JPEG图像重压缩检测及篡改定位
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着数码相机的普及,数字图像以其方便、即时、易传输等优点,成为现代通信中一种重要的媒体形式。同时,由于简单易用的数字图像处理软件的不断发展与广泛流传,使得数字图像的伪造和篡改变得易如反掌。近年来,国内外在政治、司法、新闻等领域频繁出现的造假事件使得人们对于数字图像的真实性和完整性产生了质疑,因此数字图像取证技术,尤其是利用图像自身特性的盲取证技术,成为近年来学术界的研究热点。本文从重压缩操作对JPEG图像带来的统计特性上的影响为出发点,研究了JPEG重压缩操作的检测方法,以及利用重压缩检测来定位JPEG图像篡改区域的方法。本文的主要工作如下:
     (.1)提出了一种基于DCT系数灰度共生矩阵的重压缩检测方法。首先分析了重压缩操作对JPEG图像DCT系数的影响,考虑到之前的大部分重压缩检测算法都只考虑了DCT系数的一阶统计特性,而没有考虑相邻DCT系数间的相关性,这是导致之前算法检测准确率低的一个主要原因。本文从这一角度入手,分析了重压缩操作对DCT系数灰度共生矩阵的统计特性的影响,发现此二阶统计特征可以有效地放大重压缩操作给图像DCT系数带来的影响,进而提高重压缩检测的准确率。
     (2)提出了一种基于DCT系数首位有效数字Markov模型的重压缩检测算法。首先分析了重压缩操作对DCT系数首位有效数字分布特性的影响,并给出利用Markov过程来对DCT系数首位有效数字分布进行建模的方法。对比实验结果表明,该算法能够有效地检测重压缩操作,尤其是在第二次压缩质量远小于第一次压缩质量时,检测准确率较之前的算法有很大提高。
     (3)提出了一种基于重压缩检测的JPEG图像篡改定位模型。由于JPEG图像经过篡改后通常会再次保存为JPEG格式,因此会引入重压缩操作。分析表明,可以将篡改后的JPEG图像分为两部分,一部分为背景区域,这部分区域具有重压缩特性,而另一部分为篡改区域,这部分区域的重压缩特性大大减弱,基本不具有重压缩特性。因此,通过检测待测图像中的某一区域是否具有重压缩特性,可以定位图像中的篡改区域。实验表明,该模型能够有效检测和定位出图像的篡改区域,而且对旋转、缩放、羽化等操作具有鲁棒性,同时对不同压缩质量的篡改图像也具有鲁棒性。
With the popularity of digital cameras, digital image has become one of the most important media forms in modern communication because of its convenience, instant and easy to transport. At the same time, with the development and widely spreads of the image processing software, tampering a digital image becomes an easy job for non-specialist and the tampered image is hardly detected by the naked eyes. In recent years, more and more tampered images emerged in the field of political, judicial, news, etc. both in domestic and overseas, which has caused skeptical about the integrity and authenticity of the images. Thus, image forensics, especially those technics using only the image characteristics, has become a hotspot of study in recent years. In this paper, considering double compression effects on the statistical characteristics of JPEG images, we proposed two different double compression detection methods, and a JPEG image tampering localization model using double compression detection features. The main contribution of this thesis includes:
     (1) Proposed a double compression detection method based on the Gray Level Co-occurrence Matrix (GLCM) of the DCT (Discrete Cosine Transform) coefficients. Through deep analysis about the double compression effects on the DCT coefficients of JPEG images and those methods proposed to detect double compression previously, we find that some correlations between adjacent coefficients, which have been ignored in the previous works, can be used to increase the detection accuracy. Based on this analysis, we find that the Gray Level Co-occurrence Matrix, which is a second order statistics, can reflect the correlations and thus enlarge the double compression effects on DCT coefficients. Experiments show that this second order statistics do increase the double compression detection accuracy compared to the first order statistics.
     (2) Proposed a double compression detection method based on the Markov model of the first digits of DCT coefficients. After a comprehensive analysis about the double compression effects on the distribution of the first digits of DCT coefficients, we proposed to model the distribution of the mode based first digits of DCT coefficients using Markov transition probability matrix and utilize its stationary distribution as features for double compression detection. Experiments show the effectiveness of the proposed method, especially when the second compression factor is much lower than that of the first one, the detection results have a significant improvement.
