JPEG地质资料篡改检测算法及应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
摘要:地质资料是地质工作成果的具体体现和历史记录,是国家经济建设和科学发展不可缺少的宝贵财富。近年来,随着全球社会经济与数字技术的迅速发展,地质资料的储存、服务和管理等方式也发生了很大变化,全国各省局地质资料馆都展开了大规模的地质资料图文数字化工作。目前,针对数字化地质资料在汇交、分发等过程中的真实性鉴别需求,中国地质调查局发展研究中心组织开展了数字水印技术在地质数据成果知识产权管理中的应用研究,然而,该技术需要资料提供方主动对图像进行预处理以及提供认证信息,很大程度上限制了其应用。针对上述应用与现有技术存在的局限性,本课题提出了基于盲检测技术的数字化地质资料检测,它是一种不依赖于数字签名或水印信息的图像真实性、完整性、原始性检测技术,具有广泛的应用前景。
     本文围绕JPEG地质资料的真实性检测问题,从篡改方式与图像格式入手,在系统地总结和分析现有盲检测方法的基础上,对JPEG地质资料真实性检测涉及的关键技术进行深入研究,提出了三种JPEG地质资料盲检测算法,并对不同类型数字化地质资料进行检测,通过实验结果比较与分析,验证了提出方法的有效性。论文的主要工作成果和创新点如下:
     (1)提出了基于SURF算法的JPEG地质资料复制-移动篡改检测算法。针对传统复制-移动篡改的块匹配检测算法普遍存在的计算量大、无法分辨被复制区域与篡改区域、以及篡改区域定位不精准等问题,本文提出了一种基于SURF算法的JPEG地质资料复制-移动篡改检测方法。首先运用SURF算法提取图像的特征点和特征描述符,根据特征描述符之间的欧氏距离进行特征点匹配,定位复制-移动区域;然后根据JPEG压缩特性,提出块伪影矩阵因子FBACM的计算方法;最后通过比较复制-移动区域FBACM值的大小定位篡改区域。实验结果表明,相较DCT和PCA块匹配算法,该方法无论在算法计算复杂度、鲁棒性以及篡改区域定位的准确性上都具有明显优势。
     (2)提出了基于ASAD的JPEG地质资料篡改检测算法。针对JPEG地质资料可能的Inpainting与拼接篡改操作,根据篡改后保存格式的不同对其进行分类,并通过对不同篡改方案进行仿真和可行性分析,提出了一种基于ASAD的JPEG地质资料篡改检测算法。该方法通过以不同JPEG质量因子压缩待检测图像,并计算他们与原始图像差的绝对值之和的均值来检测篡改区域。此外,在实验部分对算法涉及的参数选择进行了讨论与研究。实验结果表明,该方法对于拼接与Inpainting篡改后并以JPEG或无压缩格式保存的篡改方案均有效,且算法鲁棒性以及篡改区域定位准确性均高于BAG提取方法。
     (3)提出了基于首位数特性的JPEG地质资料篡改检测算法。针对DCT和JPEG单压缩系数首位数的概率分布特性,研究了基于单压缩系数首位数分布的通用Benford法则模型,结合该模型分析不同压缩历史JPEG系数首位数的概率分布特性,提出了一种基于首位数特性的JPEG地质资料篡改检测算法。该算法将篡改区域检测看作是一个二分类模式识别问题,首先将待检测图像进行子图像提取操作,然后计算每个子图像JPEG系数部分AC mode的首位数概率分布作为特征向量,结合支持向量机(Support Vetcor Machine, SVM)分类器对图像中的所有子图像进行分类,判断给定JPEG地质资料是否被局部篡改,并自动定位篡改区域。实验结果表明,该方法对于"JPEG+无压缩”"JPEG+JPEG""JPEG+Inpainting"等三种常见的地质资料篡改均有效,且算法性能明显优于SAD和BPPM算法。
     综上所述,本文的主要工作集中在数字化地质资料真实性检测的盲取证技术研究,在理论和应用上都取得了一定的成果,这些成果将为数字化地质资料更加安全有效实用地社会化服务提供技术保障与支持。
Abstract:Geological data is the embodiment and historical records of geological work achievements, is indispensable precious wealth for national economic construction and scientific development. In recent years, with the rapid development of global social economy and the digital technology, the storage, service and management mode also changed greatly. The provincial geological archives across the country have launched a large-scale digital work of geological data. At present, in view of the need to identify the authenticity of digital geological data in the process of submission and distribution, the Development Research Center of China Geological Survey Bureau organized the application of digital watermarking technology in intellectual property management of geological data. However the application of digital watermarking this technology is limited greatly, because it requires the content providers to pre-process the images and provide authentication information actively. Due to the requirements of application and limitations of existing technology, based on blind detection technology this thesis proposes digital geological data detection technology, which is a technology of detecting image authenticity, integrity and primitiveness without relying on digital signature or watermark information and with broad prospect.
