首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
李应灿  杨建权  丁峰  朱国普 《信号处理》2020,36(9):1533-1543
Copy-move是一种常用的图像伪造手段,它通过复制图像的某一区域,移动并粘贴到同一图像的其他位置,达到掩盖重要信息或伪造虚假场景的目的。近年来,为了防止copy-move被用于违法犯罪,copy-move伪造检测技术迅猛发展,在维护社会运行秩序和信息安全方面发挥着积极作用。本文提出一种基于条件生成对抗网络(conditional Generative Adversarial Networks, cGANs)的copy-move伪造检测方法。针对图像copy-move伪造检测,该方法优化设计了cGANs的损失函数,并使用适量的弱监督样本来提升网络性能。不同于目前大部分检测算法,该方法不仅可以定位出图像中的相似区域,还可以有效区分伪造来源区域和伪造目标区域。实验结果表明,本文所提出的方法在检测准确率上显著优于现有方法。   相似文献   

2.
图像复制-黏贴(copy-move)是一类的常见的图像篡改手段,篡改通过将图像中一部分区域复制并黏贴到同一幅图像另一区域后起到掩盖被覆盖内容的目的。由于篡改者为了使篡改更加逼真或者试图增加检测难度,往往在黏贴图像块之前对图像块进行加噪、模糊或者旋转缩放等后续处理。目前检测这类篡改的认证方法主要归纳为三类:变换域鲁棒特征子块匹配方法、旋转不变特征子块匹配方法和特征点匹配方法。本文对采用这三类方法的国内外文献进行了系统的分析和归纳并对未来研究方向进行了展望。  相似文献   

3.
With advancement of media editing software, even people who are not image processing experts can easily alter digital images. Various methods of digital image forgery exist, such as image splicing, copy-move forgery, and image retouching. The most common method of tampering with a digital image is copy-move forgery, in which a part of an image is duplicated and used to substitute another part of the same image at a different location. In this paper, we present an efficient and robust method to detect such artifacts. First, the tampered image is segmented into overlapping fixed-size blocks, and the Gabor filter is applied to each block. Thus, the image of Gabor magnitude represents each block. Secondly, statistical features are extracted from the histogram of orientated Gabor magnitude (HOGM) of overlapping blocks, and reduced features are generated for similarity measurement. Finally, feature vectors are sorted lexicographically, and duplicated image blocks are identified by finding similarity block pairs after suitable post-processing. To enhance the algorithm’s robustness, a few parameters are proposed for removing the wrong similar blocks. Experiment results demonstrate the ability of the proposed method to detect multiple examples of copy-move forgery and precisely locate the duplicated regions, even when dealing with images distorted by slight rotation and scaling, JPEG compression, blurring, and brightness adjustment.  相似文献   

4.
Understanding if a digital image is authentic or not, is a key purpose of image forensics. There are several different tampering attacks but, surely, one of the most common and immediate one is copy-move. A recent and effective approach for detecting copy-move forgeries is to use local visual features such as SIFT. In this kind of methods, SIFT matching is often followed by a clustering procedure to group keypoints that are spatially close. Often, this procedure could be unsatisfactory, in particular in those cases in which the copied patch contains pixels that are spatially very distant among them, and when the pasted area is near to the original source. In such cases, a better estimation of the cloned area is necessary in order to obtain an accurate forgery localization. In this paper a novel approach is presented for copy-move forgery detection and localization based on the J-Linkage algorithm, which performs a robust clustering in the space of the geometric transformation. Experimental results, carried out on different datasets, show that the proposed method outperforms other similar state-of-the-art techniques both in terms of copy-move forgery detection reliability and of precision in the manipulated patch localization.  相似文献   

5.
6.
7.
Copy-move forgery is one of the most common image tampering schemes, with the potential use for misleading the opinion of the general public. Keypoint-based detection methods exhibit remarkable performance in terms of computational cost and robustness. However, these methods are difficult to effectively deal with the cases when 1) forgery only involves small or smooth regions, 2) multiple clones are conducted or 3) duplicated regions undergo geometric transformations or signal corruptions. To overcome such limitations, we propose a fast and accurate copy-move forgery detection algorithm, based on complex-valued invariant features. First, dense and uniform keypoints are extracted from the whole image, even in small and smooth regions. Then, these keypoints are represented by robust and discriminative moment invariants, where a novel fast algorithm is designed especially for the computation of dense keypoint features. Next, an effective magnitude-phase hierarchical matching strategy is proposed for fast matching a massive number of keypoints while maintaining the accuracy. Finally, a reliable post-processing algorithm is developed, which can simultaneously reduce false negative rate and false positive rate. Extensive experimental results demonstrate the superior performance of our proposed scheme compared with existing state-of-the-art algorithms, with average pixel-level F-measure of 94.54% and average CPU-time of 36.25 s on four publicly available datasets.  相似文献   

