首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Copy-move forgery is one of the most common types of image forgeries, where a region from one part of an image is copied and pasted onto another part, thereby concealing the image content in the latter region. Keypoint based copy-move forgery detection approaches extract image feature points and use local visual features, rather than image blocks, to identify duplicated regions. Keypoint based approaches exhibit remarkable performance with respect to computational cost, memory requirement, and robustness. But unfortunately, they usually do not work well if smooth background areas are used to hide small objects, as image keypoints cannot be extracted effectively from those areas. It is a challenging work to design a keypoint-based method for detecting forgeries involving small smooth regions. In this paper, we propose a new keypoint-based copy-move forgery detection for small smooth regions. Firstly, the original tampered image is segmented into nonoverlapping and irregular superpixels, and the superpixels are classified into smooth, texture and strong texture based on local information entropy. Secondly, the stable image keypoints are extracted from each superpixel, including smooth, texture and strong texture ones, by utilizing the superpixel content based adaptive feature points detector. Thirdly, the local visual features, namely exponent moments magnitudes, are constructed for each image keypoint, and the best bin first and reversed generalized 2 nearest-neighbor algorithm are utilized to find rapidly the matching image keypoints. Finally, the falsely matched image keypoints are removed by customizing the random sample consensus, and the duplicated regions are localized by using zero mean normalized cross-correlation measure. Extensive experimental results show that the newly proposed scheme can achieve much better detection results for copy-move forgery images under various challenging conditions, such as geometric transforms, JPEG compression, and additive white Gaussian noise, compared with the existing state-of-the-art copy-move forgery detection methods.  相似文献   

2.
针对图像复制粘贴篡改检测中算法时间复杂度过高和定位区域不完整的问题,提出一种基于深度特征提取和离散余弦变换的图像复制粘贴篡改检测算法。首先,融合图像颜色和纹理信息获得四通道图像,计算自适应特征提取阈值,并通过基于全卷积神经网络的特征检测器提取图像深度特征;其次,通过离散余弦变换提取块特征进行初步匹配,再利用点特征向量消除误匹配;最后,通过卷积运算精确定位篡改区域。通过在公共数据集上进行验证,充分展示了该算法在检测效率和定位区域完整性方面的优势。  相似文献   

3.
刘美红  徐蔚鸿 《计算机应用》2011,31(8):2236-2239
现在大多数图像“复制-粘贴”篡改检测算法对于区域复制后的进一步混合处理不能进行有效检测。为此提出了一种新的基于分形和统计的检测方法。首先将图像分块并提取每块的特征向量,该特征向量由分形维数和三个统计量组成;接着对所有特征向量进行字典排序;最后,利用图像块的位置信息和欧氏距离定位篡改区域。此方法不仅能够检测传统的复制-粘贴型篡改,而且还能够检测经过旋转、翻转以及旋转和翻转混合的多区域复制-粘贴型篡改;此方法也能够抵抗高斯模糊、对比度调整和亮度调整等攻击。实验结果表明了该方法的有效性。  相似文献   

4.
Copy-move forgery as one of popular methods is widely used to tamper digital images. Passive authentication is extensively used to detect the copy-move forgery images. This paper proposes a passive authentication scheme for copy-move forgery based on the discrete cosine transform (DCT) and the package clustering algorithm. The copy regions and paste regions can be automatically detected in doctored digital images. This scheme works by first applying the DCT to small fixed image blocks to obtain their features and the size of feature vectors are reduced. Moreover, the package clustering algorithm is applied to replace the general lexicographic order technologies to improve the detection precision. The similar blocks can be found by comparing the feature vectors in each package. The experimental results represent that the proposed scheme can locate irregular and meaningful tampered regions and multiply duplicated regions in a suspicious image. The duplicated regions can also be located in digital images that are distorted by adding white Gaussian noise, Gaussian blurring and their mixed operations.  相似文献   

5.
检测整幅窜改图像的方法增加了许多非必要的计算量,为了降低计算复杂度和进一步提高检测精确率,提出了一种基于改进显著图和局部特征匹配的copy-move窜改检测方法。首先,结合图像梯度改进显著图,分离出包含图像高纹理信息的局部显著区域;其次,只对该局部区域采用SIFT(scale invariant feature transform)算法提取特征点;然后,对显著性小的图像采用密度聚类和二阶段匹配策略,对显著性大的图像采用超像素分割和显著块特征匹配的策略;最后,结合PSNR和形态学操作来定位窜改区域。在两个公开数据集上进行实验,该方法的平均检测时间小于10 s,平均检测精确率大于97%,均优于所对比的方法。实验结果表明,该方法能够大幅缩减检测时间、有效提高检测精确率,并且对几何变换和后处理操作也都具有较好的鲁棒性。  相似文献   

