A Novel Approach for Detecting Forged Image
上传者:高哲|上传时间:2015-05-08|密次下载
A Novel Approach for Detecting Forged Image
内容需要下载文档才能查看
A Novel Approach for Detecting Forged Image
Zhen Zhang#!, PeiYing Zhang*2, Zhou Yu #3
# School of Electrical Engineering,
Zhengzhou 450001, China
3
Zhengzhou University
subaina@http://wendang.chazidian.com
*
Zhengzhou College of Animal Husbandry Engineeringy
Zhengzhou 450001, China
2
15936220686@http://wendang.chazidian.com
Abstract-The advent of digital technology has not only brought about benefits but also some problems, such as the ease of creating image fogery. In this paper, we present a novel approach for tamper localization, which is based on the edge detection. We first process the input image with a smoothing filter, and then we use the LOG (Laplace-Gaussian Operator) edge detector for edge detection. By the evidence from the above steps, we can finally make judgement on missed edge: if the forged region is connected and its size is not less than 0.85% of the whole image size, we can judge that this forgery is significative. The results of our experiments illustrate that the novel approach can accurately detect the trace of blur operation when composite forgery happens. Besides, this approach can precisely locate the forged region. extracting, smoothing filter
Keywords-tamper detection, tamper localization, LOG, edge
image is created by taking an region from one image and
pasting it into another one. In actual process of regional copy, the copied region usually needs to be preprocessed, such as being rotated, resized and so on. Before pasting, operations like blur, adding noise and others are used for modification, in order to ensure the visual authenticity. Therefore, it is valuable to research the detection of image compostion and image retouch. In this paper, we propose an approach based on Gauss filtering and edge detecting algorithm, this approach is effective for tamper localization. The experiment results illustrate that this approach can accurately detect the blur operation traces, and can precisely locate the boundary in the composite image. II.
FEATURES OF SYNTHESIS IMAGE AND THE INFLUENCE THEY
BRING To THE STANDARD DEVIATION
I.
INTRODUCTION
With the development of image processing technology and multimedia technology, digital image has gradually taken the place of original analog photograph, and many image editing and processing software are used to deal with images, therefore, the forgery of digital image has become increasingly easy and indiscoverable. Some images are forged only for artistic use, some are only for personal use, which doesn't bring about trouble. However, some other forged images have great impact on our society, and bring serious threat to the security of image content. For those reasons, before using digital image, people may frequently doubt about the completeness and the authenticity of the image. Therefore, it is valuable to develop credible methods to detect whether a digital image is forged.
Digital image forensics can be divided into active forensics and passive forensics. The active forensic technology includes watermark technique and digital signature technique. Usually, digital images are not embedded with fragile watermark, and there is no supplementary information that can be used. Hence, the passive forensic is more realistic for image forensics.
In recent years, the passive forensic of digital image has been concerned by scholars both at home and abroad, and some preliminary research has been done. Hany farid classified forged images into six categories: composite images, morphed images, retouched images, enhanced images, computer graphics and painted images [1]. In practice, the most commonly used one is composite images. Composite
A. Features of Synthesis Image
In order to reduce visual distortion, people who tamper images usually blur the edge of forged region when they composite images, this blur operation will smooth the edge's gray mutation, in other words, the edge's contrast will decrease. The basic principle of blur operation is to average the pixel values within the local neighborhood, its purpose is to dilute the composite edge caused by forgery. In the blurred image, the contrast between target edge and the background pixels around it decreases, resulting in the mix of the edge and non-edge, so there will be many pixels to respond to the edge, which means we can not locate targets accurately. In 1980s, lCanny proposed three optimal criteria of edge detection operator: great detection performance (missed rate and error rate are low), localization precision and single-edge response [2]. Therefore, the blur operation goes against the optimal criteria for edge detection, and influences the accuracy of target detection. To a large extent, the standard deviation of gray can be used to characterize the contrast between the target and background. Set g(i,j) for the pixel grayscale of the (i,j) in the image, where the size of the image is M x N, i=1,2,3, ..., M, j=1,2,3, ..., N, 11 and (J are respectively the average grayscale and the standard deviation, then
11-
MXN??g(i,j)
1
M
N
(1)
978-1-4244-6439-5/1 0/$26.00 ©2010 IEEE
958
内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看
a=
The mean and standard deviation reflect the brightness and contrast of the image, the greater the mean is, the higher the brightness is; the greater the standard deviation is, the higher the contrast is.
