面向真实性检测的数字图像盲取证方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着现代数字技术的发展和图像处理工具性能的日益强大,数字图像极易被篡改并使得人眼难以觉察出伪造的痕迹,因此迫切需要对图像的真实性进行鉴别。传统的数字签名和数字水印鉴别技术都需要内容提供方对图像进行预处理(提取签名或嵌入水印),从而导致两者的应用受到了限制。针对上述应用需求和技术需求,本课题研究一种刚刚兴起的鉴别技术—数字图像盲取证。数字图像盲取证是一种不依赖任何预签名提取或预嵌入信息来鉴别图像真伪和来源的技术,它有着广泛的应用前景,正逐步成为多媒体安全领域新的研究热点。
     本文围绕数字图像盲取证中的真实性检测问题,采用理论分析、算法设计和实验验证相结合的方法,对数字图像盲取证的理论和技术进行了深入研究。论文的主要研究内容及创新点如下:
     数字图像盲取证系统框架的研究。数字图像盲取证技术的发展处于初级阶段,目前尚未形成统一的、成熟的系统框架。本文在总结现有研究成果的基础上,提出了一个数字图像盲取证的基本框架,它包括图像建模、特征提取与特征分析、算法设计、测试与验证、图像篡改检测定位与图像分类、相关的图像源特性以及图像数据库等主要组成部分。该框架为本文的研究提供了理论指导,对今后的盲取证工作也具有一定的借鉴意义。
     复制-粘贴伪造图像的盲取证方法研究。针对在同一幅图像中复制部分特定区域来覆盖伪造目标区域的复制-粘贴伪造类型,本文提出了一种基于小波和奇异值分解的图像盲取证算法。该算法将复制-粘贴伪造检测问题转化为相似块对的匹配问题,利用小波变换提取图像的近似分量作为分析对象,并对其进行滑窗分块操作,对图像块进行奇异值分解和量化,然后对由所有块的量化奇异值特征组成的特征矩阵按行进行字典排序,最后结合相似图像块对的偏移频率信息,对复制-粘贴伪造区域进行检测和定位。实验结果表明,该算法能够有效地检测并定位出图像的复制-粘贴篡改区域,对JPEG压缩和高斯噪声具有较好的鲁棒性,并且具有较高的检测效率。
     纹理合成修复伪造图像的盲取证方法研究。针对利用纹理合成图像修复技术进行图像篡改的修复伪造类型,本文首次提出了一种基于零值连通和模糊隶属度的图像盲取证算法。该算法利用零值连通特征来刻画修复伪造图像中异常的块对相似性,然后引入模糊理论中的隶属函数,将这种块对的相似性转换成待检测块属于篡改块的隶属度,最后通过截集划分,对伪造区域进行检测和定位。实验结果表明,该算法能够对多种修复方法生成的伪造图像进行有效的检测并对篡改区域进行准确的定位,同时对JPEG压缩和高斯噪声具有一定的鲁棒性。
     拼接伪造图像盲取证方法的研究。针对从一幅或多幅图像中剪切部分区域,将其拼接到另一幅图像中并进行必要的后处理的拼接伪造类型,本文提出了一种基于自然图像统计特性的图像盲取证算法。该算法将拼接图像检测问题看作是一个两类模式识别问题,从分析自然图像的统计特性出发,利用广义高斯分布模型对图像小波细节子带系数的统计分布进行建模,提取模型参数及模型预测误差作为特征;同时利用马尔可夫链对图像离散余弦变换系数之间的相关性进行建模,提取模型的状态转移概率矩阵作为特征;然后将两部分特征合并形成图像的统计特征向量,采用支持向量机实现了对自然图像和拼接图像的有效分类。利用该算法对三个公开的拼接图像数据库进行了测试,实验结果表明算法具有较高的分类准确率,从而验证了特征的有效性。
     综上所述,本文的主要工作集中在数字图像盲取证的系统框架和方法的研究上,在理论和应用上都取得了一定的成果,这些成果将对多媒体盲取证技术的发展产生积极的推动作用。
With the development of modern digital technology and the availability of increasingly powerful image processing tools, digital images are easy to be manipulated without leaving obvious visual traces of having been tampered, so there is an urgent need to identify the authenticity of images. The applications of traditional digital signature and watermarking authentication technologies are limited, because they require the content providers to pre-process the images, such as extracting signature or embedding watermark. Due to the requirements of application and technology mentioned above, this thesis focuses on blind digital image forensics, which is an emerging authentication technology. As a technology of detecting image authenticity and source without relying on any pre-extracted or pre-embedded information, blind digital image forensics is becoming a new hotspot with broad prospect in the multimedia security area.