6.
提出一种利用Harris特征点和环形均值描述的图像区域复制篡改检测算法。首先对图像进行自适应维纳滤波,并利用Harris算子提取图像的特征点,然后通过对每个特征点的环形邻域进行均值描述生成特征向量矩阵,并采用字典排序和阈值化处理进行相似性匹配,从而确定候选匹配点,最后利用RANSAC算法剔除错误的匹配点,实现复制和篡改区域的标识定位。实验结果表明,算法对于复制区域的旋转和翻转变换具有较强的鲁棒性,并且可以有效抵抗常见的后处理攻击,包括高斯模糊、加性高斯白噪声、JPEG压缩以及它们的混合操作,尤其能够抵抗非显著视觉结构的平坦区域和小区域的复制、粘贴、篡改操作。  相似文献   

7.
目的 为了解决现有图像区域复制篡改检测算法只能识别图像中成对的相似区域而不能准确定位篡改区域的问题,提出一种基于JPEG(joint photographic experts group)图像双重压缩偏移量估计的篡改区域自动检测定位方法。方法 首先利用尺度不变特征变换(SIFT)算法提取图像的特征点和相应的特征向量,并采用最近邻算法对特征向量进行初步匹配,接下来结合特征点的色调饱和度(HSI)彩色特征进行优化匹配,消除彩色信息不一致引发的误匹配;然后利用随机样本一致性(RANSAC)算法对匹配对之间的仿射变换参数进行估计并消除错配,通过构建区域相关图确定完整的复制粘贴区域;最后根据对复制粘贴区域分别估计的JPEG双重压缩偏移量区分复制区域和篡改区域。结果 与经典SIFT和SURF(speeded up robust features)的检测方法相比,本文方法在实现较高检测率的同时,有效降低了检测虚警率。当第2次JPEG压缩的质量因子大于第1次时,篡改区域的检出率可以达到96%以上。 结论 本文方法可以有效定位JPEG图像的区域复制篡改区域,并且对复制区域的几何变换以及常见的后处理操作具有较强的鲁棒性。  相似文献   

8.
Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is copy-move digital image forgery, which involves copying one part of the image onto another area of the same image. Various methods have been proposed to detect copy-move forgery that uses different types of transformations. The goal of this paper is to determine which copy-move forgery detection methods are best for different image attributes such as JPEG compression, scaling, rotation. The advantages and drawbacks of each method are also highlighted. Thus, the current state-of-the-art image forgery detection techniques are discussed along with their advantages and drawbacks.  相似文献   

9.
目前大多数时域视频帧复制粘贴篡改检测算法都是针对至少20帧以上的视频子序列的复制粘贴篡改,而对单帧复制粘贴篡改无法判断。而根据人眼视觉感知的特性,修改视频内容需要至少15帧以上的帧操作,因此篡改帧想通过单帧复制粘贴篡改来达到想要的效果,必须进行连续多次粘贴操作。为了检测这种篡改方式,针对性地提出了一种基于量化离散余弦变换(DCT)系数的视频单帧连续多次复制-粘贴篡改检测算法。首先,将视频转换为图像,采用量化后的DCT系数作为视频帧图像特征向量,并通过计算巴氏(Bhattacharyya)系数来衡量两相邻帧帧间相似度;再设定阈值来判断两相邻帧帧间相似度是否有异常,最后根据出现相似度异常的帧是否连续,以及连续出现的帧数来判断视频是否经过篡改,并定位篡改位置。实验结果表明,所提算法对不同场景的视频都能检测,不仅检测速度快,而且不受再压缩因素影响,算法的正确率高、漏检率低。  相似文献   

10.
采用圆谐-傅里叶矩的图像区域复制粘贴篡改检测   总被引:1,自引:1,他引:0       下载免费PDF全文
现有检测方法大多对图像区域复制粘贴篡改的后处理操作鲁棒性不高.针对这种篡改技术,提出一种新的基于圆谐-傅里叶矩的区域篡改检测算法.首先将图像分为重叠的小块;然后提取每个图像块的圆谐-傅里叶矩作为特征向量并对其进行排序;最后根据阈值确定相似块,利用位移矢量阈值去除错误相似块以定位篡改区域.实验结果表明,该算法能有效抵抗噪声、高斯模糊、旋转等图像后处理操作,且与基于HU矩的方法相比有更好的检测结果.  相似文献   

