首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 375 毫秒
1.
采用圆谐-傅里叶矩的图像区域复制粘贴篡改检测   总被引:1,自引:1,他引:0       下载免费PDF全文
现有检测方法大多对图像区域复制粘贴篡改的后处理操作鲁棒性不高.针对这种篡改技术,提出一种新的基于圆谐-傅里叶矩的区域篡改检测算法.首先将图像分为重叠的小块;然后提取每个图像块的圆谐-傅里叶矩作为特征向量并对其进行排序;最后根据阈值确定相似块,利用位移矢量阈值去除错误相似块以定位篡改区域.实验结果表明,该算法能有效抵抗噪声、高斯模糊、旋转等图像后处理操作,且与基于HU矩的方法相比有更好的检测结果.  相似文献   

2.
一种检测图像Copy-Move篡改鲁棒算法   总被引:3,自引:0,他引:3  
针对现有的复制粘贴(Copy-Move)检测算法鲁棒性较差,时间复杂度高,提出一种有效快速的检测与定位篡改区域算法.利用小波变换获取图像低频区域,引入几何矩提取分块鲁棒特征,通过特征向量排序缩小匹配空间,最后通过经验阈值和数学形态学定位篡改区域.实验结果表明该算法不仅能有效抵抗如高斯白噪声、JPEG压缩等常规图像后处理操作,而且减少块总数,算法的时间复杂度大大降低.  相似文献   

3.
图像的局部复制粘贴篡改技术,是最常见的一种图像伪造方式,对此提出一种基于小波矩的图像复制粘贴篡改检测算法.首先通过变分水平集活动轮廓模型初步确定图像篡改的可疑区域:然后对每一块可疑区域利用小波矩算法提取其小波矩特征;接着利用余弦相关性测度判别可疑区域的相似性;最后定位图像的篡改区域.实验结果表明本算法能够有效提取可疑区域,并进一步定位篡改区域.此外,算法对图像前景篡改区域的平移、旋转和缩放具有较强的鲁棒性.  相似文献   

4.
目的 为了解决现有图像区域复制篡改检测算法只能识别图像中成对的相似区域而不能准确定位篡改区域的问题,提出一种基于JPEG(joint photographic experts group)图像双重压缩偏移量估计的篡改区域自动检测定位方法。方法 首先利用尺度不变特征变换(SIFT)算法提取图像的特征点和相应的特征向量,并采用最近邻算法对特征向量进行初步匹配,接下来结合特征点的色调饱和度(HSI)彩色特征进行优化匹配,消除彩色信息不一致引发的误匹配;然后利用随机样本一致性(RANSAC)算法对匹配对之间的仿射变换参数进行估计并消除错配,通过构建区域相关图确定完整的复制粘贴区域;最后根据对复制粘贴区域分别估计的JPEG双重压缩偏移量区分复制区域和篡改区域。结果 与经典SIFT和SURF(speeded up robust features)的检测方法相比,本文方法在实现较高检测率的同时,有效降低了检测虚警率。当第2次JPEG压缩的质量因子大于第1次时,篡改区域的检出率可以达到96%以上。 结论 本文方法可以有效定位JPEG图像的区域复制篡改区域,并且对复制区域的几何变换以及常见的后处理操作具有较强的鲁棒性。  相似文献   

5.
目的 采用无损数字水印算法对医学图像进行篡改检测和恢复是一个重要的研究领域。针对现有方法在区域划分和块特征值选取上的不足,提出一种新的基于四叉树分解和线性加权插值技术的无损水印算法。方法 首先对原始的医学图像进行四叉树分解,得到非固定尺寸且具有高同质性的图像块;然后利用线性加权插值方法计算每个图像块的特征值作为水印信息,最后采用基于混沌的简单可逆整数变换进行水印嵌入。结果 在提取端当水印图像没有受到篡改时,原始的图像能被无损恢复;当受到篡改时,算法能精确定位篡改区域并能高质量恢复,采用本文算法恢复的图像质量较现有方法高出20 dB左右。另外,在水印图像遭到较大程度篡改时,本文算法的正检率和负检率均优于现有方法。结论 实验结果表明,本文算法相比现有方法具有更高的嵌入容量、篡改检测精确性、恢复图像质量。算法适用于医学图像的完整性认证和篡改检测中。  相似文献   