     Aimed at the authenticity detection of JPEG geological image, this paper makes an in-depth research on the related key techniques on the basis of summarizing and analyzing the blind detection methods that exist from the tampering scenarios and image format, and proposed three passive detection methods for JPEG geological image, and tested on different kinds of digital geological image. The effectiveness of the proposed methods is verified by experimental comparison and analysis. The main contents and innovations are as follows:
     (1) A copy-move forgery detection method for JPEG geological images based on SURF algorithm is proposed. Aiming at the shortcomings of the traditional copy-move forgery block-matching detection methods, including large computational quantity, can't distinguish the tampered region from the copy-move regions, and the inaccuracy of tampered region location, a copy-move forgery detection method for JPEG geological images is proposed based on SURF algorithm. Firstly, the SURF algorithm is applied to extract keypoints and descriptor vectors of the given image. Secondly, match the detected keypoints by computing the Euclidean distance of their descriptor vectors, and locate the copy-move regions. Then, the blocking artifact characteristics matrix factor (FBACM) is proposed base on JPEG compression, and finally, the tampered region is located according to the JPEG BACM factor. Experimental results show that, the proposed method has considerable advantages over traditional DCT and PCA block-matching methods in efficiency, robustness and accuracy.
     (2) A passive tampering detection for JPEG geological image based on ASAD is Proposed. The commonly used Inpainting and splicing tampering techniques can be classified according to the format which the tampered image is saved in after tampering. A passive tampering detection for JPEG geological image is proposed based on ASAD by introducing the simulation and feasibility analysis for different tampering schemes. The tampered region is detected by computing the averaged sum of absolute difference (ASAD) images between the tampered image and a resaved JPEG compressed image at different quality factors. In addition, the discussion and analysis of the related parameters selection is presented at the experiment segment. Experimental results show that, the proposed method works for inpainting and splicing tampering techniques when the tampered image is saved in an uncompressed format or in JPEG compressed format, and the robustness and the tampered region location accuracy of the proposed method are higher than those of BAG extraction method.
     (3) A passive tampering detection for JPEG geological image based on the characteristic of the first digits is proposed. Aiming at the first digits'probability distribution of the DCT and singly compressed JPEG coefficients, a generalized Benford's law which follows the distribution of singly compressed JPEG coefficients is studied. According to the generalized Benford's law, the probability distribution of JPEG coefficients obtained by different compression schemes analyze. On the basis of this, a passive tampering detection for JPEG geological image based on the characteristic of the first digits is proposed. In the algorithm, the tampered region detection can be treated as a two-class pattern recognition problem. Firstly, the sub-images are extracted from the to-be detected image. Then, for each sub-image, calculate its first digits' probability distribution of JPEG coefficients of individual AC modes as feature vectors, and support vector machine (SVM) is applied to detect and locate the tampered region. Experimental results show that, the proposed method can effectively detect three kinds of commonly used tampering schemes for digital geological images, including "JPEG+uncompressed","JPEG+JPEG" and "JPEG+Inpainting", and the performance of the proposed method is obviously better than that of SAD and BPPM algorithms.
     In conclusion, this thesis mainly focuses on the blind forensics research of identifying the authenticity of digital geological data. Some achievements have been made in theory and application. These achievements will provide technical guarantee and support for safe, effective, practical and services of digital geological data.