     This thesis makes an in-depth research on the authenticity detection problem of blind digital image forensics by applying the combined methods of theory analysis, algorithm design and experiment validation. The main contents and innovations are as follows:
     Firstly, the basic framework of digital image forensics is studied. As the research of blind digital image forensics technology is still in its infancy, there is no unified and mature architecture. Based on the recent developments in this field, a basic framework of digital image forensics is proposed, which consists of image modeling, feature extraction and analysis, algorithm design, test and verification, forgery area localization and image classification, image source characteristics as well as image database. The framework provides a theoretical guidance for the research of this paper, and has some reference to the future work of digital forensics.
     Secondly, a blind forensic approach for detecting copy-paste images is studied. The copy-paste forgery is to copy a particular part of a digital image and to cover another part of the same image. A blind image forensic algorithm based on wavelet and singular value decomposition is proposed to detect the specific forgery. In this algorithm, the copy-paste forgery detection is translated into a matching problem of similar block pairs. The wavelet transform is applied to extract the approximate component of the image, on which the sliding window operation is used. Then the singular value decomposition and quantization are adopted to extract characteristics of the fixed-size image blocks. The quantized singular value vectors are lexicographically sorted and the copy-paste forgery regions are localized by detecting all neighborhood vectors. The experimental results demonstrate that the proposed approach can detect and localize the copy-paste forgery regions accurately, and has good robustness to JPEG compression and Gaussian noise. In addition, the efficiency of our approach is improved significantly.
     Thirdly, a blind forensic approach for detecting inpainted image based on texture synthesis is studied. The technique of image inpainting can be used to remove objects from an image and play visual tricks. As a first attempt, a blind image forensic algorithm based on zero-connectivity feature and fuzzy membership is proposed to detect the specific forgery. Zero-connectivity labeling is applied on block pairs to yield matching degree feature of all blocks in the region of suspicion, and fuzzy memberships of these blocks are then computed by constructing a membership function. Then the tampered regions are identified by a cut set. The experimental results show that the proposed approach can effectively detect the inpainted images, which are generated by a variety of image inpainting methods, and it can localize the tampered region accurately. Furthermore, the approach has robustness to JPEG compression and Gaussian noise to a certain extent.
     Finally, a blind forensic approach for detecting spliced image is studied. Image splicing is a process of cropping and pasting regions from different images to form another image with necessary post-processing. A blind image forensic algorithm based on statistical characteristics of natural images is proposed to detect this specific forgery. In the algorithm, the splicing detection can be treated as a two-class pattern recognition problem. On the one hand, the generalized Gaussian distribution is adopted to model the statistical distribution of wavelet details subbands of images, and the model parameters and prediction error of each wavelet details subband are extracted as features. On the other hand, the Markov chain is applied to model the correlation of discrete cosine transform coefficients, and the state transition probability matrix is extracted as feature. Then the two kinds of features are combined to form natural image statistical feature vector, which is used to distinguish natural images from spliced images using support vector machine. The proposed algorithm is tested on three public image splicing detection databases, and the experimental results show that the algorithm has a high classification accuracy, which verifies the effectiveness of the proposed features.
     In conclusion, this thesis mainly focuses on the research of the systematic framework and methods for blind digital image forensics. Some achievements have been made in theory and applications. These achievements will play a positive role in promoting the development of blind multimedia forensics.
引文
[1] Agarwala A , Dontcheva M , Agrawala M , et al . Interactive digital photomontage.ACM Transactions on Graphics(SIGGRAPH'04),2004,23(3):294~302.
    [2] Barrett W A,Cheney A S.Object-based image editing.ACM Transactions on Graphics(SIGGRAPH'02),2002,21(3):777~784.
    [3] Chuang Y Y,Curless B,Salesin D H,et al.A Bayesian approach to digital matting.Proceedings of IEEE International Conference on Computer Vision and Pattern Recogniton,Hawaii,USA,2001,2:264~271.
    [4] Kwatra V,Schodl A,Essa I,et al.Graphcut textures:image and video synthesis using graph cuts.ACM Transactions on Graphics(SIGGRAPH'03),2003,22(3):277~286.
    [5] Rother C,Kolmogorov V,Blake A.Grabcut-interactive foreground extraction using iterated graph cuts.ACM Transactions on Graphics(SIGGRAPH'04),2004,23(3):309~314.
    [6] Chuang Y Y,Agarwala A,Curless B,et al.Video matting of complex scenes.ACM Transactions on Graphics (SIGGRAPH'02),2002,21(3):243~248.
    [7] Perez P,Gangnet M,Blake A.Poisson image editing.ACM Transactions on Graphics(SIGGRAPH'03),2003,22(3):313~318.
    [8] Sun J,Jia J,Tang C K,et al.Poisson matting.ACM Transactions on Graphics(SIGGRAPH'04),2004,23(3):315~321.
    [9] Sun J,Yuan L,Jia J,et al.Image completion with structure propagation.ACM Transactions on Graphics(SIGGRAPH'05),2005,24(3):861~868.
    [10] Li Y,Sun J,Shum H Y.Video object cut and paste.ACM Transactions on Graphics(SIGGRAPH'05),2005,24(3):595~600.
