区域复制篡改的数字图像被动认证研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数码相机的出现与普及,使得数字图像早已成为我们日常生活的一部分。而由于数字图像容易修改的特性、再加上图像处理软件功能的日渐强大,过去被认为能够记载真实场景的图像,在数字时代中已经受到严峻的挑战。针对上述应用需求和技术需求,本文主要研究了数字图像被动认证技术中的区域复制篡改检测算法。
     数字图像被动认证是一种不依赖任何预签名提取或预嵌入信息来鉴别图像真伪和来源的技术,而区域复制篡改检测是数字图像被动认证的一个重要分支。本文除了研究目前已有的被动认证理论之外,还研究了Tchebichef矩及SIFT特征点的特性。并从数字图像伪造过程遗留痕迹入手,设计出相应的检测算法,实现了对伪造图像中篡改区域的检测。文中研究工作有:
     1.结合国内外数字图像被动认证方法,深入研究了相关的技术,对数字图像取证的理论模型和系统框架进行了研究。在总结前人工作的基础上,根据现有的理论,设计出区域复制篡改被动认证框架及几何变换的区域复制篡改模型。
     2.设计了基于Tchebichef矩的数字图像被动认证算法,用于检测区域复制粘贴的伪造图像。算法首先利用小波变换提取图像的低频分量,再对低频分量进行分块并提取每一块的Tchebichef矩特征,然后将特征矢量进行字典排序,比较相邻两组特征矢量的相似性,最后利用阈值判别实现篡改伪造区域的检测和定位。实验表明该算法不但能够较精确地定位出复制和粘贴的图像伪造区域,还能效抵抗噪声污染、有损JPEG压缩以及旋转等攻击,并有效地减少了运算量,提高了检测效率
     3.根据同一幅自然图像不会存在互相匹配的特征点这一特性,设计了一种基于特征点的能够抗几何变换的数字图像被动认证算法,用于数字图像篡改中区域复制篡改类型的检测。算法先提取出图像中的特征点,再计算出特征点相应的特征向量,然后对特征向量集进行划分与匹配,用连线标记出图像中的匹配点对。如果图像被复制篡改过,所标记的边线将明显集中于某两个区域之间。实验证明,该算法对伪造图像中几何变换的篡改区域具有良好的通用性。
     4.总结了所做的工作,指出工作中存在的问题及需要改进的地方,以及下一步工作的方向。
With the widely use of digital cameras, digital images have already become a part of our daily life. However, the credibility of digital images has faced severe challenges in the digital era caused by the intrinsic nature of easy modification of digital data as well as the powerful function of modern image process software. Due to the requirements of application and technology mentioned above, this thesis mainly studies the detection methods for testing the regional duplication and forgery that is part of passive digital image authentication.
     Passive digital image authentication is a technology of detecting image authenticity and source without relying on any pre-extracted or pre-embedded information. And Regional duplication forgery is an important branch of passive digital image authentication. In this thesis, apart from study the passive authentication theory which has been proposed currently, we also study Tchebichef moments invariants as well as characteristics of the SIFT feature point starting with left traces of the process of digital image forgery. We designed a corresponding passive authentication algorithm. It can detect the duplication region in the forgery image. In this paper, research work is conducted as follows:
     Firstly, combine with domestic and foreign passive digital image authentication methods; we make an in-depth study of the relevant technology, and do some research on theoretical models and systems framework about digital image forensics. In summary on the basis of previous work, passive authentication framework tampering regional replication and geometric model of the deformation zone transfer tampering are designed according to existing theories.
     Secondly, this paper designs a new passive digital image authentication algorithm in the basis of Tchebichef Moments Invariants algorithm to detect and identify the location of image copy-move tamper, in which an object region in the image is copied and pasted somewhere else in the original image to confound right and wrong. After reducing the image dimension by Discrete Wavelet Transform (DWT), the Tchebichef moments invariants is applied to the fixed sized overlapping blocks of a low-frequency image in the wavelet sub-band, and the eigenvectors are lexicographically sorted. Then, similar eigenvectors are matched by a certain threshold. Finally, the forgery part is identified by the threshold. The experimental results show that proposed method can not only localize the copy forgery regions accurately, but also undergo some attacks like random noise contamination, lossy JPEG compression, rotation transformation etc., and reduce the amount of computation, which improves the detection effectively.
