首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
With advancement of media editing software, even people who are not image processing experts can easily alter digital images. Various methods of digital image forgery exist, such as image splicing, copy-move forgery, and image retouching. The most common method of tampering with a digital image is copy-move forgery, in which a part of an image is duplicated and used to substitute another part of the same image at a different location. In this paper, we present an efficient and robust method to detect such artifacts. First, the tampered image is segmented into overlapping fixed-size blocks, and the Gabor filter is applied to each block. Thus, the image of Gabor magnitude represents each block. Secondly, statistical features are extracted from the histogram of orientated Gabor magnitude (HOGM) of overlapping blocks, and reduced features are generated for similarity measurement. Finally, feature vectors are sorted lexicographically, and duplicated image blocks are identified by finding similarity block pairs after suitable post-processing. To enhance the algorithm’s robustness, a few parameters are proposed for removing the wrong similar blocks. Experiment results demonstrate the ability of the proposed method to detect multiple examples of copy-move forgery and precisely locate the duplicated regions, even when dealing with images distorted by slight rotation and scaling, JPEG compression, blurring, and brightness adjustment.  相似文献   

2.
Copy-move forgery (CMF) is a popular image manipulation technique that is simple and effective in creating forged illustrations. The bulk of CMF detection methods concentrate on common geometrical transformation attacks (e.g., rotation and scale) and post-processing attacks (e.g., Joint Photographic Experts Group (JPEG) compression and Gaussian noise addition). However, geometrical transformation that involves reflection attacks has not yet been highlighted in the literature. As the threats of reflection attack are inevitable, there is an urgent need to study CMF detection methods that are robust against this type of attack. In this study, we investigated common geometrical transformation attacks and reflection-based attacks. Also, we suggested a robust CMF detection method, called SIFT-Symmetry, that innovatively combines the Scale Invariant Feature Transform (SIFT)-based CMF detection method with symmetry-based matching. We evaluated the SIFT-Symmetry with three established methods that are based on SIFT, multi-scale analysis, and patch matching using two new datasets that cover simple transformation and reflection-based attacks. The results show that the F-score of the SIFT-Symmetry method surpassed the average 80% value for all geometrical transformation cases, including simple transformation and reflection-based attacks, except for the reflection with rotation case which had an average F-score of 65.3%. The results therefore show that the SIFT-Symmetry method gives better performance compared to the other existing methods.  相似文献   

3.
针对能够用于图像篡改的Seam-Carving技术,提出了一种基于扩展的马尔科夫特征的Seam-Carving篡改识别算法。该算法充分考虑了Seam-Carving操作导致的图像频域特征的变化,将传统的利用马尔科夫转移概率矩阵求取的图像特征和基于扩展的马尔科夫转移概率特征进行融合,而后利用支持向量机进行分类训练,从而达到有效识别基于Seam-Carving的图像篡改。实验结果表明,提出的方案性能优于传统的基于马尔科夫转移矩阵的特征选择方法以及现有的一些该类图像篡改检测方法。  相似文献   

4.
Copy-move forgery detection (CMFD) is the process of determining the presence of copied areas in an image. CMFD approaches are mainly classified into two groups: keypoint-based and block-based techniques. In this paper, a new CMFD approach is proposed on the basis of both block and keypoint based approaches. Initially, the forged image is partitioned into non overlapped segments utilizing adaptive watershed segmentation, wherein adaptive H-minima transform is used for extracting the markers. Also, an Adaptive Galactic Swarm Optimization (AGSO) algorithm is used to select optimal gap parameter while selecting the markers for reducing the undesired regional minima, which can increase the segmentation performance. After that, the features from every segment are extracted as segment features (SF) using Hybrid Wavelet Hadamard Transform (HWHT). Then, feature matching is performed using adaptive thresholding. The false matches or outliers can be removed with the help of Random Sample Consensus (RANSAC) algorithm. Finally, the Forgery Region Extraction Algorithm (FREA) is utilized for detecting the copied portion from the host image. Experimental results indicate that the proposed scheme find out image forgery region with Precision = 92.45%; Recall = 93.67% and F1 = 92.75% on MICC-F600 dataset and Precision = 94.52%; Recall = 95.32% and F1 = 93.56% on Bench mark dataset at pixel level. Also, it outperforms the existing approaches when the image undergone certain geometrical transformation and image degradation.  相似文献   

5.
夏蕾  周冰 《量子电子学报》2016,33(2):153-161
为了解决当前图像伪造定位技术因使用了CFA 插值,易形成颜色插值噪声而降低分辨率,导致其难以检测微小篡改区域,使其伪造检测精度较低等不足,本文提出了像素预测误差耦合似然映射的图像伪造检测算法。首先,分析颜色滤波阵列CFA插值模型,并从图像中提取绿色分量;随后,嵌入权重因子,构造预测误差及其权重方差计算模型;根据预测误差与贝叶斯理论,定义伪造特征统计模型,识别出趋于零的特征值;最后,根据特征统计模型,建立其似然率模型,输出伪造映射,完成检测。仿真结果表明:与当前图像伪造定位机制相比,本文算法拥有更强的鲁棒性,能识别定位出微小伪造像素;且拥有更高的AUC值与理想的ROC曲线。  相似文献   

