计算机科学 ›› 2021, Vol. 48 ›› Issue (6A): 43-50.doi: 10.11896/jsjkx.200800020
田洋1, 毕秀丽1, 肖斌1, 李伟生1, 马建峰2
TIAN Yang1, BI Xiu-li1, XIAO Bin1, LI Wei-sheng1, MA Jian-feng2
摘要: 接缝裁剪(Seam Carving)作为近些年来热门的图像缩放技术之一,常被用于图像恶意篡改。当前对Seam Carving篡改的检测方法并不多,并均是针对JPEG格式图像,且在篡改比例较小时,检测准确率不高。文中方法利用离散切比雪夫变换后系数矩阵中的分布特点来提取特征以达到对图像接缝裁剪篡改的检测,并且该方法适用于多种图像格式,在小比例篡改的情况下依然保持较高的分类准确。利用离散切比雪夫变换(Discrete Tchebichef Transform,DTT)得到变换后的系数矩阵,提取Seam Carving篡改的痕迹,实现了对Seam Carving的篡改检测。所提方法首先将待检测图像分成8×8不重叠块,对每一个8×8块进行DTT变换,得到变换后的DTT系数矩阵;然后在每一块中分别计算DTT系数间的差异,再通过系数差异直方图得到统计矩阵,从统计矩阵中提取特征;最后使用支持向量机(Support Vector Machine,SVM)进行训练得到预测模型,实现对图像Seam Carving篡改的检测。实验结果表明,所提方法不仅适用于JPEG格式和TIFF格式的篡改图像,对小比例篡改也能达到较高的检测准确率。
中图分类号:
[1] AVIDAN S,SHAMIR A.Seam carving for content-aware image resizing [C]//ACM SIGGRAPH.2007:10-es. [2] WATTANACHOTE K,SHIH T K,CHANG W L,et al.Tamper detection of JPEG image due to seam modifications [J].IEEE Transactions on Information Forensics,2015(10):2477-2491. [3] SARKAR A,NATARAJ L,MANJUNATH B S.Detection ofseam carving and localization of seam insertions in digital images[C]//Proceedings of the Proceedings of the 11th ACM Workshop on Multimedia and Security.2009. [4] GUO J C,WANG Q Z,ZHAO J,et al.A Method of Seam Carving Forensics Based on LBP and Markov Features [J].Journal of University ofElectronic Science,2018,47:481-485. [5] ZHANG D,YANG G,LI F,et al.Detecting seam carved images using uniform local binary patterns [J].Multimedia Tools and Applications,2020,79(13):8415-8430. [6] WEI J D,LIN Y J,WU Y J.A patch analysis method to detect seam carved images [J].Pattern Recognition Letters,2014,36:100-106. [7] SCHAEFER G,STICH M.UCID:An uncompressed color image database[C]//Proceedings of the Storage and RetrievalMe-thods and Applications for Multimedia 2004.International Society for Optics and Photonics,2003. [8] RYU S J,LEE H Y,LEE H K,et al.Detecting trace of seam carving for forensic analysis [J].Ice Transactions on Information and Systems,2014,97:1304-1311. [9] YIN T,YANG G,LI L,et al.Detecting seam carving basedimage resizing using local binary patterns [J].Computer and Security.2015,55:130-141. [10] LU W,WU M.Seam carving estimation using forensic hash[C]//Proceedings of the Proceedings of the thirteenth ACM multimedia workshop on Multimedia and Security.2011. [11] LIU Q.An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics [J].Pattern Recognition,2017,6:35-46. [12] LIU Q.Exposing seam carving forgery under recompression attacks by hybrid large feature mining[C]//Proceedings of the 2016 23rd International Conference on Pattern Recognition (ICPR).2016. [13] LIU Q,CHEN Z J.Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detectionin JPEG images [C]//ACM Transactions on Intelligent Systems and Technology (TIST).2014:1-30. [14] LU M,NIU S Z.Detection of Image Seam Carving Using a Novel Pattern[J].Computational Intelligence and Neuroscience,2019,2019:9492358. [15] MUKUNDAN R,ONG S,LEE P A.Image analysis by Tche-bichef moments [J].IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society,2001,10:1357-1364. [16] NAM S H,AHN W,YU J,et al.Deep Convolutional Neural Network for Identifying