     Thirdly, according to the feature that feature points does not match one another in the same natural image, a passive algorithm of digital image, based on its own feature point, has been designed, which can resist geometric transformation and be used in testing the type of region duplication forgery in the digital image. The algorithm firstly extracts the image feature points, calculates the corresponding eigenvectors, and then divides the feature vector sets and matches them, the image matching point's pairs marked with the connections. If the image is copied tampered with, the tag will clearly focus on certain edges between the two regions. If the image has been duplicated, the lines of marks will be clearly focused on certain edges between the two regions. Finally, the simulation experiment verifies the effectiveness of the algorithm of digital image region duplication forgery, which can resist geometric transformation.
     Finally, summarizes the work done for the problems of work and areas for improvement, as well as the direction of future work.
引文
[1]Schneider M, Chang S F.A Robust Content based Digital Signature for Image Authentication[C]. In:Proc. of the IEEE Intl Conf. on Image Processing,1996, 3:227-230.
    [2]Lu C S, Mark Liao H Y. Structural digital signature for image authentication:an incidental distortion resistant scheme[J]. IEEE Transactions on Multimedia, 2003,5(2):161-173.
    [3]Dittmann J, Steinmetz A., Steinmetz R. Content-based digital signature for motion pictures authentication and content-fragile watermarking[C]. IEEE ICMCS'99,1999,2:209-213.
    [4]Lu C S, Liao H Y M. Multipurpose watermarking for image authentication and protection[J]. IEEE Transactions on Image Processing,2001,10(10):1579-1592.
    [5]Lucas J, Fridrich J, Goljan M. Digital "bullet scratches" for images[C]. Proceedings of the IEEE International Conference on Image Processing. Genova, Italy,2005.
    [6]Johnson M K, Farid H. Exposing digital forgeries through chromatic aberration[C]. In:Proceedings of the 8th Workshop on Multimedia & Security, Geneva, Switzerland:IEEE,2006:48-55.
    [7]Wang W H, Farid H. Exposing Digital forgeries in video by detecting duplication[C]. Proceedings of the 9th Workshop on Multimedia & Security, Dallas, Texas, USA,2007:20-21.
    [8]吴琼,李国辉,涂丹,孙韶杰。面向真实性鉴别的数字图像盲取证技术综述[J],自动化学报,2008,(12):1458-1466。
    [9]周琳娜。数字图像盲取证技术研究[D],北京邮电大学,2007。
    [10]Popescu A C. Statistical Tools for Digital Forensics[D],Department of Computer Science,Dartmouth College,2005.
    [11]戴蒙,赵学州。JPEG二次压缩的分析与检测[J],中国图象图形学报,2009,(12):2601~2602。
    [12]He J F,Lin Z C,Wang L F,Tang X O.Detecting doctored JPEG images via DCT coefficient analysis[C].In:Proceedings of 9th European Conference on Computer Vision, Graz, Austria,2006:423-435.
    [13]CHEN C, SHIY Q, WEI S. A machine learning based scheme for double JPEG compression detection [C]//Proceedings of 19th International Conference on Pattern Recognition. Tampa, Florida,USA:IEEE Computer Society,2008:1-4.
    [14]LUO W, QU Z, HUANG J, et al. A novel method for detecting cropped and recompressed image block [C]//Proceedings of 2007 IEEE International Conference on Acoustics, Speech and Signal Processing. Honolulu, H I:IEEE Signal Processing Society,2007:217-220.
    [15]YE S, SUN Q, CHANG E C. Detecting digital image forgeries by measuring inconsistencies of b locking artifacts [C]//Proceedings of 2007 IEEE International Conference on Multimedia and Expo.Washington, DC:IEEE Computer Society,2007:12-15.
    [16]FARID H. Exposing digital forgeries from JPEG ghosts [J]. IEEE Transactions on In formation Forensics and Security,2009,4 (1):154-160.
