首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 140 毫秒
1.
图像内区域复制粘贴篡改鉴定   总被引:1,自引:0,他引:1  
区域复制粘贴篡改检测算法是以图像块匹配为基础的,然而传统的匹配算法计算量大,匹配速度慢,效率低下.针对现有的图像内区域复制粘贴检测算法计算量大,时间复杂度高的问题提出一种有效快速的检测与定位篡改区域算法.首先利用小波变换获取图像低频区域,然后对得到的图像低频部分进行分割,然后对分割后得到的每个图像块进行DCT变换,通过特征向量排序缩小匹配空间,最后通过经验阈值进行真伪鉴定,实验结果表明该算法过程中除掉图像冗余,减少检测块数,降低了时间复杂度,提高了检测效率.  相似文献   

2.
基于混沌置乱的分块自嵌入水印算法   总被引:18,自引:0,他引:18  
针对分块自嵌入水印算法的安全性和不能有效判断图像篡改块的问题,提出一种基于混沌置乱的分块自嵌入算法.该算法将由图像块生成的水印按空间位置生成二值水印图像,利用混沌序列对其置乱加密后嵌入到图像的最低位,认证时根据设定的阈值能有效定位图像内容被篡改的图像块.实验仿真和理论分析表明,该算法在保持原算法篡改恢复效果的基础上,无论是否有水印被改变,均能有效判断图像内容被篡改的图像块,且具有更高的安全性.  相似文献   

3.
结合医学图像特点,提出一种基于分块的灰度直方图平移水印算法.首先构建图像的灰度直方图,寻找峰值点和零值点;然后对图像分块,根据图像块的特点设定标志位;最后在指定的图像块内通过直方图变换来嵌入水印.实验结果表明,该算法不仅可以实现可逆水印,而且水印不可见性较好,嵌入容量较高,算法复杂度较低.该算法可以应用到信息隐藏、图像认证、隐秘传输等安全领域.  相似文献   

4.
叶天语 《通信学报》2013,34(3):148-156
利用子块区域分割思想和自嵌入技术提出了一种只利用攻击图像就能进行版权鉴别和内容认证的全盲多功能图像水印算法。将原始图像分割成不重叠的子块,对每个子块进行离散余弦变换,将每个子块离散余弦变换矩阵分成为区域1和区域2两部分,然后对区域1进行奇异值分解,通过判断奇异值均值的最高位数字奇偶性产生特征水印,然后通过调整区域2的2个离散余弦变换交流系数大小自嵌入特征水印,最后对每个子块进行逆离散余弦变换得到含水印图像。算法通过结合将区域1产生的特征水印自嵌入区域2和在区域2盲提取认证水印实现全盲检测和多功能。实验结果表明,算法既能实现版权保护又能实现内容认证,而且还具有区分恶意篡改和无意篡改的能力。  相似文献   

5.
针对数字图像检测中一类常见的复制-粘贴图像篡改,提出了一种基于小波变换和奇异值分解的检测算法。该算法利用小波变换提取图像的低频分量,对低频分量分块提取奇异值特征,然后将特征矢量进行按行字典排序,并且配合图像块的偏移位置信息,进行图像复制伪造区域的检测和定位。实验表明该算法大大减小了特征向量的维数,从而提高了相似块的匹配检测效率。为了更方便快捷的检测图像是否被恶意篡改,设计了简单明了的系统检测界面,只需载入待检测的图像并输入相应的参数就能进行检测,最后将检测结果返回给界面,而且系统完成了篡改检测算法的DSP硬件实现,该算法将有利于推动数字图像取证技术的理论研究与应用推广的发展。  相似文献   

6.
针对自然图像与高度仿真的计算机生成图像的合成图像篡改检测问题,提出在YCbCr颜色空间基于差分直方图和中心对称局部二进制模式提取图像块颜色和纹理特征的方法,通过训练后验概率支持向量机模型对待测图像块进行识别.在不重叠分块情况下先大致判断篡改区域,然后在该区域内逐像素分块判别,最终实现篡改区域精确定位.实验结果表明,对128 dpi×128 dpi图像块的识别率达到94.75%,高于现有方法;对合成图像篡改区域能够实现精确定位,且对旋转、缩放操作表现出较好的顽健性.  相似文献   

7.
张婷 《电视技术》2013,37(11):43-46
为了在检测结果中区分出原始区域和粘贴区域,提出一种基于尺度不变特征转换(SIFT)和重采样痕迹的图像盲检测算法。该算法首先将图像分成互不重叠块,利用SIFT算法找出每个块中的关键点,对关键点匹配;然后在每个块中以匹配关键点的中心为种子进行区域生长得到篡改区域;最后分析每个图像块的频谱图,计算出缩放因子,区分原始区域和复制区域。实验结果表明,该算法简便快捷,在能够对篡改区域进行准确定位的同时,并能区分原始区域和复制区域。  相似文献   