    [11] Li Y,Sun J,Tang C K,et al.Lazy snapping.ACM Transactions on Graphics(SIGGRAPH'04),2004,23(3):303~308.
    [12] Wang J,Bhat P,Colburn R A,et al.Interactive video cutout.ACM Transactions on Graphics(SIGGRAPH'05),2005,24(3):585~594.
    [13] http://www.cs.dartmouth.edu/farid/research/digitaltampering/
    [14] Zhu B B,Swanson M D,Tewfik A H.When seeing isn't believing.IEEE Signal Processing Magazine,2004,21(2):40~49.
    [15] Lee S J , Jung S H . A survey of watermarking techniques applied to multimedia . Proceedings of IEEE International Symposium on Industrial Electronics(ISIE2001),Pusan,South Korea,2001,1(1):272~277.
    [16]吴金海,林福宗.基于数字水印的图像认证技术.计算机学报,2004,27(9):1153~1161.
    [17] Cox I J,Miller M L,Bloom J A.数字水印.王颖,黄志蓓等译.北京:电子工业出版社,2003.
    [18] Lin C Y,Chang S F.Semi-fragile watermarking for authentication JPEG visual content.Proceedings of SPIE,San Jose,CA,USA,2000,3971:140~151.
    [19] Ng T T,Chang S F,Sun Q B.Blind detection of photomontage using higher order statistics . Proceedings of IEEE International Symposium on Circuits and Systems(ISCAS04),Vancouver,Canada,2004,5:688~691.
    [20] Menezes A J,Oorchot P V,Vanstone S.Handbook of applied cryptography.Boca Raton,FL:CRC Press,1997.
    [21] Lin C Y . Watermarking and digital signature techniques for multimedia authentication and copyright protection.Doctor Thesis,Columbia University,2000.
    [22] Bhattacharjee S , Kutter M . Compression tolerant image authentication . Proceedings of IEEE International Conference on Image Processing(ICIP98),Chicago,USA,1998,1:435~439.
    [23] Lu C S,Liao H Y.Structural digital signature for image authentication:an incidental distortion resistant scheme.IEEE Transactions on Multimedia,2003,5(2):161~173.
    [24] Lin C Y,Chang S F.Generating robust digital signature for image/video authentication,Proceedings of Multimedia and Security Workshop at ACM Multimedia,Bristol,U K,1998,49~53.
    [25] Lin C Y,Chang S F.A robust image authentication method distinguishing JPEG compression from malicious manipulation.IEEE Transactions on Circuits and Systems for Video Technology,2001,11(2):153~168.
    [26]姚作樑,李国辉,涂丹等.数字图像的一种可恢复性主动数字签名方法RADS.计算机工程与科学,2003,25(1):29~32.
    [27] Yao Z L,Wu Q,Li G H.A recoverable and active digital signature approach for image:RADS.Proceedings of ICCC,Beijing,China,2004,I:541~546.
    [28] Zhou X,Duan X H,Wang D X.A semi-fragile watermark scheme for image authentication . Proceedings of 10th International Multimedia ModellingConference(MULMM04),Brisbane,Australia,2004,374~377.
    [29] Paquet A H,Ward R K.Wavelet-based digital watermarking for image authentication.Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering(CCECE02),Winnipeg,Canada,2002,2:879~884.
    [30] Paquet A H,Ward R K,Pitas I.Wavelet packets-based digital watermarking for image verification and authentication.Signal Processing,2003,83(5):2117~2132.
    [31] Winne D A,Knowles H D,Bull D R,et al.Digital watermarking in wavelet domain with predistortion for authenticity verification and localization.Proceedings of SPIE,2002,4675:349~356.
    [32] Chang E C,Kankanhalli M S,Guan X,et al.Robust image authentication using content based compression.Multimedia Systems,2003,9(2):121~130.
    [33] Friedman G L.The trustworthy digital camera: restoring credibility to the photographic image.IEEE Transactions on Consumer Electronics,1993,39(4):905~910.
    [34] Van Schyndel R V,Tirkel A Z,Osborne C F.A digital watermark.Proceedings of the IEEE International Conference on Image Processing (ICIP94),Austin,Texas,1994,2: 86~90.
    [35] Wolfgang R B , Delp E J . Fragile watermarking using the VW2D watermark.Proceedings of the SPIE/IS&T International Conference on Security and Watermarking of Multimedia Contents,San Jose,California,1999,3657:204~213.
    [36] Celik M,Sharma G,Saber E.Hierarchical watermarking for secure image authentication with localization.IEEE Transactions on Image Processing,2002,11(6):585~595.
    [37] Wu M,Liu B.Watermarking for image authentication.Proceedings of Internatioanl Conference on Image Processing(ICIP98),Chicago,Illinois,1998,2:437~441.
    [38] Piva A, Bartolini F, Caldelli R.Self recovery authentication of images in the DWT domain.International Journal of Image and Graphics,2005,5(1):149~165.
