A Novel Approach for Detecting Forged Image
上传者:高哲|上传时间:2015-05-08|密次下载
A Novel Approach for Detecting Forged Image
内容需要下载文档才能查看
A Novel Approach for Detecting Forged Image
Zhen Zhang#!, PeiYing Zhang*2, Zhou Yu #3
# School of Electrical Engineering,
Zhengzhou 450001, China
3
Zhengzhou University
subaina@http://wendang.chazidian.com
*
Zhengzhou College of Animal Husbandry Engineeringy
Zhengzhou 450001, China
2
15936220686@http://wendang.chazidian.com
Abstract-The advent of digital technology has not only brought about benefits but also some problems, such as the ease of creating image fogery. In this paper, we present a novel approach for tamper localization, which is based on the edge detection. We first process the input image with a smoothing filter, and then we use the LOG (Laplace-Gaussian Operator) edge detector for edge detection. By the evidence from the above steps, we can finally make judgement on missed edge: if the forged region is connected and its size is not less than 0.85% of the whole image size, we can judge that this forgery is significative. The results of our experiments illustrate that the novel approach can accurately detect the trace of blur operation when composite forgery happens. Besides, this approach can precisely locate the forged region. extracting, smoothing filter
Keywords-tamper detection, tamper localization, LOG, edge
image is created by taking an region from one image and
pasting it into another one. In actual process of regional copy, the copied region usually needs to be preprocessed, such as being rotated, resized and so on. Before pasting, operations like blur, adding noise and others are used for modification, in order to ensure the visual authenticity. Therefore, it is valuable to research the detection of image compostion and image retouch. In this paper, we propose an approach based on Gauss filtering and edge detecting algorithm, this approach is effective for tamper localization. The experiment results illustrate that this approach can accurately detect the blur operation traces, and can precisely locate the boundary in the composite image. II.
FEATURES OF SYNTHESIS IMAGE AND THE INFLUENCE THEY
BRING To THE STANDARD DEVIATION
I.
INTRODUCTION
With the development of image processing technology and multimedia technology, digital image has gradually taken the place of original analog photograph, and many image editing and processing software are used to deal with images, therefore, the forgery of digital image has become increasingly easy and indiscoverable. Some images are forged only for artistic use, some are only for personal use, which doesn't bring about trouble. However, some other forged images have great impact on our society, and bring serious threat to the security of image content. For those reasons, before using digital image, people may frequently doubt about the completeness and the authenticity of the image. Therefore, it is valuable to develop credible methods to detect whether a digital image is forged.
Digital image forensics can be divided into active forensics and passive forensics. The active forensic technology includes watermark technique and digital signature technique. Usually, digital images are not embedded with fragile watermark, and there is no supplementary information that can be used. Hence, the passive forensic is more realistic for image forensics.
In recent years, the passive forensic of digital image has been concerned by scholars both at home and abroad, and some preliminary research has been done. Hany farid classified forged images into six categories: composite images, morphed images, retouched images, enhanced images, computer graphics and painted images [1]. In practice, the most commonly used one is composite images. Composite
A. Features of Synthesis Image
In order to reduce visual distortion, people who tamper images usually blur the edge of forged region when they composite images, this blur operation will smooth the edge's gray mutation, in other words, the edge's contrast will decrease. The basic principle of blur operation is to average the pixel values within the local neighborhood, its purpose is to dilute the composite edge caused by forgery. In the blurred image, the contrast between target edge and the background pixels around it decreases, resulting in the mix of the edge and non-edge, so there will be many pixels to respond to the edge, which means we can not locate targets accurately. In 1980s, lCanny proposed three optimal criteria of edge detection operator: great detection performance (missed rate and error rate are low), localization precision and single-edge response [2]. Therefore, the blur operation goes against the optimal criteria for edge detection, and influences the accuracy of target detection. To a large extent, the standard deviation of gray can be used to characterize the contrast between the target and background. Set g(i,j) for the pixel grayscale of the (i,j) in the image, where the size of the image is M x N, i=1,2,3, ..., M, j=1,2,3, ..., N, 11 and (J are respectively the average grayscale and the standard deviation, then
11-
MXN??g(i,j)
1
M
N
(1)
978-1-4244-6439-5/1 0/$26.00 ©2010 IEEE
958
内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看
a=
The mean and standard deviation reflect the brightness and contrast of the image, the greater the mean is, the higher the brightness is; the greater the standard deviation is, the higher the contrast is.