a1[0'= ---_b (r (n()) ) r
r 2 2' r 2 aE[1,r-1], then f(a) is a
Set f(a)= 2(a-"2) +
There:
i?1
(5)
The blur operation on the edge will smooth the edge's gray mutation. The following data is an example that shows how the blur operation influences the standard deviation of gray. The function for one-dimensional square-ware data (solid line) is defined as
quadratic parabola about a, the minimum can be obtained at a=r/2, the maximum can be obtained at a=1 or a=r-l, Therefore
(7)
E[ 0, nj]U[n2, n] Take (7) into (6), we can get (3) b tE(npn2) 2(r-1) (b-a)2 0"2O'2 (8) _n() The mean and variance of the function are defined as 2 r222
?=((n-n' )a+ n' b)/n,a=[(n-n' )(a_?)+ n' (b-?)]/n ,where That means 0" 0' ,namely, the blur operation decreases , =n-nn 2l the contrast of data, this may bring difficulty for the target
r2 r2
>
> °
<
t
detection and decrease the accuracy of target identification.
III. LINEAR SCALE SPACE
Commonly used scale spaces includes linear scale space, nonlinear scale space, mathematical morphology scale space and shape scale space. These four basic scale-space make up the main research for computer visual scale-space. At present, the international visual multi-scale analysis basically belongs to these four categories. In image processing, the introduction a
of scale space has aroused great interest. The scale space theory has played an irreplaceable role in many fields, such as
o image compression, image smoothing, image denoising, edge 01 02 n
detection and the localization of invariant feature points.
In the four categories of scale space mentioned above, this paper adopts the most common one, linear scale space. Linear Fig. 1. one-dimensional square wave and the data of slow blurring
scale space is known as Gaussian scale space, it was firstly
Set the spread radius of blurred edge of the data (dotted line proposed by Witkin[3], and then was further improved by in the figure) is r, and then the blur function can be given by Koenderink and other scholars[4]. Under a series of
reasonable assumptions, Koenderink and Lindeberg proved the only kernel of scale space is the Gaussian equation, namely the Gaussian kernel is the only transform kernel to achieve scale transform. Besides, Gaussian function is a
(4) f'(t) smooth function that will not increases new extreme points
when the scale rises. Therefore, the linear scale space can be defined as the equation L(X), which is the convolution of a variable-scale Gaussian equation g(X) and the input image I (X):
(9) L(X, ) =g(X, )* I(X) The mean and standard deviation are
where I:RD -) R, L: RD X R+ -) R, Gaussian function It is easy to prove that = , and the variance can be
g(X, ) is given by:
given by
b
atE [0, nl-r] U[n2, n] -i)a+ (r ib = ia+(r-i)r b t=n-i,i=1,2, ... r-1 , 2 r
fi' , 0" .
fi' fi 0"2 = -fi)2 -n -r -fi)2 [en (n -+ + + + l)(a l)(b r
r
i?j
0' 0' 0'
1 O'X= (,) DI2 g(2JZ"O')
e
(10)
959
内容需要下载文档才能查看 内容需要下载文档才能查看
It is easy to prove that L(X, (J) is exactly the solution of thermal diffusion equation given by:
D 2
8aL =_ VL = L 8xiXjL
2 2 i,j=i
-
{II
L(O,X) =L (X)
(11)
As can be seen from figure 2, the first derivative of the
gray profile has a step at the image mutation. Therefore, the amplitude of the first derivative can be used to detect if the edge exist or not, and according to the change of the second derivative's amplitude, the location of the edge can be obtained. For digital images, difference operation is often used to approximate differential operation.
