全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2017 

基于分片变换的图像Copy-Move篡改检测方法
Copy-Move Forgery Detection Using Slicing Transform

DOI: 10.13203/j.whugis20150451

Keywords: SLT,C-M,篡改检测,图像取证,
SLT
,copy-move,forgery detection,digital image forensics

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对图像区域复制(copy-move,C-M)篡改检测方法通常面临的特征向量维度高、计算量大等问题,提出了一种基于分片变换(slicing transform,SLT)的图像C-M篡改检测方法。通过对目标图像进行SLT变换并对图像分片进行分组合并,提取每组图像分片的局部分片密度特征对图像块进行C-M篡改检测。实验结果表明,该方法提出的局部分片密度特征向量能够较好地表征图像特征,较典型的基于分块的篡改检测方法特征维度低,具有较低的时间复杂度和较高的检测率,并且对图像篡改区域的旋转攻击和缩放攻击亦具有较好的鲁棒性

References

[1]  Birajdar G K, Mankar V H. DigitalImage Forgery Detection Using Passive Techniques:A Survey[J]. <em>Digital Investigation</em>, 2013, 10(3):226-245
[2]  Fridrich A J, Soukal B D, Luká? A J.Detection of Copy-Move Forgery in Digital Images[C]. Digital Forensic Research Workshop, Cleveland, USA, 2003
[3]  Popescu A C, Farid H. Exposing Tigital Forgeries by Detecting Duplicated Image Regions[R]. Dartmouth Computer Scieuce Technical Report, Dartmouth, USA, 2004.
[4]  Kang X B, Wei S M. Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics[C].International Conference on Computer Science and Software Engineering, New York, USA, 2008
[5]  Mahdian B, Saic S. Detection of Copy-Move Forgery Using a Method Based on Blur Moment Invariants[J].<em>Forensic Science International</em>, 2007, 171(2):180-189
[6]  Christlein V, Riess C, Jordan J, et al. An Evaluation of Popular Copy-Move Forgery Detection Approaches[J].<em>IEEE Transactions on Information Forensics and Security</em>, 2012, 7(6):1841-1854
[7]  Tralic D, Zupancic I, Grgic S, et al. CoMoFoD-New Database for Copy-Move Forgery Detection[C]. The 55th International Symposium ELMAR, New York, USA, 2013
[8]  Bashar M, Noda K, Ohnishi N, et al.Exploring Duplicated Regions in Natural Images[J]. <em>IEEE Transactions on Image Processing</em>,2010(99):1-40
[9]  Ardizzone E, Bruno A, Mazzola G.Detecting Multiple Copies in Tampered Images[C]. IEEE International Conference on Image Processing,New York, USA, 2010
[10]  Amerini I, Ballan L, Caldelli R, et al. A Sift-based Forensic Method for Copy-Move Attack Detection and Transformation Recovery[J].<em>IEEE Transactions on Information Forensics and Security</em>, 2011, 6(3):1099-1110
[11]  Shivakumar B L, Baboo L D S S. Detection of Region Duplication Forgery in Digital Images Using SURF[J].<em>IJCSI International Journal of Computer Science Issues</em>, 2011, 8(4):199-205
[12]  Li G, Wu Q, Tu D, et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD[C]. IEEE International Conference on Multimedia and Expo, New York, USA,2007
[13]  Ryu S J, Lee M J, Lee H K. Detection of Copy-Rotate-Move Forgery Using Zernike Moments[C]. Information Hiding-international Conference, Berlin, Germany, 2010

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133