6.
7.
8.
As a popular image manipulation technique, object removal can be achieved by image-inpainting without any noticeable traces, which poses huge challenges to passive image forensics. The existing detection approach utilizes full search for block matching, resulting in high computational complexity. This paper presents an efficient forgery detection algorithm for object removal by exemplar-based inpainting, which integrates central pixel mapping (CPM), greatest zero-connectivity component labeling (GZCL) and fragment splicing detection (FSD). CPM speeds up suspicious block search by efficiently matching those blocks with similar hash values and then finding the suspicious pairs. To improve the detection precision, GZCL is used to mark the tampered pixels in suspected block pairs. FSD is adopted to distinguish and locate tampered regions from its best-match regions. Experimental results show that the proposed algorithm can reduce up to 90% of the processing time and maintain a detection precision above 85% under different kinds of object-removed images.  相似文献   

9.
Copy-move forgery is one of the most common image tampering schemes, with the potential use for misleading the opinion of the general public. Keypoint-based detection methods exhibit remarkable performance in terms of computational cost and robustness. However, these methods are difficult to effectively deal with the cases when 1) forgery only involves small or smooth regions, 2) multiple clones are conducted or 3) duplicated regions undergo geometric transformations or signal corruptions. To overcome such limitations, we propose a fast and accurate copy-move forgery detection algorithm, based on complex-valued invariant features. First, dense and uniform keypoints are extracted from the whole image, even in small and smooth regions. Then, these keypoints are represented by robust and discriminative moment invariants, where a novel fast algorithm is designed especially for the computation of dense keypoint features. Next, an effective magnitude-phase hierarchical matching strategy is proposed for fast matching a massive number of keypoints while maintaining the accuracy. Finally, a reliable post-processing algorithm is developed, which can simultaneously reduce false negative rate and false positive rate. Extensive experimental results demonstrate the superior performance of our proposed scheme compared with existing state-of-the-art algorithms, with average pixel-level F-measure of 94.54% and average CPU-time of 36.25 s on four publicly available datasets.  相似文献   

10.
Zhuzhu WANG 《通信学报》2019,40(4):171-178
Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.  相似文献   

11.
图像拼接是最常用的图像篡改操作之一,针对篡改图像噪声水平不一致性的现象,本文提出了一种基于统计噪声水平分析的图像拼接检测方法。首先,将检测图像分割成大小相同的非重叠图像块,然后,利用一种非参数估计算法来估计每个图像块的噪声值,并且采取聚类法对图像块的噪声值进行聚类,聚类结果分为可疑部分和非可疑部分两大类。最后,通过一个由粗到细的两阶段策略对篡改区域进行定位。哥伦比亚未压缩图像拼接检测评估图像库的实验结果表明,本文方法能够准确地估计图像块的噪声和定位出拼接区域,性能优于现有方法。  相似文献   

12.
许灵龙  张玉金  吴云 《光电子.激光》2023,34(12):1271-1278
对JPEG(joint photographic experts group)图像实施篡改往往会产生双重JPEG(double JPEG,DJPE) 压缩痕迹,分析该痕迹有助于揭示图像压缩历史并实现篡改区域定位。现有算法在图像尺寸较小和质量因子(quality factor,QF) 较低的时候性能不佳,对两个QF的组合情况存在限制。本文提出了一种端到端的混合QF双重JPEG压缩图像取证网络,命名为DJPEGNet。首先,使用预处理层从图像头文件中提取表征压缩历史信息的量化表 (quantization table,Qtable) 特征,将图像从空域转换至DCT(discrete cosine transform)域构造统计直方图特征。然后,将两个特征输入到由深度可分离卷积和残差结构堆叠而成的主体结构,输出二分类结果。最后,使用滑动窗口算法自动定位篡改区域并绘制概率分布图。实验结果表明,在使用不同Qtable集生成的小尺寸数据集上,DJPEGNet所有指标均优于现有最先进的算法,其中ACC提高了1.78%,TPR提升了2.00%,TNR提升了1.60%。  相似文献   

