期刊文献+

基于JPEG双量化效应的图像篡改盲检测

Blind detection of tampered image based on JPEG double quantization effect
下载PDF
导出
摘要 JPEG图像的双量化效应是检测和发现JPEG图像篡改的重要线索。针对现有检测算法大多数是基于DCT块效应而较少利用双量化效应的情况,提出了一种利用JPEG双量化效应的图像篡改盲检测新方案。该方案对比用DCT系数直方图计算的未篡改区域后验概率和用区间长度计算的未篡改区域后验概率之间的差异性,提取能有效区分篡改块和未篡改块的特征,计算每个DCT块的特征值,然后设置阈值,将特征值大于阈值的图像块判定为篡改块,最后通过选取连通区域,标定篡改区域。实验结果表明,与已有的类似方案相比,该方案能够较精确地检测和定位篡改区域,且对颜色、纹理丰富的图像具有明显优势。 The double quantization effect in JPEG images is becoming important clue in detecting image forgeries. As many detection methods are based on the block artifacts of DCT coefficients, a new blind detection scheme which makes use of the double quantization effect is proposed. By comparing two posteriori probabilities of untampered region, which are computed by histogram of DCT coefficients and interval length respectively, a feature that can distinguish the tampered block and untampered block is extracted, and then the feature value of each DCT block is calculated. After setting a threshold, the tampered blocks whose feature values are larger than the threshold are obtained. Finally, the tampered region is located by labeling the connected components. Experimental results demonstrate that the proposed scheme can detect and localize the tampered areas more accurately with respect to previously proposed methods, especially for colorful or rich texture images.
出处 《计算机工程与应用》 CSCD 2014年第20期202-206,共5页 Computer Engineering and Applications
基金 福建省计算机应用技术和信号与信息系统研究生教育创新基地资助(闽高教[2008]114号)
关键词 双量化效应 盲检测 直方图 后验概率 连通区域 double quantization effect blind detection histogram posteriori probability connected region
  • 相关文献

参考文献16

  • 1Farid H.A survey of image forgery detection[J].IEEE Signal Processing Magazine,2009,26(2):16-25.
  • 2Luo W Q,Qu Z,Pan F,et al.A survey of passive technology for digital image forensics[J].Frontiers of Computer Science in China,2007,1(2):166-179.
  • 3胡永健,刘琲贝,贺前华.数字多媒体取证技术综述[J].计算机应用,2010,30(3):657-662. 被引量:20
  • 4Popescu A C,Farid H.Statistical tools for digital forensics[C]//Proceedings of the 6th International Workshop on Information Hiding,Toronto,Canada,2004:128-147.
  • 5Fu D D,Shi Y Q,Su W.A generalized Benford’s law for JPEG coefficients and its applications in image forensics[C]//Proceedings of SPIE,2007,6505:1-11.
  • 6Luo W Q,Qu Z H,Huang J W,et al.A novel method for detecting cropped and recompressed image block[C]//Proceedings of ICASSP.New York:IEEE Computer Society,2007:217-220.
  • 7Luo W Q,Huang J W,Qiu G P.JPEG error analysis and its applications to digital image forensics[J].IEEE Transactions on Information Forensics and Security,2010,5(3):480-491.
  • 8Ye S M,Sun Q B.Detecting digital image forgeries by measuring inconsistencies of blocking artifact[C]//Proceedings of ICME.New York:IEEE Computer Society,2007:12-15.
  • 9李晟,张新鹏.利用JPEG压缩特性的合成图像检测[J].应用科学学报,2008,26(3):281-287. 被引量:19
  • 10Li W H,Yu N H,Yuan Y.Doctored JPEG image detection[C]//Proceedings of International Conference on Multimedia and Expo 2008,Hannover,Germany,2008.

二级参考文献78

  • 1高阳,黄征,徐彻,施少培,杨旭.基于高阶频谱分析的音频篡改鉴定[J].信息安全与通信保密,2008,30(2):94-96. 被引量:8
  • 2姚秋明,柴佩琪,宣国荣,杨志强,施云庆.基于期望最大化算法的音频取证中的篡改检测[J].计算机应用,2006,26(11):2598-2601. 被引量:13
  • 3王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 4周林娜,王东明.数字图像取证技术[M].北京:北京邮电大学出版社,2008.
  • 5FARID H.Image forgery detection[J].IEEE Signal Processing Magazine,2009,26(2):16-25.
  • 6FRIDRICH J,SOUKAL D,LUKAS J.Detection of copy move forgery in digital images[EB/OL].[2009-06-15].http://www.ws.binghamton.edu/fridrich/Research/copymove.pdf.
  • 7POPESCU A,FARID H.Exposing digital forgeries by detecting duplicated image regions,TR2004-515[R].Hanover,NH:Dartmouth College,Department of Computer Science,2004.
  • 8MAHDIAN B,SAIC S.Blind authentication using periodic properties of interpolation[J].IEEE Transactions on Information Forensics and Security,2008,3(3):529-538.
  • 9POPESCU A C,FARID H.Exposing digital forgeries by detecting traces of resampling[J].IEEE Transactions on Signal Processing,2005,53(2):758-767.
  • 10PRASAD S,RAMAKRISHNAN K.On resampling detection and its application to detect image tampering[C]// Proceedings of IEEE International Conference on Multimedia and Exposition.Toronto,Canada:IEEE Computer Society,2006:1325-1328.

共引文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部