首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
基于相位和幅度谱的数字图像被动认证算法   总被引:1,自引:0,他引:1  
针对一类单幅图像的复制遮盖篡改,提出一种基于快速傅立叶变换相位和幅度的自相关检测算法对篡改部位进行检测.利用Canny算子对篡改图像进行边缘提取,对提取的边缘图像进行分块傅立叶变换,比较块与块之间的相似性程度确认图像中被篡改的部位.实验结果表明该算法能够有效检测出图像被篡改部位,并且对图像复制部位的润饰处理和一般的噪声攻击具有鲁棒性.  相似文献   

2.
提出了一种新的基于Shamir秘密共享方案的文件图像篡改检测和修复方法,该方法包含篡改保护生成和篡改检测修复2个过程.在篡改保护生成过程中,为了提高已有文件图像篡改检测和修复方法的篡改检测正确率和修复效果,首先提出了基于权重的篡改检测信号生成方法,对每个非重叠2×3图像块提取图像块特征,再利用Shamir秘密共享方案将块特征和块内容序列值生成用于块篡改检测和修复的共享信息,最后将块共享信息构成的α通道与原始图像组成可移植网络图形格式(portable network graphic format, PNG)的文件图像.在篡改检测过程中,α通道提取的共享信号可以判断图像块是否被篡改,并可以通过Shamir秘密共享方案反向操作修复篡改图像块的内容.实验表明所提方法不仅具有良好的篡改检测和修复效果,同时具有良好的鲁棒性,能抵抗图像裁剪、噪声攻击.  相似文献   

3.
一种篡改检测与篡改定位分离的图像认证方案   总被引:3,自引:0,他引:3  
王国栋  刘粉林  汪萍  耿楠楠 《计算机学报》2007,30(10):1880-1888
针对脆弱水印认证算法的篡改定位精度及安全性问题,提出了一种将篡改检测和定位分离的图像认证方案:对图像进行单像素置乱并将其低两位置零,采用像素关联技术生成各个像素的篡改定位水印,并将其嵌入到自身的次低位;将图像逆置乱后并进行分块,生成各个分块的篡改检测水印,将篡改检测水印嵌入到各像素的最低位,进而生成含水印图像.理论分析和实验结果表明:该方案可以抵抗目前针对单像素认证算法的Oracle攻击及针对分块算法的量化攻击,在保证系统安全性的同时可将篡改定位到单个像素.  相似文献   

4.
结合基于块匹配和基于点匹配算法优点,提出复杂场景下(平坦区域和非平坦区域都有篡改)图像复制-移动篡改检测方法.通过关键点检测出非平坦区域的篡改,计算平坦区域,对平坦区域图像分块并提取FMT特征,通过相似块的匹配确定平坦区域的篡改,获得整个图像的篡改区域.实验结果表明,该方法具有很好的鲁棒性和稳健性,在计算速度上也具有明显的优势.  相似文献   

5.
利用JPEG块效应不一致性的合成图像盲检测   总被引:4,自引:1,他引:3       下载免费PDF全文
合成图像的篡改对象和背景区域一般来源于不同的JPEG图像.为了快速有效地检测这种图像篡改,提出了一种盲检测JPEG合成图像的方法.首先将图像与Laplacian模板卷积得到二阶差分图像,沿水平(垂直)方向平均后进行离散Fourier变换得到归一化的频谱,基于频谱幅值构造JPEG块效应测度;然后将待检测图像重叠分块并计算其相应块效应测度,利用块效应不一致性检测篡改区域.实验结果表明,该方法是快速有效的.  相似文献   

