
浏览全部资源
扫码关注微信
南京理工大学 自动化学院,江苏 南京,210094
收稿日期:2008-08-26,
修回日期:2008-10-08,
网络出版日期:2009-07-25,
纸质出版日期:2009-07-25
移动端阅览
王俊文, 刘光杰, 张湛, 戴跃伟, 王执铨. 基于小波变换和Zernike矩的图像区域复制篡改鲁棒取证[J]. 光学精密工程, 2009,17(7): 1686-1693
WANG Jun-wen, LIU Guang-jie, ZHANG-Zhan, DAI Yue-wei, WANG Zhi-quan. Robust forensics for image regional duplication and forgery based on DWT and Zernike moment[J]. Editorial Office of Optics and Precision Engineering, 2009,17(7): 1686-1693
王俊文, 刘光杰, 张湛, 戴跃伟, 王执铨. 基于小波变换和Zernike矩的图像区域复制篡改鲁棒取证[J]. 光学精密工程, 2009,17(7): 1686-1693 DOI:
WANG Jun-wen, LIU Guang-jie, ZHANG-Zhan, DAI Yue-wei, WANG Zhi-quan. Robust forensics for image regional duplication and forgery based on DWT and Zernike moment[J]. Editorial Office of Optics and Precision Engineering, 2009,17(7): 1686-1693 DOI:
针对现有的图像区域复制篡改检测算法其后处理的鲁棒性较差
且时间复杂度高的问题
提出了一种有效的检测与定位篡改区域算法。该算法通过对图像进行小波分解
将低频图像进行块分解
提取每块的Zernike矩特征
并将特征向量排序;然后
为每个特征向量搜索阈值符合的相似特征向量;最后
利用区域面积阈值去除错误的相似块对
并结合数学形态学定位篡改区域。实验结果表明
该算法不仅能有效地对抗常规的后处理操作
而且只在1/4图像上搜索块空间
提高了运算效率。本方法可用于面向图像内容的真实性鲁棒取证。
Most of the existing detection algorithms for testing the region duplication and forgery are not robust in the post region duplication image process
and have high time complexities. In this paper
an efficient and robust algorithm is presented for detecting and localizing this type of malicious forgery.After reducing the image dimension by Discrete Wavelet Transform(DWT)
the Zernike moment is applied to the fixed sized overlapping blocks of a low-frequency image in the wavelet sub-band
and the eigenvectors are lexicographically sorted. Then
similar eigenvectors are matched by a certain threshold. Finally
the area threshold is proposed to remove the wrong similar blocks
and the mathematical morphology operations are performed to localize the forgery part. Experimental results show that proposed method is robust and not only can successfully detect this type of forgery for images subjected to post region duplication processing in various forms
but also can search block spaces in only the 1/4 image
which improves the calculation efficiency of algorithm. The method suits to the robust forensics for image contents.
LUO W Q, QU Z H, PAN F, et al.. A survey of passive technology for digital image forensics[J]. Front. Comupt. Sci. China., 2007,1(2):166-179.[2] 赵玉鑫,刘光杰,戴跃伟,等. 一种新的视觉Hash算法[J]. 光学 精密工程, 2008,16(3):551-557. ZHAO Y X, LIU G J, DAI Y W, et al.. A novel perceptual image Hash algorithm[J]. Opt. Precision Eng., 2008,16(3):551-557. (in Chinese)[3] POPESCU A, FARID H. Exposing Digital Forgeries by Detecting Duplicated Image Regions . Dartmouth College, USA, TR2004-515, 2004.[4] POPESCU A, FARID H. Exposing digital forgeries in color filter array interpolated images[J]. IEEE Trans. Signal Processing., 2005,53(10):3948-3959.[5] POPESCU A, FARID H. Exposing digital forgeries by detecting traces of Re-sampling[J]. IEEE Trans. Signal Processing., 2005,53(2):758-767.[6] JOHNSON M, FARID H. Exposing digital forgeries by detecting inconsistencies in lighting . Proceedings of ACM Multimedia Securty Workshop, New York, 2005:1-9.[7] FRIDRICH J, SOUKAL D, LUKAS J. Detection of Copy-Move Forgery in Digital Images . Proceedings of Digital Forensic Research Workshop, Cleveland, 2003.[8] LUKAS J, FRIDRICH J, GOLJAN M. Detecting digital image forgeries using sensor pattern noise[J]. SPIE, 2006, VIII6072(1):362-372.[9] NG T T, CHANG S F, HSU J, et al.. Physics-motivated features for distinguishing photographic images and computer graphics . Proceedings of the ACM Multimedia, Singapore, 2005:239-248.[10] NG T T, CHANG S F. A model for image splicing . Proceedings of ICIP, Singapore, 2004:1169-1172.[11] LUO W Q, QU Z H, HUANG J W, et al.. A novel method for detecting cropped and recompressed image block . Proceedings of IEEE Conference on Acoustics. Speech, and Signal Processing, 2007:217-220.[12] 骆伟祺,黄继武,丘国平. 鲁棒的区域复制图像篡改检测技术[J]. 计算机学报, 2007,30(11):1998-2007. LUO W Q, HUANG J W, QIU G P. Robust detection of region-duplication forgery in digital image[J]. Chinese Journal of Computers, 2007,30(11):1998-2007. (in Chinese)[13] 魏为民,王朔中,唐振军,等. 一类数字图像篡改的被动认证[J]. 东南大学学报, 2007,37(A):58-61. WEI W M, WANG SH ZH, TANG ZH J, et al.. Passive authentication of Copy-move forgery in digital images[J]. Journal of Southeast University, 2007,37(A):58-61. (in Chinese)[14] 朱秀明,宣国荣,姚秋明,等. 基于EM算法的数字取证中图像重采样检测[J]. 哈尔滨工业大学学报, 2006,38(A):868-871. ZHU X M, XUAN G R, YAO Q M, et al.. Re-sampling detection in digital forensics based on EM algorithm[J].Journal of Harbin Institute of Technology, 2006,38(A):868-871. (in Chinese)[15] 王波,孙璐璐,孔祥维,等. 图像伪造中模糊操作的异常色调率取证技术[J]. 电子学报, 2006, 34(12A):2451-2454. WANG B, SUN L L, KONG X W, et al.. Image forensics technology using abnormity of local hue for blur detection[J].Chinese Journal of Electronics, 2006,34(12A):2451-2454. (in Chinese)[16] ZHOU L N, WANG D M, GUO Y B, et al.. Blur detection of digital forgery using mathematical morphology[J]. Lecture notes in computer science, 2007:990-998.[17] 亓波,陈洪斌,刘顺发. Zernike多项式波面拟合的回归分析方法[J]. 光学 精密工程, 2007,15(3):396-400. QI B, CHEN H B, LIU SH F. A novel perceptual image Hash algorithm[J]. Opt. Precision Eng., 2007,15(3):396-400. (in Chinese)
0
浏览量
468
下载量
4
CSCD
关联资源
相关文章
相关作者
相关机构
京公网安备11010802024621