首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.

A copy-move forgery is a passive tampering wherein one or more regions have been copied and pasted within the same image. Often, geometric transformations, including scale, rotation, and rotation+scale are applied to the forged areas to conceal the counterfeits to the copy-move forgery detection methods. Recently, copy-move forgery detection using image blobs have been used to tackle the limitation of the existing detection methods. However, the main limitation of blobs-based copy-move forgery detection methods is the inability to perform the geometric transformation estimation. To tackle the above-mentioned limitation, this article presents a technique that detects copy-move forgery and estimates the geometric transformation parameters between the authentic region and its duplicate using image blobs and scale-rotation invariant keypoints. The proposed algorithm involves the following steps: image blobs are found in the image being analyzed; scale-rotation invariant features are extracted; the keypoints that are located within the same blob are identified; feature matching is performed between keypoints that are located within different blobs to find similar features; finally, the blobs with matched keypoints are post-processed and a 2D affine transformations is computed to estimate the geometric transformation parameters. Our technique is flexible and can easily take in various scale-rotation invariant keypoints including AKAZE, ORB, BRISK, SURF, and SIFT to enhance the effectiveness. The proposed algorithm is implemented and evaluated on images forged with copy-move regions combined with geometric transformation from standard datasets. The experimental results indicate that the new algorithm is effective for geometric transformation parameters estimation.

  相似文献   

2.
Multimedia Tools and Applications - Splicing and copy-move are two well known methods of passive image forgery. In this paper, splicing and copy-move forgery detection are performed simultaneously...  相似文献   

3.
Copy-move forgery as one of popular methods is widely used to tamper digital images. Passive authentication is extensively used to detect the copy-move forgery images. This paper proposes a passive authentication scheme for copy-move forgery based on the discrete cosine transform (DCT) and the package clustering algorithm. The copy regions and paste regions can be automatically detected in doctored digital images. This scheme works by first applying the DCT to small fixed image blocks to obtain their features and the size of feature vectors are reduced. Moreover, the package clustering algorithm is applied to replace the general lexicographic order technologies to improve the detection precision. The similar blocks can be found by comparing the feature vectors in each package. The experimental results represent that the proposed scheme can locate irregular and meaningful tampered regions and multiply duplicated regions in a suspicious image. The duplicated regions can also be located in digital images that are distorted by adding white Gaussian noise, Gaussian blurring and their mixed operations.  相似文献   

4.
图像伪造检测是数字取证领域一个发展迅速的研究方向。复制一移动是最常见的图像伪造方式之一,其目的是通过隐藏或克隆对象来创建新的图像内容场景。复制一移动伪造检测的主要依据是图像中存在较大面积的相同或非常相似的区域对。针对以往检测方法对图像中存在同质纹理或均匀区域检测困难以及相关参数阂值选择不确定等现状,提出一种基于自适应阂值的图像复制一移动伪造检测算法,该算法不但使相关阂值的选择和估计更合理,而且能够自动识别和定位伪造区域。通过在包含同质或均匀区域的彩色伪造图像中的实验,进一步验证了本算法的有效性。  相似文献   

5.
Image forgery detection remains a challenging problem. For the most common copy-move forgery detection, the robustness and accuracy of existing methods can still be further improved. To the best of our knowledge, we are the first to propose an image copy-move forgery passive detection method by combining the improved pulse coupled neural network (PCNN) and the self-selected sub-images. Our method has the following steps: First, contour detection is performed on the input color image, and bounding boxes are drawn to frame the contours to form suspected forgery sub-images. Second, by improving PCNN to perform feature extraction of sub-images, the feature invariance of rotation, scaling, noise adding, and so on can be achieved. Finally, the dual feature matching is used to match the features and locate the forgery regions. What's more, the self-selected sub-images can quickly obtain suspected forgery sub-images and lessen the workload of feature extraction, and the improved PCNN can extract image features with high robustness. Through experiments on the standard image forgery datasets CoMoFoD and CASIA, it is effectively verified that the robustness score and accuracy of proposed method are much higher than the current best method, which is a more efficient image copy-move forgery passive detection method.  相似文献   

6.
刘美红  徐蔚鸿 《计算机应用》2011,31(8):2236-2239
现在大多数图像“复制-粘贴”篡改检测算法对于区域复制后的进一步混合处理不能进行有效检测。为此提出了一种新的基于分形和统计的检测方法。首先将图像分块并提取每块的特征向量,该特征向量由分形维数和三个统计量组成;接着对所有特征向量进行字典排序;最后,利用图像块的位置信息和欧氏距离定位篡改区域。此方法不仅能够检测传统的复制-粘贴型篡改,而且还能够检测经过旋转、翻转以及旋转和翻转混合的多区域复制-粘贴型篡改;此方法也能够抵抗高斯模糊、对比度调整和亮度调整等攻击。实验结果表明了该方法的有效性。  相似文献   

