计算机科学 ›› 2019, Vol. 46 ›› Issue (6A): 380-384.

• 信息安全 • 上一篇    下一篇

数字图像复制粘贴篡改取证

邢文博1,2, 杜志淳1   

  1. 华东政法大学刑事司法学院 上海2000421;
    南京森林警察学院刑事科学技术学院 南京 2100462
  • 出版日期:2019-06-14 发布日期:2019-07-02
  • 作者简介:邢文博 男,博士生,主要研究方向为司法鉴定制度、图像取证、痕迹检验,E-mail:704181858@qq.com;杜志淳 男,教授,博士生导师,主要研究方向为司法鉴定制度,E-mail:duzhichun@ecupl.edu.cn。

Digital Image Forensics for Copy and Paste Tampering

XING Wen-bo1,2, DU Zhi-chun1   

  1. School of Criminal Justice,East China University of Political Science and Law,Shanghai 200042,China1;
    School of Criminal Science and Technology,Nanjing Forest Police College,Nanjing 210046,China2
  • Online:2019-06-14 Published:2019-07-02

摘要: 数字图像在被复制粘贴篡改时会对被复制部分进行缩放、旋转,然后粘贴在图像的不同部位,从而形成篡改图像。用sift算法检测出图像中的sift关键点,通过关键点的向量找出相互匹配的关键点对。用随机采样一致性算法在匹配点对中随机采取3个匹配点对计算其仿射变换矩阵,并对匹配点对进行循环分类,分类完成后按照每一类的仿射变换模型对篡改图像进行仿射变换以及仿射变换的逆变换,然后求得篡改图像与其仿射变换图像的局部相关图、篡改图像与其逆仿射变换图像的局部相关图。将每一类匹配关键点对按照仿射变换关系分为两组,从每组的关键点位置设置二值图像并用结构元素进行膨胀,将二值图像膨胀位置在相关图像的相关值大于阈值的膨胀部分保留,小于阈值的膨胀部分舍去,迭代膨胀到二值图像不再膨胀为止。然后获取二值图像的边界,在原图像中标出复制粘贴篡改部分。实验表明该方法可以有效定位篡改图像中的复制粘贴区域。

关键词: RANSAC算法, sift关键点, 复制粘贴篡改, 局部相关图, 数字图像取证

Abstract: When a digital image is tampered with copy and paste,the copied part might be zoomed,rotated and then pasted in different parts of the image.The sift key points are detected in the image by SIFT algorithm,and the matched key points are found out by matching vector of the key points.The matched key points are classified by the affine transformation matrix which is calculated byRANdom SAmple Consensus,namely randomly extracting three matched point pairs in matched point pairs.The affine transformation of the image and its inverse affine transformation are carried out.Then the local correlation map of the tampered image and its affine transformation image is obtained,and the local correlation map of the tampered image and its inverse affine transformation image too.Each class of matched key points is divided into two groups according to affine transformation relations.A binary image is set from the key point of each group and dilated with structural elements.The dilated position of the binary image is continued to have when its value in the local correlation map is greater than the threshold and is get rid of when its value in the local correlation map is less than the threshold.The binary image is dilated iteratively until it’s no longer expands and its boundary is marked on the original image.Experiments show that this method can effectively locate the copy paste tampering areas in digital images.

Key words: Copy-pasted forgery, Digital image forensics, Local correlation map, RANSAC algorithm, Sift key points

中图分类号: 

  • TP391
[1]WARBHE A D,DHARASKAR R V,THAKARE V M.A Survey on Keypoint Based Copy-paste Forgery Detection Techniques[J].Procedia Computer Science,2016,78:61-67.
[2]LOWE D G.Distinctive Image Features from Scale-Invariant Keypoints [J].International Journal of Computer Vision,2004,60(2):91-110.
[3]BAY H,TUYTELAARS T,GOOL L V.SURF:Speeded Up Robust Features[J].Computer Vision & Image Understanding,2006,110(3):404-417.
[4]ALCANTARILLA P F,BARTOLI A,DAVISON A J.KAZE Features[M]∥European Conference on Computer Vision.Berlin:Springer,2012:214-227.
[5]HUANG H,GUO W,ZHANG Y.Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm[C]∥Pacific-Asia Workshop on Computational Intelligence and Industrial Application,2008(PACIIA’08).IEEE,2009:272-276.
[6]ARDIZZONE E,BRUNO A,MAZZOLA G.Detecting multiple copies in tampered images[C]∥IEEE International Conference on Image Processing.IEEE,2010:2117-2120.
[7]池静,张婷,杨振宇.基于SIFT和区域生长的图像复制粘贴盲检测算法 [J].科学技术与工程,2013,13(4):917-920.
[8]AMERINI I,BALLAN L,CALDELLI R,et al.Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J].Signal Processing Image Communication,2013,28(6):659-669.
[9]李云,陈帆,和红杰.SIFT复制粘贴图像取证算法的安全性分析及改进[C]∥全国信息隐藏暨多媒体信息安全学术大会.2015.
[10]巩家昌.基于局部颜色不变性特征的图像复制粘贴篡改取证研究[D].天津:天津大学,2015.
[11]FISCHLER M A,BOLLES R C.Random sample consensus:a paradigm for model fitting with applications to image analysis and automated cartography [J].Comm. of the ACM,1981,24:381-395.
[12]http://www.cs.ubc.ca/~lowe/keypoints/.
[13]http://blog.sina.com.cn/s/blog_49cd44fb010005qb.html.
[14]http://image.fengniao.com/360/3600114_all.html#3601563.
[15]TRALIC D,ZUPANCIC I,GRGIC S.CoMoFoD — New database for copy-move forgery detection[C]∥55th International Symposium ELMAR-2013.IEEE,2013:49-54.
[1] 淡州阳, 刘粉林, 巩道福.
基于差分直方图中尾部信息的平滑滤波检测算法
Smoothing Filter Detection Algorithm Based on Middle and Tail Information of Differential Histogram
计算机科学, 2021, 48(11): 234-241. https://doi.org/10.11896/jsjkx.200900121
[2] 邵进达, 杨帅, 程琳.
改进SIFT算法结合两级特征匹配的无人机图像匹配算法
UAV Image Matching Algorithm Based on Improved SIFT Algorithm and Two-stage Feature Matching
计算机科学, 2019, 46(6): 316-321. https://doi.org/10.11896/j.issn.1002-137X.2019.06.048
[3] 胡梦琪, 郑继明.
基于量化颜色特征和SURF检测器的图像盲鉴别算法
Blind Image Identification Algorithm Based on HSV Quantized Color Feature and SURF Detector
计算机科学, 2019, 46(11A): 268-272.
[4] 胡燕花,唐鹏,金炜东,何正伟.
铁路视频序列的FOE的估计
Estimation of FOE for Railway Video Sequences
计算机科学, 2018, 45(7): 226-229. https://doi.org/10.11896/j.issn.1002-137X.2018.07.039
[5] 康晓兵,魏生民.
一种基于自适应闭值的图像伪造检测算法
Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery
计算机科学, 2011, 38(3): 295-299.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!