8.
自适应阈值及加权局部二值模式的人脸识别   总被引:1,自引:0,他引:1  
针对局部二值模式(LBP)和中心对称局部二值模式(CS-LBP)方法描述图像纹理特征时,阈值不能自动选取并且图像中不同子块的贡献也没有进行区分的问题,该文提出一种自适应阈值及加权的局部二值模式方法。首先,将图像进行分块,采用设定的自适应阈值提取每个子块的LBP或CS-LBP纹理直方图;然后,将各子图像的信息熵作为直方图的加权依据,对每个子块对应的直方图进行自适应加权,并将所有子块的直方图连接成最终的纹理特征;最后,通过快速计算图像均值加快了算法的计算速度。在人脸数据库上进行的实验证明,利用该文提出的方法提取纹理特征,并结合最近邻分类法可以得到较高的正确识别率。  相似文献   

9.
针对单像素篡改检测算法和分块篡改检测算法的缺点,提出了基于交叉划分的篡改检测与恢复算法.根据图像内容生成的2×2分块水印被两次嵌入到不同的对应块中,两次分块方式采用交叉划分方式.在水印嵌入时采用混沌映射序列对水印进行了加密.根据不同的分块位置进行两次篡改检测,并根据两次检测结果交叉后逐步求精,得到最终检测结果.图像恢复采用像素级恢复方式,先确定水印嵌入区域是否被篡改然后再根据两次嵌入的信息进行恢复.实验结果表明,该算法篡改检测定位精度可以达到像素级,恢复图像质量好,能够抵抗矢量攻击和噪声攻击.  相似文献   

10.
高铁杠  杨亮  宣妍  佟静 《电子与信息学报》2016,38(11):2787-2794
该文提出一种基于超像素和游程直方图的图像对比度修改检测取证算法。算法首先对图像进行超像素分割,并提取每个分割区域的游程直方图特征值,然后将不同方向的特征值进行融合,并进行归一化处理;再计算处理后的特征值数值突变量;最后将区域的数值突变量用支持向量机(SVM)进行分类识别。实验结果表明,和现有的一些算法相比,该文提出的算法计算复杂度低,在多种不同的测试数据库上都具有良好的识别性能。此外,在区域篡改检测实验中,该算法不仅可以定位出篡改区域,还能准确地描绘出篡改区域的轮廓形状。  相似文献   

11.
基于卷积神经网络的图像篡改检测算法利用卷积神经网络的学习能力可以实现不依赖于单一图像属性的图像篡改检测,弥补传统图像篡改检测方法依赖单一图像属性、适用度不高的缺陷。利用深层多神经元的单一网络结构的图像篡改检测算法虽然可以学习更高级的语义信息,但检测定位篡改区域效果并不理想。该文提出一种基于级联卷积神经网络的图像篡改检测算法,在卷积神经网络所展示出来的普遍特性的基础上进一步探究其深层次的特性,利用浅层稀神经元的级联网络结构弥补以往深层多神经元的单一网络结构在图像篡改检测中的缺陷。该文提出的检测算法由级联卷积神经网络和自适应筛选后处理两部分组成,级联卷积神经网络实现分级式的篡改区域定位,自适应筛选后处理对级联卷积神经网络的检测结果进行优化。通过实验对比,该文算法展示了较好的检测效果,且具有较高的鲁棒性。  相似文献   

12.
Understanding if a digital image is authentic or not, is a key purpose of image forensics. There are several different tampering attacks but, surely, one of the most common and immediate one is copy-move. A recent and effective approach for detecting copy-move forgeries is to use local visual features such as SIFT. In this kind of methods, SIFT matching is often followed by a clustering procedure to group keypoints that are spatially close. Often, this procedure could be unsatisfactory, in particular in those cases in which the copied patch contains pixels that are spatially very distant among them, and when the pasted area is near to the original source. In such cases, a better estimation of the cloned area is necessary in order to obtain an accurate forgery localization. In this paper a novel approach is presented for copy-move forgery detection and localization based on the J-Linkage algorithm, which performs a robust clustering in the space of the geometric transformation. Experimental results, carried out on different datasets, show that the proposed method outperforms other similar state-of-the-art techniques both in terms of copy-move forgery detection reliability and of precision in the manipulated patch localization.  相似文献   