7.
采用圆谐-傅里叶矩的图像区域复制粘贴篡改检测   总被引:1,自引:1,他引:0       下载免费PDF全文
现有检测方法大多对图像区域复制粘贴篡改的后处理操作鲁棒性不高.针对这种篡改技术,提出一种新的基于圆谐-傅里叶矩的区域篡改检测算法.首先将图像分为重叠的小块;然后提取每个图像块的圆谐-傅里叶矩作为特征向量并对其进行排序;最后根据阈值确定相似块,利用位移矢量阈值去除错误相似块以定位篡改区域.实验结果表明,该算法能有效抵抗噪声、高斯模糊、旋转等图像后处理操作,且与基于HU矩的方法相比有更好的检测结果.  相似文献   

8.
生成对抗网络(generative adversarial network,GAN)快速发展,并在图像生成和图像编辑技术等多个方面取得成功应用。然而,若将上述技术用于伪造身份或制作虚假新闻,则会造成严重的安全隐患。多媒体取证领域的研究者面向GAN生成图像已提出了多种被动取证与反取证方法,但现阶段缺乏相关系统性综述。针对上述问题,本文首先阐述本领域的研究背景和研究意义,然后分析自然图像采集与GAN图像生成过程的区别。根据上述理论基础,详细介绍了现有GAN生成图像的被动取证技术,包括:GAN生成图像检测算法,GAN模型溯源算法和其他相关取证问题。此外,针对不同应用场景介绍基于GAN的反取证技术。最后,通过实验分析当前GAN生成图像被动取证技术所面临的挑战。本文根据对现有技术从理论和实验两方面的分析得到以下结论:现阶段,GAN生成图像的被动取证技术已在空间域和频率域形成了不同技术路线,较好地解决了简单场景下的相关取证问题。针对常见取证痕迹,基于GAN的反取证技术已能够进行有效隐藏。然而,该领域研究仍存在诸多局限:1)取证与反取证技术的可解释性不足;2)取证技术鲁棒性和泛化性较弱;3)反取证技术缺乏多特征域协同的抗分析能力等。上述问题和挑战还需要研究人员继续深入探索。  相似文献   

9.
现有的篡改检测方法中特征点提取不充分会导致篡改检测精度不高,特征点描述符识别率差,针对该问题提出一种基于颜色矩的区域划分和四元数Hu矩的彩色图像复制粘贴篡改检测算法。首先,使用自适应形态重建算法对图像进行超像素分割,通过密度聚类算法对图像自适应划分区域;其次,提出一种关键点提取方法得到均匀的SIFT特征点;然后,在一种新颖的彩色图像四元数表示方法中构建局部高斯金字塔提取Hu矩特征;最后,利用2NN进行特征匹配后,结合Delaunay三角形算法定位出复制粘贴篡改区域。在公共数据集上的实验结果表明,该算法可以更有效地定位篡改区域。  相似文献   

10.
颜普  苏亮亮  邵慧  吴东升 《计算机应用》2019,39(9):2707-2711
图像伪造检测是目前数字图像处理领域中的一个研究热点,其中复制-粘贴是最常用的伪造手段。由于伪造区域在粘贴前会被进行一定的尺度、旋转、JPEG压缩、添加噪声等操作,这使得检测伪造区域具有一定的挑战性。针对图像复制-粘贴伪造技术,提出一种基于多支持区域局部亮度序模式(LIOP)的图像伪造检测算法。首先,利用最大稳定极值区域(MSER)算法提取具有仿射不变性的区域作为支持区域;其次,利用非抽样Contourlet变换得到不同尺度、不同分辨率和不同方向的多个支持区域;然后,在每个支持区域上提取同时具有旋转不变性和单调亮度不变性的LIOP描述子,并利用双向距离比值法实现特征初匹配;接着,采用空间聚类将匹配的特征进行归类,进而用随机抽样一致性(RANSAC)算法对每个归类进行几何变换参数估计;最后,使用必要的后处理等操作来检测出伪造区域。实验表明,提出的算法具有较高的伪造检测精度与可信度。  相似文献   

11.
Creating copy-move forgery became even easier using a wide range of software and platforms. Many algorithms have been proposed to solve the problem, but each one of those algorithms has its own drawbacks. Researchers face many challenges in developing copy-move detection algorithms, and in this paper, we focus on two challenges. The first is the benchmark dataset, and the second involves evaluation metrics. In this paper, we investigate the available copy-move datasets and their advantages and disadvantages. In addition, we discuss the different metrics that have been used by researchers to evaluate the copy-move forgery detection (CMFD) algorithms. On that basis, we suggest the standard specifications of the appropriate copy-move dataset and the metrics that should be used to evaluate the detection algorithms. The findings of this paper will help researchers evaluate their algorithms effectively and fairly essential for developing reliable algorithms.  相似文献   

