信号与信息处理

基于超像素分割的图像复制粘贴篡改检测

展开
  • 1. 中山大学 数据科学与计算机学院, 广州 510006;
    2. 中科院信息工程研究所 信息安全国家重点实验室, 北京 100093

收稿日期: 2018-05-08

  修回日期: 2018-09-03

  网络出版日期: 2019-05-31

基金资助

国家自然科学基金(No.U1736118);广东省自然科学基金(No.2016A030313350);广东省科技发展专项基金(No.2016KZ010103);广州市科学研究计划重点项目基金(No.201804020068);上海市民生科技支撑计划基金(No.17DZ1205500);上海市启明星计划基金(No.17YF1420000);中央高校基本科研业务费(No.16lgjc83,No.17lgjc45)资助

Copy-Move Forgery Detection Based on Super Pixel Segmentation

Expand
  • 1. School of Data and Computer Science, Sun Yat-sen University, Guangzhou 510006, China;
    2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

Received date: 2018-05-08

  Revised date: 2018-09-03

  Online published: 2019-05-31

摘要

提出了一种基于超像素分割的结果进行聚类来检测复制粘贴篡改区域的方法.常规K-means等点聚类方法是直接对点进行聚类分析,而该方法则是将若干随机种子置于图像中,借助于超像素分割方法进行区域分割,随后获得包含预先匹配特征点的区域.所提算法以此区域内匹配特征点的数目作为衡量标准,判定区域内的匹配特征点是否为有效特征点.当匹配点的数目到达某个阈值时则将子区域内的点聚为一类,这样聚类的结果更加贴近图像内容,符合实际情况.实验结果表明,所提方法比传统的SIFT等方法更加有效.

本文引用格式

刘佳睿, 卢伟, 刘轲, 黄信朝, 蔺聪, 刘先进 . 基于超像素分割的图像复制粘贴篡改检测[J]. 应用科学学报, 2019 , 37(3) : 419 -426 . DOI: 10.3969/j.issn.0255-8297.2019.03.012

Abstract

A clustering method to detect the copy-move area based on the results of superpixel segmentation is proposed. Different from the traditional K-means clustering method, the proposed clustering method is to place random seeds in the image and segment the region by using super-pixel segmentation method, and then obtain the regions containing pre-matched feature points. In this algorithm, the number of matched feature points in each region is used as a criterion to determine whether the matched feature points in the region are effective feature points. When the number of matching points reaches a certain threshold, the points in the sub-regions are clustered into one group, so that the clustering results are closer to the image content and in accordance with the actual situation. Experiments show that the proposed method based on super-pixel segmentation is more effective than the traditional SIFT method.

参考文献

[1] Farid H. Chapter 1 photo fakery and forensics[J]. Advances in Computers, 2009, 77:1-55.
[2] Fridrich J J. Detection of copy-move forgery in digital images[C]//Digital Forensic Research Workshop, 2004.
[3] Huang Y, Lu W, Sun W, Long D. Improved DCT-based detection of copy-move forgery in images[J]. Forensic Science International, 2011, 206(1-3):178-184.
[4] Khan S, Kulkarni A. Reduced time complexity for detection of copy-move forgery using discrete wavelet transform[J]. International Journal of Computer Applications, 2011, 6(7):31-36.
[5] Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions[J]. Computer Science, 2004:1-11.
[6] Ryu S J, Kirchner M, Lee M J, Lee H K. Rotation invariant localization of duplicated image regions based on zernike moments[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(8):1355-1370.
[7] Ryu S J, Lee M J, Lee H K. Detection of copy-rotate-move forgery using Zernike moments[C]//International Conference on Information Hiding. Springer-Verlag, 2010:51-65.
[8] Fischler M A, Bolles R C. Random sample consensus:a paradigm for model fitting with applications to image analysis and automated cartography[J]. Readings in Computer Vision, 1987, 24:726-740.
[9] Lowe D G. Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2):91-110.
[10] Bay H, Ess A, Tuytelaars T. Gool LV SURF:speeded up robust features[C]//Computer Vision and Image Understanding, 2008, 110(3):346-359.
[11] Pan X, Lü S. Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics & Security, 2010, 5(4):857-867.
[12] Amerini I, Ballan L, Caldelli R, Bimbo A D, Serra G. A sift-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3):1099-1110.
[13] Amerini I, Ballan L, Caldelli R, Bimbo A D, Tongo L D, Serra G. Copy-move forgery detection and localization by means of robust clustering with J-Linkage[J]. Signal Processing Image Communication, 2013, 28(6):659-669.
[14] Pun C M, Yuan X C, Bi X L. Image forgery detection using adaptive over segmentation and feature point matching[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(8):1705-1716.
[15] Levinshtein A, Stere A, Kutulakos K N, Fleet D J, Dickinson S J, Siddiqi K. Turbo pixels:fast super pixels using geometric flows[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2009, 31(12):2290-2297.
[16] Li J, Li X, Yang B, Sun X. Segmentation-based image copy-move forgery detection scheme[J]. IEEE Transactions on Information Forensics & Security, 2017, 10(3):507-518.
[17] Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E. An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(6):1841-1854.
文章导航

/