Thermal diffusion equation belongs to the category of
physics, it describes the change process of heat distribution B. The Selection of Edge
The classical edge detection is based on the original image, over time. Thermal diffusion equation is linear, so the above
analysis of multi-scale is also referred to as linear scale space for each pixel, we inspect the step change of gray in its certain method. When the scale factor of Gaussian equation increases, nearby region. For edge detection, we use the variation of the the small-scale information, which is got from the convolution first or second directional derivative nearby the edge. There of Gaussian equation and input image, will be removed. With are several commonly used edge detection ways, such as the increase of the scale factor, the original image is bound to differential edge detection, Roberts edge detection operator, be smoother and smoother, therefore, sometimes the scale Sobel edge detection operator, Log edge detection operator, factor of Gaussian equation is also vividly called the Canny edge detection operator and so on.
As the differential detection of the edge demands the smoothing factor.
As the linear scale space reflects the thought of visual direction of the difference must perpendicular to the direction multi-scale analysis well, it is widely used in many fields, of the edge, which means that we need to deal the image with such as image filtering, deep structural analysis and so on. difference operation in different directions, but this will cause Moreover, the linear scale space also has other significant additional operation. The gradient made up of the first features: on one hand, the diffusion process that described by derivative is a vector that has both size and direction, thermal diffusion equation is isotropic, so when the image is therefore, compared with scalar, this vector has huger data smoothed, the spread of the gray value are the same in every storage. The LOG operator firstly use Gaussian function to direction, this would inevitably lead to the blur of the edge. smooth image, therefore, it is better at noise suppression, but On the other hand, contrast invariance and linearity are at the same time, it may smooth the original edge, and this conflicting, the linearity of thermal diffusion equation will cause that some edges can not be detected. In addition, determines that it can not satisfy the contrast invariance, for the choice of Gaussian distribution factor (J has great impact example, with the scale increasing, the image gradually on the result of edge detection. The larger (J is, the more become smooth, and the detail of the image gradually become abundant details can be obtained from the image, but the blurred, therefore the contrast has a significant change. For ability of noise immunity decreases, which may causes false this reason, the smoothing scale is the key to this paper. edge, otherwise, the ability of noise immunity increases, but
the accuracy of edge detection decreases, and many true edges
IV. THEORETICAL ANALYSIS OF EDGE DETECTION OPERATOR
may be lost. Therefore, this paper adopts Laplace-Gaussian
AND THE SELECTION OF EDGE