6.
为了减小图像自嵌入水印的长度,降低水印对载体图像质量的影响,同时为消除基于分块的图像认证算法中图像块之间的独立性,提出了一种变容量的自嵌入易碎水印算法:首先对图像进行2×2的分块,根据各分块灰度均值生成原始图像的均值图像;根据均值图像各像素之间的相关性进行游程编码;将编码信息作为水印嵌入在图像像素的最低两位中;篡改检测时首先使用字符串匹配的思想进行图像块和水印之间的匹配,对于未匹配成功的块,使用分组的方式进行再次匹配,以完成认证和恢复.该算法进行一次的水印嵌入,同时用于篡改检测与恢复,水印长度依赖于均值图像相邻像素之间的相关性,可有效缩短水印长度,减小对载体图像质量的影响.理论分析和实验仿真表明,算法在不可见性、篡改定位和恢复、抗拼贴攻击、漏检率等方面具有较好的效果.  相似文献   

7.
秦瑶  和红杰  陈帆 《自动化学报》2014,40(6):1184-1190
为提高算法抵抗拼贴攻击的能力,本文结合块相关思想提出一种二值图像认证算法.该算法首先将每个图像块中的像素点分为“可翻转”和“不可翻转”两类,将“不可翻转”像素点 Hash 生成水印信息,用其替代相应映射块的“可翻转”像素点实现水印嵌入.通过比较图像块重构水印及提取水印的一致性判断该图像块的真实性,并结合各图像块邻域篡改特征进一步提高篡改检测性能.实验结果表明,该算法不仅提高了在替换、添加、删除攻击下的篡改检测性能,而且能够有效抵抗拼贴攻击.  相似文献   

8.
基于视频感知哈希的视频篡改检测与多粒度定位   总被引:1,自引:0,他引:1       下载免费PDF全文
为了对被篡改过的视频进行准确快速的篡改检测与定位,引入人类视觉可计算模型,提出一种多层次、多粒度的视频篡改快速检测与定位算法.采用随机分块采样技术,提取视频结构感知特征及视频图像时域感知特征,利用哈希理论的单向摘要特性量化感知特征,获取视频摘要哈希.通过应用相似度矩阵进行多粒度、多层次篡改部位检测与定位.实验结果表明,相似度拟合图能够体现视频篡改攻击强度和攻击部位,算法表现出更好的篡改检测准确率与定位精确度.  相似文献   

9.
针对数字图像常见的区域复制篡改方式和实时特征提取要求,结合离散小波变换(DWT)和ORB特征提取算法,提出了一种高效的数字图像区域复制篡改检测方法。该方法首先使用DWT将图像分解为LL、LH、HL、HH四部分;然后将ORB算法作用于LL部分,提取关键点,构建二进制描述向量rBRIEF;最后使用汉明距离匹配相似关键点,达到检测图像篡改的目的。通过实验结果证明,该方法不仅可以有效地检测出区域复制篡改图像,同时对平移、旋转、噪音和综合攻击后的篡改图像具备一定的鲁棒性,且与SIFT等算法相比具有更短的检测时间和更少的存储空间。  相似文献   

10.
基于密钥特征点的抗几何攻击图像水印算法   总被引:4,自引:3,他引:1  
赵培东  谢剑英 《计算机仿真》2008,25(1):158-160,199
运用满足函数关系的特征点方法建立源图像的坐标系.源图像移入标准坐标系后,基于小波系数块的统计特性,数字水印自适应地嵌入到小波域,然后嵌入特征点.水印检测时,先检测特征点,重新建立已嵌入水印图像的坐标系作为校准系统.无论源图像遭受旋转、缩放或者平移,已嵌人水印的图像变换到标准坐标系后,将消除所遭受的几何攻击.水印检测是盲检测.仿真实验结果表明所提出方法稳健地抵抗一般攻击和几何攻击.特别是特征点满足依赖于密钥的函数关系,有效抵抗了篡改攻击,解决了特征点不依赖密钥的问题.  相似文献   

11.
图像伪造检测是数字取证领域一个发展迅速的研究方向。复制一移动是最常见的图像伪造方式之一,其目的是通过隐藏或克隆对象来创建新的图像内容场景。复制一移动伪造检测的主要依据是图像中存在较大面积的相同或非常相似的区域对。针对以往检测方法对图像中存在同质纹理或均匀区域检测困难以及相关参数阂值选择不确定等现状,提出一种基于自适应阂值的图像复制一移动伪造检测算法,该算法不但使相关阂值的选择和估计更合理,而且能够自动识别和定位伪造区域。通过在包含同质或均匀区域的彩色伪造图像中的实验,进一步验证了本算法的有效性。  相似文献   

