期刊文献+

利用块效应特征的JPEG图像盲取证研究进展 被引量:8

Survey:blind forensic of JPEG forgeries based on blocking artifacts
原文传递
导出
摘要 数字图像的盲取证技术由于不依赖任何预嵌入的信息来鉴别图像真实性和完整性的优势,正逐步成为数字媒体安全领域新的研究热点。由于JPEG图像是目前最流行的图像格式,并且块效应是JPEG图像与生俱来的本质特征,因此如何更加有效地利用块效应特征对JPEG图像的真伪进行盲取证研究具有非常重要的现实意义和应用价值。首先对目前国内外利用JPEG图像编码特性的盲取证方法进行归类分析;然后重点针对利用块效应特征的JPEG图像盲取证技术展开讨论,详细介绍并总结了基于块效应测度和基于块效应网格提取的两类盲取证算法的核心思想和局限性;最后提出了存在的问题及未来的研究方向。 Blind digital image forensics, a technology for detecting image authenticity and integrity without relying on any pre-embedded information, is emerging as a new hotspot in the digital media security filed. Since JPEG is the most popular image format and blocking artifacts are the inherent characteristics of JPEG images, using blocking artifacts more effectively for the authentication of JPEG image forgeries has very important practical significance and application value. First, the state-of-the-art algorithms of blind forensics based on JPEG image coding characteristics are classified and analyzed. Then we focus on blind forensic algorithms of tempered JPEG images based on blocking artifacts. Two types are introduced and summarized in detail : one based on blocking artifacts measurement and the other based on blocking artifacts grid extraction. Finally, we discuss unresolved problems and future research directions.
出处 《中国图象图形学报》 CSCD 北大核心 2013年第6期613-620,共8页 Journal of Image and Graphics
基金 天津市科技支撑计划基金项目(10ZCKFGX00700)
关键词 JPEG块效应 伪造图像 被动盲取证 篡改检测 JPEG blocking artifacts image forgery passive-blind forensics tampering detection
  • 相关文献

参考文献33

  • 1Farid H. A survey of image forgery detection [ J ]. IEEE Signal Processing Magazine, 2009,26 (2) : 16-25. 被引量:1
  • 2Eric Hamilton. JPEG file interchange format, Versionl. 02[ EB/ OL]. (1992-9-1) [ 2012-10-17 ], http://www, jpeg. org/public/ jfif. pdf. 被引量:1
  • 3Fan Z, de Queiroz R L Identification of bitmap compression his- tory : JPEG detection and quantizer estimation [ J ]. IEEE Transac- tions on Image Processing,2003,12 (2) :230-235. 被引量:1
  • 4Neelamani R, Queiroz R d, Fan Z G, et al. JPEG compression history estimation for color images [ J ]. IEEE Transactions on Image Processing, 2006,15 ( 6 ) : 1365-1378. 被引量:1
  • 5Lin G, Chang M, Chen Y. A passive-blind forgery detection scheme based on content-adaptive quantization table estimation [ J]. IEEE Transactions on Circuits and Systems for Video Tech- nology,2011,21 (4) :421-434. 被引量:1
  • 6Fridrich J, Lukas J. Estimation of primary quantization matrix in double compressed JPEG images [ C ]//Proceedings of Digital Fo- rensic Research Workshop. Cleveland, OH, USA : Elsevier,2003 : 67 -84. 被引量:1
  • 7Farid H. Exposing digital forgeries from JPEG ghosts [ J ]. IEEE Transactions on Information Forensics and Security,2009,4( 1 ) :154-160. 被引量:1
  • 8Huang F, Huang J, Shi Y Q. Detecting double JPEG compre- ssion with the same quantization matrix [ J ]. IEEE Transactions on Information Forensics and Security,2010,5 (4) :848-856. 被引量:1
  • 9Chen Y, Hsu C. Detecting reeompression of JPEG images via periodicity analysis of compression artifacts for tampering detec- tion[ J]. IEEE Transactions on Information Forensics and Securi- ty,2011,6(2) :396-406. 被引量:1
  • 10Bianchi T, Piva A. Detection of non-aligned double JPEG com- pression with estimation of primary compression parameters [C]//Proeeedings of IEEE International Conference on Image Processing. Brussels: IEEE Press,2011 : 1929-1932. 被引量:1

