期刊文献+

基于局部块效应的JPEG伪造图像的盲取证 被引量:7

Blind Forensic of JPEG Forgeries Based on Local Blocking Artifacts
下载PDF
导出
摘要 JPEG图像的块效应是判断图像是否被篡改的一个重要线索。本文基于对JPEG图像整体块效应的分析,定义了新的针对图像局部区域的块效应评价,并由此提出了一种有效的JPEG伪造图像盲取证方法。首先要获取待测图像在水平方向和垂直方向的差分图像,然后将两个不同方向的差分图像分别进行特定大小的分块处理,再计算每个分块区域的局部块效应评价,最后根据待测图像在不同区域局部块效应评价的明显差异分别从水平方向和垂直方向检测出图像被篡改区域的具体位置。实验结果表明,该方法可以有效的检测出经过JPEG双压缩的伪造图像,本文又进一步使用不同大小的滑块和不同的评价公式对伪造图像进行检测,并从抗干扰性和算法效率上比较不同算法的利弊,为寻找更优的JPEG伪造图像盲取证方法奠定了基础。 The blocking artifact in the JPEG images is becoming a more and more important clue in detecting image forgeries. This paper presents a new block artifact measure of the images local area and an effective method of blind forensic of JPEG forgeries on the basis of analyzing the overall block artifact of the JPEG images.Firstly,we calculate the horizontal and vertical differences maps of the JPEG image,and then divide the two maps into many sub-blocks with a specific size.Secondly,we measure the block artifact of each sub-block on the local area using the new method.Finally,respectively from the horizontal and vertical direction,the detection and location of doctored region is realized via checking significant differences of block artifact in different local areas.The experimental results validate the proposed approach in blind detecting the tampered area of the double JPEG compressed images.The slider blocks of varied sizes and different evaluation formulas are further used to detect the image forgeries.At the end of the paper,we give the pros and cons of different algorithms on the analysis of counter-interference and algorithm efficiency,which lays the foundation for further research in the area of JPEG forgeries blind forensic.
出处 《信号处理》 CSCD 北大核心 2010年第12期1805-1811,共7页 Journal of Signal Processing
基金 国家自然科学基金资助项目(60772040 60972151) 国家863计划项目(2007AA01Z455)
关键词 块效应 伪造图像 盲取证 JPEG双压缩 block artifact image forgery blind forensic double JPEG compression
  • 相关文献

参考文献9

  • 1Lukas J,Fridrich J.Estimation of Primary Quantization Matrix in Double Compressed JPEG Images[C].Proceedings of Digital Forensic Research Workshop,Cleveland,OH,USA,August 6-8,2003:67-84.
  • 2Popescu A C,Farid H.Statistical tools for digital forensics[C].6th International Workshop on Information Hiding Proceedings,Toronto,Canada,May,2004:128-147.
  • 3He J F,Lin Z C,Wang L F,and Tang X O.Detecting Doctored JPEG Images Via DCT Coefficient Analysis[C].Proceedings of 9th European Conference on Computer Vision,Graz,Austria:Springer,2006:423-435.
  • 4Farid H.Exposing Digital Forgeries from JPEG Ghosts[J].IEEE Transactions on Information Forensics and Se curity,2009,4(1):154-160.
  • 5李晟,张新鹏.利用JPEG压缩特性的合成图像检测[J].应用科学学报,2008,26(3):281-287. 被引量:19
  • 6Ye Shui-ming,Sun Qi-bin and Chang Ee-chien.Detecting digital image forgeries by measuring inconsistencies of blocking artifact[C].Proceedings of IEEE International Conference on Multimedia and Expo,Beijing,China,2007:12-15.
  • 7Li Wei-hai,Yuan yuan and Yu Neng-hai.Passive detection of doctored JPEG image via block artifact grid extraction[J].Signal Processing,2009,89:1821-1829.
  • 8魏为民,唐振军.利用JPEG块效应不一致性的合成图像盲检测[J].中国图象图形学报,2009,14(11):2387-2390. 被引量:15
  • 9Barbe K.,Pintelon R.,Schoukens J..Welch Method Revisited:Nonparametric Power Spectrum Estimation Via Circular Overlap.IEEE Transactions on Signal Processing,2010,58(2):553~565.