12.
Copy-move forgery is one of the most common types of image forgeries, where a region from one part of an image is copied and pasted onto another part, thereby concealing the image content in the latter region. Keypoint based copy-move forgery detection approaches extract image feature points and use local visual features, rather than image blocks, to identify duplicated regions. Keypoint based approaches exhibit remarkable performance with respect to computational cost, memory requirement, and robustness. But unfortunately, they usually do not work well if smooth background areas are used to hide small objects, as image keypoints cannot be extracted effectively from those areas. It is a challenging work to design a keypoint-based method for detecting forgeries involving small smooth regions. In this paper, we propose a new keypoint-based copy-move forgery detection for small smooth regions. Firstly, the original tampered image is segmented into nonoverlapping and irregular superpixels, and the superpixels are classified into smooth, texture and strong texture based on local information entropy. Secondly, the stable image keypoints are extracted from each superpixel, including smooth, texture and strong texture ones, by utilizing the superpixel content based adaptive feature points detector. Thirdly, the local visual features, namely exponent moments magnitudes, are constructed for each image keypoint, and the best bin first and reversed generalized 2 nearest-neighbor algorithm are utilized to find rapidly the matching image keypoints. Finally, the falsely matched image keypoints are removed by customizing the random sample consensus, and the duplicated regions are localized by using zero mean normalized cross-correlation measure. Extensive experimental results show that the newly proposed scheme can achieve much better detection results for copy-move forgery images under various challenging conditions, such as geometric transforms, JPEG compression, and additive white Gaussian noise, compared with the existing state-of-the-art copy-move forgery detection methods.  相似文献   

13.
Lin  Cong  Lu  Wei  Huang  Xinchao  Liu  Ke  Sun  Wei  Lin  Hanhui  Tan  Zhiyuan 《Multimedia Tools and Applications》2019,78(21):30081-30096

Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be tampered easily. Therefore, the research of multimedia forensics is necessary. Copy-move is an important branch of multimedia forensics. In this paper, a novel copy-move forgery detection scheme using combined features and transitive matching is proposed. First, SIFT and LIOP are extracted as combined features from the input image. Second, transitive matching is used to improve the matching relationship. Third, a filtering approach using image segmentation is proposed to filter out false matches. Fourth, affine transformations are estimated between these image patches. Finally, duplicated regions are located based on those affine transformations. The experimental results demonstrate that the proposed scheme can achieve much better detection results on the public database under various attacks.

  相似文献   

14.
谢伟  万晓霞  叶松涛  金国念 《软件学报》2017,28(7):1835-1846
本文印前图像特指图像数字排版经编辑确认后的数字印刷样张,其以栅格处理器分色后的加网二进制形式存储.数字样张一经确认,其来源的合法性便不受怀疑.但是,从印刷的整体流程来看,数字样张的存储、传输过程中仍有较大的篡改风险.现有的复制移动篡改检测算法存在特征维度高、计算开销大或检测率较低等问题,而且不适用于分色后的二进制样张.本文提出了一种基于半色调图像网点密度特征的Copy-Move篡改检测方法,该方法针对分色处理后的CMYK目标图像的二值量化处理,采用滑动分块的方法对目标图像进行分块,通过提取图像块CMYK四个通道的局部网点密度特征对图像块进行篡改检测.实验结果表明,该方法在图像篡改检测上较以往方法相比具有较低的时间复杂度和较高的检测率,并且对图像篡改区域的旋转攻击、小尺度缩放攻击等具有较好的鲁棒性.  相似文献   

15.
詹玲超  黄继风 《计算机工程与设计》2007,28(17):4307-4308,4318
由于现今功能强大的图像编辑软件很容易就可以得到,所以对数字图像进行操作和编辑变得非常的容易,在一幅图像中添加或移掉一个重要的人或物并且不留任何痕迹是很有可能的.如果这些篡改图用在媒体或法律上,对社会将造成很大的影响.随着数码相机和摄像机的不断普及,验证数码图像变得越来越重要了.利用相机的传感器噪声对复制遮盖篡改图像进行检测,并根据其模板噪声进一步确定篡改区域.对多幅图像进行操作,实验证明效果不错.  相似文献   

16.