8.
Aiming at the high computational complexity of the existing copy-move image forgery detection algorithm,a copy-move forgery detection algorithm based on group scale-invariant feature transform (SIFT) was proposed.Firstly,the simple linear iterative clustering (SLIC) was utilized to divide the input image into non-overlapping and irregular blocks.Secondly,the structure tensor was introduced to classify each block as flat blocks,edge blocks and corner blocks,and then the SIFT feature points extracted from the block were taken as the block features.Finally,the forgery was located by the inter-class matching of the block features.By means of inter-class matching and feature point matching,the time complexity of the proposed copy-move forgery detection algorithm in feature matching and locating forgery region was effectively reduced while guaranteeing the detection effect.The experimental results show that the accuracy of the proposed algorithm is 97.79%,the recall rate is 90.34%,and the F score is 93.59%,the detecting time for the image with size of 1024×768 is 12.72 s,and the detecting time for the image with size of 3000×2000 was 639.93 s.Compared with the existing copy-move algorithm,the proposed algorithm can locate the forgery region quickly and accurately,and has high robustness.  相似文献   

9.
李子健  阮秋琦 《信号处理》2017,33(4):589-594
图像的复制-粘贴篡改检测是图像篡改检测领域中的重要组成部分。本文基于SIFT算法以及LPP的降维思想,提出了一种新的篡改检测算法。本文在SIFT算法的基础上,使用LPP算法对SIFT算法生成的特征点以及特征向量进行降维。使得传统SIFT算法在实际应用中特征点数目过多、特征向量维数过高等缺陷得到了解决。并使用凝聚型层次聚类算法对相似的特征点进行聚类,完成了对图像复制-粘贴篡改区域的检测。在文章的最后,本文对哥伦比亚大学复制-粘贴图像库里的100张图片进行实验。实验结果表明,不管篡改区域后处理方式是拉伸还是旋转,本文算法都能比传统的SIFT、SURF、PCA-SIFT等算法生成更少的特征点数目和更低的特征向量维度,使得检测效率以及检测正确率得到有效提升。   相似文献   

10.
The key intention of non-intrusive image forensic detection is to resolve whether an image is original or tampered. In contrast to intrusive methods, there is no supporting pattern that has been embedded into an image to ensure image authenticity. The only accessible cue is the original characteristics of an image. Various non-intrusive techniques have been proposed to ensure image authenticity but no adequate solution exists so far. This article introduced a robust technique by means of Discrete Stationary Wavelet Transform along with Multi Dimension Scaling to detect familiar category of copy-move image tampering. Experimental outcomes shows that proposed technique decreases computational complexity by reducing feature dimension and locate the tampered region more accurately even when the tampered image is blurred, brightness altered, colour reduced and pasted in multiple locations. Overall tamper detection accuracy is greater than 97% and false positive rate close to zero, which indicates that proposed technique will discover tampered region more precisely compared with existing methods.  相似文献   

11.
针对现有图像拼接检测网络模型存在边缘信息关注度不够、像素级精准定位效果不够好等问题,提出一种融入残差注意力机制的DeepLabV3+图像拼接篡改取证方法,该方法利用编-解码结构实现像素级图像的拼接篡改定位。在编码阶段,将高效注意力模块融入ResNet101的残差模块中,通过残差模块的堆叠以减小不重要的特征比重,凸显拼接篡改痕迹;其次,利用带有空洞卷积的空间金字塔池化模块进行多尺度特征提取,将得到的特征图进行拼接后通过空间和通道注意力机制进行语义信息建模。在解码阶段,通过融合多尺度的浅层和深层图像特征提升图像的拼接伪造区域的定位精度。实验结果表明,在CASIA 1.0、COLUMBIA和CARVALHO数据集上的拼接篡改定位精度分别达到了0.761、0.742和0.745,所提方法的图像拼接伪造区域定位性能优于一些现有的方法,同时该方法对JPEG压缩也具有更好的鲁棒性。  相似文献   