a1[0'= ---_b (r (n()) ) r
r 2 2' r 2 aE[1,r-1], then f(a) is a
Set f(a)= 2(a-"2) +
There:
i?1
(5)
The blur operation on the edge will smooth the edge's gray mutation. The following data is an example that shows how the blur operation influences the standard deviation of gray. The function for one-dimensional square-ware data (solid line) is defined as
quadratic parabola about a, the minimum can be obtained at a=r/2, the maximum can be obtained at a=1 or a=r-l, Therefore
(7)
E[ 0, nj]U[n2, n] Take (7) into (6), we can get (3) b tE(npn2) 2(r-1) (b-a)2 0"2O'2 (8) _n() The mean and variance of the function are defined as 2 r222
?=((n-n' )a+ n' b)/n,a=[(n-n' )(a_?)+ n' (b-?)]/n ,where That means 0" 0' ,namely, the blur operation decreases , =n-nn 2l the contrast of data, this may bring difficulty for the target
r2 r2
>
> °
<
t
detection and decrease the accuracy of target identification.
III. LINEAR SCALE SPACE
Commonly used scale spaces includes linear scale space, nonlinear scale space, mathematical morphology scale space and shape scale space. These four basic scale-space make up the main research for computer visual scale-space. At present, the international visual multi-scale analysis basically belongs to these four categories. In image processing, the introduction a
of scale space has aroused great interest. The scale space theory has played an irreplaceable role in many fields, such as
o image compression, image smoothing, image denoising, edge 01 02 n
detection and the localization of invariant feature points.
In the four categories of scale space mentioned above, this paper adopts the most common one, linear scale space. Linear Fig. 1. one-dimensional square wave and the data of slow blurring
scale space is known as Gaussian scale space, it was firstly
Set the spread radius of blurred edge of the data (dotted line proposed by Witkin[3], and then was further improved by in the figure) is r, and then the blur function can be given by Koenderink and other scholars[4]. Under a series of
reasonable assumptions, Koenderink and Lindeberg proved the only kernel of scale space is the Gaussian equation, namely the Gaussian kernel is the only transform kernel to achieve scale transform. Besides, Gaussian function is a
(4) f'(t) smooth function that will not increases new extreme points
when the scale rises. Therefore, the linear scale space can be defined as the equation L(X), which is the convolution of a variable-scale Gaussian equation g(X) and the input image I (X):
(9) L(X, ) =g(X, )* I(X) The mean and standard deviation are
where I:RD -) R, L: RD X R+ -) R, Gaussian function It is easy to prove that = , and the variance can be
g(X, ) is given by:
given by
b
atE [0, nl-r] U[n2, n] -i)a+ (r ib = ia+(r-i)r b t=n-i,i=1,2, ... r-1 , 2 r
fi' , 0" .
fi' fi 0"2 = -fi)2 -n -r -fi)2 [en (n -+ + + + l)(a l)(b r
r
i?j
0' 0' 0'
1 O'X= (,) DI2 g(2JZ"O')
e
(10)
959
内容需要下载文档才能查看 内容需要下载文档才能查看
It is easy to prove that L(X, (J) is exactly the solution of thermal diffusion equation given by:
D 2
8aL =_ VL = L 8xiXjL
2 2 i,j=i
-
{II
L(O,X) =L (X)
(11)
As can be seen from figure 2, the first derivative of the
gray profile has a step at the image mutation. Therefore, the amplitude of the first derivative can be used to detect if the edge exist or not, and according to the change of the second derivative's amplitude, the location of the edge can be obtained. For digital images, difference operation is often used to approximate differential operation.