引文
[1]尚武,杨东来,李景朝,姜作勤.中国地质信息服务体系的现状、差距及对策[J].中国地质,2001,34(4):730-735.
    [2]周进生.关于成果地质资料社会化服务的理性思考[J].资源与产业,2007,9(6):119-122.
    [3]姜作勤,马智民,杨东来,李景朝,尚武,王群.地质信息服务体系框架研究[J].中国地质,2007,34(1):173-178.
    [4]卜小平,赵亚利,张翠花,孟刚,尚宇.我国地质资料管理工作问题分析与对策建议[J].国土资源科技管理,2009,26(2):135-139.
    [5]钟长林,韩永吉.网络环境下地质资料管理工作初探[J].吉林地质,2006,25(3):56-58.
    [6]丁克永,庞振山,颜世强.馆藏青藏高原地区成果地质资料概况[J].中国矿业,2011,20(5):16-18.
    [7]王传礼,郑晓光.江苏图文地质资料数字化工作现状与展望[J].江苏地质,2005,29(2):123-124.
    [8]施红棉.地质资料图文数字化工作现状和发展趋势[J].资源环境与工程,2009,23(3):344-347.
    [9]李桂芳.成果地质资料汇交中存在的问题及对策[J].资源环境与工程,2007,21(4):476-478.
    [10]Kumar A, Yemeni L K. Semi-automated relative quantification of cell culture contamination with mycoplasma by Photoshop-based image analysis on immunofluorescence preparations[J]. Biologicals,2009,37(1):55-60.
    [11]Jouybari H A, Farahnaky A. Evaluation of Photoshop software potential for food colorimetry[J]. Journal of Food Engineering,2011,106(2):170-175.
    [12]Vousdoukas M I, Perakakis P, Idrissi S, Vila J. SVMT:A MATLAB toolbox for stereo-vision motion tracking of motor reactivity [J]. Computer Methods and Programs in Biomedicine,2012,108(1):318-329.
    [13]Murukeshan V M, Fei L Y, Krishnakumar V, Ong L S, Asundi A. Development of Matlab filtering techniques in digital speckle pattern interferometry[J]. Optics and Lasers in Engineering,2003,39(4):441-448.
    [14]Y, Li. Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching[J]. Forensic Science International, 2013,224(1-3):59-67.
    [15]Chang I N, Yu J C, Chang C C.A forgery detection algorithm for exemplar-based inpainting images using multi-region relation[J]. Image and Vision Computing,2013,31(1):57-71.
    [16]Sekeh M A, Maarof M A, Rohani M F, Mahdian B. Efficient image duplicated region detection model using sequential block clustering[J]. Digital Investigation,2013,10(1):73-84.
    [17]Wang X F, Xue J R, Zheng Z Q, Liu Z L, Li N. Image forensic signature for content authenticity analysis [J]. Journal of Visual Communication and Image Representation,2012,23(5):782-797.
    [18]Cao Y J, Gao T G, Fan L, Yang Q T. A robust detection algorithm for copy-move forgery in digital images [J]. Forensic Science International,2012, 214(1-3):33-43.
    [19]赫明钊,曹良才,谭峭峰,何庆声,金国藩.基于级联分数傅里叶变换系统的数字水印技术[J].光学学报,2009,29(10):2709-2715.
    [20]尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099.
    [21]龙军,危韧勇.数字水印技术在网络评审中的应用研究[J].湖南大学学报,2005,32(3):111-114.
    [22]Li L, Yuan X, Lu Z, Pan J. Rotation invariant watermark embedding based on scale-adapted characteristic regions[J]. Information Sciences,2010,180(15): 2875-2888.
    [23]Li L, Ma Y, Chang C, Lu J. Analyzing and removing SureSign watermark[J]. Signal Processing,2013,93(5):1374-1378.
    [24]Taha M, Hesham N, Hoda M. Efficient watermark detection by using the longest common substring technique[J]. Egyptian Informatics Journal,2011, 12(2):115-123.