    [39] Wu Q,Li G H.An image authentication watermarking with self-localization and recovery.Proceedings of the 11th Joint International Computer Conference(JICC05),Chongqing,China,2005,960~963.
    [40] Ng T T,Chang S F,Lin C Y,et al.Passive-blind image forensics.MultimediaSecurity Technologies for Digital Rights,W Zeng,Yu H,Lin C Y(eds.),Elsvier,2006.
    [41] Lanh T V,Chong K S,Emmanuel S,et al.A survey on Digital Camera image forensic methods.Proceedings of IEEE International Conference on Multimedia and Expo (ICME07),Beijing,China,2007,16~19.
    [42] Sencar H T , Memon N . Overview of state-of-the-art in digital image forensics.Part of Indian Statistical Institute Platinum Jubilee Monograph series titled 'Statistical Science and Interdisciplinary Research',World Scientific Press,2008.
    [43] Adams J,Parulski K.Color processing in digital cameras.IEEE Micro,1998,18(6):20~31.
    [44] Kharrazi M , Sencar H T , Memon N . Blind source camera identification.Proceedings of Internatioanl Conference on Image Processing(ICIP04),Singapore,2004,1:709~712.
    [45] Celiktutan O , Avcibas I , Sankur B , et al . Source cell-phone identification.Proceedings of IEEE 14th Signal Processing and Communications Applications Conference,Antalya,2006,1~3.
    [46] Tsai M J,Wu G H.Using image features to identify camera sources.Proceedings of IEEE International Coference on Acoustics,Speech and Signal Processing(ICASSP06),Toulouse,2006,2:297~300.
    [47] Bayram S,Sencar H T,Memon N.Source camera identification based on CFA interpolation . Proceedings of IEEE International Conference on Image Processing(ICIP05),Genoa,Italy,2005,3:69~72.
    [48] Bayram S,Sencar H T,Memon N.Improvements on source camera-model identification based on CFA interpolation . Proceedings of WG 11.9 International Conference on Digital Forensics,Orlando,Florida,USA,2006.
    [49] Swaminathan A,Wu M,Ray Liu K J.Non-intrusive forensics analysis of visual sensors using output images.IEEE Transactions of Information Forensics and Security,2007,2(1):91~106.
    [50] Choi K S,Lam E Y,Wong K K Y.Source camera identification using footprints from lens aberration.Digital Photography II,Proceedings of SPIE,2006,6069:172~179.
    [51] Geradts Z J,Bijhold J,Kieft M,et al.Methods for Identification of Images Acquired with Digital Cameras.Proceedings of SPIE,2001,4232:505~512.
    [52] Lukas J,Fridrich J,Goljan M.Digital camera identification from sensor patternnoise.IEEE Transactions on Information Forensics and Security,2006,1(2):205~214.
    [53] Sutcu Y,Bayram S,Sencar H T,et al.Improvements on sensor noise based source camera identification.Proceedings of IEEE International Conference on Multimedia and Expo(ICME07),Beijing,China,2007,24~27.
    [54] Chen M,Fridrich J,Goljan M.Digital imaging sensor identification(Further Study).Proceedings of SPIE,2007.
    [55] Dirik E,Sencar H T,Memon N.Source camera identification based on sensor dust characteristics.Proceedings of IEEE workshop on Signal Processing Applications for Public Security and Forensics(SAFE07),Washington DC,USA,2007,1~6.
    [56] Lyu S,Farid H.How realistic is photorealistic?IEEE Transactions On Signal Processing,2005,53(2):845~850.
    [57] Ng T T,Chang S F,Hsu J,et al.Physics-motivated features for distinguishing photographic images and computer graphics.Proceedings of ACM Multimedia,Singapore,2005,238~248.
    [58] Wang Y,Moulin P.On discrimination between photorealistic and photographic images.Proceedings of IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP06),Toulouse,Francs,2006,2:161~164.
    [59] Dehnie S,Sencar H T,Memon N.Digital image forensics for identifying computer generated and digital camera images.Proceedings of IEEE International Conference on Image Processing(ICIP06),Atlanta,GA,USA,2006,2313~2316.
    [60] Dirik A E,Bayram S,Sencar H T,et al.New features to identify computer generated images.Proceedings of IEEE International Conference on Image Processing(ICIP07),San Antonio,Texas,USA,2007,4:433~436.
    [61] Khanna N,Mikkilineni A K,Martone A F.A survey of forensic characterization methods for physical devices.Digital Investigation,2006,3:17~28.
    [62] Srivastava A,Lee A B,Simoncelli E P,et al.On advances in statistical modeling of natural images.Journal of Mathematical Imaging and Vision,2003,18(1):17~33.
    [63] Lin S,Gu J W,Yamazaki S,et al.Radiometric calibration from a single image.Proceedings of IEEE Conference on Computer Vision and Pattern Recognition(CVPR04),Washington,DC,USA,2004,2:938~945.
