基于相机成像特性的数字图像真伪鉴定
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
新闻图片造假案例层出不穷,严重危害社会稳定。如何在未知原始图像情况下对图像内容真伪进行鉴定成为近年来媒体安全领域的研究热点。现有被动图像取证方法种类繁多,不胜枚举,按其原理大体可分为三类:基于约束理论的内容鉴定、基于痕迹学的内容鉴定和基于内部指纹的来源鉴定。本文分别从相机透视约束、噪声等级函数约束、线性对比度增强痕迹和图像复制-粘贴痕迹等多个视点对图像内容真伪鉴定展开研究,取得的创新成果概括如下:
     1.基于透视约束的图像拼接检测。近大远小是相机成像的基本透视特性。篡改者在图像中插入一个对象时,很难确定适当的物体成像高度使其服从透视约束关系。在不考虑相机上下倾角情况下,证明了图像中物体实际高度仅与其所在参考平面灭线(vanishing line)、物体在图像中的坐标位置、相机实际高度这三个量有关,而与相机内部参数无关。针对防伪取证,得出图像中两可疑物体实际高度比仅取决于参考平面灭线和物体坐标的结论,根据此结论提出了对不满足透视约束条件的插入对象的检测方法。实验表明该方法对图像压缩和下采样具有很强的稳健性。
     2.基于噪声等级函数不一致性的图像拼接检测。现有基于噪声不一致性取证方法多以高斯白噪声假设为前提,而在实际相机中传感器产生的噪声往往服从更复杂的分布。本文假设局部噪声标准差是图像局部亮度的函数,称之为噪声等级函数。现有用于去噪的噪声等级函数估计方法并不适合取证应用,存在样本集不完备和测量精度受图像内容影响较大的问题。通过推导噪声等级函数与相机响应函数之间的形状约束关系,提出了利用相机响应函数形状对噪声等级函数形状进行约束的联合估计方法。利用图像边缘区和非边缘区样本构造贝叶斯后验概率最大化模型,使噪声等级函数估计和相机响应函数估计同时达到最优。在此基础上提出一类取证算法,通过检测图像中局部区域块的噪声等级不一致性来判断该块是否来自其他图像。
     3.对线性对比度增强操作的检测和映射函数系数估计。线性函数是最基本的对比度增强映射函数。由于映射函数的斜率恒定不变,因此图像中直方图会产生周期性梳状效应。本文提出直方图频谱尖峰能量分析方法以检测此种效应,另外还得出分段线性对比度增强中,映射折线的斜率与直方图幅度谱峰值所在频率间的对应关系。以三折线对比度增强映射函数为例,实现了分段线性映射函数的参数估计。
     4.基于非负矩阵分解的稳健性图像复制-粘贴操作检测。图像的复制-粘贴操作是指篡改者复制图像部分区域,将它粘贴到本图像的其他区域。本文提出基于块特征匹配的检测方法。用非负矩阵分解得到图像特征,将分解得到的系数二值化,通过计算汉明距离进一步降低匹配复杂度。在保证足够稳健性的前提下,所提出的方法相对于现有基于特征系数相关性的匹配方法具有复杂度低,运算效率高的特点。该方法可抵抗滤波、压缩、低倍率缩放等操作。
     本论文提出的方法对于图像被动取证提供了几种有效手段。随着图像处理工具的发展,篡改技巧也不断改进和翻新,使检测的难度更高。进一步完善和提高图像取证技术是一项具有挑战性的长期任务。
News photo forgery scandals emerged continuously in recent years, and thesefake photos can mislead the public and cause serious social harm. How to detectimage forgery without any prior knowledge, which is defined as passive imageforensic techniques, is a new and hot topic for multimedia security researches. Thereare a variety of existing forensic methods, which can be roughly categorized into threegroups: constraints based image content authentication methods, traces based imageforgery detection methods and intrinsic fingerprint based image source identificationmethods. In this dissertation, we mainly focus on identifying image forgery usingperspective constraints and noise feature inconsistency, and detecting the tamperingtraces left by piecewise linear contrast enhancement and image copy-movemanipulations. The contributions of this dissertation are listed as follows:
     1. Propose an image splicing detection method using perspective constraints
     In visual perception, distant objects appear smaller than those close to theobserver. To insert one object into an image, due to the interference of perspectiveeffects, the forger may not control the proper size of the foreign object in this imageeasily. When neglecting camera tilt and roll, via derivation, we demonstrate that theheight of any object sitting on a reference plane can be uniquely decided by thevanishing line of the reference plane, the pixel coordinates of this object in the imageand the height of camera. Furthermore, we develop this characteristic into imageforensics. To eliminate the dependence on camera height, we estimate the height ratioof two objects both resting on the reference plane and evaluate it with reference ratio.Since it do not need any prior knowledge of camera parameters, the proposed perspective constraints based method can be widely used for forensic applications.The experimental results demonstrate the efficacy of the method, even though theimages are down-sampled and high-ratio compressed.