    [25]魏为民,梁光岚,唐振军,王朔中.基于重叠正交变换的鲁棒水印方法[J].武汉大学学报·信息科学版,2008,33(3):326-329.
    [26]姜传贤,陈孝威,李智.基于文本重要内容的鲁棒水印算法[J].自动化学报,2010,36(9):1250-1256.
    [27]王向阳,侯丽敏,杨红颖.基于图像特征点与伪Zernike矩的鲁棒水印算法 研究[J].计算机研究与发展,2008,45(5):772-778.
    [28]陈经会,张雪萍.基于计算全息图的内容易碎水印技术[J].计算机工程与设计,2008,29(17):4581-4583.
    [29]张杰,张士杰,高山青,刘粉林.一种基于混沌映射的易碎水印[J].计算机工程,2006,32(9):159-161.
    [30]邵亚非,张利,吴国威.安全且可定位的半易碎图像验证算法[J].清华大学学报(自然科学版),2003,43(9):1253-1256.
    [31]代少升,潘露.基于奇异值分解与安全Hash函数的图像认证方法[J].光电技术应用,2010,31(2):303-316.
    [32]王一淼,彭宏,陈龙.基于入侵检测系统的主动取证方法[J].计算机应用研究,2007,24(5):278-282.
    [33]徐旭,平西建,张涛,王国新.针对LSB匹配隐写的图像复原隐写分析[J].计算机辅助设计与图形学学报,2009,21(2):262-274.
    [34]钮心忻,杨义先.信息隐写与隐写分析研究框架探讨[J].电子学报,2006,34(12):2421-2424.
    [35]史经业,赵耀,倪蓉蓉.基于DCT系数统计特性和支持向量机的图像隐写分析[J].东南大学学报,2007,37(I):119-122.
    [36]Al-Qershi O M, Khoo B E. Passive detection of copy-move forgery in digital images:State-of-the-art [J]. Forensic Science International,2013,231(1-3): 284-295.
    [37]Ding M, Cao Y, Wu Q. Method of Passive Image Based Crater Autonomous Detection[J]. Chinese Journal of Aeronautics,2009,22(3):301-306.
    [38]Bravo-Solorio S, Nand A. Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics[J]. Signal Processing,2011,91(8):1759-1770.
    [39]Geradts Z, Bijhold J. New developments in forensic image processing and pattern recognition[J]. Science & Justice,2001,41(3):159-166.
    [40]Chen L, Lu W, Ni J, Sun W, Huang J. Region duplication detection based on Harris corner points and step sector statistics [J]. Journal of Visual Communication and Image Representation,2013,24(3):244-254.
    [41]Shao H, Yu T, Xu M, Cui W. Image region duplication detection based on circular window expansion and phase correlation[J]. Forensic Science International,2012,222(1-3):71-82.
    [42]Liu G, Wang J, Lian S, Wang Z. A passive image authentication scheme for detecting region-duplication forgery with rotation[J]. Journal of Network and Computer Applications,2011,34(5):1557-1565.
    [43]Li X H, Zhao Y Q, Liao M, Shih F Y, Shi Y Q. Passive detection of copy-paste forgery among JPEG images[J]. Journal of Central South University.2012,19 (10):2839-2851.
    [44]Zhao Y Q, Liao M, Shih F Y, Shi Y Q. Tampered region detection of inpainting JPEG images[J]. Optik-International Journal for Light and Electron Optics, 2013,124(16):2487-2492.
    [45]Liu Q, Sung A H, Qiao M, Chen Z, Ribeiro B An improved approach to steganalysis of JPEG images[J]. Information Sciences,2010,180(9): 1643-1655.
    [46]Johnson M K, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting[C].2005:1-9.
    [47]Lukas J, Fridrich J, Goljan M. Detecting digital image forgeries using sensor pattern noise[C]. Proceedings of the International Society for Optical Engineering,2006,6072:362-372.
    [48]H, Farid. Exposing digital forgeries in color filter array interpolated images[J]. IEEE Transactions on Signal Processing,2005,53(10):3948-3959.