    [64] Lin S,Zhang L.Determining the radiometric response function from a singlegrayscale image.IEEE Conference on Computer Vision and Pattern Recognition(CVPR05),San Diego,CA,USA,2005,2:66~73.
    [65] Ng T T,Chang S F,Tsui M P.Camera response function estimation from a single-channel image using differential invariants.ADVENT Technical Report,216-2006-2,Columbia University,2006.
    [66] Wu T P,Tang C K.A bayesian approach for shadow extraction from a single image.Proceedings of IEEE International Conference on Computer Vision(ICCV05),Beijing,China,2005,1:480~487.
    [67] Farid H. Creating and detecting doctored and virtual images:implications to the child pornography prevention act.Technical Report,TR2004-518,Dartmouth College,2004.
    [68] Ramanath R,Snyder W E,Bilbro G L,et al.Demosaicking methods for Bayer color arrays.Journal of Electronic Imaging,2002,11(3):306~315.
    [69] Gunturk B K,Altunbasak Y,Mersereau R M.Color plane interpolation using alternating projections.IEEE Transactions on Image Processing,2002,11(9):997~1013.
    [70] Hirakawa K , Parks T W . Adaptive homogeneity-directed demosaicing algorithm . Proceedings of the IEEE International Conference on Image Processing(ICIP03),Barcelona,Catalonia,Spain,2003,3:669~672.
    [71] Muresan D D,Parks T W.Adaptively quadratic image interpolation.IEEE Transactions on Image Processing,2004,13(5):690~698.
    [72] Keys R G.Cubic convolution interpolation for digital image processing.IEEE Transactions on Acoustics,Speech and Signal Processing.1981,29(6):1153~1160.
    [73] Hamilton J F,Adams J E.Adaptive color plan interpolation in single sensor color electronic camera.US Patent,5629734,1997.
    [74] Cok D R.Signal processing method and apparatus for producing interpolated chrominance values in a sampled color image signal.US Patent,4642678,1987.
    [75] Freeman W T.Median filter for reconstructing missing color samples.US Patent,4724395,1988.
    [76] Laroche C A,Prescott M A.Apparatus and method for adaptively interpolating a full color image utilizing chrominance gradients.US Patent,5373322,1994.
    [77] Ng T T,Chang S F.A data set of authentic and spliced image blocks.ADVENT Technical Report,203-2004-3,Columbia University,2004.
    [78] Hsu Y F,Chang S F.Detecting image splicing using geometry invariants andcamera.Proceedings of International Conference on Multimedia and Expo(ICME06),Toronto,Ontario,Vanada,2006,549~552.
    [79] Ng T T,Chang S F,Hsu J,et al.Columbia photographic images and photorealistic computer graphics dataset . ADVENT Technical Report ,205-2004-5,Columbia University,2005.
    [80] Lalonde J F,Efros A A.Using color compatibility for assessing image realism.IEEE International Conference on Computer Vision(ICCV07),Rio de Janeiro,Brazil,2007,1~8.
    [81] Lukas J,Fridrich J.Estimation of primary quantization matrix in double compressed JPEG Images.Proceedings of Digital Forensic Research Workshop(DFRWS03),Cleveland,OH,USA,2003.
    [82] Popescu A C,Farid H.Statistical tools for digital forensics.Doctor Thesis,Department of Computer Science,Darthmouth College,2005.
    [83]戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测.中国图象图形学报,2006,11(11):1619~1622.
    [84] He J F,Lin Z C,Wang L F,et al.Detecting Doctored JPEG Images via DCT Coefficient Analysis.Proceedings of 9th European Conference on Computer Vision(ECCV06),Graz,Austria,2006,3953(3):423~435.
    [85] Popescu A C,Farid H.Exposing digital forgeries by detecting traces of re-sampling.IEEE Transactions on Signal Processing,2005,53(2):758~767.
    [86]朱秀明,宣国荣,宣国荣等.信息取证中图像重采样检测.计算机应用,2006,26(11):2596~2597.
    [87] Fridrich J,Soukal D,Lukas J.Detection of copy-move forgery in digital images.Proceedings of Digital Forensic Research Workshop,Cleveland,OH,USA,2003.
    [88] Popescu A C,Farid H.Exposing digital forgeries by detecting duplicated image regions.Technical Report,TR2004-515,Dartmouth College,2004.
    [89] Johnson M,Farid H.Exposing digital forgeries by detecting inconsistencies in lighting.Proceedings of 7th Workshop on Multimedia and Security,New York,NY,USA,2005,1~10.
    [90] Johnson M,Farid H.Exposing digital forgeries through specular highlights on the eye.Proceedings of 9th International Workshop on Information Hiding,Saint Malo,France,2007,311~325.