     2. Develop a MAP based noise level function estimation method and apply it intoimage splicing detection
     Existing noise inconsistency based image forensic methods are all with theassumption of man-made white noise. However, this assumption does not hold inmost practical sensor noise generation process. In this dissertation, the standarddeviation of noise distribution is modeled as a function with respect to image intensity,and this function is defined as noise level function (NLF). In comparison todenoising-oriented methods, incomplete sample set and unstable statistic measuringare both major challenges for application in forensics. After exposing the closerelationship between NLF and camera response function (CRF), we fit the curve ofNLF with the constraints imposed by the shape of CRF. Then we formulate aBayesian maximum a posteriori (MAP) framework to optimize the NLF estimation.Besides, we design a novel splicing forgery detection method based on the noise levelinconsistency maintaining in each image block pair from different origins.
     3. Propose a method to detect the trace of linear contrast enhancement andestimate the mapping parameters simultaneously
     Linear contrast enhancement is one of the common contrast modificationapproaches. Owning to the constant slope in linear mapping function, periodiccomb-like artifacts appear in image histogram. We exploit histogram frequencyanalysis method to expose this artifact. Also based on this observation, a parametersestimation approach is proposed. The peak frequency in spectrum has a strongrelationship with the slope of mapping function for estimation. To exemplify theefficacy of the proposed method, a three piecewise linear mapping function issupposed for estimation.
     4. Propose an approach to detect image copy-move forgery via non-negativematrix factorization and lexicographic sorting matching
     A manipulation duplicating one region of the image and pasting to another in thesame image is known as copy-move forgery. The proposed method, which belongs tothe block-feature matching category, extracts features from each block usingnon-negative matrix factorization. In order to further reduce the matching complexity,the feature coefficients are quantized to be binary and difference between each blockpair are measured by Hamming distance. A lexicographic sorting is also introduced toeliminate the redundant matchings. Low extraction complexity and high matchingefficiency are both the main advantages of the proposed method, the effectiveness ofwhich to conter filtering, compression and minor rescaling is demonstrated inexperimental results.
引文
[1] P. W. Wong and N. Memon, Secret and public key image watermarking schemes forimage authentication and ownership verification, IEEE Transactions on ImageProcessing,2001,10(10):1593–1601.
    [2] X. Zhang and S. Wang, Fragile watermarking with error-free restoration capability,IEEE Transactions on Multimedia,2008,10(8):1490–1499.
    [3] V. Monga and B. L. Evans, Perceptual image hashing via feature points:performance evaluation and trade-offs, IEEE Transactions on Image Processing,2006,15(11):3453–3466.
    [4] H. Farid, Image forgery detection, IEEE Signal Processing Magazine,2009,26(2):16-25.
    [5] J. Fridrich, Digital image forensics, IEEE Signal Processing Magazine,2009,26(2):26-37.
    [6] A. Swaminathan, M. Wu, and K. J. R. Liu, Component forensics, IEEE SignalProcessing Magazine,2009,26(2):38-48.
    [7] T.-T. Ng and S.-F. Chang, Identifying and prefiltering images, IEEE SignalProcessing Magazine,2009,26(2):49-58.