    [17]李晟,张新鹏。利用JPEG压缩特性的合成图像检测[J],应用科学学报,2008,26(3):281~287。
    [18]Alin C Popescu, Jessica Fridrich. Statistical Tools for Digital Forensics.6th International Workshop on Information Hiding&LNCS. Berlin:Springer Verlag,2004:128-147.
    [19]Popescu A C, Farid H. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing,2005,53 (2):758-767.
    [20]朱秀明,宣国荣,宣国荣等。信息取证中图像重采样检测[J],计算机应用,2006,26(11):2596-2597。
    [21]姚恒,魏为民,唐振军。重采样图像的盲检测技术[J],计算机工程与应用,2010,(30):166~169
    [22]Hanghang Tong. Blur Detection for Digital Images Using Wavelet Transform[A]. Multimedia and ExPo,2004. ICME'04.2004 IEEE International Conference[C].Taipei, Taiwan:IEEE,2004:17-20.
    [23]Hsiao D Y, Pei S C.Detecting digital tampering by blur estimation[C].In: Proceedings of First International Workshop on Systematic Approaches to Digital Forensic Engineering, Taipei, China:IEEE,2005:264-278.
    [24]Sutcu Y, Coskun B, Sencar H T, Memon N. Tamper detection based on regularity of wavelet transform coefficients[C]. In:proceedings of 2007 IEEE International Conference on Image Processing, San Antonio, TX, USA: IEEE,2007:397-400.
    [25]王波,孙璐璐,孔祥维,尤新刚。图像伪造中模糊操作的异常色调率取证技术[J],电子学报,2006(12A),2006年12月增刊。
    [26]Zhou Linna, Wang Dongming,Guo Yunbiao,Zhang Jingfei,Blue Detection of Digital Forgery Using Mathematical Morphology.KES AMSTA2007,Lecture notes in computer science.2007.
    [27]周琳娜,王东明,郭云彪,杨义先。基于数字图像边缘特性的形态学滤波取证技术[J],电子学报,2008(06):1047-1051。
    [28]王俊文,刘光杰,戴跃伟等。基于非抽样Contourlet变换的图像模糊取证[J],计算机研究与发展,2009,(09):1549-1555。
    [29]李哲,郑江滨,李秀秀等。基于重采样检测的图像可信度评价方法[A],第六届和谐人机环境联合学术会议(HHME2010)、第19届全国多媒体学术会议(NCMT2010)论文集[C],2010
    [30]Fridrich J,Soukal D,Lukas J.Detection of copy-moveforgery in digital images[C/OL].In:Proceedings of Digital Forensic Research Workshop, Cleveland, OH,USA,2003.
    [31]Popescu A C,Farid H.Exposing Digital Forgeries by Detecting Duplicated Image Regions[R].Technical Report TR2004-515,Department of Computer Science, Dartmouth College,2004.
    [32]Li G H,Wu Q,Tu D.Sun S J.A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[C].In:Proceedings of 2007 IEEE International Conference on Multimedia and Expo,Beijing,China:IEEE,2007:1750-1753.
    [33]王睿,方勇。基于不变矩的Copy-Move型篡改图像盲检测方法[J],中国图象 图形学报,2008,(10):1938-1941。
    [34]张广群,汪杭军。基于FMT的快速Copy-Move篡改检测[J],计算机工程与设计,2010,(15):3530-3533。
    [35]王俊文,刘光杰,戴跃伟,王执铨。一种检测图像Copy-Move篡改鲁棒算法[J],模式识别与人工智能,2009,(04):630-634。
    [36]Johnson M, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. Proceedings of 7th Workshop on Multimedia and Security, New York, NY, USA,2005,1-10.
    [37]Johnson M, Farid H. Exposing digital forgeries through specular highlights on theeye. Proceedings of 9th International Workshop on Information Hiding, Saint Malo, France,2007,311-325.
    [38]OHNSON M, FARID H. Exposing digital forgeries in complex lighting environments [J]. IEEE Transactions on Information Forensics and Security, 2007,2(3):450-461.