    [91] Sutcu Y,Coskun B,Sencar H T,et al.Tamper detection based on regularity ofwavelet transform coefficients.Proceedings of IEEE International Conference on Image Processing(ICIP07),San Antonio,Texas,USA,2007,1:397~400.
    [92] Hsiao D Y,Pei S C.Detecting digital tampering by blur estimation.Proceedings of International Workshop on Systematic Approaches to Digital Forensic Engineering(SADFE05),Taipei,Taiwan,2005,264~278.
    [93] Bayer B E.Color imaging array.US Patent,3971065,1976.
    [94] Popescu A C,Farid H.Exposing digital forgeries in color filter array Interpolated Images.IEEE Transactions on Signal Processing,2005,53(10):3948~3959.
    [95] Long Y J,Huang Y Z.Image based source camera identification using demosaicking.Proceedings of IEEE 8th Workshop on Multimedia Signal Processing(MMSP06),Victoria,BC,2006,3:419~424.
    [96] Swaminathan A,Wu M,Liu K J R,et al.Image tampering identification using blind deconvolution.Proceedings of IEEE International Conference on Image Processing(ICIP06),Atlanta,GA,USA,2006,2309~2312.
    [97] Lukas J,Fridrich J,Goljan M.Detecting digital image forgeries using sensor pattern noise.Proceedings of SPIE:Security,Steganography and Watermarking of Multimedia Contents VIII,San Jose,California,USA,2006,6072(1):362~372.
    [98] Johnson M K , Farid H . Exposing digital forgeries through chromatic aberration.Proceedings of ACM Multimedia Security Workshop,Geneva,Switzerland,2006,48~55.
    [99] Hsu Y F,Chang S F.Image splicing detection using camera response function consistency and automatic segmentation.Proceedings of International Conference on Multimedia and Expo(ICME07),Beijing,China,2007,28~31.
    [100] Lin Z,Wang R,Tang X,et al.Detecting doctored images using camera response normality and consistency analysis . Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition(CVPR05),San Diego,CA,USA,2005,1087~1092.
    [101] Ng T T,Chang S F.A model for image Splicing.Proceedings of IEEE International Conference on Image Processing(ICIP04),Singapore,2004,2:1169~1172.
    [102] Farid H.Detecting digital forgeries using bispectral analysis.Technical Report,AIM-1657,MIT AI Memo,1999.
    [103] Avcibas I,Memon N,Sankur B.Steganalysis using image quality metrics.IEEE Transactions on Image Processing,2003,12(2):221~229.
    [104] Avcibas I,Bayram S,Memon N,et al.A classifier design for detecting image manipulation . Proceedings of IEEE International Conference on Image Processing(ICIP04),Singapore,2004,4:2645~2648.
    [105] Bayram S,Avcibas I,Sankur B,et al.Image manipulation detection.Journal of Electronic Imaging,2006.
    [106] Farid H . Detecting hidden messages using higher-order statistical models.Proceedings of the IEEE International Conference on Image Processing(ICIP02),Rochester,New York,USA,2002,2:905~908.
    [107] Bayram S,Avcibas I,Sankur B,et al.Image manipulation detection with binary similarity measures . Proceedings of 13th European Signal Processing Conference,Antalya,Turkey,2005,1:752~755.
    [108]周琳娜,王东明,郭云彪等.基于数字图像边缘特性的形态学滤波取证技术.电子学报,2008,36(6):1047~1051.
    [109]骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术.计算机学报,2007,30(11):1998~2007.
    [110] Elmagarmid A K,Ipeirotis P G,Verykios V S.Duplicate record detection:a survey.IEEE Transactions on Knowledge and Data Engineering,2007,19(1):1~16.
    [111] Amara G.An introduction to wavelets.IEEE Computational Science and Engineering,1992,2(2):50~61.
    [112] Shapiro J M . Embedded imge coding using zero trees of wavelet coefficients.IEEE Transactions on signal processing,1993,41(12):3445~3462.
    [113] Chang S G,Yu B,Veterli M.Adaptive wavelet thresholding for image denoising and compression.IEEE Transactions on image processing,2000,9(9):1532~1546.
    [114]黄达人,刘九芬,黄继武.小波变换域图像水印嵌入对策和算法.软件学报,2002,13(7):1290~1298.
    [115]高成.Matlab小波分析与应用.第2版.北京:国防工业出版社,2007.
    [116]程正兴.小波分析与应用实例.西安:西安交通大学出版社,2006.
    [117]成礼智,王红霞,罗永.小波的理论与应用.北京:科学出版社,2004.
    [118]伯晓晨,李涛,刘路等.Matlab工具箱应用指南—信息工程篇.北京:电子工业出版社,2000.
    [119] Ientilucci E J.Using the Singular Value Decomposition.Chester F. Carlson Center for Imaging Science,Rochester Institute of Technology,2003.
    [120]何东健.数字图像处理.西安:西安电子科技大学出版社,2003.
    [121] Drineas P,Kannan R,Frieze A,et al.Clustering large graphs via the singular value decomposition.Machine Learning,2004,56,9~33.