    [49]Lynch G., Shih F Y, Liao H M An efficient expanding block algorithm for image copy-move forgery detection[J]. Information Sciences,2013,239: 253-265.
    [50]Davarzani R, Yaghmaie K, Mozaffari S, Tapak M Copy-move forgery detection using multiresolution local binary patterns[J]. Forensic Science International,2013,231(1-3):61-72.
    [51]Amerini I, Ballan L, Caldelli R, Bimbo A D, Tongo L D, Serra G. Copy-move forgery detection and localization by means of robust clustering with J-Linkage[J]. Signal Processing:Image Communication,2013,28(6): 659-669.
    [52]Muhammad G., Hussain M, Bebis G. Passive copy move image forgery detection using undecimated dyadic wavelet transform[J]. Digital Investigation, 2012,9(1):49-57.
    [53]Peng F, Nie Y, Long M A complete passive blind image copy-move forensics scheme based on compound statistics features[J]. Forensic Science International,2011,212(1-3):e21-e25.
    [54]Fridrich J, Soukal D, Lukas J. Detection of copy-move forgery in digital images[C]. Proc. of digital forensic research workshop,2003:247-258.
    [55]Popescu A, Farid H. Exposing digital forgeries by detecting duplicated image regions. Technical Report TR2004-515. Department of Computer Science, Dartmouth College; 2004.
    [56]Langille A, Gong M. An efficient match-based duplication detection al-gorithm[C]. Proceedings of the 3rd Canadian Conference on Computer and Robot Vision,2006:64-71.
    [57]Luo W, Huang J, Qiu G. Robust detection of region-duplication forgery in digital image [C]. The 18th International Conference on Pattern Recognition, 2006,4:746-749.
    [58]Mahdian B, Saic S. Detection of near-duplicated image regions[C]. Computer Recognition Systems 2,2007,45:187-195.
    [59]Myna A, Venkateshmurthy M, Patil C. Detection of region duplication forgery in digital images using wavelets and log-polar mapping[C]. Conference on Computational Intelligence and Multimedia Applications,2007,3:371-377.
    [60]Qiumin W, Shuozhong W, Xinpeng Z. Log-polar based scheme for revealing duplicated regions in digital images[J]. IEEE Signal Processing Letters,2011, 18(10):559-562.
    [61]Dybala B, Jennings B, Letscher D. Detecting filtered cloning in digital images[C]. Proceedings of the 9th workshop on Multimedia & security,2007: 43-50.
    [62]Li G, Wu Q, Tu D, Sun S. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[C].2007 IEEE International Conference on Multimedia and Expo,2007:1750-1753.
    [63]Li W, Yuan Y, Yu N. Detecting copy-paste forgery of JPEG image via block artifact grid extraction[C]. International workshop on local and non-local approximation in image pro cessing,2008:121-126.
    [64]Huang Y, Long Y. Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model [C]. IEEE conference on computer vision and pattern recognition,2008:1-8.
    [65]Zhang Z, Ren Y, Ping X J, He Z Y, Zhang S Z. A survey on passive-blind image forgery by doctor method detection[C]. Proceedings of the 7th International Conference on Machine Learning and Cybernetics,2008,6: 3463-3467.
    [66]Bayram S, Taha H, Memon N. An efficient and robust method for detecting copy-move forgery[C]. IEEE International Conference on Acoustics, Speech and Signal Processing,2009:1053-1056.
    [67]Lin H, Wang C, Kao Y. Fast copy-move forgery detection[J]. WSEAS Transactions on Signal Processing,2009,5(5):188-197.
    [68]Liu B B, Lee H K, Hu Y,Choi C H. On classification of source cameras:a graph based approach[C].2010 IEEE International Workshop on Information Forensics and Security,2010:1-5.
    [69]Muhammad G, Hussain M, Khawaji K, Bebis G. Blind copy move image forgery detection using dyadic uncedimated wavelet transform[C].17th International Conference on Digital Signal Processing,2011:1-6.