Thermal diffusion equation belongs to the category of
physics, it describes the change process of heat distribution B. The Selection of Edge
The classical edge detection is based on the original image, over time. Thermal diffusion equation is linear, so the above
analysis of multi-scale is also referred to as linear scale space for each pixel, we inspect the step change of gray in its certain method. When the scale factor of Gaussian equation increases, nearby region. For edge detection, we use the variation of the the small-scale information, which is got from the convolution first or second directional derivative nearby the edge. There of Gaussian equation and input image, will be removed. With are several commonly used edge detection ways, such as the increase of the scale factor, the original image is bound to differential edge detection, Roberts edge detection operator, be smoother and smoother, therefore, sometimes the scale Sobel edge detection operator, Log edge detection operator, factor of Gaussian equation is also vividly called the Canny edge detection operator and so on.
As the differential detection of the edge demands the smoothing factor.
As the linear scale space reflects the thought of visual direction of the difference must perpendicular to the direction multi-scale analysis well, it is widely used in many fields, of the edge, which means that we need to deal the image with such as image filtering, deep structural analysis and so on. difference operation in different directions, but this will cause Moreover, the linear scale space also has other significant additional operation. The gradient made up of the first features: on one hand, the diffusion process that described by derivative is a vector that has both size and direction, thermal diffusion equation is isotropic, so when the image is therefore, compared with scalar, this vector has huger data smoothed, the spread of the gray value are the same in every storage. The LOG operator firstly use Gaussian function to direction, this would inevitably lead to the blur of the edge. smooth image, therefore, it is better at noise suppression, but On the other hand, contrast invariance and linearity are at the same time, it may smooth the original edge, and this conflicting, the linearity of thermal diffusion equation will cause that some edges can not be detected. In addition, determines that it can not satisfy the contrast invariance, for the choice of Gaussian distribution factor (J has great impact example, with the scale increasing, the image gradually on the result of edge detection. The larger (J is, the more become smooth, and the detail of the image gradually become abundant details can be obtained from the image, but the blurred, therefore the contrast has a significant change. For ability of noise immunity decreases, which may causes false this reason, the smoothing scale is the key to this paper. edge, otherwise, the ability of noise immunity increases, but