二级参考文献18

  • 1KATZENBEISSER S, PETITCOLAS F. Information techniques for steganography and digital watermarking[ M ]. Norwood, MA: Artech House, 2000.
  • 2VENKATESAN R, KOON S M, JAKUBOWSKI M H, MOULIN P. Robust image hashing [ C ]//Proceedings IEEE International Conference Image Processing, Vancouver, BC, 2000, (3) : 664 - 666.
  • 3FRIDRICH J, SOUKAL D, LUKAS J. Detection of copy-move forgery in digital images [ C ]// Proceedings of Digital Forensic Research Workshop, Cleveland, Aug. 2003.
  • 4POPESCU A C, FARID H. detecting duplicated image Department of Computer 2004. Exposing digital forgeries by regions, TR2004 - 515 [ R]. Science, Dartmouth College,2004.
  • 5NG T T, CHANG S F, SUN Q. Blind detection of photomontage using higher order statistics [ C ]// IEEE International Symposium on Circuits and Systems, Vancouver, Canada, 2004.
  • 6POPESCU A C, FARID H. Exposing digital forgeries by detecting traces of re-sampling [ J ]. IEEE Transactions on Signal Processing, 2005, 53(2) : 758 -767.
  • 7NG T T,CHANG S F, TSUI M P. Camera response function estimation from a single-channel image using differential invariants[ R]. Columbia University, 2005.
  • 8POPESCU A C, FARID H. Exposing digital forgeries in color filter array interpolated images [ J ]. IEEE Transactions on Signal Processing, 2005, 53(10): 3948-3959.
  • 9Farid H.Image forgery detection[].IEEE Signal Processing Magazine.2009
  • 10Fridrich J.Digital image forensics[].IEEE Signal Processing Magazine.2009

共引文献31

同被引文献75

  • 1王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 2Farid H. A survey of image forgery detection [ J ]. IEEE Signal Processing Magazine, 2009,26 (2) : 16-25.
  • 3Eric Hamilton. JPEG file interchange format, Versionl. 02[ EB/ OL]. (1992-9-1) [ 2012-10-17 ], http://www, jpeg. org/public/ jfif. pdf.
  • 4Fan Z, de Queiroz R L Identification of bitmap compression his- tory : JPEG detection and quantizer estimation [ J ]. IEEE Transac- tions on Image Processing,2003,12 (2) :230-235.
  • 5Neelamani R, Queiroz R d, Fan Z G, et al. JPEG compression history estimation for color images [ J ]. IEEE Transactions on Image Processing, 2006,15 ( 6 ) : 1365-1378.
  • 6Lin G, Chang M, Chen Y. A passive-blind forgery detection scheme based on content-adaptive quantization table estimation [ J]. IEEE Transactions on Circuits and Systems for Video Tech- nology,2011,21 (4) :421-434.
  • 7Fridrich J, Lukas J. Estimation of primary quantization matrix in double compressed JPEG images [ C ]//Proceedings of Digital Fo- rensic Research Workshop. Cleveland, OH, USA : Elsevier,2003 : 67 -84.
  • 8Farid H. Exposing digital forgeries from JPEG ghosts [ J ]. IEEE Transactions on Information Forensics and Security,2009,4( 1 ) :154-160.
  • 9Huang F, Huang J, Shi Y Q. Detecting double JPEG compre- ssion with the same quantization matrix [ J ]. IEEE Transactions on Information Forensics and Security,2010,5 (4) :848-856.
  • 10Chen Y, Hsu C. Detecting reeompression of JPEG images via periodicity analysis of compression artifacts for tampering detec- tion[ J]. IEEE Transactions on Information Forensics and Securi- ty,2011,6(2) :396-406.

引证文献7

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部