chien.Detecting digital image forgeries by measuring inconsistencies of blocking artifact[C].Proceedings of IEEE International Conference on Multimedia and Expo,Beijing,China,2007:12-15.
  • 6Li Wei-hai,Yuan yuan and Yu Neng-hai.Passive detection of doctored JPEG image via block artifact grid extraction[J].Signal Processing,2009,89:1821-1829.
  • 7Barbe K.,Pintelon R.,Schoukens J..Welch Method Revisited:Nonparametric Power Spectrum Estimation Via Circular Overlap.IEEE Transactions on Signal Processing,2010,58(2):553~565.
  • 8Popescu A C,Farid H.Statistical tools for digital forensics[C].6th International Workshop on Information Hiding Proceedings,Toronto,Canada,May,2004:128-147.
  • 9He J F,Lin Z C,Wang L F,and Tang X O.Detecting Doctored JPEG Images Via DCT Coefficient Analysis[C].Proceedings of 9th European Conference on Computer Vision,Graz,Austria:Springer,2006:423-435.
  • 10Farid H.Exposing Digital Forgeries from JPEG Ghosts[J].IEEE Transactions on Information Forensics and Se curity,2009,4(1):154-160.

引证文献15

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部