12.
Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large number of image blocks used and fail to handle geometric transformations. On the contrary, keypoint-based approaches can overcome these two drawbacks yet are found difficult to deal with smooth regions. As a result, fusion of these two approaches is proposed for effective copy-move forgery detection. First, our scheme adaptively determines an appropriate initial size of regions to segment the image into non-overlapped regions. Feature points are extracted as keypoints using the scale invariant feature transform (SIFT) from the image. The ratio between the number of keypoints and the total number of pixels in that region is used to classify the region into smooth or non-smooth (keypoints) regions. Accordingly, block based approach using Zernike moments and keypoint based approach using SIFT along with filtering and post-processing are respectively applied to these two kinds of regions for effective forgery detection. Experimental results show that the proposed fusion scheme outperforms the keypoint-based method in reliability of detection and the block-based method in efficiency.  相似文献   

13.
韩语晨  华光  张海剑 《信号处理》2021,37(4):567-577
近年来出现并迅猛发展的深度伪造(DeepFake)技术深刻改变了多媒体内容伪造的方式和水平,给网络空间内容安全带来了新的严峻挑战。本文主要关注深度伪造中危害最大的视频换脸伪造,提出基于Inception3D(I3D)网络的眼部与口部双流检测方法。首先,针对现有大多数伪造检测方法忽略了视频中重要的时间信息的问题,将目前常用的仅具备空域感受能力的2D卷积拓展为I3D卷积,赋予网络同时感受空域和时域信息的能力。同时,通过调整I3D网络结构使其从原有的多分类任务设计改进为更适合换脸取证二分类任务的高效网络。进一步,考虑到视频换脸操作中眼部和口部区域伪造难度更大也更容易留下篡改痕迹的特点,提出基于这两个区域的双流网络结构,最终利用双流输出结果实现协同决策。通过在Celeb-DF、DFDC、DeepFakeDetection、FaceForensics++等目前常用数据集上的广泛实验,结果表明本文提出的方法在检测准确性和效率上较目前最先进的Xception和标准I3D网络均得到显著提升。   相似文献   

14.
基于脊波变换的图像篡改检验算法   总被引:2,自引:2,他引:0  
针对数字图像篡改一种最经常使用的复制-粘 贴篡改手段,提出了一种基于脊波变换的 图像篡改检测取证方法。算法利用了脊波变换是Radon变换切片上应用小波变换这种 特性,实现了 复制-粘贴篡改的鲁棒识别。针对十一大类图像的仿真实验结果表明,算法对于旋转变换、 JPEG压缩和噪 声添加都具有良好的鲁棒性,对于压缩新标准JPEG2000也表现出了较 好的鲁棒性。  相似文献   

15.
In this paper, we present a comprehensive approach for investigating JPEG compressed test images, suspected of being tampered either by splicing or copy-move forgery (cmf). In JPEG compression, the image plane is divided into non-overlapping blocks of size 8 × 8 pixels. A unified approach based on block-processing of JPEG image is proposed to identify whether the image is authentic/forged and subsequently localize the tampered region in forged images. In the initial step, doubly stochastic model (dsm) of block-wise quantized discrete cosine transform (DCT) coefficients is exploited to segregate authentic and forged JPEG images from a standard dataset (CASIA). The scheme is capable of identifying both the types of forged images, spliced as well as copy-moved. Once the presence of tampering is detected, the next step is to localize the forged region according to the type of forgery. In case of spliced JPEG images, the tampered region is localized using block-wise correlation maps of dequantized DCT coefficients and its recompressed version at different quality factors. The scheme is able to identify the spliced region in images tampered by pasting uncompressed or JPEG image patch on a JPEG image or vice versa, with all possible combinations of quality factors. Alternatively, in the case of copy-move forgery, the duplication regions are identified using highly localized phase congruency features of each block. Experimental results are presented to consolidate the theoretical concept of the proposed technique and the performance is compared with the already existing state of art methods.  相似文献   