the accuracy of edge detection decreases, and many true edges
IV. THEORETICAL ANALYSIS OF EDGE DETECTION OPERATOR
may be lost. Therefore, this paper adopts Laplace-Gaussian
AND THE SELECTION OF EDGE
operator, which is a second derivative operator. The results of experiments show that LOG operator is the second derivative A. Theoretical Analysis of Edge Detection Operator
operator used to the operation of the two-dimensional
The edge is one of the basic characteristics of image,
function, it has nothing to do with the direction, and it is not
people mainly rely on the edge to identify the target. The edge sensitive to the orientation, so the calculated amount is smaller. refers to the set of pixels whose gray have spatial mutations.
The edge that is easy to get lost is defined as:
The mutation of gray is usually described and detected by
V2=V2[(X,y)]* f(x,y) (12) gdifferential coefficient. There are three common kinds
mutation of gray: the step-like, sloping and roof-like[5]-[7]. Where G is Gaussian function, the convolution kernel is
given by
profile First
derivative
2+ 2 2+ 2
2 2 X Y X Y
--V =V [g(x,y)]=K[ 2(]exp2) 2 (J 2(J
(13)
The 5 X 5 template used in this process is:
-2 -4 -4 -4 -2 -4
0 8 0
8
0 8 0
Second
derivative
Step-like edge
Roof-like edge
Sloping edge
-4 -4 -4
(14)
-4 -4
24
8
Fig. 2. edge of image and derivative rule of edge
-2 -4 -4 -4 -2
960
内容需要下载文档才能查看 内容需要下载文档才能查看 内容需要下载文档才能查看
下载文档
热门试卷
- 2016年四川省内江市中考化学试卷
- 广西钦州市高新区2017届高三11月月考政治试卷
- 浙江省湖州市2016-2017学年高一上学期期中考试政治试卷
- 浙江省湖州市2016-2017学年高二上学期期中考试政治试卷
- 辽宁省铁岭市协作体2017届高三上学期第三次联考政治试卷
- 广西钦州市钦州港区2016-2017学年高二11月月考政治试卷
- 广西钦州市钦州港区2017届高三11月月考政治试卷
- 广西钦州市钦州港区2016-2017学年高一11月月考政治试卷
- 广西钦州市高新区2016-2017学年高二11月月考政治试卷
- 广西钦州市高新区2016-2017学年高一11月月考政治试卷
- 山东省滨州市三校2017届第一学期阶段测试初三英语试题
- 四川省成都七中2017届高三一诊模拟考试文科综合试卷
- 2017届普通高等学校招生全国统一考试模拟试题(附答案)
- 重庆市永川中学高2017级上期12月月考语文试题
- 江西宜春三中2017届高三第一学期第二次月考文科综合试题
- 内蒙古赤峰二中2017届高三上学期第三次月考英语试题
- 2017年六年级(上)数学期末考试卷
- 2017人教版小学英语三年级上期末笔试题
- 江苏省常州西藏民族中学2016-2017学年九年级思想品德第一学期第二次阶段测试试卷
- 重庆市九龙坡区七校2016-2017学年上期八年级素质测查(二)语文学科试题卷
- 江苏省无锡市钱桥中学2016年12月八年级语文阶段性测试卷
- 江苏省无锡市钱桥中学2016-2017学年七年级英语12月阶段检测试卷
- 山东省邹城市第八中学2016-2017学年八年级12月物理第4章试题(无答案)
- 【人教版】河北省2015-2016学年度九年级上期末语文试题卷(附答案)
- 四川省简阳市阳安中学2016年12月高二月考英语试卷
- 四川省成都龙泉中学高三上学期2016年12月月考试题文科综合能力测试
- 安徽省滁州中学2016—2017学年度第一学期12月月考高三英语试卷
- 山东省武城县第二中学2016.12高一年级上学期第二次月考历史试题(必修一第四、五单元)