     (3) Proposed a JPEG image tampering localization Model based on double compression detection. Most of the tampered image will be resaved in JPEG format to save the storage space while maintaining the image quality, which may leave double compression artifacts. Study on the tampered JPEG image shows that it can be divided into two parts:one is the original part that has double compression artifacts and the other is the tampered part without double compression artifacts, thus by detecting whether the image blocks have double compression artifacts, the tampered region can be determined. Experiment results show that the proposed model is effective under post-processing operations such as rotation, resizing, feathering, etc. What's more, the model gives promising results even when the tampered image has been compressed at a relatively low quality factor.
引文
[1]Yeung M. M, Mintzer F. An Invisible Watermarking Technique for Image Verification [C]. International Conference on Image processing, Santa Barbara, CA, Oct,26-29, 1997,2:680-683.
    [2]Fridrich J. Security of Fragile Authentication Watermarks with Localization[C]. Proc. of SPIE Photonic West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January,2002:691-700.
    [3]Fridrich J. Methods for Detecting Changes in Digital Images[C]. Proc. of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems, Melbourne, Australia, November,4-6,1998:173-177.
    [4]Lin C, Chang S. Semi-Fragile Watermarking for Authenticating JPEG Visual Content [C]. SPIE Security and Watermarking of Multimedia Contents Ⅱ, San Jose, CA, January, 2000.
    [5]Wu M, Liu B. Watermarking for image Authentication[C]. International Conference on Image Processing, Chicago, IL, USA, Oct,4-7,1998,2:437-441.
    [6]Fridrich J, Goljan M. Protection of Digital Image Using Self Embedding[R]. Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, May,14,1999.
    [7]Queluz M P. Towards Robust, Content based techniques for image authentication[C]. IEEE Second workshop on Multimedia Signal Processing, Redondo Beach, CA, Dec,7-9, 1998:297-302.
    [8]H. Farid, Siwei Lyu. Higher-order Wavelet Statistics and their Application to Digital Forensics[C]. Conference on Computer Vision and Pattern Recognition Workshop, Madison, Wisconsin, USA, June,16-22,2003:94-94.
    [9]S. Lyu, H. Farid. How Realistic is Photorealistic[J]. IEEE Transaction on Signal Processing,2005,53(2):845-850.
    [10]Chen W, Shi Y Q, Xuan G. Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristics Function[C]. IEEE International Conference on Multimedia and Expo, Beijing, July,2-5,2007:1123-1126.
    [11]Chen W, Shi Y Q, Xuan G, et al. Computer Graphics Identification Using Genetic Algorithm[C].19th International Conference on Pattern Recognition, Tampa, FL, Dec,8-11,2008:1-4.
    [12]P. Sutthiwan, J. Ye, Y.Q.Shi. An Enhanced Statistical Approach to Identifying Photorealistic Images[C]. Proc. of International Workshop on Digital Watermarking, Guildford, UK, Aug.24-26,2009:323-335.
    [13]Ng T, Chang S, Tsui M. Physics-Motivated Features for Distinguishing Photographic Images and Computer Graphics[C]. ACM Multimedia, Singapore, Nov.,2005.
    [14]崔霞,童学峰,宣国荣,等.基于直方图频域矩的自然图像和计算机图形的鉴别[C].第七届全国信息隐藏暨多媒体安全学术大会(CIHW2007),2007年11月12-14日,南京
    [15]王玉平,李生红,赵峰,等.基于AdaBoost的计算机生成图像检测算法[J].计算机仿真,2005,25(7):220-222.
    [16]郑二功,平西建.一种基于相邻像素一致性的数码照片与计算机图像鉴别方法[J].计算机研究与发展,2009,Suppl.:258-262.
    [17]McKay C, Swaminathan A, Hongmei Gou, et al. Image Acquisition Forensic:Forensic Analysis to Identify Image source[C]. IEEE International Conference of Acoustics, Speech and Signal Processing, Las Vegas, NV, March 31-April 4,2008:1657-1660.
    [18]Geradts Z J, Bijhold J, Kieft M, et al. Methods for identification of images acquired with Digital cameras[C]. Proc. SPIE, Enabling Technologies for Law Enforcement and Security,2001,4232:505-512.
    [19]Dirik A E, Sencar H T, Memon N. Source Camera Identification Based on Sensor Dust Characteristics[C]. IEEE Workshop on Signal Processing Applications for Public Security and Forensics, Washington, DC, USA, April,11-13,2007:1-6.