12.
采用圆谐-傅里叶矩的图像区域复制粘贴篡改检测   总被引:1,自引:1,他引:0       下载免费PDF全文
现有检测方法大多对图像区域复制粘贴篡改的后处理操作鲁棒性不高.针对这种篡改技术,提出一种新的基于圆谐-傅里叶矩的区域篡改检测算法.首先将图像分为重叠的小块;然后提取每个图像块的圆谐-傅里叶矩作为特征向量并对其进行排序;最后根据阈值确定相似块,利用位移矢量阈值去除错误相似块以定位篡改区域.实验结果表明,该算法能有效抵抗噪声、高斯模糊、旋转等图像后处理操作,且与基于HU矩的方法相比有更好的检测结果.  相似文献   

13.
Copy-move forgery as one of popular methods is widely used to tamper digital images. Passive authentication is extensively used to detect the copy-move forgery images. This paper proposes a passive authentication scheme for copy-move forgery based on the discrete cosine transform (DCT) and the package clustering algorithm. The copy regions and paste regions can be automatically detected in doctored digital images. This scheme works by first applying the DCT to small fixed image blocks to obtain their features and the size of feature vectors are reduced. Moreover, the package clustering algorithm is applied to replace the general lexicographic order technologies to improve the detection precision. The similar blocks can be found by comparing the feature vectors in each package. The experimental results represent that the proposed scheme can locate irregular and meaningful tampered regions and multiply duplicated regions in a suspicious image. The duplicated regions can also be located in digital images that are distorted by adding white Gaussian noise, Gaussian blurring and their mixed operations.  相似文献   

14.
基于彩色LBP的隐蔽性复制-粘贴篡改盲鉴别算法   总被引:3,自引:3,他引:0  
现有的复制-粘贴盲鉴别算法大多忽略图像彩色信息,导致对隐蔽性篡改方式的检测率较低,基于此,本文提出一种基于彩色局部二值模式(Color local binary patterns,CoLBP)的隐蔽性复制-粘贴盲鉴别算法.算法首先对彩色图像进行预处理,即建立彩色LBP纹理图像,从而实现彩色信息与LBP纹理特征的融合;其次重叠分块并提取灰度共生矩阵(Gray level co-occurrence matrix,GLCM)特征;最后,提出改进的kd树和超平面划分标记split搜索方法,快速匹配图像块,并应用形态学操作去除误匹配,精确定位复制-粘贴区域.实验结果表明,本算法对隐蔽性复制-粘贴篡改定位准确,并对模糊、噪声、JPEG重压缩后处理操作有很好的鲁棒性.  相似文献   

15.
Digital picture forgery detection has recently become a popular and significant topic in image processing. Due to advancements in image processing and the availability of sophisticated software, picture fabrication may hide evidence and hinder the detection of such criminal cases. The practice of modifying original photographic images to generate a forged image is known as digital image forging. A section of an image is copied and pasted into another part of the same image to hide an item or duplicate particular image elements in copy-move forgery. In order to make the forgeries real and inconspicuous, geometric or post-processing techniques are frequently performed on tampered regions during the tampering process. In Copy-Move forgery detection, the high similarity between the tampered regions and the source regions has become crucial evidence. The most frequent way for detecting copy-move forgeries is to partition the images into overlapping square blocks and utilize Discrete cosine transform (DCT) components as block representations. Due to the high dimensionality of the feature space, Gaussian Radial basis function (RBF) kernel based Principal component analysis (PCA) is used to minimize the dimensionality of the feature vector representation, which improves feature matching efficiency. In this paper, we propose to use a novel enhanced Scale-invariant feature transform (SIFT) detector method called as RootSIFT, combined with the similarity measures to mark the tampered areas in the image. The proposed method outperforms existing state-of-the-art methods in terms of matching time complexity, detection reliability, and forgery location accuracy, according to the experimental results. The F1 score of the proposed method is 92.3% while the literature methods are around 90% on an average.  相似文献   