    [8] M. K. Johnson and H. Farid, Exposing digital forgeries by detecting inconsistenciesin lighting, in: Proceedings of ACM workshop on Multimedia and security, NewYork, NY, USA, August1-2,2005, pp.1-9.
    [9] M. K. Johnson and H. Farid, Exposing digital forgeries in complex lightingenvironments, IEEE Transactions on Information Forensics and Security,2007,2(1):450-461.
    [10] M. K. Johnson and H. Farid, Exposing Digital Forgeries Through SpecularHighlights on the Eye, in: Proceedings of International Workshop on InformationHiding, Saint Malo, France, June11-13,2007, pp.311-325.
    [11] E. Kee and H. Farid, Exposing digital forgeries from3-D lighting environments, in:Proceedings of IEEE International Workshop on Information Forensics and Security,Seattle, USA, December12-15,2010, pp.1-6.
    [12] L. Wu, X. Cao, W. Zhang, and Y. Wang, Detecting image forgeries using metrology,Machine Vision and Applications, in press, DOI:10.1007/s00138-010-0296-6.
    [13] W. Zhang, X. Cao, J. Zhang, J. Zhu, and P. Wang, detecting photographiccomposites using shadows, in: Proceedings of IEEE International Conference onMultimedia and Expo, New York, NY, USA, June28-July2,2009, pp.1042-1045.
    [14] Q. Liu, X. Cao, C. Deng, and X. Guo, Identifying image composites through shadowmatte consistency, IEEE Transactions on Information Forensics and Security,2011,6(3):1111-1122.
    [15] W. Zhang, X. Cao, Z. Feng, J. Zhang and P. Wang, Detecting photographiccomposites using two-view geometrical constraints, in: Proceedings of IEEEInternational Conference on Multimedia and Expo, New York, NY, USA, June28-July2,2009, pp.1078-1081.
    [16] W. Zhang, X. Cao, Y. Qu, Y. Hou, H. Zhao, and C. Zhang, Detecting and extractingthe photo composites using planar homography and graph cut, IEEE Transactions onInformation Forensics and Security,2010,5(3):544-555.
    [17] H. Yao, S. Wang, Y. Zhao, and X. Zhang, Detecting image forgery using perspectiveconstraints, IEEE Singal Processing Letters,2012,19(3):123-126.
    [18] B. Mahdian and S. Saic, Using noise inconsistencies for blind image forensics,Image and Vision Computing,2009,27(10):1497-1503.
    [19] X. Pan, X. Zhang, and S. Lyu, Exposing image forgery with blind noise estimation,in: Proceedings of ACM workshop on Multimedia and security, Buffalo, USA,September29-30,2011, pp.15-20.
    [20] D. Zoran and Y. Weiss, Scale invariance and noise in nature image, in: Proceedingsof IEEE International Conference on Computer Vision, Kyoto, Japan, September27-October4,2009, pp.2209-2216.
    [21] J. O'Brien and H. Farid, Exposing photo manipulation with inconsistent reflections,ACM Transactions on Graphics,2012,31(1):4(1-11).
    [22] H. Farid and M. J. Bravo, Image forensic analyses that elude the human visualsystem, in: Proceedings of SPIE Symposium on Electronic Imaging, San Jose, USA,January18-20,2010, pp.754106.
    [23] P. Kakar, N. Sudha, and W. Ser, Exposing digital image forgeries by detectingdiscrepancies in motion blur, IEEE Transactions on Multimedia,2011,13(3):443-452.
    [24] V. Conotter, J. O'Brien, and H. Farid, Exposing digital forgeries in ballistic motion,IEEE Transactions on Information Forensics and Security,2012,7(1):283-296.
    [25] I. Yerushalmy and H. Hel-Or, Digital image forgery detection based on lens andsensor aberration, International Journal of Computer Vision,2011,92(1):71-91.
    [26] M. K. Johnson and H. Farid, Exposing digital forgeries through chromatic aberration,in: Proceedings of ACM workshop on Multimedia and security, Geneva, Switzerland,September26-27,2006, pp.48-55.
