2016中国计算机应用大会遴选论文

特征增强的平滑区域篡改检测算法

展开
  • 1. 中国农业大学 理学院, 北京 100083;
    2. 北京邮电大学 智能通信软件与多媒体北京市重点实验室, 北京 100876
张伟伟,博士生,讲师,研究方向:数字图像篡改取证,E-mail:zhangweiwei2012@126.com

收稿日期: 2016-09-28

  修回日期: 2017-01-01

  网络出版日期: 2017-09-30

基金资助

国家自然科学基金(No.61370195,No.U1536121)资助

Detection of Smoothing Region Tampering Based on Feature Enhancement

Expand
  • 1. College of Science, China Agricultural University, Beijing 100083, China;
    2. Beijing Key Lab of Intelligent Telecommunication Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, China

Received date: 2016-09-28

  Revised date: 2017-01-01

  Online published: 2017-09-30

摘要

针对移除图像平滑区域目标的篡改行为,提出一种基于轮廓特征增强的检测算法.首先对待检测图像进行滑窗式分块,逐块进行二值化轮廓特征提取,然后对提取的轮廓序列进行字典排序,最后通过对轮廓序列的匹配实现篡改区域的正确标注.实验表明该算法能有效解决平滑区域篡改痕迹检测的问题,且篡改图像经较低品质JPEG压缩后仍有较强的匹配能力.

本文引用格式

张伟伟, 杨正洪, 韩洪立, 王珺斌, 牛少彰 . 特征增强的平滑区域篡改检测算法[J]. 应用科学学报, 2017 , 35(5) : 537 -544 . DOI: 10.3969/j.issn.0255-8297.2017.05.001

Abstract

An algorithm for forgery detection based on outline feature enhancement is proposed to remove tampered areas in an image. The image to be detected is frst divided into blocks of sliding-windows. Binary outline features are extracted from every block. The extracted outline sequences are ranked in an alphabetic order. By matching the outline sequences, tampered regions are identifed. Experiment results show that the proposed algorithm can effectively detect tampering traces in smooth image regions, even from images after JPEG compression with low quality factors.

参考文献

[1] Qazi T, Hayat K, Khan S U, Madani S A. Survey on blind image forgery detection[J]. IET Image Processing, 2013, 7(7):660-670.
[2] Amerini I, Ballan L, Caldelli R, Bimbo A D. Copy-move forgery detection and localization by means of robust clustering with J-linkage[J]. Signal Processing Image Communication, 2013, 28(6):659-669.
[3] Pandey R C, Singh S K, Shukla K K, Agrawal R. Fast and robust passive copy-move forgery detection using SURF and SIFT image features[C]//International Conference on Industrial and Information Systems. IEEE, 2015:1-6.
[4] Fridrich J, Soukal D, Lukáš J. Detection of copy-move forgery in digital images[C]//Proceedings of Digital Forensic Research Workshop, Cleveland, 2003:1-10.
[5] Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions[J]//Comput. Sci. dartmouth College, Private Ivy League Res. univ, 2004:646.
[6] Li G H, Wu Q, Tu D, Sun S. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[C]//Proceedings of the 2007 IEEE International Conference on Multimedia and Expo.Beijing, China:IEEE, 2007:1750-1753.
[7] Lowe D. Distinctive image feature from Scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2):91-110.
[8] Huang H, Guo W, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm[C]//Computational Intelligence and Industrial Application, Paciia. Pacifc-Asia Workshop. IEEE, 2008, 2:272-276.
[9] Amerini I, Ballan L, Caldelli R, Del B A, Serra G. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3):1099-1110.
[10] 王珺斌,杨正洪,牛少彰. 一种基于关键点的复制粘贴盲检测算法[J]. 计算机科学与应用,2015, 5(7):255-263. Wang J B, Yang Z H, Niu S Z. Copy-move forgeries detection based on SIFT algorithm[J]. Computer Science and Application, 2015, 5(7):255-263. (in Chinese)
[11] Bay H, Ess A, Tuytelaars T, Gool L J V. Speeded-up robust features (SURF)[J]. Computer Vision and Image Understanding, 2008, 110(3):346-359.
[12] Bo X, Wang J, Liu G, Dai Y. Image copy-move forgery detection based on SURF[C]//International Conference on Multimedia Information Networking and Security. IEEE, 2010:889-892.
[13] Pandey R C, Singh S K, Shukla K K, Agrawal R. Fast and robust passive copy-move forgery detection using SURF and SIFT image features[C]//IEEE International Conference on Industrial and Information Systems, 2015:1-6.
[14] Gong J C, Guo J C. Image copy-move forgery detection using SURF in opponent color space[J]. Transactions of Tianjin University, 2016, 22(2):151-157.
[15] Cao G, Zhao Y, Ni R, Li X. Contrast enhancement-based forensics in digital images[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(3):515-525.
[16] Zandi M, Mahmoudi-Aznaveh A, Talebpour A. Iterative copy-move forgery detection based on a new interest point detector[J]. IEEE Transactions on Information Porensics & Securify, 2016, 11(11):2499-2512.

文章导航

/