收稿日期: 2016-09-28
修回日期: 2017-01-01
网络出版日期: 2017-09-30
基金资助
国家自然科学基金(No.61370195,No.U1536121)资助
Detection of Smoothing Region Tampering Based on Feature Enhancement
Received date: 2016-09-28
Revised date: 2017-01-01
Online published: 2017-09-30
张伟伟, 杨正洪, 韩洪立, 王珺斌, 牛少彰 . 特征增强的平滑区域篡改检测算法[J]. 应用科学学报, 2017 , 35(5) : 537 -544 . DOI: 10.3969/j.issn.0255-8297.2017.05.001
An algorithm for forgery detection based on outline feature enhancement is proposed to remove tampered areas in an image. The image to be detected is frst divided into blocks of sliding-windows. Binary outline features are extracted from every block. The extracted outline sequences are ranked in an alphabetic order. By matching the outline sequences, tampered regions are identifed. Experiment results show that the proposed algorithm can effectively detect tampering traces in smooth image regions, even from images after JPEG compression with low quality factors.
[1] Qazi T, Hayat K, Khan S U, Madani S A. Survey on blind image forgery detection[J]. IET Image Processing, 2013, 7(7):660-670.
[2] Amerini I, Ballan L, Caldelli R, Bimbo A D. Copy-move forgery detection and localization by means of robust clustering with J-linkage[J]. Signal Processing Image Communication, 2013, 28(6):659-669.
[3] Pandey R C, Singh S K, Shukla K K, Agrawal R. Fast and robust passive copy-move forgery detection using SURF and SIFT image features[C]//International Conference on Industrial and Information Systems. IEEE, 2015:1-6.
[4] Fridrich J, Soukal D, Lukáš J. Detection of copy-move forgery in digital images[C]//Proceedings of Digital Forensic Research Workshop, Cleveland, 2003:1-10.
[5] Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions[J]//Comput. Sci. dartmouth College, Private Ivy League Res. univ, 2004:646.
[6] Li G H, Wu Q, Tu D, Sun S. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[C]//Proceedings of the 2007 IEEE International Conference on Multimedia and Expo.Beijing, China:IEEE, 2007:1750-1753.
[7] Lowe D. Distinctive image feature from Scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2):91-110.
[8] Huang H, Guo W, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm[C]//Computational Intelligence and Industrial Application, Paciia. Pacifc-Asia Workshop. IEEE, 2008, 2:272-276.
[9] Amerini I, Ballan L, Caldelli R, Del B A, Serra G. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3):1099-1110.
[10] 王珺斌,杨正洪,牛少彰. 一种基于关键点的复制粘贴盲检测算法[J]. 计算机科学与应用,2015, 5(7):255-263. Wang J B, Yang Z H, Niu S Z. Copy-move forgeries detection based on SIFT algorithm[J]. Computer Science and Application, 2015, 5(7):255-263. (in Chinese)
[11] Bay H, Ess A, Tuytelaars T, Gool L J V. Speeded-up robust features (SURF)[J]. Computer Vision and Image Understanding, 2008, 110(3):346-359.
[12] Bo X, Wang J, Liu G, Dai Y. Image copy-move forgery detection based on SURF[C]//International Conference on Multimedia Information Networking and Security. IEEE, 2010:889-892.
[13] Pandey R C, Singh S K, Shukla K K, Agrawal R. Fast and robust passive copy-move forgery detection using SURF and SIFT image features[C]//IEEE International Conference on Industrial and Information Systems, 2015:1-6.
[14] Gong J C, Guo J C. Image copy-move forgery detection using SURF in opponent color space[J]. Transactions of Tianjin University, 2016, 22(2):151-157.
[15] Cao G, Zhao Y, Ni R, Li X. Contrast enhancement-based forensics in digital images[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(3):515-525.
[16] Zandi M, Mahmoudi-Aznaveh A, Talebpour A. Iterative copy-move forgery detection based on a new interest point detector[J]. IEEE Transactions on Information Porensics & Securify, 2016, 11(11):2499-2512.
/
| 〈 |
|
〉 |