WANG Jun-wen, LIU Guang-jie, ZHANG-Zhan, DAI Yue-wei, WANG Zhi-quan. Robust forensics for image regional duplication and forgery based on DWT and Zernike moment[J]. Editorial Office of Optics and Precision Engineering, 2009,17(7): 1686-1693
WANG Jun-wen, LIU Guang-jie, ZHANG-Zhan, DAI Yue-wei, WANG Zhi-quan. Robust forensics for image regional duplication and forgery based on DWT and Zernike moment[J]. Editorial Office of Optics and Precision Engineering, 2009,17(7): 1686-1693DOI:
Robust forensics for image regional duplication and forgery based on DWT and Zernike moment
Most of the existing detection algorithms for testing the region duplication and forgery are not robust in the post region duplication image process
and have high time complexities. In this paper
an efficient and robust algorithm is presented for detecting and localizing this type of malicious forgery.After reducing the image dimension by Discrete Wavelet Transform(DWT)
the Zernike moment is applied to the fixed sized overlapping blocks of a low-frequency image in the wavelet sub-band
and the eigenvectors are lexicographically sorted. Then
similar eigenvectors are matched by a certain threshold. Finally
the area threshold is proposed to remove the wrong similar blocks
and the mathematical morphology operations are performed to localize the forgery part. Experimental results show that proposed method is robust and not only can successfully detect this type of forgery for images subjected to post region duplication processing in various forms
but also can search block spaces in only the 1/4 image
which improves the calculation efficiency of algorithm. The method suits to the robust forensics for image contents.
关键词
Keywords
references
LUO W Q, QU Z H, PAN F, et al.. A survey of passive technology for digital image forensics[J]. Front. Comupt. Sci. China., 2007,1(2):166-179.[2] 赵玉鑫,刘光杰,戴跃伟,等. 一种新的视觉Hash算法[J]. 光学 精密工程, 2008,16(3):551-557. ZHAO Y X, LIU G J, DAI Y W, et al.. A novel perceptual image Hash algorithm[J]. Opt. Precision Eng., 2008,16(3):551-557. (in Chinese)[3] POPESCU A, FARID H. Exposing Digital Forgeries by Detecting Duplicated Image Regions . Dartmouth College, USA, TR2004-515, 2004.[4] POPESCU A, FARID H. Exposing digital forgeries in color filter array interpolated images[J]. IEEE Trans. Signal Processing., 2005,53(10):3948-3959.[5] POPESCU A, FARID H. Exposing digital forgeries by detecting traces of Re-sampling[J]. IEEE Trans. Signal Processing., 2005,53(2):758-767.[6] JOHNSON M, FARID H. Exposing digital forgeries by detecting inconsistencies in lighting . Proceedings of ACM Multimedia Securty Workshop, New York, 2005:1-9.[7] FRIDRICH J, SOUKAL D, LUKAS J. Detection of Copy-Move Forgery in Digital Images . Proceedings of Digital Forensic Research Workshop, Cleveland, 2003.[8] LUKAS J, FRIDRICH J, GOLJAN M. Detecting digital image forgeries using sensor pattern noise[J]. SPIE, 2006, VIII6072(1):362-372.[9] NG T T, CHANG S F, HSU J, et al.. Physics-motivated features for distinguishing photographic images and computer graphics . Proceedings of the ACM Multimedia, Singapore, 2005:239-248.[10] NG T T, CHANG S F. A model for image splicing . Proceedings of ICIP, Singapore, 2004:1169-1172.[11] LUO W Q, QU Z H, HUANG J W, et al.. A novel method for detecting cropped and recompressed image block . Proceedings of IEEE Conference on Acoustics. Speech, and Signal Processing, 2007:217-220.[12] 骆伟祺,黄继武,丘国平. 鲁棒的区域复制图像篡改检测技术[J]. 计算机学报, 2007,30(11):1998-2007. LUO W Q, HUANG J W, QIU G P. Robust detection of region-duplication forgery in digital image[J]. Chinese Journal of Computers, 2007,30(11):1998-2007. (in Chinese)[13] 魏为民,王朔中,唐振军,等. 一类数字图像篡改的被动认证[J]. 东南大学学报, 2007,37(A):58-61. WEI W M, WANG SH ZH, TANG ZH J, et al.. Passive authentication of Copy-move forgery in digital images[J]. Journal of Southeast University, 2007,37(A):58-61. (in Chinese)[14] 朱秀明,宣国荣,姚秋明,等. 基于EM算法的数字取证中图像重采样检测[J]. 哈尔滨工业大学学报, 2006,38(A):868-871. ZHU X M, XUAN G R, YAO Q M, et al.. Re-sampling detection in digital forensics based on EM algorithm[J].Journal of Harbin Institute of Technology, 2006,38(A):868-871. (in Chinese)[15] 王波,孙璐璐,孔祥维,等. 图像伪造中模糊操作的异常色调率取证技术[J]. 电子学报, 2006, 34(12A):2451-2454. WANG B, SUN L L, KONG X W, et al.. Image forensics technology using abnormity of local hue for blur detection[J].Chinese Journal of Electronics, 2006,34(12A):2451-2454. (in Chinese)[16] ZHOU L N, WANG D M, GUO Y B, et al.. Blur detection of digital forgery using mathematical morphology[J]. Lecture notes in computer science, 2007:990-998.[17] 亓波,陈洪斌,刘顺发. Zernike多项式波面拟合的回归分析方法[J]. 光学 精密工程, 2007,15(3):396-400. QI B, CHEN H B, LIU SH F. A novel perceptual image Hash algorithm[J]. Opt. Precision Eng., 2007,15(3):396-400. (in Chinese)