13.
李子健  阮秋琦 《信号处理》2017,33(4):589-594
图像的复制-粘贴篡改检测是图像篡改检测领域中的重要组成部分。本文基于SIFT算法以及LPP的降维思想,提出了一种新的篡改检测算法。本文在SIFT算法的基础上,使用LPP算法对SIFT算法生成的特征点以及特征向量进行降维。使得传统SIFT算法在实际应用中特征点数目过多、特征向量维数过高等缺陷得到了解决。并使用凝聚型层次聚类算法对相似的特征点进行聚类,完成了对图像复制-粘贴篡改区域的检测。在文章的最后,本文对哥伦比亚大学复制-粘贴图像库里的100张图片进行实验。实验结果表明,不管篡改区域后处理方式是拉伸还是旋转,本文算法都能比传统的SIFT、SURF、PCA-SIFT等算法生成更少的特征点数目和更低的特征向量维度,使得检测效率以及检测正确率得到有效提升。   相似文献   

14.
夏蕾  周冰 《量子电子学报》2016,33(2):153-161
为了解决当前图像伪造定位技术因使用了CFA 插值,易形成颜色插值噪声而降低分辨率,导致其难以检测微小篡改区域,使其伪造检测精度较低等不足,本文提出了像素预测误差耦合似然映射的图像伪造检测算法。首先,分析颜色滤波阵列CFA插值模型,并从图像中提取绿色分量;随后,嵌入权重因子,构造预测误差及其权重方差计算模型;根据预测误差与贝叶斯理论,定义伪造特征统计模型,识别出趋于零的特征值;最后,根据特征统计模型,建立其似然率模型,输出伪造映射,完成检测。仿真结果表明:与当前图像伪造定位机制相比,本文算法拥有更强的鲁棒性,能识别定位出微小伪造像素;且拥有更高的AUC值与理想的ROC曲线。  相似文献   

15.
为了解决数字图像多重复制粘贴篡改检测问题,克服广义2近邻(g2NN)算法对匹配特征点漏检的缺点,该文提出逆序广义2近邻(Rg2NN)算法。在计算匹配特征点时,该算法采用逆序方式计算特征点之间的匹配关系,可以更加准确地计算出所有与待检测特征点相匹配的特征点。实验证明,Rg2NN算法比g2NN算法计算出来的匹配特征点更加准确,提高了g2NN算法对多重复制粘贴篡改图像的检测能力,当图像中的一块区域被复制后在多处粘贴,或多块区域被复制粘贴时可以准确计算出复制粘贴区域。  相似文献   

16.
With advancement of media editing software, even people who are not image processing experts can easily alter digital images. Various methods of digital image forgery exist, such as image splicing, copy-move forgery, and image retouching. The most common method of tampering with a digital image is copy-move forgery, in which a part of an image is duplicated and used to substitute another part of the same image at a different location. In this paper, we present an efficient and robust method to detect such artifacts. First, the tampered image is segmented into overlapping fixed-size blocks, and the Gabor filter is applied to each block. Thus, the image of Gabor magnitude represents each block. Secondly, statistical features are extracted from the histogram of orientated Gabor magnitude (HOGM) of overlapping blocks, and reduced features are generated for similarity measurement. Finally, feature vectors are sorted lexicographically, and duplicated image blocks are identified by finding similarity block pairs after suitable post-processing. To enhance the algorithm’s robustness, a few parameters are proposed for removing the wrong similar blocks. Experiment results demonstrate the ability of the proposed method to detect multiple examples of copy-move forgery and precisely locate the duplicated regions, even when dealing with images distorted by slight rotation and scaling, JPEG compression, blurring, and brightness adjustment.  相似文献   

17.
Copy-move forgery is one of the most common image tampering schemes, with the potential use for misleading the opinion of the general public. Keypoint-based detection methods exhibit remarkable performance in terms of computational cost and robustness. However, these methods are difficult to effectively deal with the cases when 1) forgery only involves small or smooth regions, 2) multiple clones are conducted or 3) duplicated regions undergo geometric transformations or signal corruptions. To overcome such limitations, we propose a fast and accurate copy-move forgery detection algorithm, based on complex-valued invariant features. First, dense and uniform keypoints are extracted from the whole image, even in small and smooth regions. Then, these keypoints are represented by robust and discriminative moment invariants, where a novel fast algorithm is designed especially for the computation of dense keypoint features. Next, an effective magnitude-phase hierarchical matching strategy is proposed for fast matching a massive number of keypoints while maintaining the accuracy. Finally, a reliable post-processing algorithm is developed, which can simultaneously reduce false negative rate and false positive rate. Extensive experimental results demonstrate the superior performance of our proposed scheme compared with existing state-of-the-art algorithms, with average pixel-level F-measure of 94.54% and average CPU-time of 36.25 s on four publicly available datasets.  相似文献   

18.
19.
Zhuzhu WANG 《通信学报》2019,40(4):171-178
Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号