16.
为了解决数字图像多重复制粘贴篡改检测问题,克服广义2近邻(g2NN)算法对匹配特征点漏检的缺点,该文提出逆序广义2近邻(Rg2NN)算法。在计算匹配特征点时,该算法采用逆序方式计算特征点之间的匹配关系,可以更加准确地计算出所有与待检测特征点相匹配的特征点。实验证明,Rg2NN算法比g2NN算法计算出来的匹配特征点更加准确,提高了g2NN算法对多重复制粘贴篡改图像的检测能力,当图像中的一块区域被复制后在多处粘贴,或多块区域被复制粘贴时可以准确计算出复制粘贴区域。  相似文献   

17.
刘福金 《电视技术》2015,39(3):107-109,132
现有的大多数图像篡改检测算法不能够很好地检测多次篡改区域,针对此不足,提出了一种有效的基于SVD和直方图的JPEG图像篡改盲检测算法。该算法首先以设定的窗口块在待检测图像上依次滑动一个像素得到每个单独的滑窗分块,每个分块用奇异值分解(SVD)值表征;然后字典排序所有分块量化后的SVD值矩阵,并通过统计排序后的矩阵的偏移频率来得到直方图;最后通过直方图设定阈值以判断分块是否属于复制粘贴块。实验结果表明,该算法不仅能对单次篡改区域进行准确定位,还能较好地检测到多次篡改区域。  相似文献   

18.
随着现代科学技术的进步,图像编辑工具的发展极大地降低了篡改所需成本。图像篡改手段有多种,现有的方法往往存在通用性差的问题。同时,这些方法只关注篡改定位而忽略对篡改手段的分类。本文提出一种基于改进的Mask R-CNN两阶段网络模型用于图像篡改取证。在特征提取部分,结合空域富模型(spatial rich model, SRM)和受约束卷积对输入图像进行预处理,再输入到ResNet101前4层中,以建立能够有效体现各种篡改痕迹的统一特征表示。一阶段网络通过注意力区域提议网络(attention region proposal network, A-RPN)检测篡改区域,预测模块实现篡改操作分类和粗略篡改区域定位。继而,一阶段网络得到的定位信息引导二阶段网络学习局部特征以定位出最终的篡改区域。本文所提出的模型能检测3种不同类型的图像篡改操作,包括复制-粘贴、拼接和移除。实验结果表明,本文所提出的方法在NIST16、COVERAGE、Columbia和CASIA数据集的F1值分别达到了0.924、0.761、0.791和0.473,优于传统方法和一些主流深度学习方法。  相似文献   

19.
The most prevalent type of digital image falsification occurs when a portion of a image is copied and pasted onto another section of the same image. Falsification of the image made in this way is called copy-move forgery (CMF). This study presents a new and effective approach for copy-move forgery detection (CMFD) using the Local Intensity Order Pattern (LIOP) to overcome the restrictions of existing CMFD techniques. The input image is first converted to a YCbCr color space and then split into Y, Cb, and Cr color channels. The LIOP features are then extracted from each color channel and all the features are combined. The feature vectors are ordered lexicographically and related features are detected by comparing the LIOP features. Although the LIOP feature has rarely been used in CMFD prior to this study, the success rate of the proposed method is high. In addition, since the channels are not correlated to each other in the YCbCr color space, each color channel is considered as a gray image, and the success rate is increased by combining the features extracted from each of the color channels. The proposed approach was assessed using the CoMoFoD and GRIP datasets. Experimental findings demonstrated that the suggested method was successful and displayed robustness in post-processing attacks.  相似文献   

20.
Availability of the powerful image editing softwares and advancement in digital cameras has given rise to large amount of manipulated images without any traces of tampering, generating a great demand for automatic forgery detection algorithms in order to determine its authenticity. When altering an image like copy–paste or splicing to conceal traces of tampering, it is often necessary to resize the pasted portion of the image. The resampling operation may highly likely disturb the underlying inconsistency of the pasted portion that can be used to detect the forgery. In this paper, an algorithm is presented that blindly detects global rescaling operation and estimate the rescaling factor based on the autocovariance sequence of zero-crossings of second difference of the tampered image. Experimental results using UCID and USC-SIPI database show the validity of the algorithm under different interpolation schemes. The technique is robust and successfully detects rescaling operation for images that have been subjected to various forms of attacks like JPEG compression and arbitrary cropping. As expected, some degradation in detection accuracy is observed as the JPEG quality factor decreased.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号