首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
针对同幅图像的区域复制-粘贴篡改,提出一种新的检测方法。该方法对待检测图像先用离散小波变换进行预处理,然后用截尾奇异值方法选取图像特征,对选取图像特征选择欧氏距离作为图像特征的相似性度量,并配合契比雪夫距离进行篡改定位。实验结果表明该算法能够有效检测复制粘贴篡改,并对复制区域旋转操作具有较强的鲁棒性。  相似文献   

2.
将运动对象从视频中删除是视频篡改的一种常见 形式,针对删除视频运动对象这一篡改操作, 提出了基于视频修复痕迹的检测方法。运动对象删除后需采用数字视频修复技术填补由于移 除操作产生的 黑洞,使得篡改后的视频遗留有修复痕迹;通过深入分析篡改视频中遗留的修复痕迹,对篡 改后未压缩视 频采用对称帧差法检测运动对象删除区域;对压缩后的篡改视频从运动光流场的角度,由视 频帧光流方向 的不一致性进行检测。实验结果表明,本文方法不依赖于原始视频,计算复杂度低,能够有 效检测运动对象删除操作,并在空时域上对篡改区域进行定位。  相似文献   

3.
基于压缩传感的半脆弱水印的视频篡改检测算法   总被引:1,自引:0,他引:1  
现针对目前的视频水印算法在篡改检测方面存在不足,提出一种基于压缩传感的半脆弱水印的视频篡改检测算法.通过压缩传感算法提取I帧的图像特征,生成半脆弱的内容认证水印,嵌入到I帧图像的中高频系数中,实现帧内篡改检测.通过对P帧的序号进行哈希运算,生成完整性水印,嵌入到P帧的运动矢量中,实现帧间篡改检测.仿真实验表明,算法对视...  相似文献   

4.
图像的复制-粘贴篡改是常见的图像篡改方法之一。现有基于SIFT特征的算法能够有效地检测复制-粘贴篡改,但由于SIFT特征本身不能抵抗翻转,因此,这些方法不能检测出具有翻转操作的复制-粘贴篡改。基于SIFT特征,提出了一种抗翻转的图像复制-粘贴篡改检测算法。通过在检测框架中引入图像预处理操作,不仅能够有效地检测出存在翻转的复制-粘贴篡改块,而且能够抵抗旋转、缩放等图像处理行为。同时,在SIFT关键点匹配环节提出了ng2NN匹配方法,提高了算法的检测效果。实验结果证明了所提出算法在抵抗翻转、缩放、旋转以及检测多重复制-粘贴篡改等方面的有效性。  相似文献   

5.
基于隔帧差分区域光流法的运动目标检测   总被引:1,自引:0,他引:1  
邓辉斌  熊邦书  欧巧凤 《半导体光电》2009,30(2):300-304,307
结合运动目标检测帧差法运算速度快和光流法动目标检测准确度高的特点,提出了一种基于隔帧差分区域光流计算的运动目标检测方法.该方法通过隔帧帧差方法先提取运动区域,然后只对运动区域进行光流计算,减少了计算区域,提高了速度;在光流场计算时,对梯度较大和较小的点处,分别采用基本等式约束和光滑准则约束的方法,提高了动目标检测的准确性,另外在光流迭代运算中增加惯性项,减少了迭代次数,进一步提高了检测速度.实验结果验证了该方法的有效性.  相似文献   

6.
视频监控系统在日常生活中日益普及,为了实现监控视频的智能分析,利用背景差分法检测并提取关注的前景目标,再结合光流算法分析目标的运动方向和强度,为了提升视频分析效率,先利用帧差欧几里得距离法计算帧与帧之间的相似度,提取视频序列的关键帧,并提出了一种运算量小检测效果较好的基于图像灰度化的背景差分法进一步提取关键帧的前景目标,最后用光流法计算得到目标的光流矢量和强度信息,为监控视频的异常判断提供依据。  相似文献   

7.
提出一种在区域复制图像篡改检测中的块匹配检测的效率提高方法。将待匹配的图像分块进行简单分类,被划分为不同类的分块之间具有明显的区别,根据不同分类将所有的图像分块划分为多个分块队列。在分块相似度匹配的过程中,只有分类一致或接近的分块队列才进行匹配计算,避免了具有明显区别的图像分块匹配过程,从而大量降低分块匹配的次数,提高算法运行效率。实验结果表明,提出的改进方法与原算法的检测结果基本一致,而算法运行时间有较大幅度减少。  相似文献   