    [20]Choi K S, Lam E Y, Wong K K Y. Automatic source camera identification using the intrinsic lens radial distortion[J]. Optics Express,2006,14 (24):11551-11565.
    [21]Choi K S, Lam E Y, Wong K K Y. Source Camera Identification Using Footprints from Lens Aberration[C]. Digital Photography Ⅱ, Vol.6069 of Proc. SPIE,2006:155-162.
    [22]Fridrich J. Digital Image Forensics Using Sensor Noise[J]. IEEE Signal Processing Magazine,2009,26(2):26-37.
    [23]Filler T, Fridrich J, Goljan M. Using Sensor Pattern Noise for Camera Model Identification[C]. Proc. ICIP 2008, San Diego, California, October 12-15, 2008:1296-1299.
    [24]Lukas J, Fridrich J, Goljan M. Digital "Bullet Scratches" for Images[C]. IEEE International Conference of Image Processing, Sept.11-14,2005,3:65-68.
    [25]Chen M, Fridrich J, Gol jan M, et al. Determining Image Origin and Integrity Using Sensor Noise[J]. IEEE Transaction on Information Forensics and Security, March 2008,3:74-90.
    [26]Lukas J, Fridrich J, Goljan M. Determining Digital Image Origin Using Sensor Imperfections[C]. Proc. SPIE Electronic Imaging, San Jose, CA, January,16-20, 2005:249-260.
    [27]E. J. Delp. Digital Image Forensics Through the Use of Noise Reference Patterns[C]. Proceedings of the 2006 SURF Conference,2006.
    [28]崔夏荣,苏光大.基于模式噪声的数字图像来源鉴别[J].光电子.激光,2007,18(11):1239-1243.
    [29]崔夏荣,苏光大.基于噪声相关性的数字图像鉴别[J].光电子.激光,2007,18(11):1386-1390.
    [30]Popescu A C, Farid H. Exposing Digital Forgeries in Color Filter Array Interpolated images[J]. IEEE Transaction on Signal Processing, Oct,2005,53 (10):3948-3959.
    [31]S. Bayram, H. Sencar, N. Memon, et al. Source camera identification based on CFA interpolation[C]. IEEE International Conference on Image Processing, ICIP2005, Genova, Italy, Sep.11-14,2005,3:69-72.
    [32]S. Bayram, H. Sencar, N. Memon. Improvements on source camera-model identification [C]. IFIP Working Group 11.9 on Digital Forensics, Orlando, Florida, USA, Jan.29-Feb.1,2006.
    [33]Y. Long, Y. Huang. Image based source camera identification using demosaicking[C]. IEEE 8th Workshop on Multimedia Signal Processing. Fairmont Empress Hotel Victoria, BC, Canada, Oct.3-6,2006:419-424.
    [34]A. Swaminathan, M. Wu, K. J. R. Liu. Component forensics of digital cameras:a non-intrusive approach[C]. IEEE Conference on Information Science and System, Princeton University, Princeton, New Jersey, USA, Mar.22-24,2006:1194-1199.
    [35]A. Swaminathan, M. Wu, K. J. R. Liu. Non-intrusive forensic analysis of visual sensors using output images[C]. IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP2006, Toulouse, France, May,14-19,2006,5: V-V.
    [36]A. Swaminathan, M. Wu, K. J. R. Liu. Non-intrusive component forensics of visual sensors using output images[J]. IEEE Transaction on Information Forensics and Security,2007,2 (1):91-106.
    [37]王波,孔祥维,尤新刚,等.基于协方差矩阵的CFA插值盲检测方法[J].电子与信息学报,2009年,31卷(5期):1175-1179.
    [38]H. Farid. Blind Inverse Gamma Correct ion [J]. IEEE Transactions on Image processing, Oct,2001,10 (10):1428-1433.
    [39]Choi K S, Lam E Y, Wong K K Y. Source Camera Identification by JPEG Compression Statistics for Image Forensics[C].2006 IEEE Region 10 Conference, Hong Kong, Nov.,14-17,2006:1-4.
    [40]Kharrazi M, Sencar H T, Memon N. Blind Source Camera Identification[C].2004 International Conference on Image Processing, Oct.24-27,2004,1:709-712.
    [41]Min-Jen Tsai, Guan-Hui Wu. Using Image Features to Identify Camera Sources[C]. 2006 IEEE Transaction Conference on Acoustic, Speech and Signal Processing, May 14-19,2006,2:II-II.
