Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 268-272.

• Pattern Recognition & Image Processing • Previous Articles     Next Articles

Blind Image Identification Algorithm Based on HSV Quantized Color Feature and SURF Detector

HU Meng-qi1,2, ZHENG Ji-ming1   

  1. (Key Lab of Intelligent Analysis and Decision on Complex Systems,Chongqing University of Posts and Telecommunications,Chongqing 400065,China)1;
    (School of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China)2
  • Online:2019-11-10 Published:2019-11-20

Abstract: Aiming at the problem that the features extracted from the color image by existing copy-move forgery detection (CMFD) algorithms are not comprehensive and the matching time is too high,the blind identification algorithm for digital images by using quantized color features and SURF detector was studied.In the feature extraction process,the algorithm combines HSV fuzzy quantization color feature and SURF feature to form a comprehensive description,called the FCQ-SURF features,of color image content.K-Means clustering and KNN method are used to improve matching efficiency in feature matching stage.The experimental results show that the algorithm can detect and locate the colorima-ge copy-move forgery well in CASIA 1.0 and FAU color image test library.It also has a good detection effect for multiple tampering attacks and multi-region tampering of images.The experimental results demonstrate that the proposed algorithm has higher detection accuracy and better matching time for color image copy-move forgery.

Key words: Blind image identification, Copy-move forgery, FCQ-SURF features, K-Means clustering matching

CLC Number: 

  • TP391.4
[1]SONI B,DAS P K,THOUNAOJAM D M.CMFD:a detailed review of block based and key feature based techniques in image copy-move forgery detection[J].Iet Image Processing,2018,12(2):167-178.
[2]MALVIYA A V,LADHAKE S A.Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram[J].Procedia Computer Science,2016,79:383-390.
[3]GONG J C,GUO J C.Image Copy-Move Forgery Detection Using SURF in Opponent Color Space[J].Transactions of Tianjin University,2016,22(2):151-157.
[4]ZHU Y,SHEN X J,CHEN H P.Covert Copy-move ForgeryDetection Based on Color LBP[J].Acta Automatica Sinica,2017,43(3):390-397.
[5]WANG X Y,JIAO L X,WANG X B,et al.A new keypoint-based copy-move forgery detection for color image[J].Applied Intelligence,2018:1-23.
[6]谢伟,万晓霞,叶松涛,等.基于局部色彩不变量的图像篡改检测方法[J].湖南大学学报(自科版),2016,43(8):128-134.
[7]KUSHOL R,SALEKIN M S,KABIR M H,et al.Copy-MoveForgery Detection Using Color Space and Moment Invariants-Based Features[C]∥International Conference on Digital Image Computing:Techniques and Applications.IEEE,2016:1-6.
[8]BAY H,TUYTELAARS T,GOOL L V.SURF:Speeded up robust features[C]∥Proceedings of the 9th European conference on Computer Vision- Volume Part I.Berlin:Springer,2006.
[9]王梦思,王任华.基于SIFT和RGB特征的同图复制篡改检测算法[J].中国人民公安大学学报(自然科学版),2018,24(2):83-87.
[10]CHERNOV V,ALANDER J,BOCHKO V.Integer-based accurate conversion between RGB and HSV color spaces[J].Computers & Electrical Engineering,2015,46:328-337.
[11]徐慧英,袁杰,赵建民,等.一种基于颜色和纹理的图像检索方法[J].计算机科学,2009,36(5):282-286.
[12]TAHOUN M A,NAGATY K A,EL-ARIEF T I.A Robust Content-Based Image Retrieval System Using Multiple Features Representations[C]∥Networking,Sensing & Control.IEEE,2005:116-122.
[13]居学尉,贺利军,朱光宇.基于离散Fréchet距离的多目标优化方法[J].计算机集成制造系统,2017(2):253-260.
[14]陈付幸,王润生.基于预检验的快速随机抽样一致性算法[J].软件学报,2005,16(8):1431-1437.
[15]王天召,徐克虎,陈金玉.基于K-means聚类和RANSAC的图像配准算法研究[J].计算机工程与科学,2014,36(9):1765-1769.
[16]PENG J,HEISTERKAMP D R,DAI H K.Adaptive Discriminant and Quasiconformal Kernel Nearest Neighbor Classification[M]∥Support Vector Machines:Theory and Applications.Berlin:Springer,2005.
[17]李若晨,李若晨,李勤,等.图像内部Move-Copy篡改盲取证算法研究[J].四川大学学报(自然科学版),2016,53(1):67-72.
[18]申铉京,朱叶,吕颖达,等.基于SIFT和HSI模型的彩色图像复制-粘贴盲鉴别算法[J].吉林大学学报(工学版),2014,44(1):171-176.
[1] KANG Xiao-bing,WEI Sheng-min. Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery [J]. Computer Science, 2011, 38(3): 295-299.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!