期刊文献+

RANSAC算法在同图复制鉴定中的应用研究 被引量:9

Application research of RANSAC algorithm on copy-move forgery detection
下载PDF
导出
摘要 同图复制伪造是最为常见的图像造假类型之一。针对同图复制伪造检测过程中容易产生大量的误匹配点对这一问题,应用RANSAC算法消除原始匹配结果中的误匹配点对,并生成原始区域和复制伪造区域之间的仿射变换矩阵,进而确定原始窗口和复制伪造窗口。在窗口区域内重复块匹配和RANSAC算法,以求发现更多的正常匹配点对,提高复制伪造区域定位精度。实验表明,RANSAC算法可以有效用于常见的块匹配算法和特征点匹配算法,对缩放、旋转等不同类型的复制伪造都具有很好的效果,对不同图像特征具有很好的适应性。针对85幅不同复制伪造类型图像的总体识别率达到92.9%。 Copy-move forgery is one of the most common types of image forgeries. In order to solve the problem of mismatched points during the copy-move detection procedure,this paper eliminated the mismatched points with RANSAC algorithm,and generated affine transformation matrix between the original areas and copy-move forged areas. With the affine transformation matrix,it located the original window and the forged window. It repeated the block matching and RANSAC algorithms inside the windows to find much more matched points. Experimental results show that RANSAC is effective for block-based match algorithms and key-point based algorithms. RANSAC is available under various copy-move forgery types such as rotation and scaling. RANSAC also shows wide suitability for different image features. Its overall accuracy achieves to 92. 9% in the 85tested images with various copy-move forgery types.
出处 《计算机应用研究》 CSCD 北大核心 2014年第7期2209-2212,共4页 Application Research of Computers
基金 国家自然科学基金青年基金资助项目(61201429)
关键词 图像取证 同图复制 仿射变换 块匹配算法 image forensics copy-move forgery affine transformation block matching algorithm
  • 相关文献

参考文献10

  • 1吴琼,李国辉,涂丹,孙韶杰.面向真实性鉴别的数字图像盲取证技术综述[J].自动化学报,2008,34(12):1458-1466. 被引量:55
  • 2FARID H. Image hrgery, detection [ J ]. Signal Processing Maga- zine,2009,26 ( 2 ) : 1 6- 25.
  • 3CHRISTLE1N V, R1ESS C ,JORDAN J ,et al. An evaluation of popular copy-move forget)' detection approaches [ J ]. IEEE Trans on Infor- mation Forensics and Security, 2012,7 ( 6 ) : 1841-1854.
  • 4PAN Xun-yu, LYU S W. Region duplication detection using image fea- ture matching [ J ]. IEEE Trans on Information Forensics and Se- curity,2010,5(4) :85?-86?.
  • 5赵于前,陈瑜,李香花,廖苗,刘助龙.一种新的复制移动篡改JPEG图像探测方法[J].中南大学学报(自然科学版),2012,43(10):3964-3970. 被引量:4
  • 6MAHDIAN B,SAIC S. Detection of copy-move forgery using a method based on blur moment invariants[ J]. Forensic Science Internatio- nal ,2007,171 ( 2 ) : 180-189.
  • 7RYN S J,LEE M J, LEE H K. Detection of copy-rotate-move forge7 using Zernike moments[ C]//BOHME R,FONG P L,SAFAVI-NAINI R. hfformation Hiding. Berlin : Springer,2010:51-65.
  • 8BRAVO-SOLORIO S, NANDI A K. Exposing duplicated regions af- fected by reflection, rotation and scaling[ C ]//Pnw of IEEE ln/erna- tional Conference on Acoustics, Prague:The Institute of Electrical 1880-1883. Speech and Signal Pnx:essing and Electronics Engineels, 2011.
  • 9MUHAMMAD G, HUSSAIN M, BEBIS G. Passive copy move image tbrgery detection using undecinmted dyadic wavelet transtorm[ J ]. Digital Investigation ,2012,9( 1 ) :49-57.
  • 10FISCHLER M A, BOLLES R C. Random sample consensus:a para- digm fnr model fitting with applications to image analysis and auloma- ted cartography [ J ]. Gommunication of the AGM, 1981,24 ( 6 ) : 381-395.

二级参考文献66

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2朱秀明,宣国荣,姚秋明,童学锋,施云庆.信息取证中图像重采样检测[J].计算机应用,2006,26(11):2596-2597. 被引量:7
  • 3戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622. 被引量:6
  • 4Celik M U, Sharma G, Saber E, Tekalp A M. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing, 2002, 11(6): 585-595
  • 5Zhu B B, Swanson M D, Tewfik A H. When seeing isn't believing. IEEE Signal Processing Magazine, 2004, 21(2): 40-49
  • 6Wu Q, Li G H, Tu D. An image authentication watermarking with self-localization and recovery. In: Proceedings of the 11th Joint International Computer Conference. Chongqing, China: World Scientific, 2005. 960-963
  • 7Ng T T, Chang S F, Sun Q B. Blind Detection of Digital Photomontage Using Higher Order Statistics, Advent Technical Report 201-2004-1, Columbia University, June 2004
  • 8Khanna N, Mikkilineni A K, Martone A F, Ali G N, Chiu G T C, Allebach J P. A survey of forensic characterization methods for physical devices. In: Proceedings of the 6th Annual Digital Forensics Research Workshop. Lafayette, USA: Elsevier, 2006. 17-28
  • 9Sencar H T, Memon N. Overview of state-of-the-art in digital image forensics. Part of Indian Statistical Institute Platinum Jubilee Monograph Series Titled Statistical Science and Interdisciplinary Research. USA: World Scientific Press, 2008
  • 10Ng T T, Chang S F, Lin C Y, Qibin Sun Q B. Passive-blind image forensics. In: Multimedia Security Technologies for Digital Rights. New York: Elsevier, 2006

共引文献57

同被引文献60

  • 1张震,边玉琨,康吉全,任远.一种新的拼接图像检测方法[J].计算机应用研究,2009,26(3):1127-1130. 被引量:2
  • 2布拉德斯基,克勒.学习OpenCV[M].北京:清华大学出版社,2009.
  • 3GK Birajdar, VH Mankar. Digital image forgery detection using passive techniques: A survey[J]. Digital Investigation, 2013, 10 (3): 226-245.
  • 4Ansari MD, Ghrera SP, Tyagi V. pixel-based image forgery detection: A review [J]. IETE Journal of Education, 2014, 55 (1): 40-46.
  • 5Hashmi MF, Hambarde AR. Copy nmve forgery detection using DWT and SIFT features [J]. Intelligent Systems Design and Applications, 2013, 34 (10): 188-193.
  • 6Irene Amerini, Lamberto BaUan. Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J]. Signal Processing; Image Communication, 2013, 28 (6): 659-669.
  • 7Zhou SR, Yin JP, Zhang JM. Local binary pattern (LBP) and local phase quantization (LBQ) based on Gabor filter for face representation [ J ]. Neurocomputing, 2014, 116 ( 20 ): 260-264.
  • 8Yerushalmy I, Hel-Or H. Digital image forgery detection based on lens and sensor aberration [J]. International Journal of Computer Vision, 2011, 92 (1): 71-77.
  • 9Zimba M, Xingrning S. DWT-PCA (EVD) based copy-move image forgery detection [J]. International Journal of Digital Con- tent Technology and its Applications, 2011, 5 (1): 251-258.
  • 10Duch A, Jimfnez RM, Martinez C. Selection by rank in K- dimensional binary search trees [J]. Random Structures & Algorithms, 2012, 45 (1): 14-37.

引证文献9

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部