operator, which is a second derivative operator. The results of experiments show that LOG operator is the second derivative A. Theoretical Analysis of Edge Detection Operator
operator used to the operation of the two-dimensional
The edge is one of the basic characteristics of image,
function, it has nothing to do with the direction, and it is not
people mainly rely on the edge to identify the target. The edge sensitive to the orientation, so the calculated amount is smaller. refers to the set of pixels whose gray have spatial mutations.
The edge that is easy to get lost is defined as:
The mutation of gray is usually described and detected by
V2=V2[(X,y)]* f(x,y) (12) gdifferential coefficient. There are three common kinds
mutation of gray: the step-like, sloping and roof-like[5]-[7]. Where G is Gaussian function, the convolution kernel is
given by
profile First
derivative
2+ 2 2+ 2
2 2 X Y X Y
--V =V [g(x,y)]=K[ 2(]exp2) 2 (J 2(J
(13)
The 5 X 5 template used in this process is:
-2 -4 -4 -4 -2 -4
0 8 0
8
0 8 0
Second
derivative
Step-like edge
Roof-like edge
Sloping edge
-4 -4 -4
(14)
-4 -4
24
8
Fig. 2. edge of image and derivative rule of edge
-2 -4 -4 -4 -2
960
内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看
下载文档
热门试卷
- 2016年四川省内江市中考化学试卷
- 广西钦州市高新区2017届高三11月月考政治试卷
- 浙江省湖州市2016-2017学年高一上学期期中考试政治试卷
- 浙江省湖州市2016-2017学年高二上学期期中考试政治试卷
- 辽宁省铁岭市协作体2017届高三上学期第三次联考政治试卷
- 广西钦州市钦州港区2016-2017学年高二11月月考政治试卷
- 广西钦州市钦州港区2017届高三11月月考政治试卷
- 广西钦州市钦州港区2016-2017学年高一11月月考政治试卷
- 广西钦州市高新区2016-2017学年高二11月月考政治试卷
- 广西钦州市高新区2016-2017学年高一11月月考政治试卷
- 山东省滨州市三校2017届第一学期阶段测试初三英语试题
- 四川省成都七中2017届高三一诊模拟考试文科综合试卷
- 2017届普通高等学校招生全国统一考试模拟试题(附答案)
- 重庆市永川中学高2017级上期12月月考语文试题
- 江西宜春三中2017届高三第一学期第二次月考文科综合试题
- 内蒙古赤峰二中2017届高三上学期第三次月考英语试题
- 2017年六年级(上)数学期末考试卷
- 2017人教版小学英语三年级上期末笔试题
- 江苏省常州西藏民族中学2016-2017学年九年级思想品德第一学期第二次阶段测试试卷
- 重庆市九龙坡区七校2016-2017学年上期八年级素质测查(二)语文学科试题卷
- 江苏省无锡市钱桥中学2016年12月八年级语文阶段性测试卷
- 江苏省无锡市钱桥中学2016-2017学年七年级英语12月阶段检测试卷
- 山东省邹城市第八中学2016-2017学年八年级12月物理第4章试题(无答案)
- 【人教版】河北省2015-2016学年度九年级上期末语文试题卷(附答案)
- 四川省简阳市阳安中学2016年12月高二月考英语试卷
- 四川省成都龙泉中学高三上学期2016年12月月考试题文科综合能力测试
- 安徽省滁州中学2016—2017学年度第一学期12月月考高三英语试卷
- 山东省武城县第二中学2016.12高一年级上学期第二次月考历史试题(必修一第四、五单元)
- 福建省四地六校联考2016-2017学年上学期第三次月考高三化学试卷
- 甘肃省武威第二十三中学2016—2017学年度八年级第一学期12月月考生物试卷
网友关注
- 外经贸局机关作风建设年工作总结
- 宜蘭縣103 學年度公立國民小學附設幼兒園招生簡章
- 台北市松山區健康國民小學八十八學年度合格教師甄選簡章
- 在“捐赠爱心压岁钱,幸福xx第一棒”启动仪式上的讲话
- 残疾学生帮扶工作总结
- 在都市福彩爱心传递助学捐赠仪式上的讲话【精品-doc】
- 廉政文化进机关活动总结
- 【DOC】生猪标准化规模养殖场建设项目可行性研究报告
- 1000玫瑰基地可行性研究报告
- 家用电动膳食器具及厨房用品
- 唐海涛的简历
- 健康教育资料
- 在建设“爱心水窖”捐款活动启动仪式上的讲话
- 消防工程竣工验收报告(文本)
- MOS-T4作业指导书2008.5
- 风景园林行业分析报告2010
- 责任心_爱心_教师一生的追求
- 职称评定--表格
- 2011年工作总结及2012年工作计划
- 光触媒自洁涂层资料—中国最先辈室内装修环保品牌[宝典]
- 规章制度 关于建立“五必谈、五必访”制度的通知
- 市职业中学关爱学生谱写师德新篇章的工作总结
- 《电子商务概论》教案
- [金牌原创]现行财务会计规章制度与审计工作实务全书
- 输变电工程安全文明施工标准化图册
- 赵炯求职简历
- 自动化立体仓库货位优化和堆垛机路径优化的的研究
- 常用的安全管理制度 操作规程 台账汇编
- [教学]孝心爱心教育案例
- 中国电视娱乐节目知名女性主持人的形象建构研究
网友关注视频
- 第五单元 民族艺术的瑰宝_16. 形形色色的民族乐器_第一课时(岭南版六年级上册)_T3751175
- 外研版英语七年级下册module3 unit1第二课时
- 【部编】人教版语文七年级下册《逢入京使》优质课教学视频+PPT课件+教案,辽宁省
- 青岛版教材五年级下册第四单元(走进军营——方向与位置)用数对确定位置(一等奖)
- 沪教版八年级下册数学练习册21.3(3)分式方程P17
- 8.练习八_第一课时(特等奖)(苏教版三年级上册)_T142692
- 化学九年级下册全册同步 人教版 第22集 酸和碱的中和反应(一)
- 沪教版八年级下册数学练习册21.4(1)无理方程P18
- 七年级英语下册 上海牛津版 Unit5
- 第五单元 民族艺术的瑰宝_16. 形形色色的民族乐器_第一课时(岭南版六年级上册)_T1406126
- 苏教版二年级下册数学《认识东、南、西、北》
- 外研版八年级英语下学期 Module3
- 每天日常投篮练习第一天森哥打卡上脚 Nike PG 2 如何调整运球跳投手感?