    [122] Hou Z J.Adaptive singular value decomposition in wavelet domain for image denosing.Pattern Recognition,2003,36(8):1747~1763.
    [123]崔屹.图象处理与分析—数学形态学方法及应用.北京:科学出版社,2000.
    [124]李国辉,汤大权,武德峰.信息组织与检索.北京:科学出版社,2003.
    [125]张红英,彭启琮.数字图像修复技术综述.中国图象图形学报,2007,12(1):1~10.
    [126] Bertalmio M,Sapiro G,Caselles V,et al.Image inpainting.Proceedings of International Conference on Computer Graphics and Interactive Techniques,New Orleans,Louisiana,USA,2000,417~424.
    [127] Chan T F,Shen J.Mathematical models for local non-texture inpaintings.SIAM Journal of Applied Mathematics,2001,62(3):1019~1043.
    [128] Chan T F , Shen J H . Non-texture inpainting by curvature-driven diffusions.Journal of Visual Communication and Image Representation,2001,12(4):436~449.
    [129] Tsai A,Yezzi J A,Willsky A S.Curve evolution implementation of the Mumford-Shah functional for image segmentation,denoising,interpolation and magnification.IEEE Transactions on Image Processing,2001,10(8):1169~1186.
    [130] Esedoglu S,Shen J H.Digital inpainting based on the Mumford-Shah-Euler image model.European Journal on Applied Mathematics,2003,13(4):353~370.
    [131] Bertalmio M,Vese L,Sapiro G,etal.Simultaneous structure and texture image inpainting.IEEE Transactions on Image Processing,2003,12(8):882~889.
    [132] Criminisi A , Perez P , Toyama K . Object removal by exemplar-based inpainting.Proceedings of IEEE Conference on Computer Vision and Pattern Recognition(CVPR03),Madison,Wisconsin,USA,2003,2:18~20.
    [133] Criminisi A,Perez P,Toyama K.Region filling and object removal by exemplar-based image inpainting.IEEE Transactions on Image Processing,2004,13(9):1200~1212.
    [134] Patrick P,Michel G,Andrew B.PatchWorks:Example-based region tiling for image editing.Microsoft Research Technical Report,MSR-TR-2004-04,2004.
    [135] Harrison P . A non-hierarchical procedure for re-synthesis of complextexture.Proceedings of International Conference on Central Europe Computer Graphics,Visualization and Computer Vision.Plzen Czech Republic,2001,190~197.
    [136] Drori I,Cohen-Or D,Yeshurun H.Fragment-based image completion.ACM Transactions on Graphics(SIGGRAPH03),2003,22(3):303~312.
    [137] Jia J Y,Tang C K.Image repairing:Robust image synthesis by adaptive and tensor voting.Proceedings of IEEE Conference on Computer Vision and Pattern Recognition(CVPR03),Madison,Wisconsin,USA,2003,1:643~650.
    [138] Zalesny A , Ferrari V , Caenen G , et al . Parallel composite texture synthesis.Proceedings of Texture 2002 Workshop(ECCV02),Copenhagen,Denmark,2002,151~155.
    [139]朱为,李国辉,涂丹.纹理合成技术在旧照片修补中的应用.计算机工程与应用,2007,28(10):220~222.
    [140] Tang F,Ying Y T,Wang J,et al.A novel texture synthesis based algorithm for object removal in photographs.Proceedings of 9th Asian Computing Science Conference,Thailand,2004,248~258.
    [141] Mandelbrot B B.The fractal geometry of nature.San Francisco:W.H.Freeman,1982.
    [142] Gonzalez R C.数字图像处理(MATLAB版).阮秋琦等译.北京:电子工业出版社,2006.
    [143] Klir G J , Clair U St , Yuan B . Fuzzy Set Theory : Foundations and Applications.New York:Prentice Hall,1997.
    [144] Zadeh L A.Fuzzy sets.Information and Control,1965,8:338~353.
    [145]刘普寅,吴孟达.模糊理论及其应用.长沙:国防科技大学出版社,1998.
    [146]孙即祥.现代模式识别.长沙:国防科学技术大学出版社,2002.
    [147] Ng T T . Statistical and geometric methods for passive-blind image forensics.Doctor Thesis,Columbia University,2007.
    [148] Buccigrossi R W,Simoncelli E P.Image compression via joint statistical characterization in the wavelet domain . IEEE Transactions on Image Processing,1999,8(12):1688~1701.
    [149] Moulin P,Liu J.Analysis of multiresolution image denoising schemes using generalized Gaussian and complexity priors.IEEE Transactions on Information Theory,1999,45(3):909~919.
    [150] Do M N,Vetterli M.Wavelet-based texture retrieval using generalized Gaussian density and Kullback-Leibler distance.IEEE Transactions on Image Processing,2002,11(2):146~158.