Since powerful editing software is easily accessible, manipulation on images is expedient and easy without leaving any noticeable evidences. Hence, it turns out to be a challenging chore to authenticate the genuineness of images as it is impossible for human’s naked eye to distinguish between the tampered image and actual image. Among the most common methods extensively used to copy and paste regions within the same image in tampering image is the copy-move method. Discrete Cosine Transform (DCT) has the ability to detect tampered regions accurately. Nevertheless, in terms of precision (FP) and recall (FN), the block size of overlapping block influenced the performance. In this paper, the researchers implemented the copy-move image forgery detection using DCT coefficient. Firstly, by using the standard image conversion technique, RGB image is transformed into grayscale image. Consequently, grayscale image is segregated into overlying blocks of m × m pixels, m = 4.8. 2D DCT coefficients are calculated and reposition into a feature vector using zig-zag scanning in every block. Eventually, lexicographic sort is used to sort the feature vectors. Finally, the duplicated block is located by the Euclidean Distance. In order to gauge the performance of the copy-move detection techniques with various block sizes with respect to accuracy and storage, threshold D_similar = 0.1 and distance threshold (N)_d = 100 are used to implement the 10 input images in order. Consequently, 4 × 4 overlying block size had high false positive thus decreased the accuracy of forged detection in terms of accuracy. However, 8 × 8 overlying block accomplished more accurately for forged detection in terms of precision and recall as compared to 4 × 4 overlying block. In a nutshell, the result of the accuracy performance of different overlying block size are influenced by the diverse size of forged area, distance between two forged areas and threshold value used for the research.

  相似文献   

17.
目的 随着各种功能强大的音频编辑软件的流行,使得不具备专业知识的普通用户也可以轻松随意地对数字音频文件进行编辑甚至是恶意篡改,这给数字音频的鉴真带来了极大挑战。其中,copy-move篡改是将同一段音频中的部分区域复制粘贴到其他部分,从而实现对音频的语义篡改。由于其篡改片段的特性与原始音频文件匹配度极高,导致检测难度极大,已成为音频取证领域的一个研究热点。然而,现有研究大多基于语音端点检测技术,只能检测出整个有声片段是否发生篡改,而无法准确定位篡改的具体位置。为此,本文提出一种基于多特征决策融合的音频copy-move篡改检测与定位方法。方法 首先利用基于谱熵法的语音端点检测技术将音频划分为若干静音段和有声段,并基于能熵比方法进一步对有声段进行字节分割;然后提取每个字节的基音频率特征、颜色自相关图特征和短时能量特征,并利用动态时间规整距离计算任意两个字节在基音频率特征上的相似度,采用余弦距离计算两个字节在颜色自相关图特征上的相似度,利用短时能量和差值计算两个字节在短时能量特征上的相似度;最后基于多特征决策融合准确定位篡改位置。结果 在相关数据集上的对比实验结果表明,本文提出的多特征决策...  相似文献   

18.
提出了一种新的图像盲检测技术,该技术先对图像进行两次分块得到两个子块集,分别对这两个子块集中的子块进行小波变换,将最大变换尺度的小波近似系数以向量形式表示各子块,一个子块集组成一个矩阵,利用主成分分析方法(PCA)对这两个特征矩阵进行二次特征提取,利用Pearson相关系数法对二次提取后的子块特征进行篡改检测,标记出篡改块。实验结果表明,该技术在降低运算复杂度的基础上,不仅能较好地检测进行了多处复制粘贴篡改的图像,且在抗高斯模糊、JPEG有损压缩和噪声方面都有较强的鲁棒性,尤其在篡改图像经过滤波和加性噪声混合严重干扰后,仍能检测出大部分篡改区域。  相似文献   

19.
针对图像复制粘贴篡改检测中算法时间复杂度过高和定位区域不完整的问题,提出一种基于深度特征提取和离散余弦变换的图像复制粘贴篡改检测算法。首先,融合图像颜色和纹理信息获得四通道图像,计算自适应特征提取阈值,并通过基于全卷积神经网络的特征检测器提取图像深度特征;其次,通过离散余弦变换提取块特征进行初步匹配,再利用点特征向量消除误匹配;最后,通过卷积运算精确定位篡改区域。通过在公共数据集上进行验证,充分展示了该算法在检测效率和定位区域完整性方面的优势。  相似文献   

20.
针对目前图像复制粘贴检测算法有时间复杂度高、当图像中有光滑区域时错检率大的缺点,将图像角点区域及其八方向邻接圆形区域作为伪造检测区域,提取每个检测区域的矩特征后用k-d树进行排序,并通过比较每个区域矩特征的相似性来定位伪造复制区域.该算法效率高,且对经过旋转、添加噪声、模糊、JPEG压缩等后处理的复制粘贴伪造图像检测效果很好.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号