11.
颜普  苏亮亮  邵慧  吴东升 《计算机应用》2019,39(9):2707-2711
图像伪造检测是目前数字图像处理领域中的一个研究热点,其中复制-粘贴是最常用的伪造手段。由于伪造区域在粘贴前会被进行一定的尺度、旋转、JPEG压缩、添加噪声等操作,这使得检测伪造区域具有一定的挑战性。针对图像复制-粘贴伪造技术,提出一种基于多支持区域局部亮度序模式(LIOP)的图像伪造检测算法。首先,利用最大稳定极值区域(MSER)算法提取具有仿射不变性的区域作为支持区域;其次,利用非抽样Contourlet变换得到不同尺度、不同分辨率和不同方向的多个支持区域;然后,在每个支持区域上提取同时具有旋转不变性和单调亮度不变性的LIOP描述子,并利用双向距离比值法实现特征初匹配;接着,采用空间聚类将匹配的特征进行归类,进而用随机抽样一致性(RANSAC)算法对每个归类进行几何变换参数估计;最后,使用必要的后处理等操作来检测出伪造区域。实验表明,提出的算法具有较高的伪造检测精度与可信度。  相似文献   

12.
针对传统图像复制粘贴篡改检测方法中划分子块的数目过大导致算法时间复杂度过高且抵抗几何变换能力较弱的问题,提出一种基于超像素形状特征的图像复制粘贴篡改检测算法.首先提出基于小波对比度自适应划分超像素的方法分割图像并提取稳定的特征点;然后提出新颖的形状编码方式提取超像素形状特征,并与特征点融合,估计可疑伪造区域;最后对可疑...  相似文献   

13.
针对图像中复制-移动和拼接形式的图像伪造检测,提出一种基于离散小波变换(DWT)和形态学滤波的图像伪造检测方法。首先,将图像转换为灰度图,通过应用DWT获得LH、HL和HH子带。然后,通过阈值判断来获得伪造图像区域的边缘,并通过形态学滤波来连接边缘使其清晰化。最后,提取伪造区域的SIFT特征,并通过相似性检测来寻找图像中与伪造区域相似的区域,以此来确定伪造类型。实验结果表明,该方法能够准确检测出伪造区域和伪造类型。  相似文献   

14.
Image forgery detection remains a challenging problem. For the most common copy-move forgery detection, the robustness and accuracy of existing methods can still be further improved. To the best of our knowledge, we are the first to propose an image copy-move forgery passive detection method by combining the improved pulse coupled neural network (PCNN) and the self-selected sub-images. Our method has the following steps: First, contour detection is performed on the input color image, and bounding boxes are drawn to frame the contours to form suspected forgery sub-images. Second, by improving PCNN to perform feature extraction of sub-images, the feature invariance of rotation, scaling, noise adding, and so on can be achieved. Finally, the dual feature matching is used to match the features and locate the forgery regions. What's more, the self-selected sub-images can quickly obtain suspected forgery sub-images and lessen the workload of feature extraction, and the improved PCNN can extract image features with high robustness. Through experiments on the standard image forgery datasets CoMoFoD and CASIA, it is effectively verified that the robustness score and accuracy of proposed method are much higher than the current best method, which is a more efficient image copy-move forgery passive detection method.  相似文献   

15.

A copy-move forgery is a passive tampering wherein one or more regions have been copied and pasted within the same image. Often, geometric transformations, including scale, rotation, and rotation+scale are applied to the forged areas to conceal the counterfeits to the copy-move forgery detection methods. Recently, copy-move forgery detection using image blobs have been used to tackle the limitation of the existing detection methods. However, the main limitation of blobs-based copy-move forgery detection methods is the inability to perform the geometric transformation estimation. To tackle the above-mentioned limitation, this article presents a technique that detects copy-move forgery and estimates the geometric transformation parameters between the authentic region and its duplicate using image blobs and scale-rotation invariant keypoints. The proposed algorithm involves the following steps: image blobs are found in the image being analyzed; scale-rotation invariant features are extracted; the keypoints that are located within the same blob are identified; feature matching is performed between keypoints that are located within different blobs to find similar features; finally, the blobs with matched keypoints are post-processed and a 2D affine transformations is computed to estimate the geometric transformation parameters. Our technique is flexible and can easily take in various scale-rotation invariant keypoints including AKAZE, ORB, BRISK, SURF, and SIFT to enhance the effectiveness. The proposed algorithm is implemented and evaluated on images forged with copy-move regions combined with geometric transformation from standard datasets. The experimental results indicate that the new algorithm is effective for geometric transformation parameters estimation.