- 福建省四地六校联考2016-2017学年上学期第三次月考高三化学试卷
- 甘肃省武威第二十三中学2016—2017学年度八年级第一学期12月月考生物试卷
网友关注
- 2011年教师资格证考试《教育法律法规》考点笔记三
- 教师资格考试《教师职业道德》考点二:教师职业道德基本原则
- 2011年陕西教师资格证考试教育政策法规习题
- 2014年教师资格统考综合素质之文化素养常识
- 教师资格考试《教师职业道德》考点六:教师职业道德修养及评价
- 2012年教师资格考试法律法规之未成年人保护法二
- 中学综合素质考点归纳2.4:学生权利及保护
- 2014年教师资格考试基本能力备考指导
- 教资备考|中学综合素质写作基础知识与手法二
- 中学综合素质考点归纳5.2:逻辑思维能力
- 2011年教师资格证考试《教育法律法规》考点笔记四
- 2013年全国教资统考考前模拟二——因材施教(中学写作部分)
- 教师资格考试《教师职业道德》考点一:教师职业道德解读
- 中学综合素质考点归纳2.3:教师权利和义务
- 教资备考|教师资格考试中学综合素质知识重点八
- 教师资格证考试《中学综合素质》资料整理二:课外活动
- 教资备考|教师资格考试中学综合素质知识重点五
- 教师资格考试《教师职业道德》考点四:教师职业道德的新视野
- 教资备考|教师资格考试中学综合素质知识重点三
- 教师资格证考试《中学综合素质》资料整理五:课堂纪律
- 中学综合素质考点归纳2.2:依法执教
- 教资备考|教师资格考试中学综合素质知识重点二
- 从难住考生的作文题到教师职业理念
- 教师资格考试《教师职业道德》考点三:教师职业道德规范
- 教师资格证考试《中学综合素质》资料整理六:课堂管理
- 教师资格证考试《中学综合素质》资料整理四:中学班主任工作
- 教资备考|教师资格考试中学综合素质知识重点六
- 教师资格证考试:浅谈教师职业道德
- 2013年全国教资统考考前模拟一——学生减负(中学写作部分)
- 2012年教师资格考试法律法规之未成年人保护法三
网友关注视频
- 北师大版八年级物理下册 第六章 常见的光学仪器(二)探究凸透镜成像的规律
- 沪教版八年级下册数学练习册21.3(2)分式方程P15
- 19 爱护鸟类_第一课时(二等奖)(桂美版二年级下册)_T3763925
- 冀教版小学英语四年级下册Lesson2授课视频
- 苏科版数学 八年级下册 第八章第二节 可能性的大小
- 外研版英语三起5年级下册(14版)Module3 Unit1
- 六年级英语下册上海牛津版教材讲解 U1单词
- 沪教版牛津小学英语(深圳用) 四年级下册 Unit 2
- 沪教版八年级下册数学练习册20.4(2)一次函数的应用2P8
- 沪教版牛津小学英语(深圳用) 四年级下册 Unit 12
- 8 随形想象_第一课时(二等奖)(沪教版二年级上册)_T3786594
- 沪教版牛津小学英语(深圳用) 四年级下册 Unit 4
- 冀教版小学数学二年级下册第二单元《余数和除数的关系》
- 【部编】人教版语文七年级下册《过松源晨炊漆公店(其五)》优质课教学视频+PPT课件+教案,江苏省
- 北师大版数学 四年级下册 第三单元 第二节 小数点搬家
- 3月2日小学二年级数学下册(数一数)
- 北师大版小学数学四年级下册第15课小数乘小数一
- 沪教版牛津小学英语(深圳用) 四年级下册 Unit 8
- 沪教版八年级下次数学练习册21.4(2)无理方程P19
- 外研版英语三起6年级下册(14版)Module3 Unit1
- 每天日常投篮练习第一天森哥打卡上脚 Nike PG 2 如何调整运球跳投手感?
- 【部编】人教版语文七年级下册《老山界》优质课教学视频+PPT课件+教案,安徽省
- 冀教版小学数学二年级下册第二单元《有余数除法的竖式计算》
- 第4章 幂函数、指数函数和对数函数(下)_六 指数方程和对数方程_4.7 简单的指数方程_第一课时(沪教版高一下册)_T1566237
- 沪教版牛津小学英语(深圳用) 四年级下册 Unit 7
- 河南省名校课堂七年级下册英语第一课(2020年2月10日)
- 【部编】人教版语文七年级下册《逢入京使》优质课教学视频+PPT课件+教案,安徽省
- 8.对剪花样_第一课时(二等奖)(冀美版二年级上册)_T515402
- 【部编】人教版语文七年级下册《泊秦淮》优质课教学视频+PPT课件+教案,辽宁省
- 二年级下册数学第一课
精品推荐
- 2016-2017学年高一语文人教版必修一+模块学业水平检测试题(含答案)
- 广西钦州市高新区2017届高三11月月考政治试卷
- 浙江省湖州市2016-2017学年高一上学期期中考试政治试卷
- 浙江省湖州市2016-2017学年高二上学期期中考试政治试卷
- 辽宁省铁岭市协作体2017届高三上学期第三次联考政治试卷
- 广西钦州市钦州港区2016-2017学年高二11月月考政治试卷
- 广西钦州市钦州港区2017届高三11月月考政治试卷
- 广西钦州市钦州港区2016-2017学年高一11月月考政治试卷
- 广西钦州市高新区2016-2017学年高二11月月考政治试卷
- 广西钦州市高新区2016-2017学年高一11月月考政治试卷
分类导航
- 互联网
- 电脑基础知识
- 计算机软件及应用
- 计算机硬件及网络
- 计算机应用/办公自动化
- .NET
- 数据结构与算法
- Java
- SEO
- C/C++资料
- linux/Unix相关
- 手机开发
- UML理论/建模
- 并行计算/云计算
- 嵌入式开发
- windows相关
- 软件工程
- 管理信息系统
- 开发文档
- 图形图像
- 网络与通信
- 网络信息安全
- 电子支付
- Labview
- matlab
- 网络资源
- Python
- Delphi/Perl
- 评测
- Flash/Flex
- CSS/Script
- 计算机原理
- PHP资料
- 数据挖掘与模式识别
- Web服务
- 数据库
- Visual Basic
- 电子商务
- 服务器
- 搜索引擎优化
- 存储
- 架构
- 行业软件
- 人工智能
- 计算机辅助设计
- 多媒体
- 软件测试
- 计算机硬件与维护
- 网站策划/UE
- 网页设计/UI
- 网吧管理