Seam-Carving Forgery [J].IEEE Transactions on Circuits and Systems for Video Technology,2020(99):1-1. [17] WEI J D,CHENG H J,CHANG C W.Hopfield network-based approach to detect seam-carved images and identify tampered regions [J].Neural Computing and Applications,2019,31(10):6479-6492. [18] YE J,SHI Y,XU G,et al.A Convolutional Neural NetworkBased Seam Carving Detection Scheme for Uncompressed Digital Images[C]//Proceedings of the International Workshop on Digi-tal Watermarking.2018. |
[1] | 张开强, 蒋从锋, 程小兰, 贾刚勇, 张纪林, 万健. 多分辨率下资源感知的图像目标自适应缩放检测 Resource-aware Based Adaptive-scaling Image Target Detection Under Multi-resolution Scenario 计算机科学, 2021, 48(4): 180-186. https://doi.org/10.11896/jsjkx.201200116 |
[2] | 淡州阳, 刘粉林, 巩道福. 基于差分直方图中尾部信息的平滑滤波检测算法 Smoothing Filter Detection Algorithm Based on Middle and Tail Information of Differential Histogram 计算机科学, 2021, 48(11): 234-241. https://doi.org/10.11896/jsjkx.200900121 |
[3] | 尚进跃, 毕秀丽, 肖斌, 李伟生. 基于DCT系数哈希的图像篡改检测算法 Image Forgery Detection Based on DCT Coefficients Hashing 计算机科学, 2020, 47(6): 310-315. https://doi.org/10.11896/jsjkx.190600081 |
[4] | 郑秋梅, 刘楠, 王风华. 基于复杂攻击的脆弱水印图像完整性认证算法 Complex Attack Based Fragile Watermarking for Image Integrity Authentication Algorithm 计算机科学, 2020, 47(10): 332-338. https://doi.org/10.11896/jsjkx.191000060 |
[5] | 邢文博, 杜志淳. 数字图像复制粘贴篡改取证 Digital Image Forensics for Copy and Paste Tampering 计算机科学, 2019, 46(6A): 380-384. |
[6] | 王志锋, 朱琳, 曾春艳, 闵秋莎, 夏丹. 数字图像重压缩检测研究综述 Survey on Recompression Detection for Digital Images 计算机科学, 2018, 45(9): 20-29. https://doi.org/10.11896/j.issn.1002-137X.2018.09.003 |
[7] | 罗霄阳,霍宏涛,王梦思,陈亚飞. 基于多残差马尔科夫模型的图像拼接检测 Passive Image-splicing Detection Based on Multi-residual Markov Model 计算机科学, 2018, 45(4): 173-177. https://doi.org/10.11896/j.issn.1002-137X.2018.04.029 |
[8] | 周燕,曾凡智,赵慧民. 基于压缩感知的视频双水印算法研究 Double Video Watermarking Algorithm Based on Compressive Sensing 计算机科学, 2016, 43(5): 132-139. https://doi.org/10.11896/j.issn.1002-137X.2016.05.025 |
[9] | 隋莉莉,汪传建. 基于弱水印的地理数据拓扑完整性检验方法 Checking Topological Integrity of Geographic Data Based on Fragile Watermarking 计算机科学, 2016, 43(2): 183-187. https://doi.org/10.11896/j.issn.1002-137X.2016.02.040 |
[10] | 林晓,张晓煜,马利庄. 基于缝裁剪和变形的图像缩放方法 Image Resizing Based on Seam Carving and Warping 计算机科学, 2015, 42(9): 289-292. https://doi.org/10.11896/j.issn.1002-137X.2015.09.057 |
[11] | 刘丽娟,林小竹. 基于背景噪声的图像盲篡改检测 Image Forgery Detection Using Characteristics of Background Noise 计算机科学, 2014, 41(Z11): 136-138. |
[12] | 林晓,沈洋,马利庄,邹盼盼. 显著物体形状结构保持的图像缩放方法 Image Resizing Based on Shape and Structure-preserving of Salient Objects 计算机科学, 2014, 41(12): 288-292. https://doi.org/10.11896/j.issn.1002-137X.2014.12.062 |
[13] | 康晓兵,魏生民. 一种基于自适应闭值的图像伪造检测算法 Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery 计算机科学, 2011, 38(3): 295-299. |
[14] | 肖磊. 一种具有高攻击类型判别能力的图像空域半脆弱水印算法 Image Spatial Semi-fragile Watermarking Algorithm with High Classification Capability of Attack Types 计算机科学, 2010, 37(2): 286-289. |
[15] | 王鑫,鲁志波. 基于JPEG块效应差异的图像篡改区域自动定位 Locate Tampered Image Region Automatically Based on Inconsistency of ,JPEG Blocking Artifacts 计算机科学, 2010, 37(2): 269-273. |
|