    [27] K. Choi, E. Lam, and K. Wong, Automatic source camera identification using theintrinsic lens radial distortion, Optics Express,2006,14(24):11551-11565.
    [28] H. R. Chennamma and L. Rangarajan, Image splicing detection using inherent lensradial distortion, IJCSI International Journal of Computer Science,2010,7(6):149-158.
    [29] S. Lyu, Estimating Vignetting function from a single image for image authentication,in: Proceedings of ACM workshop on Multimedia and security, Rome, Italy,September9-10,2010, pp.3-12.
    [30] M. K. Johnson and H. Farid, Detecting photographic composites of people, in:Proceedings of International Workshop on Digital Watermarking, Guangzhou, China,November21-23,2007, pp.19-33.
    [31] D. Kundur and D. Hatzinakos, A novel blind deconvolution scheme for imagerestoration using recursive filtering, IEEE Transactions on Signal Processing,1998,46(2):375–390.
    [32] A. Swaminathan, M. Wu and K. J. R. Liu, digital image forensics via intrinsicfingerprints, IEEE Transactions on Information Forensics and Security,2008,3(1):101-117.
    [33] A. C. Popescu and Hany Farid, exposing digital forgeries in color filter arrayinterpolated images, IEEE Transactions on Signal Processing,2005,53(10):3948-3959.
    [34] A. Swaminathan, M. Wu, and K. J. R. Liu, nonintrusive component forensics ofvisual sensors using output images, IEEE Transactions on Information Forensicsand Security,2007,2(1):91-106.
    [35] H. Cao and A. C. Kot, A generalized model for detection of demosaicingcharacteristics, in: Proceedings of IEEE International Conference on Multimediaand Expo, Hannover, Germany, June23-26,2008, pp.1513-1516.
    [36] H. Cao and A. C. Kot, accurate detection of demosaicing regularity for digital imageforensics, IEEE Transactions on Information Forensics and Security,2009,4(4):899-910.
    [37] J. Takamatsu, Y. Matsushita, T. Ogasawara, K. Ikeuchi, Estimating demosaicingalgorithms using image noise variance, in: Proceedings of IEEE InternationalConference on Computer Vision and Pattern Recognition, San Francisco, USA, June13-18,2010, pp.279–286.
    [38] P. E. Debevec and J. Malik, Recovering high dynamic range radiance maps fromphotographs, in: Proceedings of ACM conference on Computer Graphics andInteractive Techniques, Los Angeles, USA, August5-7,1997, pp.369–378.
    [39] T.-T. Ng, S.-F. Chang, and M.-P. Tsui, using geometry invariants for cameraresponse function estimation, in: Proceedings of IEEE Conference on ComputerVision and Pattern Recognition, Minneapolis, USA, June17-20,2007, pp.1-8.
    [40] Y.-F. Hsu and S.-F. Chang, Camera response functions for image forensics: anautomatic algorithm for splicing detection, IEEE Transactions on InformationForensics and Security,2010,5(4):816-825.
    [41] S. Lin, J. Gu, S. Yamazaki, and H.-Y. Shum, Radiometric calibration from a singleimage, in: Proceedings of IEEE Conference on Computer Vision and PatternRecognition, Washington DC, USA, June27June-July2,2004, pp. II938–945.
    [42] Z. Lin, R. Wang, X. Tang, and H.-Y. Shum, Detecting doctored images using cameraresponse normality and consistency, in: Proceedings of IEEE Conference onComputer Vision and Pattern Recognition, San Diego, CA, June20-25,2005, pp. I1087-1092.
    [43] A. C. Popescu and Hany Farid, Exposing digital forgeries by detecting traces ofre-sampling, IEEE Transactions on Signal Processing,2005,53(2):758-767.
    [44] A. C. Gallagher, Detection of Linear and Cubic Interpolation in jpeg compressedimages, in: Proceedings of Canadian Conference on Computer and Robot Vision,Washington DC, USA, May9-11,2005, pp.65-72.
    [45]朱秀明,宣国荣,姚秋明,童学锋,施云庆,信息取证中图像重采样检测,计算机应用,2006,26(11):2596-2597.
