计算机科学 ›› 2014, Vol. 41 ›› Issue (12): 118-124.doi: 10.11896/j.issn.1002-137X.2014.12.025

• 信息安全 • 上一篇    下一篇

基于局部不变特征及离群检测的图像区域克隆认证算法

乐德广,姜楠,郑力新,李晓潮   

  1. 华侨大学工学院 泉州362021;华侨大学工学院 泉州362021;华侨大学工学院 泉州362021;厦门大学信息科学与技术学院 厦门361005
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受福建省物联网云计算平台建设项目(2013H2002),泉州市科技计划项目(2012Z83)以及华侨大学教师科研启动基金(12Y0357)资助

Image Region Cloning Authentication Algorithm Based on Local Invariant Feature and Outlier Detection

LE De-guang,JIANG Nan,ZHENG Li-xin and LI Xiao-chao   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对数字图像出现的区域克隆安全问题, 提出基于局部不变特征及离群检测技术的数字图像区域克隆认证算法。该算法首先通过高斯差分算子检测图像尺度空间中具有局部不变特征的特征点;接着,基于欧氏距离相似性度量和最近邻距离比率匹配策略,通过局部不变特征匹配检测图像区域克隆;最后,通过离群检测验证匹配结果。实验表明,该算法不但对图像区域克隆具有很好的检测效果,而且能有效抵御各种后处理篡改攻击。此外,与现有算法相比,本算法具有较高的计算效率。

关键词: 图像认证,克隆篡改,局部不变特征,离群检测

Abstract: In order to deal with the security problem of image region cloning,this paper proposed a image region cloning authentication algorithm based on local invariant feature and outlier detection.Firstly,this algorithm detects the point with local invariant feature in the scale space of image by DoG function.Secondly,this algorithm detects the image region cloning by means of local invariant feature match through the similarity measurement of euclidean distance and match policy of nearest neighbor distance ratio.Finally,the algorithm verifies the match results by means of outlier detection.The test results show the algorithm not only can detect the cloned region of image correctly,but also can prevent the different attacks of cloned image efficiently.Besides,the detection speed of cloned image is higher compared with other methods.

Key words: Image forensics,Cloning tampering,Local invariant feature,Outlier detection

[1] 胡东辉,王丽娜,江夏秋,等.盲环境下的数字图像可信性评估模型研究[J].计算机学报,2009,2(4):675-687
[2] 吴琼,李国辉,涂丹,等.面向真实性鉴别的数字图像盲认证技术综述[J].自动化学报,2008,4(12):1458-1466
[3] Shivakumar B L,Baboo S S.Detecting copy-move forgery in digital images:a survey and analysis of current methods [J].Global Journal of Computer Science and Technology,2011,10(7):61-65
[4] Fridrich J,Soukal D,Luká J.Detection of copy-move forgery in digital images [C]∥Proceedings of Digital Forensic Research Workshop.Cleveland,OH,2003:231-240
[5] Popescu A C,Farid H.Exposing digital forgeries by detecting traces of resampling [J].IEEE Transactions on Signal Proces-sing,2005,3(2):758-767
[6] 骆伟祺,黄继武,丘国平,等.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,0(11):1998-2007
[7] 张静,冯占磊,苏育挺,等.基于像素匹配的图像复制-粘贴篡改检测算法[J].天津大学学报,2009,2(8):713-720
[8] Pan X,Siwei L.Region duplication detection using image feature matching [J].IEEE Transactions on Information Forensics and Security,2010,5(4):857-867
[9] 王鑫,轩波,彭思龙,等.基于融合的高分辨率彩色图像拷贝-变换-移动篡改检测[J].中国图象图形学报(A),2010,5(7):1047-1053
[10] 李生红,张爱新,郑燕双,等.基于SIFT的图像复制遮盖篡改检测技术[J].解放军理工大学学报:自然科学版,2009,0(4):339-343
[11] Amerini I,Ballan L,Caldelli R,et al.A SIFT-based forensicmethod for copy-move attack detection and transformation recovery [J].IEEE Transactions on Information Forensics and Security,2011,6(3):1099-1110
[12] Lindeberg T.Scale-space[J].Encyclopedia of Computer Science and Engineering (Benjamin Wah,ed),2009,4(1):2495-2504
[13] Mikolajczyk K,Schmid C.Scale and affine invariant interestpoint detectors[J].International Journal of Computer Vision,2004,0(1):63-86
[14] Lin W,Li D.Adaptive downsampling to improve image compression at low bit rates [J].IEEE Transactions on Image Proces-sing,2006,5(9):2513-2521
[15] Keren D,Peleg S,Brada R.Image sequence enhancement using sub-pixel displacements [C]∥Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.1988:742-746
[16] Lowe D G.Distinctive image features from scale-invariant keypoints [J].International Journal of Computer Vision,2004,0(2):91-110
[17] Harris C,Stephens M.A combined corner and edge detector[C]∥Proceedings of Fourth Alvey Vision Conference.Manchester,UK,1988:147-151
[18] Mikolajczyk K,Schmid C.A performance evaluation of local descriptors [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2005,7(10):1615-1630
[19] Hartley R,Zisserman A.Multiple view geometry in computer vision(Second Edition)[M].Cambridge University Press,2004
[20] CASIA TIDE v2.0.CASIA tampered image detection evaluation database [EB/OL].http://forensics.idealtest.org
[21] MICC-F220 Dataset [EB/OL].http://jean.micc.unifi.it

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!