13.
夏涛  黄俊  徐太秀 《电讯技术》2023,63(8):1228-1236
针对目前的图像篡改数据集中缺少同时包含多种篡改操作的单张图像的问题,构建了包含多种图像篡改手段的综合数据集(MTO Dataset),每张图片包含复制移动、拼接和移除中的2种或3种篡改操作。针对多篡改检测,提出了一种基于改进CenterNet的图像多篡改检测模型,将RGB图像和经过隐写分析得到的噪声特征图作为特征提取网络的输入,在特征提取网络ResNet-50的每一层卷积前加入门控通道注意力转换单元以促进特征通道间关系。为得到更具辨别性的特征,通过改进后的注意力机制自适应学习并调节特征权重,最后使用改进的损失函数优化边框预测的准确度。实验结果证明,与当前先进模型DETR、EfficientDet和VarifocalNet相比,该模型的F1分数提升0.4%~7.4%,检测速率提高1.32~3.06倍。  相似文献   

14.
15.
Surveillance cameras are widely used to provide protection and security; also their videos are used as strong evidences in the courts. Through the availability of video editing tools, it has become easy to distort these evidences. Sometimes, to hide the traces of forgery, some post-processing operations are performed after editing. Hence, the authenticity and integrity of surveillance videos have become urgent to scientifically validate. In this paper, we propose inter-frame forgeries (frame deletion, frame insertion, and frame duplication) detection system using 2D convolution neural network (2D-CNN) of spatiotemporal information and fusion for deep automatically feature extraction; Gaussian RBF multi-class support vector machine (RBF-MSVM) is used for classification process. The experimental results show that the efficiency of the proposed system for detecting all inter-frame forgeries, even when the forged videos have undergone additional post-processing operations such as Gaussian noise, Gaussian blurring, brightness modifications and compression.  相似文献   

16.
Due to the wide diffusion of JPEG coding standard, the image forensic community has devoted significant attention to the development of double JPEG (DJPEG) compression detectors through the years. The ability of detecting whether an image has been compressed twice provides paramount information toward image authenticity assessment. Given the trend recently gained by convolutional neural networks (CNN) in many computer vision tasks, in this paper we propose to use CNNs for aligned and non-aligned double JPEG compression detection. In particular, we explore the capability of CNNs to capture DJPEG artifacts directly from images. Results show that the proposed CNN-based detectors achieve good performance even with small size images (i.e., 64 × 64), outperforming state-of-the-art solutions, especially in the non-aligned case. Besides, good results are also achieved in the commonly-recognized challenging case in which the first quality factor is larger than the second one.  相似文献   

17.
本文针对分布式MIMO雷达系统,在站间大间隔配置获得的空间分集增益的基础上,提出了一种目标位置估计与检测的联合算法。与以往距离门检测不同的是,这里通过所定义的目标假设框架下进行联合估计与检测。通过理论分析证明,本文所提出的位置估计与检测联合算法在检测性能上要优于距离门检测法,且漏检概率与信噪比SNR成反比。仿真实验也验证了算法的有效性。  相似文献   

18.
针对自然图像与高度仿真的计算机生成图像的合成图像篡改检测问题,提出在YCbCr颜色空间基于差分直方图和中心对称局部二进制模式提取图像块颜色和纹理特征的方法,通过训练后验概率支持向量机模型对待测图像块进行识别.在不重叠分块情况下先大致判断篡改区域,然后在该区域内逐像素分块判别,最终实现篡改区域精确定位.实验结果表明,对128 dpi×128 dpi图像块的识别率达到94.75%,高于现有方法;对合成图像篡改区域能够实现精确定位,且对旋转、缩放操作表现出较好的顽健性.  相似文献   

19.
李晓梅 《黑龙江电子技术》2013,(10):103-105,109
提出了一种基于残留噪声相关性的视频篡改检测算法.该算法利用双树复小波域局部维纳滤波的方法获取视频每帧的残留噪声,相邻两残留噪声帧对应块做相关性运算,根据相关系数的统计特性建立累积分布函数模型,设定最佳阈值,定位篡改区域.所提出的提取残留噪声的方法能更好地保留图像细节,减少残留噪声中的场景污迹.实验结果验证了该算法检测篡改视频的准确率更高.  相似文献   

20.
许亚杰  韦海成  肖明霞 《液晶与显示》2018,33(12):1033-1039
随着我国交通服务行业的发展,火车票票面信息的自动化识别已经成为提升铁路服务效率的重要手段,针对票面信息识别系统中获取火车票方向不一致的问题,本文提出了一种基于特征区域聚类下Radon变换的方向检测算法。首先,算法通过k均值聚类对火车票图像进行聚类分块,消除复杂背景的干扰,提取到火车票信息区域;然后,通过数字形态学闭运算结合图像块操作保留能够反映火车票位置信息的图像方向特征区域;最后,利用改进的Radon变换检测出火车票的倾斜角度。实验结果表明:该算法的矫正正确率为97.8%,矫正的时间为16.79s;该算法能够消除图像复杂背景、方向特征区域领域像素点对方向检测的干扰,能够对全角度任意方向的火车票图像进行方向检测,具有较高的实用价值。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号