    [46] M. Kirchner, Fast and reliable resampling detection by spectral analysis of fixedlinear predictor residue, in: Proceedings of ACM Workshop on Multimedia andSecurity, Oxford, UK, September22-23,2008, pp.11-20.
    [47] S. Prasad and K. Ramakrishnan, On resampling detection and its application todetect image tampering, in: Proceedings of the2006IEEE International Conferenceon Multimedia and Expo, Toronto, Canada, July9-12,2006, pp.1325-1328.
    [48] W. Wei, S. WANG, and Z. Tang, Estimation of rescaling factor and detection ofimage splicing, in: Proceedings of IEEE International Conference onCommunication Technology, Hangzhou, China, November10-12,2008, pp.676-679.
    [49] A. Suwendi and J. P. Allebach, Nearest-neighbor and bilinear resampling factorestimation to detect blockiness or blurriness of an image, Journal of ElectronicImaging,2008,17(2):023005.
    [50] G. Cao, Y. Zhao, and R. Ni, Forensic identification of resampling operators: a seminon-intrusive approach, Forensic Science International,2012,216(1-3):29-36.
    [51] B. Mahdian and S. Saic, Blind authentication using periodic properties ofinterpolation, IEEE Transactions on Information Forensics and Security,2008,3(3):529–538.
    [52] W. Wei, S. Wang, X. Zhang, and Z. Tang, Estimation of image rotation angle usinginterpolation-related spectral signatures with application to blind detection of imageforgery, IEEE Transactions on Information Forensics and Security,2010,5(3):507–517.
    [53] O. Hiroyuki and S. Hisashi, Detection of rotation and parallel translation usingHough and Fourier transforms, in: Proceedings of IEEE International Conference onImage Processing, Lausanne, Switzerland, September16-19,1996, pp. III.827-830.
    [54] M. Choi and W. Kim, A novel two stage template matching method for rotation andillumination invariance, Pattern Recognition,2002,35(1): pp.119-129.
    [55] M. Stamm and K. J. R. Liu, Blind forensics of contrast enhancement in digitalimages, in: Proceedings of IEEE International Conference on Image Processing,San Diego, USA, October12-15,2008, pp.3112-3115.
    [56] M. Stamm and K. J. R. Liu, Forensic detection of image manipulation usingstatistical intrinsic fingerprints, IEEE Transactions on Information Forensics andSecurity,2010,5(3):492–506.
    [57] H. Yuan, Blind forensics of median filtering in digital images, IEEE Transactions onInformation Forensics and Security,2011,6(4):1335-1345.
    [58] A. C. Bovik, Streaking in median filtered images, IEEE Transactions on Acoustics,Speech and Signal Processing,1987,35(4):493-503.
    [59] M. Kirchner and J. Fridrich, On detection of median filtering in digital images, in:Proceedings of SPIE, Electronic Imaging, Media Forensics and Security II, San Jose,CA, USA,2010, vol.7541, pp.1-12.
    [60] G. Cao, Y. Zhao, R. Ni, L. Yu, and H. W. Tian, Forensic detection of median filteringin digital images, in: Proceedings of IEEE International Conference on Multimediaand Expo, Singapore, July19-23,2010, pp.89-94.
    [61] L. Zhou, D. Wang, Y. Guo, and J. Zhang, Blur detection of digital forgery usingmathematical morphology, in: Proceedings of International Symposium on Agentand Multi-Agent Systems: Technologies and Applications, Wroclaw, Poland, May31-June1,2007, pp.990-998.
    [62]周琳娜,王东明,郭云彪,杨义先,基于数字图像边缘特性的形态学滤波取证技术,电子学报,2008,36(6):1047-1051.
    [63] D. Hsiao and S Pei, Detecting digital tampering by blur estimation, in: Proceedingsof International Workshop on Systematic Approaches to Digital ForensicEngineering, Taipei, Taiwan, China, November7-9,2005, pp.264-278.
    [64] X. Marichal, W. Ma, and H. Zhang, Blur determination in the compressed domainusing DCT information, in: Proceedings of IEEE International Conference on ImageProcessing, Kobe, Japan, October24-28,1999, pp. II.386-390.