  相似文献   

16.
现有的篡改检测方法中特征点提取不充分会导致篡改检测精度不高,特征点描述符识别率差,针对该问题提出一种基于颜色矩的区域划分和四元数Hu矩的彩色图像复制粘贴篡改检测算法。首先,使用自适应形态重建算法对图像进行超像素分割,通过密度聚类算法对图像自适应划分区域;其次,提出一种关键点提取方法得到均匀的SIFT特征点;然后,在一种新颖的彩色图像四元数表示方法中构建局部高斯金字塔提取Hu矩特征;最后,利用2NN进行特征匹配后,结合Delaunay三角形算法定位出复制粘贴篡改区域。在公共数据集上的实验结果表明,该算法可以更有效地定位篡改区域。  相似文献   

17.
A copy-move forgery detection scheme by using multi-scale feature extraction and adaptive matching is proposed in this paper. First, the host image is segmented into the non-overlapping patches of irregular shape in different scales. Then, Scale Invariant Feature Transform is applied to extract feature points from all patches, to generate the multi-scale features. An Adaptive Patch Matching algorithm is subsequently proposed for finding the matching that indicate the suspicious forged regions in each scale. Finally, the suspicious regions in all scales are merged to generate the detected forgery regions in the proposed Matched Keypoints Merging algorithm. Experimental results show that the proposed scheme performs much better than the existing state-of-the-art copy-move forgery detection algorithms, even under various challenging conditions, including the geometric transforms, such as scaling and rotation, and the common signal processing, such as JPEG compression and noise addition; in addition, the special cases such as the multiple copies and the down-sampling are also evaluated, the results indicate the very good performance of the proposed scheme.  相似文献   

18.

A novel robust image hashing scheme based on quaternion Zernike moments (QZMs) and the scale invariant feature transform (SIFT) is proposed for image authentication. The proposed method can locate tampered region and detect the nature of the modification, including object insertion, removal, replacement, copy-move and cut-to-paste operations. QZMs considered as global features are used for image authentication while SIFT key-point features provide image forgery localization and classification. Proposed approach performance were evaluated on the color images database of UCID and compared with several recent and efficient methods. These experiments show that the proposed scheme provides a short hash length that is robust to most common image content-preserving manipulations like large angle rotations, and allows us to correctly locating forged image regions as well as detecting types of forgery image.

  相似文献   

19.
赵洁  武斌  张艳 《计算机应用研究》2013,30(9):2791-2794
提出了一种基于兴趣点检测和特征匹配的图像复制粘贴窜改检测方法。首先采用Harris算子检测图像中的角点作为兴趣点, 然后提取以兴趣点为中心的邻域内空域的五个均值特征形成特征向量, 最后记录相等位移矢量的发生频率并通过阈值化处理得到匹配的兴趣点, 从而标志复制粘贴区域。仿真实验表明, 该算法不仅可以有效检测多区域复制粘贴窜改操作, 而且能够有效抵抗多种窜改后处理操作, 包括加性高斯白噪声, JPEG压缩, 对比度、亮度和曝光度调整以及JPEG压缩和加噪的混合操作。  相似文献   

20.
图像伪造检测是数字取证领域一个发展迅速的研究方向。复制一移动是最常见的图像伪造方式之一,其目的是通过隐藏或克隆对象来创建新的图像内容场景。复制一移动伪造检测的主要依据是图像中存在较大面积的相同或非常相似的区域对。针对以往检测方法对图像中存在同质纹理或均匀区域检测困难以及相关参数阂值选择不确定等现状,提出一种基于自适应阂值的图像复制一移动伪造检测算法,该算法不但使相关阂值的选择和估计更合理,而且能够自动识别和定位伪造区域。通过在包含同质或均匀区域的彩色伪造图像中的实验,进一步验证了本算法的有效性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号