期刊文献+

基于量化表估计的JPEG篡改图像盲检测 被引量:2

Blind Detection Method of Doctored JPEG Image Based on Estimating Quantization Table
下载PDF
导出
摘要 传统JPEG篡改图像盲检测算法采用不同质量因子对待测图像进行尝试性再压缩。为了缩短检测时间,减少计算量,提出一种基于量化表估计的JPEG篡改图像盲检测有效算法。首先通过DCT系数直方图估计出篡改图像某一部分量化表,然后通过计算小块DCT系数中分别是对应量化步长整数倍的个数进一步判定该小块是否属于篡改区域。实验结果表明,提出的量化步长估计算法复杂度小,正确率高;检测算法能准确检测出copy-move和合成类图像篡改。此外,改进方法不仅对标准量化表压缩的JPEG篡改图像具有非常好的检测结果,而且对非标准量化表压缩的JPEG篡改图像检测也有效。 In order to shorten the testing time and reduce computation cost,an efficient algorithm was proposed for localizing the doctored JPEG image by estimating the quantization table in this paper.The quantization table of the spliced portion was firstly estimated by the histogram of the DCT coefficients.Then the numbers of the DCT coefficients were added up respectively,which is an integer multiple of the quantization step,and the doctored area was determined by the numbers.The experimental results show that the quantization table estimation algorithm proposed is less time consuming and of higher accuracy rate.The detection algorithm can expose various kinds of JPEG image forgeries including copy-move and composite.Furthermore,the proposed algorithm successfully detects the tempered image with JPEG compression using not only the standard quantization table,but also the Non-standard quantization tables
出处 《计算机仿真》 CSCD 北大核心 2012年第10期23-25,356,共4页 Computer Simulation
基金 国家自然科学基金(61107039) 燕山大学博士基金(B505) 秦皇岛市科学技术研究与发展计划(201001A078)
关键词 盲检测 压缩 系数 量化表 Blind detection Compression Coefficients Quantization table
  • 相关文献

参考文献9

  • 1J Lukas, J Fridrich, M Goljan. Detecting digital image forgeries u- sing sensor pattern noise [ C ]. Proceedings of the SPIE, 2006, 6072 : 272 - 362. 被引量:1
  • 2M Johnson, H Farid. Exposing digital forgeries by through chro- matic aberration [ C ]. MM&Sec Proceedings of the 8th workshop on Multimedia and security, 2006. 被引量:1
  • 3M Johnson, H Farid. Exposing digital forgeries in complex lighting environments [ C ]. IEEE Transactions on Information Forensics and Security, 2007,2 ( 3 ) :450 - 461. 被引量:1
  • 4魏为民.JPEG图像篡改的盲检测技术[J].计算机工程与应用,2010,46(34):164-166. 被引量:5
  • 5Z. Fan, R de Queiroz. Identification of bitmap compression histo- ry : JPEG detection and quantizer estimation [ C ]. Image process- ing, IEEE Transactions on. 2003:230 -235. 被引量:1
  • 6S Ye, Q Sun, E C Chang. Detecting digital image forgeries by measuring inconsistencies of blocking artifact[ C. Multimedia and Expo, 2007 IEEE interna- tional Conference, 2007 : 12 - 15. 被引量:1
  • 7H Farid. Exposing digital forgeries from JPEG Ghosts [ J ]. IEEE Transactions on Information Forensics and Security, 2009,4 (1) : 154 - 160. 被引量:1
  • 8J Fridrich, M Goljan, R Du. Steganalysis based on JPEG compati- bility [ C ]. Multimedia Systems and Applications Bellingham, WA, USA:SP1E, 2001:275 -280. 被引量:1
  • 9G Schaefer, M Stich. UCID - an uncompressed color image data- base[ C ]. Proc. SPIE, Storage and Retrieval Methods and Applica- tions for Multimedia, San Jose, 2004. 被引量:1

二级参考文献11

  • 1Fridrich J.Digital image forensics[J].IEEE Signal Processing Magazine, 2009,26 (2) : 26-37. 被引量:1
  • 2Farid H.Image forgery detection[J].IEEE Signal Processing Magazine,2009,26(2) : 16-25. 被引量:1
  • 3Fan Z, de Queiroz R L.Identification of bitmap compression history:JPEG detection and quantizer estimation[J].IEEE Transactions on Image Processing,2003,12(2):230-235. 被引量:1
  • 4Ye S, Sun Q, Chang E C.Detecting digital image forgeries by measuring inconsistencies of blocking artifact[C]//IEEE International Conference on Multimedia and Expo,2007:12-15. 被引量:1
  • 5Popescu A C.Statistical tools for digital forensics[D].Dartmouth College, 2005. 被引量:1
  • 6Fridrich J, Lukas J.Estimation of primary quantization matrix in double compressed JPEG images[C]//Proceedings of Digital Forensic Research Workshop, Cleveland, OH,USA,2003. 被引量:1
  • 7Farid H.Exposing digital forgeries from JPEG ghosts[J].IEEE Transactions on Information Forensics and Security, 2009,4( 1 ): 154-160. 被引量:1
  • 8Pennebaker W, Mitchell J.JPEG: Still image data compression standard[M].New York:Van Nostrand Reinhold, 1993. 被引量:1
  • 9Clarke R J.Transform coding of images[M].New York:Academic, 1985. 被引量:1
  • 10He J, Lin Z, Wang L, et al.Detecting doctored JPEG images via DCT coefficient analysis[C]//LNCS 3953 :ECCV 2006,Berlin Heidelberg, 2006: 423-435. 被引量:1

共引文献4

同被引文献23

  • 1Fan Z, de Queiroz R L. Identification of bitmap compression history: JPEG detection and quantizer estimation [J]. Image Processing, IEEE Transactions on, 2003,12(2) :230-235. 被引量:1
  • 2I.uo W, Huang J, Qiu G. JPEG error analysis and its applications to digital image forensics[J]. Information Forensics and Security, IEEE Transactions on. 2010,5(3) :480-491. 被引量:1
  • 3Farid H. Exposing digital forgeries from JPEG ghosts[J]. Information Forensics and Security, IEEE Transactions on, 2009,4 ( 1 ) : 154-160. 被引量:1
  • 4LI F, Tingting M A, Dun C A O. Blind forensics for digital composite images based on JPEG blocking artifact [ J ]. Journal of Computational Information Systems, 2010, 6 (14):4835-4840. 被引量:1
  • 5Li W, Yuan Y, Yu N. Passive delection of doctored JPEG image via block artifact grid extraction[J]. Signal Processing, 2009,89(9): 1821-1829. 被引量:1
  • 6Tralic D, Petrovic J, Grgic S. JPEG image tampering detection using blocking artifacts[C]// Systems, Signals and Image Processing (IWSSIP), 2012 19th International Conference on. IEEE, 2012:5-8. 被引量:1
  • 7Lam E Y, Goodman J W. A mathematical analysis of the DCT coefficient distributions for images [J]. Image Processing, IEEE Transactions on, 2000,9(10):1661-1666. 被引量:1
  • 8Schaefer G, Stich M (2004). "UCID-An Un-compressed Colour Image Database"[C]. Proc.SHE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA. 2004:472-480. 被引量:1
  • 9CASIA Tampered Image Detection Evaluation Database, http://forensics. idealtest. org. 被引量:1
  • 10KEE E,JOEtNSON M K ,FARII) H. Digital image autilentication from JPEG headers[ J ]. IEEE Transactions on Information Forensics and Security ,2011,6 ( 3 ) : 1066 - 1075. 被引量:1

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部