    [65] F. Rooms, Estimating image blur in the wavelet domain, in: Proceedings of IEEEInternational Conference on Acoustics, Speech, and Signal Processing, Orlando, FL,USA,2002, pp. IV-4190.
    [66] Y. Sutcu, B. Coskun, H. T. Sencar, and N. Memon, Tamper detection based onregularity of wavelet transform coefficients, in: Proceedings of IEEE InternationalConference on Image Processing, San Antonio, TX, USA,2007, pp. I.397-400.
    [67] X. Wang, B. Xuan, and S. Peng, Digital image forgery detection based on theconsistency of defocus blur, in: Proceedings of International Conference onIntelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08),Harbin, China, August15-17,2008, pp.192-195.
    [68] J. H. Elder and S. W. Zucker, Local scale control for edge detection and blurestimation, IEEE Transactions on Pattern Analysis and Machine Intelligence,1998,20(7):699-716.
    [69] G. Liu, J. Wang, S. Lian, and Y. Dai, Detect image splicing with artificial blurredboundary, Mathematical and Computer Modeling, in press, doi:10.1016/j.mcm.20-11.06.026.
    [70] H. Tong, M. Li, H. Zhang, and C. Zhang, Blur detection for digital images usingwavelet transform, in: Proceedings of IEEE International Conference on Multimediaand Expo, Tapei, Taiwan, China, June27-30,2004, pp. I.17-20.
    [71] Z. Fan and R. D. Queiroz, Identification of bitmap compression history: JPEGdetection and quantizer estimation, IEEE Transactions on Image Processing,2003,12(2):230-235.
    [72] H. Farid, Exposing digital forgeries from JPEG ghosts, IEEE Transactions onInformation Forensics and Security,2009,4(1):154-160.
    [73] F. Huang, J. Huang, and Y. Shi, Detecting double jpeg compression with the samequantization matrix, IEEE Transactions on Information Forensics and Security,2010,5(4):848-856.
    [74] W. Luo, J. Huang, and G. Qiu, JPEG error analysis and its applications to digitalimage forensics, IEEE Transactions on Information Forensics and Security,2010,5(3):480-491.
    [75] W. Luo, Y. Wang, and J. Huang, Detection of quantization artifacts and itsapplications to transform encoder, IEEE Transactions on Information Forensics andSecurity,2010,5(4):810-815.
    [76] Y.-L. Chen and C.-T. Hsu, Detecting recompression of JPEG images via periodicityanalysis of compression artifacts for tampering detection, IEEE Transactions onInformation Forensics and Security,2011,6(2):396-406.
    [77] T. Bianchi and A. Piva, Detection of non-aligned double JPEG compression basedon integer periodicity maps, IEEE Transactions on Information Forensics andSecurity,2012,7(2):842-848.
    [78] T. Bianchi and A. Piva, Image forgery localization via block-grained analysis ofJPEG artifacts, in press, doi:10.1109/TIFS.2012.2187516.
    [79] W. Li, Y. Yuan, and N. Yu, Passive detection of doctored JPEG image via blockartifact grid extraction, Signal Processing,2009,89(9):1821-1829.
    [80] G. Cao, Y. Zhao, and R. Ni, Detection of image sharpening based on histogramaberration and ringing artifacts, in: Proceedings of IEEE International Conferenceon Multimedia and Expo, New York, USA, June28-July3,2009, pp.1026–1029.
    [81] G. Cao, Y. Zhao, R. Ni, and A. C. Kot, Unsharp Masking Sharpening Detection viaOvershoot Artifacts Analysis, IEEE Signal Processing Letters,2011,18(10):603-606.
    [82] S. Lyu and H. Farid, How realistic is photorealistic? IEEE Transactions on SignalProcessing,2005,53(2):845-850.
    [83] T.-T. Ng, S.-F. Chang, Y.-F. Hsu, L. Xie, and M.-P. Tsui, Physics-motivatedfeatures for distinguishing photographic images and computer graphics, in:Proceedings of ACM International Conference on Multimedia, Singapore,November6-11,2005, pp.239-248.