二级参考文献45

  • 1Luo W, Qu Z, Pan F, et al. A survey of passive technology for digital image forensics[J]. Frontiers of Computer Science in China, 2007,1(2) : 166-179. 被引量:1
  • 2Ng Tian-Tson, Chang Shih-Fu, Lin Ching-Yung, et al. Passiveblind image forensics[M]//Zeng W, Yu H, I.in C Y. Multimedia Security Technologies for Digital Rights Management. Orlando: Academic Press, 2006 : 383-412. 被引量:1
  • 3Ye Shuiming, Sun Qibin, Chang Ee-chien. Detecting digital image forgeries by measuring inconsistencies of blocking artifact[C]// Proceedings of ICME. New York: IEEE Computer Society, 2007:12-15. 被引量:1
  • 4Popescu A C. Statistical tools for digital forensics[D]. Hanover, NH : Department of Computer Science, Dartmouth College, 2005. 被引量:1
  • 5He J F, Lin Z C, Wang L F, et al. Detecting doctored JPEG images via DCT coefficient analysis[C]//Proceedings of European Conference on Computer Vision. Berlin-Heidelberg-New York: Springer-Verlag, 2006 : 423-435. 被引量:1
  • 6Fu D D,Shi Y Q,Su W. A generalized Benford's law for JPEG eoeffieients and its applications in image forensics[C] // SPIE 6505. 2007 : 1-11. 被引量:1
  • 7Luo W Q,Qu Z H,Huang J W,et al. A novel method for detecting cropped and recompressed image block[C]//Proceedings of ICASSP. New York : IEEE Computer Society, 2007 : 217-220. 被引量:1
  • 8Robertson M A, Stevenson R L. DCT quantization noise in corn pressed images[J] IEEE Transactions on Circuits and Systems for Video Technology, 2005,15 (1) : 27-38. 被引量:1
  • 9Chen M, Fridrieh J, Goljan M, et al. Determining image origin and integrity using sensor noise[J]. IEEE Transactions on Information Forensics and Security, 2008, a ( 1 ) : 74-90. 被引量:1
  • 10Portilla J,Strela V, Wainwright M, et al. Image denoising using scale mixtures of gaussians in the wavelet domain [J]. IEEE Transactions on Image Processing,2003,12(11) :1338-1351. 被引量:1

共引文献37

同被引文献53

  • 1易红军,佘名高.MD5算法与数字签名[J].计算机与数字工程,2006,34(5):44-46. 被引量:23
  • 2KEE E,JOEtNSON M K ,FARII) H. Digital image autilentication from JPEG headers[ J ]. IEEE Transactions on Information Forensics and Security ,2011,6 ( 3 ) : 1066 - 1075. 被引量:1
  • 3YE S M, SUN Q B, CHANG E C. l)etex:ting digital image fi)rgeries by measuring inconsistenci of blocking artifact [ C ]//Proe of 1EEE International Confence on Multimedia mM Expo,2(X)7:12 -15. 被引量:1
  • 4AI,VAREZ P. Using extended file information(EXIF) files headers in digital evidence analysis[ J ]. Digital Evidence ,2004,2 ( 3 ) : 1 - 5. 被引量:1
  • 5KEE E,JOHNSON M K, FARID H. Digital image authenticatinn from JPEG headers[ J ]. IEEE Transactions on Information Forensics and Security ,2011,6( 3 ) : 1066 - 1075. 被引量:1
  • 6FRIDRICH J, LUKAS J. Estimation of primary quantization matrix in double compressed ]PEG images [ C]//Proceeding of Digital Fonsic Researc41 Workshop,Cleveland,OH,USA :Elsevier,2003:67 -84. 被引量:1
  • 7CHEN Y ,FLSU C. Detecting rccompre&,ion of JPEG via pefiMicity mudysis of ()nqJression artifacts for tamtfing detrx:tion [ J ]. IEEE Trantions on hrfommion Forensics and Setufity,2011,6(2) :396-406. 被引量:1
  • 8BIRAJDAR G, MANKAR V. Digital image forgerydetection using passive techniques: a survey [J]. Digital Investigation, 2013(10): 226-245. 被引量:1
  • 9LUO W, QU Z, HUANG J, et al. A novel method for detecting cropped and recompressed image block [C]∥ Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Honolulu, HI: IEEE, 2007: 217-220. 被引量:1
  • 10HAMDY S, EL MESSIRY H, ROUSHDY M, et al. Quantization table estimation in JPEG images [J]. International Journal of Advanced Computer Science and Applications, 2010, 1(6): 17-23. 被引量:1

引证文献8

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部