    [70]Gopi E, Lakshmanan N, Gokul T, Ganesh S, Shah P. Digital image forgery detection using artificial neural network and auto regressive coefficients [C]. Canadian Conference on Elect rical and Computer Engineering,2006: 194-197.
    [71]Ghorbani M, FirouzmandM, Faraahi A. DWT-DCT(QCD) based copy-move image forgery detection[C].18th International Conference on Systems, Signals and Image Processing,2011:1-4.
    [72]Bashar M, Noda K, Ohnishi N, Mori K. Exploring duplicated regions in natural images[J]. IEEE Transactions on Image Processing,2010, (99):1-40.
    [73]Kang XB, Wei SM. Identifying tampered regions using singular value decomposition in digital image forensics [C].2008 International Conference on Computer Science and Software Engineering,2008,3:926-930.
    [74]Sutthiwan P, Shi YQ, Wei S, Tian-Tsong N. Rake transform and edge statistics for image forgery detection[C].2010 IEEE International Conference on Multimedia and Expo,2010:1463-1468.
    [75]Pan X Y, Lyu S W. Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics and Security,2010, 5(4):857-867.
    [76]H, Farid. Digital image ballistics from JPEG quantization. Technical Report TR2006-583. Department of Com puter Science, Dartmouth College; 2006.
    [77]Ng T, Chang S. A model for image splicing[C].2004 International Conference on Image Processing,2004,2:1169-1172.
    [78]Ng T, Chang S, Sun Q. Blind detection of photomontage using higher order statistics[C]. Proceedings of the 2004 International Symposium on Circuits and Systems,2004,5:688-691.
    [79]Lint Z, Wang R, Tang X, Shum H. Detecting doctored images using camera response normality and consistency[C]. IEEE Computer Society Conference on Computer Vision and Pattern Recognition,2005,1:1087-1092.
    [80]Fu D, Shi Y, Su W. Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition[C]. International workshop on digital watermarking,2006, 4283:177-187
    [81]Chen W, Shi Y Q, Su W. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. Proceedings of SPIE-The International Society for Optical Engineering [C],2007.
    [82]Shi Y, Chen C, Chen W. A natural image model approach to splicing detection[C]. Proceedings of the 9th workshop on Multimedia & security: 51-62.
    [83]Hsu Y, Chang S. Detecting image splicing using geometry invariants and camera characteristics consistency[C]. IEEE International Conference on Multimedia and Expo,2006:549-552.
    [84]Johnson M, Farid H. Exposing digital forgeries through specular highlights on the eye[C]. International workshop on information hiding,2007:311-325.
    [85]Zhang Z, Kang J, Ren Y. An effective algorithm of image splicing detection[C]. International Conference on Computer Science and Software Engineering, 2008,1:1035-1039.
    [86]Ng T, Tsui M. Camera response function signature for digital forensics-part I: theory and data selection[C]. First IEEE International Workshop on Information Forensics and Security,2009:156-160.
    [87]T, Ng. Camera response function signature for digital forensics-part II:signature extraction[C]. First IEEE International Workshop on Information Forensics and Security,2009:161-165.
    [88]Liu Q, Song A H. A new approach for JPEG resize and image splicing detection[C]. Proceedings of the First ACM workshop on Multimedia in forensics,2009:43-48.
    [89]Wang W, Dong J, Tan T. Effective image splicing detection based on image chroma[C]. IEEE International conference on image processing,2009: 1257-1260.
    [90]Qu Z H, Qiu G P, Huang J W. Detect digital image splicing with visual cues[C]. International workshop on information hiding,2009:247-261.
    [91]Zhang W, Cao X, Zhang J, Zhu J, Wang P. Detecting photographic composites using shadows[C]. IEEE International conference on multimedia and Expo, 2009:1042-1045.
    [92]Fang Y, Dirik A E, Sun X, Memon N. Source classidentification for DSLR and compact cameras[C]. IEEE International Workshop on Multimedia Signal Processing,2009:1-5.
    [93]Hsu Y F, Chang S F. Camera response functions for image forensics:an automatic algorithm for splicing detection[J]. IEEE Transactions on Information Forensics and Security,2010,5(4):816-825.
