[1]欧阳军林,伍家松,Gouenou Coatrieux,等.鲁棒的复制-缩放-粘贴篡改检测方法[J].东南大学学报(自然科学版),2014,44(6):1116-1120.[doi:10.3969/j.issn.1001-0505.2014.06.004]
 Ouyang Junlin,Wu Jiasong,Gouenou Coatrieux,et al.Robust copy-scale-move forgery detection method[J].Journal of Southeast University (Natural Science Edition),2014,44(6):1116-1120.[doi:10.3969/j.issn.1001-0505.2014.06.004]
点击复制

鲁棒的复制-缩放-粘贴篡改检测方法()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
44
期数:
2014年第6期
页码:
1116-1120
栏目:
计算机科学与工程
出版日期:
2014-11-20

文章信息/Info

Title:
Robust copy-scale-move forgery detection method
作者:
欧阳军林1伍家松1Gouenou Coatrieux2邵珠宏1舒华忠1
1东南大学影像科学与技术实验室, 南京 210096; 2布列塔尼国立高等电信学校, 法国布雷斯特 29238
Author(s):
Ouyang Junlin1 Wu Jiasong1 Gouenou Coatrieux2 Shao Zhuhong1 Shu Huazhong1
1Laboratory of Image Science and Technology, Southeast University, Nanjing 210096, China
2Telecom Bretagne, Brest 29238, France
关键词:
篡改检测 复制-粘贴伪造 金字塔模型 图像取证
Keywords:
tampering detection copy-move forgery pyramid mode image forensics
分类号:
TP391
DOI:
10.3969/j.issn.1001-0505.2014.06.004
摘要:
为了能够检测图像的复制-缩放-粘贴(CSM)篡改操作,提出了一种基于金字塔模型的CSM图像篡改检测方法.首先,将一幅测试图像缩放成不同尺度的降采样子图像,采用非均匀采样选择子图像,并建立金字塔篡改伪造检测模型;然后,对模型中每一层子图像进行非重叠分块,提取该模型所有图像子块的Zernike矩特征;最后,模型中每一层的所有块特征分别与底层特征建立KD树,以便于搜索图像块的所有近似匹配对,并从匹配对中寻找CSM篡改操作的伪造痕迹平移向量,以便于确定篡改区域.实验结果表明,与现有的图像篡改检测方法相比,所提方法获得了更好的检测结果,且篡改图像检测的查准率和查全率均超过93%.
Abstract:
In order to detect the image copy-scale-move(CSM)forgery, a CSM forgery detection method based on a pyramid model is proposed. First, a test image is rescaled into down sampling sub-images with different scale factors, which are used to build the pyramid model for forgery detection according to non-uniform sampling. Then, each sub-image in the pyramid model is divided into non-overlapping sub-blocks. The Zernike moment features of all sub-block are extracted. Finally, the block features of each sub-image and those of the original image are used to build a KD-tree to search all approximate matching pairs, from which the forged trace shift vector can be found so as to determine the tampering region. The experimental results show that compared with the existing image tampering detection methods, the proposed method provides better detection results for large scaling attacks of region-duplication. The precision and recall of detection are more than 93%.

参考文献/References:

[1] Coatrieux G, Huang H, Shu H Z, et al. A watermarking based medical image integrity control system and an image moment signature for tampering characterization [J]. IEEE Journal of Biomedical and Health Informatics, 2013, 17(6): 1057-1067.
[2] Huang H, Guo W, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm [C]//Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Wuhan, China, 2008: 272-276.
[3] Pan X, Lyu S. Region duplication detection using image feature matching [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 857-867.
[4] Amerini I, Ballan L, Caldelli R, et al. A sift-based forensic method for copy-move attack detection and transformation recovery [J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1099-1110.
[5] Fridrich A J, Soukal B D, Luká? A J. Detection of copy-move forgery in digital images[C]//Proceedings of Digital Forensic Research Workshop. Cleveland, Ohio, USA, 2003: 1-10.
[6] Luo W, Huang J, Qiu G. Robust detection of region-duplication forgery in digital image[C]//IEEE 18th Internation Conference on Pattern Recognition. Hongkong, China, 2006: 746-749.
[7] Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions [R]. Hanover, NH, USA: Dartmouth College, 2004.
[8] Ryu S J, Lee M J, Lee H K. Detection of copy-rotate-move forgery using Zernike moments [C]//The 12th International Conference on Information Hiding. Calgary, Canada, 2010: 51-65.
[9] Lin H J, Wang C W, Kao Y T. Fast copy-move forgery detection [J]. WSEAS Transactions on Signal Processing, 2009, 5(5): 188-197.
[10] Christlein V, Riess C, Jordan J, et al. An evaluation of popular copy-move forgery detection approaches [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1841-1854.
[11] Khotanzad A, Hong Y H. Invariant image recognition by Zernike moments [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1990, 12(5): 489-497.
[12] Vedaldi A, Fulkerson B. VLFeat: an open and portable library of computer vision algorithms [EB/OL].(2010-10-25)[2014-04-20]. http://www. vlfeat.org/.

备注/Memo

备注/Memo:
收稿日期: 2014-06-27.
作者简介: 欧阳军林(1977—),男,博士生; 舒华忠(联系人),男,博士,教授,博士生导师,shu.list@seu.edu.cn.
基金项目: 国家重点基础研究发展计划(973计划)资助项目(2011CB707904)、国家自然科学基金资助项目(61073138,6110314,61271312,61201344).
引用本文: 欧阳军林,伍家松,Gouenou Coatrieux,等.鲁棒的复制-缩放-粘贴篡改检测方法[J].东南大学学报:自然科学版,2014,44(6):1116-1120. [doi:10.3969/j.issn.1001-0505.2014.06.004]
更新日期/Last Update: 2014-11-20