    [42]Min-Jen Tsai, Cheng-Liang Lai, Jung Liu. Camera/Mobile Phone Source Identification for Digital Forensics[C]. IEEE International Conference on Acoustics, Speech and Signal Processing, Honolulu, HI, April 15-20,2007,2:221-224.
    [43]Fanjie Meng, Xiangwei Kong, Xingang You. A New Feature-based Method for Source Camera Identification[J]. IFIP International Federation for Information Processing,2008,285:207-218.
    [44]Guanshuo Xu, Shang Gao, Yun Qing Shi, et al. Camera-Model Identification Using Markovian Transition Probability Matrix[R]. Lecture Notes in Computer Science, 2009,5703:294-307.
    [45]A. C. Popescu, H. Farid. Statistical Tools for Digital Forensics[C].6th International Workshop on Information Hiding, Toronto, Canada, may,2004.
    [46]A. C. Popescu, H. Farid. Statistical Tools for Digital Image Forensics[D]. Ph. D. Dissertation, Department of Computer Science, Dartmouth College,2005.
    [47]Mahdian, Babak Saic, Stanislav. Detecting Double Compressed JPEG Image[C].3rd International Conference on Crime Detection and Prevention, London, Dec.3-3, 2009:1-6.
    [48]Lukas J, Fridrich J. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images[C]. Proc.0 DFRWS 2003, Cleveland, OH, USA, August 5-8,2003.
    [49]D. Fu, Y. Q. Shi, and W. Su. A generalized Benford' s law for JPEG coefficients and its applications in image forensics[C]. Proc. of SPIE Conference on Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, USA, January 2007.
    [50]Chunhua Chen, Shi Y. Q, Wei Su. A Machine Learning Based Scheme for Double JPEG Compression Detection[C].19th International Conference on Pattern Recognition, Tampa, FL, Dec.8-11,2008:1-4.
    [51]Huang F, Huang j, Shi Y. Q. Detecting Double JPEG Compression with the Same Quantization Matrix [J]. IEEE Transactions on Information Forensics and Security, Sept.2,2010,99:1-1.
    [52]Y. L. Chen, C. T. Hsu. Detecting Doubly Compressed Images Based on Quantization Noise Model and Image Restoration[C]. IEEE International Workshop on Multimedia Signal Processing, Oct.5-7,2009:1-6.
    [53]Xiaoying Feng and Gwenael Doerr. JPEG Re-Compression Detection[C]. Proc. SPIE, San Jose, California, USA, Jan.18,2010,Vol.7541.
    [54]戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图像图形学报,Nov.,2006,11(11):1619-1622.
    [55]王俊文,刘光杰,戴跃伟,等.一种估计JPEG双重压缩原始量化步长的新方法[J].电子与信息学报,April,2009,31(4):836-839.
    [56]岳红原,黄坚.基于双JPEG压缩统计特性的图像篡改检测方法[J].南京工程学院学报(自然科学版),Jun,2009,7(2):34-40.
    [57]Popescu A C, Farid H. Exposing Digital Forgeries by Detecting Traces of Re-sampling[J]. IEEE Transactions on Signal Processing,2005,53(02):758-767.
    [58]Matthias Kirchner. Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue[C]. Proceedings of ACM Workshop on Multimedia and Security.2008:11-20.
    [59]Matthias Kirchner. On the Detectability of Local Resampling in Digital Images[C]. IS&T/SPIE Electronic Imaging, San Jose, California, USA, Jan.28,2008.
    [60]Matthias Kirchner, Thomes Gloe. On Resampling Detection in Re-compressed Images [C]. Frist IEEE International Workshop on Information Forensics and Security, London, Dec.6-9,2009:21-25.
    [61]L. Nataraj, A. Sarkar, B. S. Manjunath. Adding Gaussian Noise to "Denoise" JPEG' for Detecting Image Resizing[C].16th IEEE International Conference on Image Processing, Cairo, Nov.7-10,2009:1493-1496.
    [62]L. Nataraj, A. Sarkar, B. S. Manjunath. Improving Re-sampling Detection by Adding Noise[C]. Proceedings of the SPIE,2010,7541:1-11.
    [63]Prasad S, Ramakrishnan K R. On Resampling Detection and Its Application to Image Tampering[C]. Proceedings of the IEEE International Conference on Multimedia and Exposition. Toronto, Canada,2006:1325-1328.
    [64]郝丽,孔祥维,郭云彪.DCT域统计特性的图像重采样检测[J].信息安全与通信保密,2009,12:60-63.