    [94]Zhang W, Cao X, Qu Y, Hou Y, Zhao H, Zhang C. Detecting and extracting the photo composites using planar homography and graph cut[J]. IEEE Transactions on Information Forensics and Security,2010,5(3):544-555.
    [95]Zhao X, Li J, Li S, Wang S. Detecting digital image splicing in chroma spaces[C]. International workshop on digital watermarking,2010, (12-22).
    [96]Liu Q, Cao X, Deng C, Guo X. Identifying image composites through shadow matte consistency [J]. IEEE Transactions on Information Forensics and Security,2011,6(3):1111-1122.
    [97]Fan Z, Queiroz R L. Identification of bitmap compression history:JPEG detection and quantizer estimation[J]. IEEE Transactions on Image Processing, 2003,12(2):230-235.
    [98]Fridrich J, Lukas J. Estimation of primary quantization matrix in double compressed jpeg images. Digital Forensic Research Workshop [C],2003.
    [99]Popescu A C, Farid H (2005). Statistical Tools for Digital Forensics. Information Hiding Lecture Notes in Computer Science.
    [100]Neelamani R, Queiroz R, Fan Z, Dash S. JPEG compression history estimation for color images[J]. IEEE Transactions on Image Processing,2003,15(6): 1365-1378.
    [101]Fu D, Shi Y Q, Su Q. A generalized Benford's law for JPEG coefficients and its applications in image forensics[C]. Proceedings of the SPIE,2007,6505: 65051L1-11.
    [102]Tjoa S, Lin W, Liu K. Transform coder classification for digital image forensic[C]. IEEE International Conference on Image Processing,2007,6: 105-108.
    [103]Ye S, Sun Q, Chang E. Detecting digital image forgeries by measuring inconsistencies of blocking artifact[C]. IEEE International Conference on Multimedia and Expo,2007:12-15.
    [104]Zhang J, Wang H, Su Y. Detection of double-compression in JPEG2000 images for application in image forensics[J]. Journal of Multimedia,2009, 4(6):379-388.
    [105]Luo W, Huang J, Qiu G. A novel method for block size forensics based on morphological operations[C]. Proceeding of International workshop on digital watermarking,2008,5450:229-239.
    [106]Tjoa S, Lin W, Zhao H, Liu K. Block size forensic analysis in digital images[C]. IEEE International Conference on Acoustics, Speech and Signal Processing,2007,1:Ⅰ-633-Ⅰ-636.
    [107]Fridrich J, Pevny T. Detection of Double-Compression in JPEG Images for Applications in Steganography[J]. IEEE Transactions on Information Forensics and Security,2008,3(2):247-258.
    [108]Qu Z, Luo W, Huang J. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication[C]. IEEE International Conference on Acoustics, Speech and Signal Processing,2008: 1661-1664.
    [109]Chen C, Shi YQ, Wei S. A machine learning based scheme for double JPEG compression detection[C].19th International Conference on Pattern Recognition,2008:1-4.
    [110]Li B, Shi Y Q, Huang J. Detecting doubly compressed JPEG images by using mode based first digit features[C]. IEEE 10th Workshop on Multimedia Signal Processing,2008:730-735.
    [111]Li W, Yu N, Yuan Y. Doctored JPEG image detection[C]. IEEE International Conference on Multimedia and Expo,2008:253-256.
    [112]He JF, Lin ZC, Wang LF, Tang XO Detecting doctored JPEG images via DCT coefficient analysis [C]. Proceedings of the 9th European conference on computer vision,2006,3953:423-435.
    [113]Chen Y, Hsu C. Image tampering detection by blocking periodicity analysis in JPEG compressed images[C]. IEEE 10th Workshop on Multimedia Signal Processing,2008:803-808.
    [114]H, Farid. Exposing digital forgeries from JPEG ghosts [J]. IEEE Transactions on Information Forensics and Security,2009,4(1):154-160.
    [115]Lin Z, He J, Tang X, Tang C. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis[J]. Pattern Recognition,2009, 42(11):1557-1565.
