期刊文献+

基于检测-分割的图像拼接篡改盲取证算法 被引量:1

Spliced image blind forensics based on detection and segmentation
下载PDF
导出
摘要 为了解决现有图像拼接篡改盲取证算法中所存在的篡改区域检测偏差大,篡改对象分割精度低,算法框架单一等问题,提出了一种基于检测-分割的图像拼接篡改盲取证算法。该算法基于Mask R-CNN的网络结构,新增一条自下而上的路径来改进特征金字塔(FPN)的网络结构,以实现多级特征的融合。同时采用新的非极大值抑制算法Soft-NMS,在不增加计算复杂度的前提下提升区域提取网络(RPN)的输出结果。此外,在该算法中定义合适的损失函数,以满足检测-分割任务融合的实验需要。实验结果表明,该算法在标准测试集中AP值达到了0.794和0.769,F1_measure值达到了0.693和0.745,MCC值达到了0.649和0.685,检测与分割性能均达到最优。 In order to solve the problems existing in the recent blind forensics algorithm for image tampering,such as large detection deviation of tampering area,low segmentation accuracy of tampered objects and single algorithm framework,a blind forensics algorithm based on detection-segmentation is proposed.The algorithm is based on Mask R-CNN and improves the feature pyramid net(FPN)by adding a bottom-up path to achieve multi-level feature fusion.At the same time,a new non-maximum suppression algorithm,Soft-NMS,is used to improve the output of the network without increasing the computational complexity.In addition,an appropriate loss function is defined in the algorithm to meet the needs of detection and segmentation task fusion.The experimental results show that the blind forensics algorithm achieves AP values of 0.794 and 0.769,F1_measure values up to 0.693 and 0.745,MCC values of 0.649 and 0.685,and the detection and segmentation performance is state of art.
作者 杨超 周大可 杨欣 YANG Chao;ZHOU Da-ke;YANG Xin(College of Automation Engineering,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China)
出处 《电子设计工程》 2020年第13期169-174,共6页 Electronic Design Engineering
关键词 图像篡改盲取证 Mask R-CNN 特征金字塔 非极大值抑制算法 image blind forensics Mask R-CNN feature pyramid net Soft-NMS
  • 相关文献

参考文献10

二级参考文献58

  • 1宫改云,高新波,伍忠东.FCM聚类算法中模糊加权指数m的优选方法[J].模糊系统与数学,2005,19(1):143-148. 被引量:81
  • 2戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622. 被引量:6
  • 3王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 4Fan Z, de Queiroz R L. Identification of bitmap compression history: JPEG detection and quantizer estimation [J]. Image Processing, IEEE Transactions on, 2003,12(2) :230-235.
  • 5I.uo W, Huang J, Qiu G. JPEG error analysis and its applications to digital image forensics[J]. Information Forensics and Security, IEEE Transactions on. 2010,5(3) :480-491.
  • 6Farid H. Exposing digital forgeries from JPEG ghosts[J]. Information Forensics and Security, IEEE Transactions on, 2009,4 ( 1 ) : 154-160.
  • 7LI F, Tingting M A, Dun C A O. Blind forensics for digital composite images based on JPEG blocking artifact [ J ]. Journal of Computational Information Systems, 2010, 6 (14):4835-4840.
  • 8Li W, Yuan Y, Yu N. Passive delection of doctored JPEG image via block artifact grid extraction[J]. Signal Processing, 2009,89(9): 1821-1829.
  • 9Tralic D, Petrovic J, Grgic S. JPEG image tampering detection using blocking artifacts[C]// Systems, Signals and Image Processing (IWSSIP), 2012 19th International Conference on. IEEE, 2012:5-8.
  • 10Lam E Y, Goodman J W. A mathematical analysis of the DCT coefficient distributions for images [J]. Image Processing, IEEE Transactions on, 2000,9(10):1661-1666.

共引文献236

同被引文献3

引证文献1

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部