6.
针对一种常见的篡改手段--图像区域复制粘贴,提出了一种基于不变矩特征的检测方法。将图像分成多个重叠块,提取每块的不变矩特征与直方图特征,结合起来得到图像的特征矢量。利用字典排序,依照预定的相似性标准,确定图像中的复制粘贴区域。实验结果表明,该算法在抗旋转操作方面明显优于经典的PCA检测算法,能准确检测出90°和180°的旋转。  相似文献   

7.
利用SIFT特征的非对称匹配图像拼接盲检测   总被引:2,自引:2,他引:0       下载免费PDF全文
复制粘贴伪造图像鉴定检测图像中的疑似相似区域。传统的逐像素或逐块的鉴定方式耗时冗长。提出一种利用SIFT(尺度不变特征转换)特征的非对称搜索的复制粘贴伪造图像盲检测算法,算法利用图像SIFT特征初步定位复制粘贴伪造疑似区域,利用非对称特征搜索方式进行方向性的特征匹配,准确定位复制粘贴伪造区域。实验结果表明,本文算法能够准确检测复制粘贴伪造区域,检测结果不受高斯、椒盐等噪声的影响,检测效率比传统算法提高了1~2个数量级。  相似文献   

8.
目的 针对水印算法通常利用实验确定强度参数,实验工作量大并且具有随机性,得到的参数无法较好地均衡水印不可见性和鲁棒性,提出一种基于图像块的自适应均衡水印算法。方法 利用尺度不变特征变换(SIFT)提取原始图像中鲁棒性强的特征点作为水印嵌入区域,将提取的嵌入区域分成4个大小相等且互不重叠的图像块,并对各图像块进行奇异值分解(SVD),得到与各块相应的奇异值矩阵,各块与水印做一级离散小波变换后产生的各子带相叠加,生成嵌入加密水印块,重组得到水印矩阵,降维后将特征点还原到原始图像。根据果蝇优化算法(FOA)中适应度函数迭代确定加密水印强度参数,构造水印图像的自适应嵌入,来均衡水印的不可见性和鲁棒性,水印检测可直接作用在受攻击后的图像上,无需校正恢复。结果 对标准灰度图像进行多组实验,得到含水印图像峰值信噪比均达到43dB以上;对水印载体图像分别进行噪声、压缩、剪切、旋转仿真攻击实验,提取水印图像与原始水印图像的归一化相关系数都达到0.94以上。结论 SIFT算法实现图像块局部嵌入,提取特征点稳定性强,结合SVD算法使水印嵌入性能良好,利用FOA算法自适应确定最优参数,使水印图像嵌入效果达到最佳状态,最终均衡了水印的不可见性和鲁棒性。  相似文献   

9.
目的 图像篡改区域检测是图像取证领域的一个挑战性任务,其目的是找出图像的篡改区域。传统方法仅针对某种特定的篡改方式进行设计,难以检测其他篡改方式的图像。基于卷积神经网络的方法能够自适应地提取特征,同时检测包含多种篡改方式的图像。但是其中多数方法都选择增强图像的噪声特征,这种机制无法较好处理篡改区域与原图像来源相同、噪声相似的情况。多数方法还忽略了篡改区域过小而产生的样本不平衡问题,导致检测效果不佳。方法 提出了一个基于区域损失的用于检测小篡改区域的U型网络,该网络构建了一个异常区域特征增强机制,放大与图像背景差异较大的异常区域的特征。此外,还利用区域损失增强对篡改区域框内像素的判别能力,可以解决因篡改区域过小而产生的样本不平衡问题。结果 消融实验说明了异常区域特征增强机制和区域损失机制的有效性;对JPEG压缩和高斯模糊的对抗性测试证明了模型的鲁棒性;在CASIA2.0(CASI-A image tampering detection evaluation database)、NIST2016(NIST nimble 2016 datasets)、COLUMBIA (Columbia uncompressed image splicing detection evaluation dataset)和COVERAGE (a novel database forcopy-move forgery detection)数据集上与最新方法进行比较时,本文方法取得了最优性能,其F1 score分别为0.979 5、0.982 2、0.995 3和0.987 0。结论 本文的异常区域特征增强机制和区域损失机制能有效提高模型性能,同时缓解篡改区域过小导致的样本不平衡问题,大量实验也表明了本文提出的小篡改区域检测方法的优越性。  相似文献   