    [116]Mahdian B, Saic S. Detecting double compressed JPEG images[C].3rd International Conference on Imaging for Crime Detection and Prevention 2009: 12.
    [117]Wang W, Dong J, Tan T. Tampered region localization of digital color images based on JPEG compression noise [C]. International workshop on digital watermarking,2011,6526:120-133.
    [118]Bianchi T, Piva A. Detection of non-aligned double JPEG compression with estimation of primary compression parameters[C].18th IEEE International Conference on Image Processing 2011:1929-1932.
    [119]Chen Y, Hsu C. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection[J]. IEEE Transactions on Information Forensics and Security,2011,6(2):396-406.
    [120]Kee E, Johnson M, Farid H. Digital image authentication from JPEG headers[J]. IEEE Transactions on Information Forensics and Security,2011, 6(3):1066-1075.
    [121]Bianchi T, Rosa A, Piva A. Improved DCTcoefficient analysis for forgery localization in JPEG images[C]. IEEE International Conference on Acoustics, Speech and Signal Processing,2011:2444-2447.
    [122]Huang Y, Lu W, Sun W, Long D. Improved DCT-based detection of copy-move forgery in images[J]. Forensic Science International,2011, 206(1-3):178-184.
    [123]Ju S, Zhou J, He K. An authentication method for copy areas of images[C]. Fourth International Conference o n Image and Graphics,2007:303-306.
    [124]Bay H, Ess A, Tuvtelaars T. SURF:Speeded Up Robust Features[J]. Computer Vision and Image Understanding,2008,110(3):346-359.
    [125]Popescu A, Farid H. Exposing Digital Forgeries By Detecting Duplicated Image Region s [R], Tech. Rep. TR2004-515, Dartmouth College,2004.
    [126]Schaefer G, Stich M. UCID-An uncompressed colour image database [R]. Technical Report, School of Computing and Mathematics, Nottingham Trent University, U.K.,2003.
    [127]Li W, Yuan Y, Yu N. Passive detection of doctored JPEG image via block artifact grid extraction[J]. Signal Processing,2009,89(9):1821-1829.
    [128]Luo W, Qu Z, Huang J. A novel method for detecting cropped and recompressed image blocks[C]. Proceedings of 2007 IEEE International Conference on Acoustics, Speech and Signal Processing,2007.
    [129]Liu Z, Li X, Zhao Y. Passive detection of copy-paste tampering for digital image forensics [C]. Proceedings of Fourth International Conference on Intelligent Computation Technology and Automation,2011,2:649-652.
    [130]Li X, Zhao Y, Liao M,, Shih F Y, Shi Y Q. Detection of Tampered Region for JPEG Images by Using Mode Based First Digit Features[J]. EURASIP Journal on Advances in Signal Processing,2012,190:1-10.
    [131]Criminisi A, Perez P, Toyama, K. Region filling and object removal by exemplar-based inpainting[J]. IEEE Transactions on Image Processing,2004, 13(9):1200-1212.
    [132]Newcomb S. Note on the frequency of use of the different digits in natural numbers[J]. American Journal of Mathematics,1881,4(1/4):39-40.
    [133]Benford F. The law of anomalous numbers[C]. Proceedings of the American Philosophical Society,1938,78:551-572.
    [134]Hill T P. A statistical derivation of the significant-digit law[J]. Statistical Science,1996,10(4):354-363.
    [135]Durtschi C, Hillison W, Pacini C. The effective use of Benford's law to assist in detecting fraud in accounting data[J]. Journal of Forensic Accounting,2004, V:17-34.
    [136]Jolion J M. Images and Benford's law[J]. Journal of Mathematical Imaging and Vision,2001,14(1):73-81.
    [137]Acebo E, Sbert M Benford's law for natural and synthetic images[C]. Proceeding Computational Aesthetics'05 Proceedings of the First Eurographics conference on Computational Aesthetics in Graphics, Visualization and Imaging,2005:169-176.
    [138]Olmos A, Kingdom F A A. McGill Calibrated Colour Image Database [DB], http://tabby.vision.mcgill.ca,2004.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700