- 《小学数学二年级下册》第二单元测试题讲解
- 精品·同步课程 历史 八年级 上册 第15集 近代科学技术与思想文化
- 【部编】人教版语文七年级下册《泊秦淮》优质课教学视频+PPT课件+教案,辽宁省
- 冀教版小学数学二年级下册第二单元《租船问题》
- 六年级英语下册上海牛津版教材讲解 U1单词
- 苏科版数学七年级下册7.2《探索平行线的性质》
- 北师大版八年级物理下册 第六章 常见的光学仪器(二)探究凸透镜成像的规律
- 沪教版牛津小学英语(深圳用) 四年级下册 Unit 12
- 3月2日小学二年级数学下册(数一数)
- 8.对剪花样_第一课时(二等奖)(冀美版二年级上册)_T515402
- 19 爱护鸟类_第一课时(二等奖)(桂美版二年级下册)_T502436
- 沪教版八年级下册数学练习册20.4(2)一次函数的应用2P8
- 外研版英语三起6年级下册(14版)Module3 Unit1
- 外研版英语三起6年级下册(14版)Module3 Unit2
- 北师大版数学四年级下册3.4包装
- 3.2 数学二年级下册第二单元 表内除法(一)整理和复习 李菲菲
- 【部编】人教版语文七年级下册《泊秦淮》优质课教学视频+PPT课件+教案,广东省
精品推荐
- 2016-2017学年高一语文人教版必修一+模块学业水平检测试题(含答案)
- 广西钦州市高新区2017届高三11月月考政治试卷
- 浙江省湖州市2016-2017学年高一上学期期中考试政治试卷
- 浙江省湖州市2016-2017学年高二上学期期中考试政治试卷
- 辽宁省铁岭市协作体2017届高三上学期第三次联考政治试卷
- 广西钦州市钦州港区2016-2017学年高二11月月考政治试卷
- 广西钦州市钦州港区2017届高三11月月考政治试卷
- 广西钦州市钦州港区2016-2017学年高一11月月考政治试卷
- 广西钦州市高新区2016-2017学年高二11月月考政治试卷
- 广西钦州市高新区2016-2017学年高一11月月考政治试卷
分类导航
- 互联网
- 电脑基础知识
- 计算机软件及应用
- 计算机硬件及网络
- 计算机应用/办公自动化
- .NET
- 数据结构与算法
- Java
- SEO
- C/C++资料
- linux/Unix相关
- 手机开发
- UML理论/建模
- 并行计算/云计算
- 嵌入式开发
- windows相关
- 软件工程
- 管理信息系统
- 开发文档
- 图形图像
- 网络与通信
- 网络信息安全
- 电子支付
- Labview
- matlab
- 网络资源
- Python
- Delphi/Perl
- 评测
- Flash/Flex
- CSS/Script
- 计算机原理
- PHP资料
- 数据挖掘与模式识别
- Web服务
- 数据库
- Visual Basic
- 电子商务
- 服务器
- 搜索引擎优化
- 存储
- 架构
- 行业软件
- 人工智能
- 计算机辅助设计
- 多媒体
- 软件测试
- 计算机硬件与维护
- 网站策划/UE
- 网页设计/UI
- 网吧管理