8.
《信息技术》2016,(11):1-4
随着视频编辑软件的普及使用,视频篡改变得越来越容易。文中针对视频帧间篡改行为,分析讨论了视频帧中宏块数量在视频篡改情况下的变化规律,提出了基于视频P、B帧宏块数量变化(MBNV)特征的视频篡改检测算法,与现有算法不同的是:文中算法考虑了编码中常见的B帧在经历帧间篡改操作后的异常特性。算法通过对异常帧的判断提取,利用I帧的周期性特性,判断视频是否经过篡改,并对视频的篡改手段进行鉴别。实验证明,文中提出的方法对不同的视频编码方式和不同的比特率都有不错的检测效果。  相似文献   

9.
视频图像序列运动目标检测是计算机视觉研究的重要组成部分,广泛应用于交通、医学等领域。文章主要论述了常用的三种检测方法:帧间差分法、背景减法、光流法。  相似文献   

10.
吕颖达  申铉京  陈海鹏 《电子学报》2016,44(11):2592-2599
提出一种具有几何不变性的复制-粘贴盲鉴别算法.该算法首先定义灰度级别和灰度结构,根据像素的灰度级别划分图像块,再结合其灰度结构定位可疑块对;然后对每一组可疑块对进行基于对数极坐标变换的相位相关,并粗略定位篡改区域;最后,精确计算篡改区域之间的旋转角度、缩放尺度及平移量,从而定位复制-粘贴区域.实验结果表明,该算法不但具有旋转、缩放等几何不变性,而且具有较高检测效率及较强的鲁棒性.  相似文献   

11.
介绍了STV5730A的原理、特点、并介绍了其在红外电视系统中硬件设计与软件实现。STV5730A是用于视频字符显示的专用集成电路,可广泛用于录像机、付费电视系统以及卫星接收机中的视频字符叠加设计。  相似文献   

12.
Zhang  C. Su  Y. 《Electronics letters》2008,44(13):801-803
A novel steganalysis approach is proposed against additive video steganography. Under the assumption of independence between the cover video and hidden data, the probability mass function of the frame difference signal of stego-video generally reveals the aliasing effect caused by embedding data. The proposed method successfully detects the hidden data in video with different compression bitrates by detecting the aliasing degree.  相似文献   

13.
基于链路特征的DDoS攻击检测方法   总被引:3,自引:3,他引:3  
提出了一种基于链路特征的DDoS攻击检测方法,利用极大似然估计技术推出网络内部链路特征分布,应用自组织映射神经网络进行链路特征活动轮廓学习和异常链路检测。实验结果表明,该方法有效,具有一定的发展潜力,对于DDoS攻击的检测和预防具有重要现实意义。  相似文献   

14.
基于模糊聚类和时域跟踪的视频分割   总被引:7,自引:0,他引:7  
黄波  杨勇  王桥  吴乐南 《通信学报》2001,22(12):22-28
本文提出了一种基于模糊聚类和时域跟踪的视频分割方法。它把视频序列的连续7帧图像作为一组,对每组中间那一帧图像进行初始分割,对组内其他帧图像采用时域跟踪方法进行分割。初始分割采用了改进的多特征模糊聚类方法:时域跟踪是利用上一帧的分割结果通过运动估计向下一帧投影,作为下一帧的初始分割来完成的。  相似文献   

15.
基于长边检测的视频分割算法   总被引:1,自引:1,他引:0  
针对前景和背景交界处颜色相似度较高时的图像分割问题,提出了基于长边检测的视频分割算法,首先建立包括颜色分量和对比度分量的能量函数,然后将基于边缘长度的边缘检测方法应用到基本模型的颜色模型中,利用长边检测的结果改进能量函数的颜色分量和对比度分量,最后使用图割算法,通过对能量函数求最小化得到最终的前景提取结果。实验结果表明,在前景和背景在交界处颜色相似度较高时,较其他算法具有明显的优势。  相似文献   

