期刊文献+

一种图像局部模糊检测方法及其在被动图像认证中的应用 被引量:8

A local-blur detection method and its application in passive image authentication
下载PDF
导出
摘要 针对目前图像模糊检测算法复杂度过高和不能有效地实现图像局部模糊检测的问题,进行了图像局部模糊检测方法的研究,给出了模糊的数学模型,并基于此模型,提出一种简单有效的图像局部模糊的检测算法。该算法按照像素级搜索机制,对图像中各像素所在位置的相邻四邻域进行二维短时傅立叶变换,计算其频域系数的对数相关性,由此描述该区域的模糊程度,把它同预设阈值相比较,实现图像中局部模糊区域的检测。实验仿真显示,将该方法应用于篡改图像被动认证,可以有效地检测经过局部模糊和边缘模糊的篡改图像。 In order to reduce the complexity of conventional blur detection algorithms and efficiently detect the local-blur regions in the images, the paper gives a new blur detection method based on a study of local-blur detection and a machematical blur model. According to the 2-D Short-Time Fourier Transform, the method calculates the coefficients of four blocks around each pixel, the correlation value describing blur magnitude of this pixel' s area. Based on the comparison between this correlation value and the preset threshold, each pixel is divided into blurred class or un-blurred class. The proposed method is applied to the passive image authentication. The simulation results show the efficiency of this approach in revealing the local-blurred and the edge-blurred image tamper.
作者 王睿 方勇
出处 《高技术通讯》 EI CAS CSCD 北大核心 2009年第7期718-723,共6页 Chinese High Technology Letters
基金 国家自然科学基金(60872114) 教育部博士点基金(20060280003)资助项目。
关键词 模糊检测 篡改检测 被动认证 blur detection, forgery detection, passive authentication
  • 相关文献

参考文献5

  • 1Tong H H,Li M J,Zhang H J, et al.Blur detection for digital image using Wavelet transform[].Proceedings of the IEEE International Conference on Multimedia and Expo.2004 被引量:1
  • 2Hsiao D Y,Pei S C.Detection digital tampering by blur estimation[].Proceeding of the st International Workshop on Approaches to Digital Forensic Engineering.2005 被引量:1
  • 3Giannakis G B,Heath R W.Blind identification of multichannel FIR blurs and perfect image restoration[].IEEE Transactions on Image Processing.2000 被引量:1
  • 4You Y L,Kaveh M.A regularization approach to joint blur identification and image restoration[].IEEE Transactions on ImageProcessing.1996 被引量:1
  • 5Lagendijk R L,Biemond J,et al.Identification and restoration of noise blurred images using the expectation-maximization algorithm[].IEEE Transactions on Applied Superconductivity.1990 被引量:1

同被引文献65

  • 1张晓冬,王桥,吴乐南.利用脊的特征进行信号盲分离[J].电子学报,2004,32(7):1156-1159. 被引量:7
  • 2王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 3Farid H. Creating and detecting doctored and virtual im- ages:implications to the child pornography prevention act [R/OL]. (2004-09-30)[2013-05-19]http://www. cs. dart- mouth, edu/cms_file/SYS_techReport/381/TR2004-518, pdf. 被引量:1
  • 4Hsiao D Y, Pei S C. Detection digital tampering by blur es- timation[C]//Proceeding of the First International Workshop on Systematic Approaclaes to Digital Forensic Engineering, November 7-9, 2005, Taipei, Taiwan. New York:IEEE Xplore, 2005:264-278. 被引量:1
  • 5Sutcu Y, Coskun B, Sencar H T, et al. Tamper detection based on regularity of wavelet transform coefficients [C]// Proceedings of IEEE International Conference on Image Processing, September 16-Oct 19, 2007, San Antonio, TX. New York : IEEE Xplore, 2007 : 397-400. 被引量:1
  • 6He Junfeng, Lin Zhouchen, Wang Lifang, et al. Detecting doctored JPEG images via DCT coefficient analysis [C ]//Pro- ceedings of 9th European Conference on Computer Vision, May 7-13, 2006, Graz, Austria. Berlin:Springer-Verlag, 2006 : 423-435. 被引量:1
  • 7Ye Shuiming, Sun Q B, Chang E C. Detecting digital image forgeries by measuring inconsistencies of blocking artifact[C ]//Proceedings of IEEE International Conference on Mul- timedia and Expo, July 2-5, 2007, Beijing, China. New York : IEEE Xplore, 2007 : 12-15. 被引量:1
  • 8Farid H. Exposing digital forgeries from JPEG ghosts [J]. IEEE Transactions on Information Forensics and Security, 2009, 4( 1 ) : 154-160. 被引量:1
  • 9Popescu A C, Farid H. Exposing digital forgeries by detecting traces of resampling[J]. IEEE Transactions on Signal Pro- cessing, 2005, 53(2):758-767. 被引量:1
  • 10Kirchner M, Bohme R. Hiding traces of resampling in digi- tal image [J. IEEE Transaction on Information Forensics and Security, 2008, 3(4) :582-592. 被引量:1

引证文献8

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部