首页 | 本学科首页   官方微博 | 高级检索  
     

鲁棒的区域复制图像篡改检测技术
引用本文:骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,30(11):1998-2007.
作者姓名:骆伟祺  黄继武  丘国平
作者单位:1. 中山大学信息科学与技术学院,广州,510275;广东省信息安全重点实验室,广州,510275
2. 诺丁汉大学计算机学院,英国
基金项目:国家自然科学基金 , 国家自然科学基金 , 国家重点基础研究发展计划(973计划) , 广东省自然科学基金
摘    要:区域复制把数字图像中一部分区域进行复制并粘贴到同一幅图像的另一个区域中,以达到去除图像中某一重要内容的目的,是一种简单而有效的图像篡改技术.现有检测算法对区域复制后处理的鲁棒性较差.文中针对此篡改技术,提出了一种有效的检测与定位篡改区域算法.该算法首先将图像分解为小块并比较各小块间的相似性,最后利用"主转移向量"方法去除错误的相似块对得到篡改的区域.实验数据说明该算法能有效地对抗多种区域复制的后处理操作,包括高斯模糊、加性白高斯噪声、JPEG压缩及它们的混合操作.

关 键 词:图像盲认证  图像篡改  篡改检测  区域复制  鲁棒性  鲁棒性  分区域  复制  图像分解  检测技术  Digital  Image  Detection  处理操作  混合  压缩  JPEG  加性白高斯噪声  高斯模糊  数据说明  实验  相似块  错误  方法  移向量  利用
修稿时间:2006-07-30

Robust Detection of Region-Duplication Forgery in Digital Image
LUO Wei-Qi,HUANG Ji-Wu,QIU Guo-Ping.Robust Detection of Region-Duplication Forgery in Digital Image[J].Chinese Journal of Computers,2007,30(11):1998-2007.
Authors:LUO Wei-Qi  HUANG Ji-Wu  QIU Guo-Ping
Affiliation:School of Information Science and Technology, Sun Yat-Sen University, Guangzhou 510275;Guangdong Key Laboratory of Information Security Technology, C, uangzhou 510275;School of Computer Science, University of Nottingham, NG8 1BB, UK
Abstract:Region duplication forgery,in which a part of a digital image is copied and then pasted to another portion of the same image in order to conceal an important object in the scene,is one of the common image forgery techniques.This paper describes an efficient and robust algorithm for detecting and localizing this type of malicious tampering.The algorithm first divides an image into small overlapped blocks and then compares the similarity of these blocks,finally identifies possible duplicated regions using the main shift vector.The experimental results show that above method is more robust comparing with other existing algorithms and can successfully detect this type of tampering for images that have been subjected to various forms of post region duplication image processing,including,blurring,noise contamination,severe lossy compression,and a mixture of these processing operations.
Keywords:blind image authentication  image forgery  detection of tampering  region duplication  robustness
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号