    [151] Wang Z,Simoncelli E P.Reduced-reference image quality assessment using a wavelet-domain natural image statistic model.IEEE Transactions on Image Processing,2004,13(4):600~612.
    [152]袁渊.小波域盲水印检测算法研究.博士论文,国防科技大学,2003.
    [153] Romberg J K,Choi H,Baraniuk R G.Bayesian tree-structured image modeling using wavelet-domain hidden Markov models.IEEE Transactions on Image Processing,2001,10(7):1056~1068.
    [154]肖志云.小波域统计图像建模与图像降噪.博士论文,中国科学院自动化研究所,2004.
    [155]李旭超.小波变换和马尔可夫随机场在图像降噪与分割中的应用研究.博士论文,浙江大学,2006.
    [156] Mallat S G.Multifrequency channel decomposition of images and wavelet models.IEEE Transactions on Acoustics,Speech and Signal Processing,1989,12(37):2091~2110.
    [157]伯晓晨.图像系统中信息隐藏若千问题研究.博士论文,国防科技大学,2002.
    [158] Mallat S G.A theory for multiresolution signal decomposition:the wavelet representation.IEEE Transactions on Pattern Analysis and Machine Intelligence,1989,11(7):674~693.
    [159] Wouwer G V,Scheunders P,Dyck D V.Statistical texture characterization from discrete wavelet representations.IEEE Transactions on Image Processing,1999,8(4):592~598.
    [160] Varanasi M K , Aazhang B . Parametric generalized Gaussian density estimation.The Journal of the Acoustical Society of America,1989,86(4):1404~1415.
    [161] Kay S M . Fundamentals of statistical signal processing : estimation theory.Englewood Cliffs,NJ:Prentice-Hall,1993.
    [162] Sharifi K,Garcia A L.Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video.IEEE Transactions on Circuits Systems for Video Technology,1995,5(1):52~56.
    [163]孙即祥.图像处理.北京:科学出版社,2004.
    [164] Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis of spread spectrum data hiding exploiting cover memory . Proceedings of SPIE : Security ,Steganography,and Watermarking of Multimedia Contents VII,2005,5681:38~46.
    [165] Fu D D,Shi Y Q,Zou D K,et al.JPEG steganalysis using empirical transition matrix in block DCT domain.IEEE 8th Workshop on Multimedia Signal Processing(MMSP06),Victoria,BC,Canada,2006,310~313.
    [166] Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis for markov cover data with applications to images.IEEE Transactions on Information Forensics and Security,2006,1(2):275~287.
    [167]胡晓峰.多媒体技术教程.北京:人民邮电出版社,2002.
    [168] Gonzalez R C,Woods R E.Digital image processing.New Jersey:Prentice Hall,2002.
    [169]盛骤,谢式千,潘承毅.概率论与数理统计.第2版.北京:高等教育出版社,1989.
    [170]吴尽昭,王永祥,覃广平.交互式马尔可夫链:并发系统的设计、验证与评价.北京:科学出版社,2007.
    [171] Lyu S W.Natural image statistics for digital image forensics.Doctor Thesis,Dartmouth College,2005.
    [172]张学工.关于统计学习理论与支持向量机.自动化学报,2000,26(1):32~42.
    [173]边肇祺,张学工.模式识别.第2版.北京:清华大学出版社,2000.
    [174] Chen Y X,Wang J Z.Support vector learning for fuzzy rule-based classification systems.IEEE Transactions on Fuzzy Systems,2003,11(6):716~728.
    [175] Pabitra M,Murthy C A,Pal S K.A probabilistic active support vector learning algorithm.IEEE Transactions on Pattern Analysis and Machine Intelligence,2004,26(3):34~39.
    [176]杜京义.基于核算法的故障智能诊断理论及方法研究.博士论文,西安科技大学,2006.
    [177]何灵敏,沈掌泉,孔繁胜等.SVM在多源遥感图像分类中的应用研究.中国图象图形学报,2007,12(4):648~654.
    [178]阎辉,张学工,马云潜等.基于变异函数的径向基核函数参数估计.自动化学报, 2002,28(3):450~455.
    [179]荣海娜,张葛祥,金炜东.系统辨识中支持向量机核函数及其参数的研究.系统仿真学报,2006,18(11):3204~3208.
    [180] Chang C C , Lin C J . LIBSVM : A Library for Support Vector Machines.http://www.csie.ntu.edu.tw/cjlin/libsvm
    [181] Calphotos:A database of photos of plants,animals,habitats and other natural history subjects.Berkeley University,2000.
    [182] Russell B C,Torralba A,Murphy K P,et al.LabelMe:a database and web-based tool for image annotation.Technical Report,AIM-2005-025,MIT AI Lab Memo,2005.
    [183] Wang W H,Farid H.Exposing digital forgeries in video by detecting double MPEG compression.Proceedings of 8th Workshop on Multimedia and Security(MM&Sec06),Geneva,Switzerland,2006,37~47.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700