Computer Science ›› 2014, Vol. 41 ›› Issue (12): 118-124.doi: 10.11896/j.issn.1002-137X.2014.12.025

Previous Articles     Next Articles

Image Region Cloning Authentication Algorithm Based on Local Invariant Feature and Outlier Detection

LE De-guang,JIANG Nan,ZHENG Li-xin and LI Xiao-chao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In order to deal with the security problem of image region cloning,this paper proposed a image region cloning authentication algorithm based on local invariant feature and outlier detection.Firstly,this algorithm detects the point with local invariant feature in the scale space of image by DoG function.Secondly,this algorithm detects the image region cloning by means of local invariant feature match through the similarity measurement of euclidean distance and match policy of nearest neighbor distance ratio.Finally,the algorithm verifies the match results by means of outlier detection.The test results show the algorithm not only can detect the cloned region of image correctly,but also can prevent the different attacks of cloned image efficiently.Besides,the detection speed of cloned image is higher compared with other methods.

Key words: Image forensics,Cloning tampering,Local invariant feature,Outlier detection

[1] 胡东辉,王丽娜,江夏秋,等.盲环境下的数字图像可信性评估模型研究[J].计算机学报,2009,2(4):675-687
[2] 吴琼,李国辉,涂丹,等.面向真实性鉴别的数字图像盲认证技术综述[J].自动化学报,2008,4(12):1458-1466
[3] Shivakumar B L,Baboo S S.Detecting copy-move forgery in digital images:a survey and analysis of current methods [J].Global Journal of Computer Science and Technology,2011,10(7):61-65
[4] Fridrich J,Soukal D,Luká J.Detection of copy-move forgery in digital images [C]∥Proceedings of Digital Forensic Research Workshop.Cleveland,OH,2003:231-240
[5] Popescu A C,Farid H.Exposing digital forgeries by detecting traces of resampling [J].IEEE Transactions on Signal Proces-sing,2005,3(2):758-767
[6] 骆伟祺,黄继武,丘国平,等.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,0(11):1998-2007
[7] 张静,冯占磊,苏育挺,等.基于像素匹配的图像复制-粘贴篡改检测算法[J].天津大学学报,2009,2(8):713-720
[8] Pan X,Siwei L.Region duplication detection using image feature matching [J].IEEE Transactions on Information Forensics and Security,2010,5(4):857-867
[9] 王鑫,轩波,彭思龙,等.基于融合的高分辨率彩色图像拷贝-变换-移动篡改检测[J].中国图象图形学报(A),2010,5(7):1047-1053
[10] 李生红,张爱新,郑燕双,等.基于SIFT的图像复制遮盖篡改检测技术[J].解放军理工大学学报:自然科学版,2009,0(4):339-343
[11] Amerini I,Ballan L,Caldelli R,et al.A SIFT-based forensicmethod for copy-move attack detection and transformation recovery [J].IEEE Transactions on Information Forensics and Security,2011,6(3):1099-1110
[12] Lindeberg T.Scale-space[J].Encyclopedia of Computer Science and Engineering (Benjamin Wah,ed),2009,4(1):2495-2504
[13] Mikolajczyk K,Schmid C.Scale and affine invariant interestpoint detectors[J].International Journal of Computer Vision,2004,0(1):63-86
[14] Lin W,Li D.Adaptive downsampling to improve image compression at low bit rates [J].IEEE Transactions on Image Proces-sing,2006,5(9):2513-2521
[15] Keren D,Peleg S,Brada R.Image sequence enhancement using sub-pixel displacements [C]∥Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.1988:742-746
[16] Lowe D G.Distinctive image features from scale-invariant keypoints [J].International Journal of Computer Vision,2004,0(2):91-110
[17] Harris C,Stephens M.A combined corner and edge detector[C]∥Proceedings of Fourth Alvey Vision Conference.Manchester,UK,1988:147-151
[18] Mikolajczyk K,Schmid C.A performance evaluation of local descriptors [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2005,7(10):1615-1630
[19] Hartley R,Zisserman A.Multiple view geometry in computer vision(Second Edition)[M].Cambridge University Press,2004
[20] CASIA TIDE v2.0.CASIA tampered image detection evaluation database [EB/OL].http://forensics.idealtest.org
[21] MICC-F220 Dataset [EB/OL].http://jean.micc.unifi.it

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!