计算机科学 ›› 2020, Vol. 47 ›› Issue (6): 310-315.doi: 10.11896/jsjkx.190600081
尚进跃, 毕秀丽, 肖斌, 李伟生
SHANG Jin-yue, BI Xiu-li, XIAO Bin, LI Wei-sheng
摘要: 随着数字图像处理技术的不断提高,大量的篡改图像充斥互联网和各类媒体,严重影响了人们的日常生活。因此,对图像的真实性和完整性进行判断的数字图像取证技术显得尤其重要。针对数字图像版权中常见的剪切组合篡改问题,文中提出了一种基于DCT系数哈希的图像篡改检测算法。在JPEG压缩过程中,首先提取Y通道的DCT系数矩阵,然后对所提系数矩阵进行DCT以构造出图像哈希,最后将图像哈希嵌入压缩码流的文件头。在篡改检测时,通过篡改图像对应的压缩码流构造出篡改图像哈希,将其与嵌入的源图像哈希进行比较以进行初次检测。为了达到像素级检测的目的,文中在初次检测结果的基础上提出了一种二次检测的算法。实验结果表明,所提算法不仅鲁棒性较好,而且构造的图像哈希长度较短,检测的准确率也提高了10%。
中图分类号:
[1]MISHRA M.Digital Image Tamper Detection Techniques-AComprehensive Study[J].Computer Science,2013,2(1):1-12. [2]VENKATESAN R,KOON S M,JAKUBOWSKI M H,et al.Robust Image Hashing[C]//International Conference on Image Processing.IEEE,2000. [3]MONGA V,VATS D,EVANS B L.Image Authentication Under Geometric Attacks Via Structure Matching[C]//IEEE International Conference on Multimedia & Expo.IEEE,2005. [4]ROY S,SUN Q.Robust Hash for Detecting and Localizing Image Tampering[C]//IEEE International Conference on Image Processing.IEEE,2007. [5]AHMED F,SIYAL M Y,ABBAS V U.A secure and robust hash-based scheme for image authentication[J].Signal Proces-sing,2010,90(5):1456-1470. [6]LU W,WU M.Multimedia forensic hash based on visual words[C]//IEEE International Conference on Image Processing.IEEE,2010. [7]BATTIATO S,FARINELLA G M,MESSINA E,et al.Robust image alignment for tampering detection[J].IEEE Transactions on Information Forensics and Security,2012,7(4):1105-1117. [8]LV X,WANG Z J.Perceptual Image Hashing Based on Shape Contexts and Local Feature Points[J].IEEE Transactions on Information Forensics and Security,2012,7(3):1081-1093. [9]ZHAO Y,WANG S,ZHANG X,et al.Robust Hashing for Image Authentication Using Zernike Moments and Local Features[J].IEEE Transactions on Information Forensics and Security,2013,8(1):55-63. [10]WANG X,PANG K,ZHOU X,et al.A Visual Model-Based Perceptual Image Hash for Content Authentication[J].IEEE Transactions on Information Forensics and Security,2015,10(7):1336-1349. [11]YAN C P,PUN C M,YUAN X C.Multi-scale image hashing using adaptive local feature extraction for robust tampering detection[J].Signal Processing,2016,121(C):1-16. [12]TANG Z,ZHANG X,LI X,et al.Robust Image Hashing with Ring Partition and Invariant Vector Distance[J].IEEE Transactions on Information Forensics and Security,2017,11(1):200-214. [13]PUN C M,YAN C P,YUAN X C.Image Alignment based Multi-Region Matching for Object-level Tampering Detection[J].IEEE Transactions on Information Forensics and Security,2017,12(2):377-391. [14]YAN C P,PUN C M,YUAN X C.Quaternion-based Image Hashing for Adaptive Tampering Localization[J].IEEE Tran-sactions on Information Forensics and Security,2016,11(12):2664-2677. [15]YAN C P,PUN C M.Multi-Scale Difference Map Fusion for Tamper Localization using Binary Ranking Hashing[J].IEEE Transactions on Information Forensics & Security,2017,PP(99):2144-2158. [16]LIU C,LING H,ZOU F,et al.Nonnegative sparse locality preserving hashing[J].Information Sciences,2014,281:714-725. [17]ZHANG W,LIU Y,DAS S K,et al.Secure data aggregation in wireless sensor networks:A watermark based authentication supportive approach[J].Pervasive and Mobile Computing,2008,4(5):658-680. [18]ELL T A,SANGWINE S J.Hypercomplex Fourier Transforms of Color Images[J].IEEE Transactions on Image Processing,2007,16(1):22-35. [19]BATTIATO S,FARINELLA G M,MESSINA E,et al.Understanding geometric manipulations of images through bovw-based hashing[C]//2011 IEEE International Conference on Multimedia and Expo(ICME 2011).IEEE Computer Society,2011. [20]GUO C,MA Q,ZHANG L.Spatio-temporal Saliency detection using phase spectrum of quaternion fourier transform[C]//2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition(CVPR 2008).Anchorage,Alaska,USA.IEEE,2008. |
[1] | 刘冶,潘炎,夏榕楷,刘荻,印鉴. FP-CNNH:一种基于深度卷积神经网络的快速图像哈希算法 FP-CNNH:A Fast Image Hashing Algorithm Based on Deep Convolutional Neural Network 计算机科学, 2016, 43(9): 39-46. https://doi.org/10.11896/j.issn.1002-137X.2016.09.007 |
[2] | 常晓敏,赵涓涓,葛磊,强彦,史曜华. 基于哈希编码的无线多媒体传感网络森林火灾图像识别算法 Forest Fire Image Recognition Algorithm Based on Wireless Multimedia Sensor Network of Hash Coding 计算机科学, 2016, 43(5): 313-317. https://doi.org/10.11896/j.issn.1002-137X.2016.05.060 |
[3] | 彭求明 杨小帆 黄松 李思静 柏森. 一种新的自适应盲数字水印算法 计算机科学, 2005, 32(8): 63-66. |
|