10.
提出一种基于离散小波变换和自相关性分析的同幅图像复制粘贴篡改检测算法.算法利用离散小波变换提取图像的低频子带作为特征向量,采用Pearson相关系数进行相似性匹配检测.实验表明,该算法可以大大减少特征向量的维数和排序矩阵的行数,提高相似块的匹配效率,对一般噪声攻击具有较好的鲁棒性.  相似文献   

11.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

12.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

13.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

14.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

15.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

16.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

17.
正The demands of a rapidly advancing technology for faster and more accurate controllers have always had a strong influence on the progress of automatic control theory.In recent years control problems have been arising with increasing frequency in widely different areas,which cannot be addressed using conventional control techniques.The principal reason for this is the fact that a highly competitive economy is forcing systems to operate in regimes where  相似文献   

18.
正Aim The Journals of Zhejiang University-SCIENCE(A/B/C)areedited by the international board of distinguished Chinese andforeign scientists,and are aimed to present the latest devel-opments and achievements in scientific research in China andoverseas to the world’s scientific circles,especially to stimulateand promote academic exchange between Chinese and for-eign scientists everywhere.  相似文献   

19.
The relative concentrations of different pigments within a leaf have significant physiological and spectral consequences. Photosynthesis, light use efficiency, mass and energy exchange, and stress response are dependent on relationships among an ensemble of pigments. This ensemble also determines the visible characteristics of a leaf, which can be measured remotely and used to quantify leaf biochemistry and structure. But current remote sensing approaches are limited in their ability to resolve individual pigments. This paper focuses on the incorporation of three pigments—chlorophyll a, chlorophyll b, and total carotenoids—into the LIBERTY leaf radiative transfer model to better understand relationships between leaf biochemical, biophysical, and spectral properties.Pinus ponderosa and Pinus jeffreyi needles were collected from three sites in the California Sierra Nevada. Hemispheric single-leaf visible reflectance and transmittance and concentrations of chlorophylls a and b and total carotenoids of fresh needles were measured. These data were input to the enhanced LIBERTY model to estimate optical and biochemical properties of pine needles. The enhanced model successfully estimated reflectance (RMSE = 0.0255, BIAS = 0.00477, RMS%E = 16.7%), had variable success estimating transmittance (RMSE = 0.0442, BIAS = 0.0294, RMS%E = 181%), and generated very good estimates of carotenoid concentrations (RMSE = 2.48 µg/cm2, BIAS = 0.143 µg/cm2, RMS%E = 20.4%), good estimates of chlorophyll a concentrations (RMSE = 10.7 µg/cm2, BIAS = − 0.992 µg/cm2, RMS%E = 21.1%), and fair estimates of chlorophyll b concentrations (RMSE = 7.49 µg/cm2, BIAS = − 2.12 µg/cm2, RMS%E = 43.7%). Overall root mean squared errors of reflectance, transmittance, and pigment concentration estimates were lower for the three-pigment model than for the single-pigment model. The algorithm to estimate three in vivo specific absorption coefficients is robust, although estimated values are distorted by inconsistencies in model biophysics. The capacity to invert the model from single-leaf reflectance and transmittance was added to the model so it could be coupled with vegetation canopy models to estimate canopy biochemistry from remotely sensed data.  相似文献   

20.
This article discusses the history and design of the special versions of the bombe key-finding machines used by Britain’s Government Code & Cypher School (GC&CS) during World War II to attack the Enigma traffic of the Abwehr (the German military intelligence service). These special bombes were based on the design of their more numerous counterparts used against the traffic of the German armed services, but differed from them in important ways that highlight the adaptability of the British bombe design, and the power and flexibility of the diagonal board. Also discussed are the changes in the Abwehr indicating system that drove the development of these machines, the ingenious ways in which they were used, and some related developments involving the bombes used by the U.S. Navy’s cryptanalytic unit (OP-20-G).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号