    [39]E. Kee and H. Farid. Exposing Digital Forgeries from 3-D Lighting Environments [J]. IEEE International Workshop on Information Forensics and Security,2010.
    [40]吕颖达,申铉京,苗健,王丹,陈海鹏。基于光源方向不一致性的局部光源图像盲鉴别方法[J],吉林大学学报(工学版),2010,(06):1673~1677。
    [41]陈海鹏,申铉京,吕颖达,金玉善。基于无限光源模式的数字图像盲鉴别技术[J],吉林大学学报(工学版),2010,(01):195-200。
    [42]Sevinc Bayram, Husrev T Sencar, Nasir Memon. Source camera identification based on CFA interpolation[A].IEEE International Conference on Image Processing[C].Genoa, Italy:IEEE,2005:69-72.
    [43]Ashwin Swaminathan, Min Wu. Non-intrusive forensic analysis of visual sensors using output images[A]. Acoustics, Speech and Signal Processing,2006. ICASSP 2006 Proceedings.2006 IEEE International Conference[C]. Toulouse,France:IEEE,2006:V-401-V-404.
    [44]Kharrazi M, Sencar H T, Memon N, Avcibas I. Blind Camera Identification Based on CFA Interpolation[A].Image Proeessing,2005. ICIP 2005. IEEE International Conference[C].Genoa, Italy:IEEE,2005:Ⅲ-69-72.
    [45]Ashwin Swaminathan, Min Wu. Component forensics of digital cameras:a non-intrusive approach [A]. Proc. of Conference on Information Sciences and Systems[C]. NJ:Princeton,2006.
    [46]Popescu A C, Farid H. Exposing digital forgeries in color filter array Interpolated Images. IEEE Transactions on Signal Processing,2005,53 (10): 3948-3959.
    [47]Long Y J, Huang Y Z. Image based source camera identification using demosaicking. Proceedings of IEEE 8th Workshop on Multimedia Signal Processing (MMSP06), Victoria, BC,2006,3:419-424.
    [48]Swaminathan A, Wu M, Liu K J R, et al. Image tampering identification using blind deconvolution. Proceedings of IEEE International Conference on Image Processing (ICIP06), Atlanta, GA, USA,2006,2309-2312.
    [49]王波,孔祥维,尤新刚,付海燕。基于协方差矩阵的CFA插值盲检测方法[J],电子与信息学报,2009(5):1175~1179。
    [50]王波,孔祥维,尤新刚,付海燕.利用协方差矩阵检测CFA插值的相机来源鉴别方法[J].光电子.激光,2009,(04):517-520。
    [51]王伟,方勇。基于有限差分的置换图像盲检测方法[J],电子学报,2010,(10):2268-2272。
    [52]Lukas J,Fridrich J,Goljan M. Digital"Bullet Scratches" for Images.Image Processing,2005. ICIP 2005.IEEE International Conference. Genoa, Italy:IEEE, 2005:65-68.
    [53]Lukas J,Fridrich J,Goljan M. Determining Digital Image Origin Using Sensor Imperfections. Proc. SPIE Electronic Imaging, Image and Video Communication and Processing. San Jose,California:Springer,2005:249-260.
    [54]Lukas J,Fridrich J,Goljan M.Digital Camera Identification form Sensor Pattern Noise. IEEE Transactions on Information Forensics and Security,2005, (1):205-214.
    [55]Lukas J,Fridrich J,Goljan M.Detecting digital image forgeries using sensor pattern noise.Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents. San Jose, CA:Springer,2006:362-372.
    [56]Lukas J, Fridrich J, Goljan M. Detecting digital image forgeries using sensor pattern noise. Proceedings of SPIE:Security, Steganography and Watermarking of Multimedia Contents Ⅷ, San Jose, California, USA,2006,6072(1): 362-372.
    [57]李哲,郑江滨。基于噪声分布规律的伪造图像盲检测算法[J],计算机应用研究,2009(03):1092-1094。
    [58]Johnson M K,Farid H. Exposing digital forgeries through chromatic aberration[C]. In:Proceedings of the 8th workshop on Multimedia and security, Geneva, Switzerland:IEEE,2006:48-55.
