期刊文献+

基于量化噪声的JPEG图像篡改检测 被引量:2

JPEG image forgery detection based on quantization noise
下载PDF
导出
摘要 JPEG图像篡改引入的双重压缩会导致篡改区域的原始压缩特性发生改变,因此可以利用篡改区域压缩特性的不一致性来检测图像的篡改。利用该原理,提出了一种基于量化噪声的JPEG图像篡改检测算法。算法对待检测图像进行分块,计算每块的量化噪声,求取图像块的量化噪声服从均匀分布和高斯分布的概率,从而检测出篡改过的双重压缩区域。实验结果表明:该算法能有效检测双重压缩的JPEG图像篡改,并能定位出篡改区域。 Doubly compression introduced by JPEG image forgery usually causes the original compression proper- ties of the tampering region change. Therefore, it can utilize the compression property inconsistency to detect image forgery. Using the principle, this paper proposes a JPEG image forgery detection algorithm based on quantization noise. The paper blocks the image and calculates the quantization noise of each block. It gets the probabilities of the quantization noise of each image block satisfying uniform distribution and Gaussian distribution. As a consequence, the tampered regions doubly compressed are detected. The experimental results indicate that this algorithm can detect the tampering of JPEG images with double compression and locate the tampering region.
出处 《计算机工程与应用》 CSCD 2012年第19期205-208,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.60973113) 湖南省自然科学基金(No.09JJ3120)
关键词 JPEG图像 量化噪声 篡改检测 高斯分布 JPEG image quantization noise forgery detection Gaussian distribution
  • 相关文献

参考文献8

  • 1王鑫,鲁志波.基于JPEG块效应差异的图像篡改区域自动定位[J].计算机科学,2010,37(2):269-273. 被引量:12
  • 2孔勇平.矢量量化LBG算法的研究[J].硅谷,2008,1(6):39-40. 被引量:7
  • 3石敏,易清明,刘金梅.一种基于边缘检测的去块效应算法[J].计算机工程与应用,2007,43(8):27-28. 被引量:4
  • 4J. Lukas,J. Fridrich.Estimation of primary quantization matrix in double compressed JPEG images[].Digital Forensic Research Workshop.2003
  • 5Chen Y L,Hsu C T.Detecting doubly compressed imagesbased on quantization noise model and image restoration[].IEEE International Workshop on Multimedia SignalProcessing.2009
  • 6Farid H.Exposing digital forgeries from JPEG ghosts[].IEEE Transactions on Information Forensics and Security.2009
  • 7Y. Liaw,W. Lo,,J. Z. C. Lai."Image restoration of compressed image using classified vector quantization,"[].Pattern Recognition.2002
  • 8Jessica Fridrich,Miroslav Goljan,Rui Du.Steganalysis Based on JPEG Compatibility. Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia System and Applications IV . August20-242001

二级参考文献22

  • 1赵姝,张燕平,张铃,张媛,陈传明.覆盖聚类算法[J].安徽大学学报(自然科学版),2005,29(2):28-32. 被引量:13
  • 2谢胜利,周智恒.一种自适应消除块效应的新算法[J].电子学报,2005,33(10):1897-1900. 被引量:6
  • 3谢胜利,石敏.基于DCT域的高压缩图像去块效应算法[J].控制理论与应用,2006,23(1):139-142. 被引量:5
  • 4Luo W, Qu Z, Pan F, et al. A survey of passive technology for digital image forensics[J]. Frontiers of Computer Science in China, 2007,1(2) : 166-179.
  • 5Ng Tian-Tson, Chang Shih-Fu, Lin Ching-Yung, et al. Passiveblind image forensics[M]//Zeng W, Yu H, I.in C Y. Multimedia Security Technologies for Digital Rights Management. Orlando: Academic Press, 2006 : 383-412.
  • 6Ye Shuiming, Sun Qibin, Chang Ee-chien. Detecting digital image forgeries by measuring inconsistencies of blocking artifact[C]// Proceedings of ICME. New York: IEEE Computer Society, 2007:12-15.
  • 7Popescu A C. Statistical tools for digital forensics[D]. Hanover, NH : Department of Computer Science, Dartmouth College, 2005.
  • 8He J F, Lin Z C, Wang L F, et al. Detecting doctored JPEG images via DCT coefficient analysis[C]//Proceedings of European Conference on Computer Vision. Berlin-Heidelberg-New York: Springer-Verlag, 2006 : 423-435.
  • 9Fu D D,Shi Y Q,Su W. A generalized Benford's law for JPEG eoeffieients and its applications in image forensics[C] // SPIE 6505. 2007 : 1-11.
  • 10Luo W Q,Qu Z H,Huang J W,et al. A novel method for detecting cropped and recompressed image block[C]//Proceedings of ICASSP. New York : IEEE Computer Society, 2007 : 217-220.

共引文献20

同被引文献34

  • 1朱秀明 宣国荣 姚秋明 等.基于EM算法的数字取证中图像重采样检测.哈尔滨工业大学学报,2006,38:868-871.
  • 2周琳娜,张茹,郭云彪.数字图像内容取证[M].北京:高等教育出版社.2011:81-109.
  • 3Popescu A C, Farid H. Exposing digital forgeries by detect- ing traces of resampling[J ]. IEEE Transactions on Signal Processing, 2005,53(2):758- 767.
  • 4Meng X, Niu S, Zou J. Tamper detection for shifted doubleJPEG compression[C]//Intelligent Information Hiding and Multimedia Signal Processing, 2010: 434 - 437.
  • 5Bianchi T, Piva A. Detection of non-aligned double JPEG compression with estimation of primary compression param- eters[ C]//18th IEEE International Conference on Image Processing, 2011 : 1929 - 1932.
  • 6Bianchi T, De Rosa A, Piva A. Improved DCT coefficient analysis for forgery localization in JPEG images[ C]//IEEE International Conference on Acoustics, Speech and Signal Processing, 2011 : 2444 - 2447.
  • 7CHEN Chunhua, Shi Yun Q, Wei Su. A machine learning based scheme for double JPEG compression detection[C]// 19th International Conference on Pattern Recognition, 2008 : 1 - 4.
  • 8ChenY L,Hsu C T. Detecting recompression of JPEG im- ages via periodicity analysis of compression artifacts for tampering detection[J ]. IEEE Transactions on Information Forensics and Security, 2011,6(2) :396 -406.
  • 9LIU Zhulong, LI Xianghua, ZHAO Yuqian. Passive detec- tion of copy-paste tampering for digital image forensics [C]//International Conference on Intelligent Computation Technology and Automation, 2011,2 : 649 - 652.
  • 10Barni M, Costanzo A, Sabatini L. Identification of cut & paste tampering by means of double-JPEG detection and image grnentation [ C] //Proceedings of 2010 IEEE In- ternational Symposium on Circuits and Systems, 2010: 1687 - 1690.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部