    [65]汪然,平西建.基于图像纹理复杂度和奇异值分解的重采样检测[J].计算机辅助设计与图形学学报,Sep.2010,22(9):1606-1612.
    [66]H. H. Tong, M. J. Li, H. J. zhang, et al. Blur Detection for Digital Image Using Wavelet Transform[C].2004 IEEE International Conference on Multimedia and Expo, June 27-30,2004,1:27-30.
    [67]Sutcu Y, Coskun B, Sencar H T, et al. Tamper detection based on regularity of wavelet transform coefficients[C]. Proceedings of IEEE International Conference on Image Processing, San Antonio, Texas, USA,2007,1:397-400.
    [68]Hsiao D Y, Pei S C. Detecting digital tampering by blur estimation[C]. Proceedings of International Workshop on Systematic Approaches to Digital Forensic Engineering, Taipei, Taiwan,2005:264-278.
    [69]王波,孙璐璐,孔祥维,等.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,Dec.,2006,34(12A):2451-2454.
    [70]周琳娜,王东明,郭云彪,等.基于数字图像边缘特性的形态学滤波取证技术[J].电子学报,June,2008,36(6):1047-1051.
    [71]孙堡垒,周琳娜,张茹.基于Benford定律的高斯模糊篡改取证[J].计算机研究与发展,2009,Vol.46(增刊):211-216.
    [72]曹刚,赵耀,倪蓉蓉.一种基于振铃效应分析的图像锐化取证算法[J].计算机研究与发展,2009,Vol.46(增刊):217-220.
    [73]王俊文,张琪,刘光杰,等.利用异常边缘进行图像锐化篡改取证[J].解放军理工大学学报(自然科学版),June,2009,10(3):237-241.
    [74]Chen W, Shi Y Q, Su W. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function[C]. Proceedings of the SPIE, San Jose, USA,2007, Vol.6505(6505R).
    [75]Shi Y Q, Chen C, Chen W. A Natural Image Model Approach to Splicing Detection[C]. Proceedings of the 9th Workshop on Multimedia & Security, Dallas, Texas, USA, Sep.2007:51-62.
    [76]Jing Zhang, Yun Zhao, Yuting Su. A New Approach Merging Markov and DCT Features for Image Splicing Detection[C]. IEEE International Conference on Intelligent Computing and Intelligent System, Shanghai, Nov.20-22,2009:390-394.
    [77]Ng T, Chang S, Tsui M. Using Geometry Invariants for Camera Response Function Estimation[C]. IEEE Conference on Computer Vision and Pattern Recognition, Minneapolis, MN, June 17-22,2007:1-8.
    [78]Yu-Feng Hsu, Shih-Fu Chang. Image splicing detection using camera response function consistency and automatic segmentation[C]. IEEE International Conference on Multimedia and Expo, Beijing, July 2-5,2007:28-31.
    [79]Z. C. Lin, R. R. Wang, X.O. Tang, etc. Detecting doctored images using camera response normality and consistency[C]. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, June 20-25,2005,1:1087-1092.
    [80]M. K. Johnson, H. Farid. Exposing Digital Forgeries Through Chromatic Aberration [C]. ACM Multimedia and Security Workshop, Geneva, Switzerland,2006:48-55.
    [81]张震,康吉全,平西建,等.用统计特征量实现的图像拼接盲检测[J].计算机应用,Dec.2008,28(12):3108-3115.
    [82]张震,任远,平西建,等.基于图像质量评价量和隐马尔科夫模型的图像拼接检测[J].武汉大学学报(信息科学版),Oct.2008,33(10):1030-1033.
    [83]李寿弟,赵峰,张爱新,等.一种改进的图像拼接检测算法[J].信息安全与通信保密,2010(01):76-78.
    [84]于振华,金波,陈璐艺,等.基于马尔科夫和HHT的图像拼接盲检测[J].信息安全与通信保密,2010(01):107-112.
    [85]J. Fridrich, D. Soukal, and J. Lukds. Detection of copy-move forgery in digital images[C]. In Proceedings of Digital Forensic Research Workshop, August 2003.
    [86]Al inC PoPeseu, Hany Farid. Exposing Digital Forgeries by Detecting Duplicated Image Regions[R]. Technical Report, Department of Computer Science, Dartmouth College,2004.
    [87]Bayram S, Sencar H.T, Memon N. An Efficient and Robust Method for Detecting Copy-Move Forgery[C]. IEEE International Conference on Acoustics, Speech and Signal Processing, Taipei, April 19-24,2009:1053-1056.