    [84] S. Dehnie, T. Sencar, N. Memon, Digital image forensics for identifying computergenerated and digital camera images, in: Proceedings of IEEE InternationalConference on Image Processing, Atlanta, USA, October8-11,2006, pp.2313-2316.
    [85] L. Ozparlak and I. Avcibas, Differentiating between images using wavelet-basedtransforms: A comparative study, IEEE Transactions on Information Forensics andSecurity,2011,6(4):1418-1431.
    [86] J. Lukas, J. Fridrich, and M. Goljan, Digital camera identification from sensorpattern noise, IEEE Transactions on Information Forensics and Security,2006,1(2):205-214.
    [87] C.-T. Li, Source camera identification using enhanced sensor pattern noise, IEEETransactions on Information Forensics and Security,2010,5(2):280-287.
    [88] X. Kang, Y. Li, Z. Qu, and J. Huang, Enhancing source camera identificationperformance with a camera reference phase sensor pattern noise, IEEE Transactionson Information Forensics and Security,2012,7(2):393-402.
    [89] E. Kee, M. K. Johnson, and H. Farid, Digital Image Authentication from JPEGHeaders, IEEE Transactions on Information Forensics and Security,2011,6(3):1066-1075.
    [90] A. Criminisi, I. Reid, and A. Zisserman, Single view metrology, InternationalJournal of Computer Vision,2000,40(2):123-148.
    [91] D. A. Forsyth and J. Ponce, Computer vision: A modern approach, Prentice HallPress,2002.
    [92] R. Hartley and A. Zisserman, Multiple view geometry in computer vision,Cambridge University Press,2004.
    [93] H. Kong, J. Y. Audibert, and J. Ponce, General road detection from a single image,IEEE Transactions on Image Processing,2010,19(8):2211-2220.
    [94] D. Hoim, A. A. Efros, and M. Hebert, Putting objects in perspective, InternationalJournal of Computer Vision,2008,80(1):3-15.
    [95] Y. Tsin, V. Ramesh, and T. Kanade, Statistical calibration of CCD imaging process,in: Proceedings of IEEE International Conference on Computer Vision, Vancouver,Canada, July7-14,2001, pp. I.480-487.
    [96] C. Liu, W. T. Freeman, R. Szeliski, and S. B. Kang, Noise estimation from a singleimage, in: Proceedings of IEEE International Conference on Computer Vision andPattern Recognition, New York, USA, June17-22,2006, pp. I.901-908.
    [97] C. Liu, R. Szeliski, S. B. Kang, C. L. Zitnick, and W. T. Freeman, Automaticestimation and removal of noise from a single image, IEEE Transactions onPattern Analysis and Machine Intelligence,2008,30(2):299-314.
    [98] G. E. Healey and R. Kondepudy, Radiometric CCD camera calibration and noiseestimation, IEEE Transactions on Pattern Analysis and Machine Intelligence,1994,16(3):267-276.
    [99] M. Kobayashi, T. Okabe and Y. Sato, Detecting forgery from static-scene videobased on inconsistency in noise level functions, IEEE Transactions on InformationForensics and Security,2010,5(4):883-892.
    [100] J. Takamatsu, Y. Matsushita, K. Ikeuchi, Estimating radiometric response functionsfrom image noise variance, in: Proceedings of European Conference on ComputerVision, Marseille, France, October12-18,2008, pp. IV.623-637.
    [101] D. Comaniciu and P. Meer, Mean shift: a robust approach toward feature spaceanalysis, IEEE Transactions on Pattern Analysis and Machine Intelligence,2002,24(5):603-619.
    [102] M. K. Mihcak, I. Kozintsev and K. Ramchandran, Spatially adaptive statisticalmodeling of wavelet image coefficients and its application to denoising, in:Proceedings of IEEE International Conference on Acoustics, Speech and Signal,Phoenix, USA, March15-19,1999, pp. VI.3253-3256.
    [103] M. D. Grossberg and S. K. Nayar, Modeling the space of camera response functions,IEEE Transactions on Pattern Analysis and Machine Intelligence,2004,26(10):1272-1282.