16.
Saliency detection is widely used to pick out relevant parts of a scene as visual attention regions for various image/video applications. Since video is increasingly being captured, moved and stored in compressed form, there is a need for detecting video saliency directly in compressed domain. In this study, a compressed video saliency detection algorithm is proposed based on discrete cosine transformation (DCT) coefficients and motion information within a visual window. Firstly, DCT coefficients and motion information are extracted from H.264 video bitstream without full decoding. Due to a high quantization parameter setting in encoder, skip/intra is easily chosen as the best prediction mode, resulting in a large number of blocks with zero motion vector and no residual existing in video bitstream. To address these problems, the motion vectors of skip/intra coded blocks are calculated by interpolating its surroundings. In addition, a visual window is constructed to enhance the contrast of features and to avoid being affected by encoder. Secondly, after spatial and temporal saliency maps being generated by the normalized entropy, a motion importance factor is imposed to refine the temporal saliency map. Finally, a variance-like fusion method is proposed to dynamically combine these maps to yield the final video saliency map. Experimental results show that the proposed approach significantly outperforms other state-of-the-art video saliency detection models.  相似文献   

17.
The most prevalent type of digital image falsification occurs when a portion of a image is copied and pasted onto another section of the same image. Falsification of the image made in this way is called copy-move forgery (CMF). This study presents a new and effective approach for copy-move forgery detection (CMFD) using the Local Intensity Order Pattern (LIOP) to overcome the restrictions of existing CMFD techniques. The input image is first converted to a YCbCr color space and then split into Y, Cb, and Cr color channels. The LIOP features are then extracted from each color channel and all the features are combined. The feature vectors are ordered lexicographically and related features are detected by comparing the LIOP features. Although the LIOP feature has rarely been used in CMFD prior to this study, the success rate of the proposed method is high. In addition, since the channels are not correlated to each other in the YCbCr color space, each color channel is considered as a gray image, and the success rate is increased by combining the features extracted from each of the color channels. The proposed approach was assessed using the CoMoFoD and GRIP datasets. Experimental findings demonstrated that the suggested method was successful and displayed robustness in post-processing attacks.  相似文献   

18.
基于改进BEMD的视频镜头转场检测算法研究   总被引:1,自引:2,他引:1  
对二维经验模式分解(BEMD)算法进行了改进,采用限定域的Delaunay三角剖分和三次插值得到极大值和极小值包络面,用基于限邻域经验模式分解(NLEMD),即通过设定最大邻域(时宽)和采用邻域内局部自适应均值算法代替包络均值算法进行分解,给出了图像BEMD分解后内蕴模函数(I MF)1和2的Hilbert谱,以I MF2的瞬时振幅作为图像的特征向量,计算镜头转场中图像序列帧特征向量间的欧式距离。采用大量的视频镜头转场的样本进行实验,结果表明,剪切镜头查准率和查全率皆为98%;渐变镜头查准率86.4%,查全率87.6%。  相似文献   

19.
视频运动目标的检测是目标分类和行为理解等后续处理的基础。本文提出一种复杂背景条件下基于置信传播(BP)的视频运动目标检测算法。该算法依据视频背景的空间和时间相关性,分别定义了视频背景的空间和时间能量函数,完成视频运动目标的优化检测。利用置信传播算法在相邻像素之间的信息交换来实现能量最小化,不同背景条件下的实验结果验证了该算法的有效性和准确性。  相似文献   

20.

It is a generic belief that digital video can be proffered as visual evidence in areas like politics, criminal litigation, journalism and military intelligence services. Multicamera smartphones with megapixels of resolution are a common hand-held device used by everyone. This has made the task of video recording very easy. At the same time a variety of applications available on smart phones have made this indispensable source of information vulnerable to deliberate manipulations. Hence, content authentication of video evidence becomes essential. Copy-move forgery or Copy-paste forgery is consequential forgery done by forgers for changing the basic understanding of the scene. Removal or addition of frames in a video clip can also be managed by advanced apps on smartphones. In case of surveillance, the video camera and the background are stable which makes forgery easy and imperceptible. Therefore, accurate Video forgery detection is crucial. This paper proposes an efficient method—VFDHSOG based on Histograms of the second order gradient to locate ‘suspicious’ frames and then localize the CMF within the frame. A ‘suspicious’ frame is located by computing correlation coefficients of the HSOG feature after obtaining a binary image of a frame. Performance evaluation is done using the benchmark datasets Surrey university library for forensic analysis (SULFA), the Video tampering dataset (VTD) and SYSU-OBJFORGED dataset. SULFA has video files of different quality like q10, q20 etc., which represents high compression. The VTD dataset provides both, i.e. inter and intra frame forgery. The SYSU dataset covers different attacks like scaling and rotation. An overall accuracy of 92.26% is achieved with the capability to identify attacks like scale up/down and rotation.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号