    [88]康晓兵,魏生民.傅里叶_梅林变换的图像复制篡改检测[J].计算机工程与应用,2008,44(35):30-33.
    [89]康晓兵,魏生民.基于TSVD的图像复制区域伪造检测算法[J].计算机应用研究,Dec.2008,25(12):3741-3743.
    [90]李生红,张爱新,郑燕双,等.基于SIFT的图像复制遮盖篡改检测技术[J].解放军理工大学学报(自然科学版),Aug.2009,10(4):339-343.
    [91]魏为民,王朔中,唐振军.一类数字图像篡改的被动认证[J].东南大学学报(自然科学版),Sept.2007,Vol.37(增刊):58-61.
    [92]王睿,方勇.基于不变矩的Copy-Move型篡改图像盲检测方法[J].中国图像图形学报,Oct.2008,13(10):1938-1941.
    [93]Swaminathan A, Wu M, Liu K J R. Component Forensics of Digital Cameras:A Non-Intrusive Approach[C].40th Annual Conference on Information Sciences and Systems, Princeton, NJ, March 22-24,2006:1194-1199.
    [94]Dirik A. E, Memon N. Image Tampering Detection Based on Demosacing Artifacts[C]. 16th IEEE International Conference on Image Processing, Cairo, Nov.7-10, 2009:1497-1500.
    [95]Lukds J, Fridrich J, and Goljan M. Detecting Digital Image Forgeries Using Sensor Pattern Noise[C]. Proc. of SPIE Electronic Imaging, Photonics West, San Jose, CA, USA, January,2006.
    [96]Chen M, Fridrich J, Goljan M, etc. Determining Image Origin and Integrity Using Sensor Noise [J]. IEEE Transactions on Information Forensics and Security, March, 2008,3 (1):74-90.
    [97]Johnson M. K, Farid H. Exposing Digital Forgeries in Complex Lighting Environments [J]. IEEE Transactions on Information Forensics and Security, Sept.2007,2 (3):450-461.
    [98]骆伟祺,黄继武.一种JPEG图像的篡改检测方法:中国,200610036602.8[P],2006,7,20.
    [99]李晟,张新鹏.利用JPEG压缩特性的合成图像检测[J].应用科学学报,May 2008,26(3):281-287.
    [100]陈波,朱秋煜.基于光照方向的人像合成图像的检测[J].计算机仿真,March 2009,26(3):202-204.
    [101]G K Wallace. The JPEG Still Picture Compression Standard[J]. IEEE Transactions on Consumer Electronics,1992,38(1).ⅹⅴⅲ-ⅹⅹⅹⅳ
    [102]R. M. Haralick, K. S. Shanmugam, I. Dinstein. Textural Features for Image Classification[J]. IEEE Transactions on System, man and Cybemetics,1973,3(6): 610-621.
    [103]G. Beliakov, S. James, L. Troniano. Texture Recognition by Using GLCM and Various Aggregation Functions[C]. IEEE International Conference on Fuzzy Systems, Hong Kong, June 1-6,2008:1472-1476.
    [104]S. Kamble, S. Agarwal, V. K. Shrivastava, et al. DCT based texture watermarking using GLCM[C].2010 IEEE 2nd International Advance Computing Conference, Feb.19-20,2010:185-189.
    [105]A. K. Millilineni, Pei-ju Chiang, Gazi N. Ali, et al. Printer Identification Based on Texture Features[C]. Proc. IS&Ts NIP 20:'International Conference on Digital Printing Technologies, October/November,2004,20:306-311.
    [106]Bin Li, Yun Q. Shi, Jiwu Huang. Detecting doubly compressed JPEG images by using mode based first digit features[C]. IEEE International Workshop on Multimedia Signal Processing,2008:730-735.
    [107]王丽艳,沈玉波,刘洪.随机过程[M].辽宁:大连理工出版社,2008.
    [108]Wei Wang, Jing Dong and Tieniu Tan. Image tampering detection based on stationary distribution of Markov chain[C].17th IEEE International Conference on Image Processing,2010:2101-2104.
    [109]Chang C C, Lin C J. LIBSVM:a library for support vector machines[EB/OL]. http://www.csie.ntu,edu,tw/-cjlin/libsvm/
    [110]Hsu C W, Chang C, Lin C J. A Practical Guide to Support Vector Classification [R]. Technical Report.2004.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700