期刊文献+

基于Krawtchouk不变矩的复制-粘贴篡改盲检测算法 被引量:1

A Blind Forensic Algorithm for Detecting Copy-Paste Images Based on Krawtchouk Invariant Moments
下载PDF
导出
摘要 针对数字图像检测中一类常见的复制-粘贴图像篡改,提出一种基于小波变换和径向Krawtchouk不变矩的盲检测算法。算法利用小波变换提取图像的低频分量,对低频分量分块提取径向Krawtchouk不变矩特征,这种特征描述方式对图像旋转后处理具有鲁棒性,然后将特征向量进行按字典排序,并结合数学形态学进行图像复制篡改区域的检测和定位。实验表明该算法能有效地定位出复制和粘贴的图像篡改区域,并对粘贴区域旋转操作具有很强的鲁棒性。 For a common class of copy-paste tampering in digital image forensics,a forensics algorithm is proposed based on Discrete Wavelet Transform(DWT) and radial krawtchouk invariance moment.The algorithm uses DWT to extract low frequency components of the image to propose the krawtchouk invariance moment of the blocks of low frequency of components.This characterization method is robust against image rotation.The feature vectors are then sorted according to the dictionary.Combined with mathematical morphology for image temper detection and region localization.Experiments show that the algorithm can locate the tampered region and strong robustness to the rotation of the paste region.
出处 《计算机技术与发展》 2012年第2期168-171,共4页 Computer Technology and Development
基金 国家自然科学基金项目(60772082) 河北省科技基金项目(05213579)
关键词 KRAWTCHOUK矩 篡改检测 盲检测 旋转不变性 Krawtchouk moment forgery detection blind forensic rotational invariance
  • 相关文献

参考文献11

二级参考文献153

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2朱秀明,宣国荣,姚秋明,童学锋,施云庆.信息取证中图像重采样检测[J].计算机应用,2006,26(11):2596-2597. 被引量:7
  • 3戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622. 被引量:6
  • 4王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 5Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 6Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 7Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 8Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 9Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 10Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004

共引文献189

同被引文献16

  • 1FARID H. Image forgery detectionEJ:. IEEE Signal Processing Magazine, 2009,26(2) :16-25.
  • 2VINCENT C,CHRISTIAN R,JOHANNES J,et al. An evaluation of popular copy-move forgery detection approaches[J]. IEEE Trans on Information Forensics and Security,2012,7(6):1841-1853.
  • 3LYNCH G, SHIH F Y,LIAO H Y M. An efficient expanding block algorithm for image copy-move forgery detection[J]. Informa- tion Sciences, 2013,239 ( 1 ) : 253-265.
  • 4FRIDRICH J,SOUKAL D,LUKAS J. Detection of copy-move forgery in digital images[G]//Proceedings of the Digital Forensic Research Workshop. Cleveland OH, USA, 2003.
  • 5DONG J, WANG W,TAN T. Run-length and edge statistics based approach for image splicing deteetio[G] // Digital Watermark- ing. Springer Berlin Heidelberg, 2009 ; 76-87.
  • 6sPENG F, NIE Y Y,LONG M. A complete passive blind image copy move forensics scheme based on compound statistics features [J]. Forensic Science International,2011,212(1-3) :21-25.
  • 7MAHDIAN B, SAIC S. Detection of copy-move forgery using a method based on blur moment invariants[J]. Forensic Science In- ternational, 2007,171(2) : 180:189.
  • 8AL-QERSHI O M, KHOO B E. Passive detection of copy-move forgery in digital images: State-of-the-art[J]. Forensic Science In- ternational, 2013,231 (1) :284-295.
  • 9PAN X, LYU S. Region duplication detection using image feature matching[J]. IEEE Trans on Information Forensics and Securi- ty,2010,5(4) :857-867.
  • 10MAHDIAN B,SAIC S. Using noise inconsistencies for blind image forensics[J]. Image and Vision Computing, 2009,27 (10): 1497-1503.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部