    [104] http://www1.cs.columbia.edu/CAVE/software/softlib/dorf.php
    [105] D. Marquardt, An algorithm for least-squares estimation of nonlinear parameters,SIAM Journal on Applied Mathematics,1963,11(2):431-441.
    [106] H. Farid, Blind inverse gamma correction, IEEE Transaction on Image Processing,2001,10(10):1428-1433.
    [107] J. Fridrich, D. Soukal, and J. Lukas. Detection of copy-move forgery in digitalimages, in: Proceedings of Digital Forensic Research Workshop, Cleveland, USA,August,2003.
    [108] A. C. Popescu and H. Farid, Exposing digital forgeries by detecting duplicatedimage regions, Technique Report2004-515, Dartmouth College,2004.
    [109]骆伟祺,黄继武,丘国平,鲁棒的区域复制图像篡改检测技术,计算机学报,2007,30(11):1998-2007.
    [110] B. Mahdian, S. Saic, Detection of copy-move forgery using a method based on blurmoment invariants. Forensic Science International,2007,171(2-3):180-189.
    [111] E. Ardizzone, A. Bruno, and G. Mazzola, Copy-move forgery detection via texturedescription, in: Proceedings of ACM Workshop on Multimedia in Forensics,Security and Intelligence, Firenze, Italy, October25-29,2010, pp.59-64.
    [112] H. Yao, T. Qiao, Z. Tang, Y. Zhao, and H. Mao, Detecting copy-move forgery usingnon-negative matrix factorization, in: Proceedings of International Conference onMultimedia Information Networking and Security, Shanghai, China, November4-6,2011, pp.591-594.
    [113] A. N. Myna, M. G. Venkateshmurthy, C. G. Patil, Detection of region duplicationforgery in digital images using wavelets and log-polar mapping, in: Proceedings ofInternational Conference on Computational Intelligence and MultimediaApplications, Sivakasi, India, December13-15,2007, pp.371-377.
    [114] S. B. Solario and A. K. Nandi, Automated detection and localisation of duplicatedregions affected by reflection, rotation and scaling in image forensics, SignalProcessing,2011,91(8):1759-1770.
    [115] Q. Wu, S. Wang, and Zhang X, Log-polar based scheme for revealing duplicatedregions in digital images, IEEE Signal Processing Letters,2012,18(10):559-562.
    [116] S. Bayram, H. T. Sencar, N. Memon, An efficient and robust method for detectingcopy-move forgery, in: Proceedings of IEEE International Conference on Acoustics,Speech and Signal Processing, Taipei, Taiwan, April19-24,2009, pp.1053-1056.
    [117] S. Ryu, M. Lee, and H. Lee, Detection of copy-rotate-move forgery using Zernikemoments, in: Proceedings of International Workshop on Information Hiding,Calgary, Canada, June28-30,2010, pp.51-65.
    [118] H. Huang, W. Guo, and Y. Zhang. Detection of copy-move forgery in digital imagesUsing SIFT algorithm, in: IEEE Pacific-Asia Workshop on ComputationalIntelligence and Industrial Application, Wuhan, China, December19-20,2008, pp.II.272-276.
    [119] I. Amerini I, L. Ballan, R. Caldelli, A. D. Bimbo, and G. Serra, Geometric tamperingestimation by means of a SIFT-based forensic analysis, in: Proceedings of IEEEInternational Conference on Acoustics, Speech, and Signal Processing, Dallas, USA,March14-19,2010, pp.1702-1705.
    [120] Pan X and Lyu S, Region duplication detection using image feature matching, IEEETransactions on Information Forensics and Security,2010,5(4):857–867.
    [121] D. D. Lee and H. S. Seung, Learning the parts of objects by non-negative matrixfactorization, Nature,1999,401:788-791.
    [122] Z. Tang, S. Wang, W. Wei, and S. Su, Robust image hashing for tamper detectionusing non-negative matrix factorization, Journal of Ubiquitous Convergence andTechnology,2008,2(1):18-26.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700