16.
现有的篡改检测方法中特征点提取不充分会导致篡改检测精度不高,特征点描述符识别率差,针对该问题提出一种基于颜色矩的区域划分和四元数Hu矩的彩色图像复制粘贴篡改检测算法。首先,使用自适应形态重建算法对图像进行超像素分割,通过密度聚类算法对图像自适应划分区域;其次,提出一种关键点提取方法得到均匀的SIFT特征点;然后,在一种新颖的彩色图像四元数表示方法中构建局部高斯金字塔提取Hu矩特征;最后,利用2NN进行特征匹配后,结合Delaunay三角形算法定位出复制粘贴篡改区域。在公共数据集上的实验结果表明,该算法可以更有效地定位篡改区域。  相似文献   

17.
刘美红  徐蔚鸿 《计算机应用》2011,31(8):2236-2239
现在大多数图像“复制-粘贴”篡改检测算法对于区域复制后的进一步混合处理不能进行有效检测。为此提出了一种新的基于分形和统计的检测方法。首先将图像分块并提取每块的特征向量,该特征向量由分形维数和三个统计量组成;接着对所有特征向量进行字典排序;最后,利用图像块的位置信息和欧氏距离定位篡改区域。此方法不仅能够检测传统的复制-粘贴型篡改,而且还能够检测经过旋转、翻转以及旋转和翻转混合的多区域复制-粘贴型篡改;此方法也能够抵抗高斯模糊、对比度调整和亮度调整等攻击。实验结果表明了该方法的有效性。  相似文献   

18.
An error diffusion scheme for digital halftoning is proposed. The scheme is an iterative and isotropic error feedback process. Also, to compensate for the nonlinear tone reproduction by laser printers due to ink drop overlaps, we incorporate Pappas-Neuhoff's simplified printer model into the new error diffusion scheme. It appears that the proposed halftoning technique enhances the perceived tone continuity of halftone hard copies, and it alleviates the objectionable structured halftone textures of some existing methods. In addition, a mechanism is suggested to preview a halftone print on a gray-level CRT monitor. The user can interactively set the desired brightness of the halftone print and balance image contrast and tone continuity, which are two mutually exclusive subjective criteria for halftone reproduction.  相似文献   

19.
Image forgery detection remains a challenging problem. For the most common copy-move forgery detection, the robustness and accuracy of existing methods can still be further improved. To the best of our knowledge, we are the first to propose an image copy-move forgery passive detection method by combining the improved pulse coupled neural network (PCNN) and the self-selected sub-images. Our method has the following steps: First, contour detection is performed on the input color image, and bounding boxes are drawn to frame the contours to form suspected forgery sub-images. Second, by improving PCNN to perform feature extraction of sub-images, the feature invariance of rotation, scaling, noise adding, and so on can be achieved. Finally, the dual feature matching is used to match the features and locate the forgery regions. What's more, the self-selected sub-images can quickly obtain suspected forgery sub-images and lessen the workload of feature extraction, and the improved PCNN can extract image features with high robustness. Through experiments on the standard image forgery datasets CoMoFoD and CASIA, it is effectively verified that the robustness score and accuracy of proposed method are much higher than the current best method, which is a more efficient image copy-move forgery passive detection method.  相似文献   

20.
Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is copy-move digital image forgery, which involves copying one part of the image onto another area of the same image. Various methods have been proposed to detect copy-move forgery that uses different types of transformations. The goal of this paper is to determine which copy-move forgery detection methods are best for different image attributes such as JPEG compression, scaling, rotation. The advantages and drawbacks of each method are also highlighted. Thus, the current state-of-the-art image forgery detection techniques are discussed along with their advantages and drawbacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号