    [59]王波,孙璐璐,孔祥维,等。图像伪造中模糊操作的异常色调率取证技术[J],电子学报,2006,34(12):2451~2454。
    [60]Ng T T,Chang S F.A model for image splicing[C]. In:Proceedings of 2004 International Conference on Image Processing, Singapore:IEEE,2004:1169-1172.
    [61]Ng T T,Chang S F.Blind Detection of Digital Photomontage Using Higher Order Statistics [R]. Advent Technical Report 201-2004-1,Columbia University,June 2004.
    [62]Avcibas I, Memon N, Sankur B, Ramkumar M. A classifier design for detecting image manipulation[C]. In:Proceedings of 2004 International Conference on Image Processing, Singapore:IEEE,2004:2645-2648.
    [63]Bayram S, Avcibas I, Sankur B, Memon N. Image manipulation detection with binary similarity measures[C]. In:Proceedings of 13th European Signal Processing Conference, Antalya,2005:752-755.
    [64]姜丽,吕皖丽,罗斌。基于相位和幅度谱的数字图像被动认证算法[J],计算机工程与设计,2009,30(09):2121-2126。
    [65]H. Farid and M.J. Bravo.Image Forensic Analyses that Elude the Human Visual System.SPIE Symposium on Electronic Imaging, San Jose, CA,2010.
    [66]吕皖丽,郭玉堂,罗斌。一种基于Tchebichef矩的半脆弱图像数字水印算法[J],中山大学学报(自然科学版),2009,48(1):16-21。
    [67]顾伟,吕皖丽,罗斌。基于图像分类的矢量量化数字水印算法[J],计算机应用研究,2009,26(7):2738-2740。
    [68]Shijie Dai, He Huang, Zhangying Gao et al. Vehicle-logo Recognition Method Based on Tchebichef Moment Invariants and SVM[J]. World Congress on Software Engineering,2009,3:18-21.
    [69]Mukundan R, Ong S H, Lee P A. Image Analysis by Tchebichef Moments [J]. IEEE Transactions on Image Processing,2001,10(9):1143-1147.
    [70]Hongqing Zhu,Huazhong Shu,Ting Xia et al. Translation and scale invariants of Tchebichef moments[J]. Pattern Recognition Society,2007:2530-2542.
    [71]Shijie Dai, He Huang, Zhangying Gao et al. Vehicle-logo Recognition Method Based on Tchebichef Moment Invariants and SVM[J]. World Congress on Software Engineering,2009,3:18-21.
    [72]R Mukundan,S H Ong,P A Lee.Image analysis by Tchebichef moments [J].IEEE Transactions on Image Processing,2001,10(9):1357-1364.
    [73]骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,30(11):1998~2007.
    [74]Mikolajczyk, K. and Tuytelaars, T. and Schmid, C. and Zisserman, A. and Matas, J. and Schaffalitzky, F. and Kadir, T. and Gool, L.V. A Comparison of Affine Region Detectors[J]. International Journal of Computer Vision, 2005(1):43-72.
    [75]T. Tuytelaars and K. Mikolajczyk, "Local Invariant Feature Detectors:A Survey," Foundations and Trends in Computer Graphics and Vision,2008(3): 177-280.
    [76]David G. Lowe. Distinctive Image Features from Scale-Invariant Keypoints[J]. International Journal of Computer Vision,2004,60(2):91-110.
    [77]Yan Ke, Sukthankar R. PCA-SIFT:A more distinctive representation for local image descriptors[C]. Proceedings of the Conference on Computer Vision and Pattern Recognition, Washington, USA:IEEE,2004 (1):511-517.
    [78]J.M. Morel and G.Yu. ASIFT:A New Framework for Fully Affine Invariant Image Comparison, SIAM Journal on Imaging Sciences, vol.2, issue 2,2009.
    [79]G. Yu and J.M. Morel, A Fully Affine Invariant Image Comparison Method[C], Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Taipei, 2009.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700