图像异常边缘篡改检测及可信度评价算法Image abnormal edge tampering detection and credibility evaluation algorithm
朱婷鸽,李文瑄,来毅,刘颖
摘要(Abstract):
针对传统图像篡改检测算法适用性有限,只能检测某一类篡改区域边缘平滑处理的问题,提出一种图像异常边缘篡改检测及可信度评价算法。采用非线性预测编码去除图像像素间的相关性,降低边缘像素点与其周围像素亮度差异,从而达到弱化边缘的目的。对处理后的图像利用边缘增强算法增强真实边缘。对比图像处理前后边缘变化,寻找异常边缘点,通过异常边缘概率计算图像可信度评价图像的真伪。实验结果表明,在未知伪造操作的情况下,该算法能够较好地检测出图像中的异常边缘,并给出图像的可信度评价。
关键词(KeyWords): 异常边缘;非线性预测编码;边缘增强;可信度评价
基金项目(Foundation): 公安部科技强警项目(2019GABJC41);; 陕西省自然科学基础研究计划项目(2022JM-374)
作者(Author): 朱婷鸽,李文瑄,来毅,刘颖
DOI: 10.13682/j.issn.2095-6533.2022.01.013
参考文献(References):
- [1] 张雪锋,陈尧尧,翟羽佳.基于一维混沌映射和比特块置乱的图像加密[J].西安邮电大学学报,2019,24(4):28-35.ZHANG X F,CHEN Y Y,ZHAI Y J.Image encryptions based on one-dimensional chaotic maping and bit block scrambling[J].Journal of Xi'an University of Posts and Telecommunications,2019,24(4):28-35.(in Chinese)
- [2] 苗鑫梅,朱婷鸽,刘颖,等.基于Contourlet变换的彩色图像双水印算法[J].西安邮电大学学报,2018,23(5):77-84.MIAO X M,ZHU T G,LIU Y,et al.Dual watermarking algorithm of colored image based on Contourlet transform[J].Journal of Xi'an University of Posts and Telecommunications,2018,23(5):77-84.(in Chinese)
- [3] MANJUNATHA S,PATIL M.A survey on image forgery detection techniques[J].Digital Image Processing,2017,9(5):103-108.
- [4] HAYAT K,QAZI T.Forgery detection in digital images via discrete wavelet and discrete cosine transforms[J].Computers & Electrical Engineering,2017,62:448-458.
- [5] WALIA S,KUMAR K.Digital image forgery detection:A systematic scrutiny[J].Australian Journal of Forensic Sciences,2019,51(5):488-526.
- [6] DIXIT R,NASKAR R,MISHRA S.Blur-invariant copy-move forgery detection technique with improved detection accuracy utilizing SWT-SVD[J].IET Image Processing,2017,11(5):301-309.
- [7] ASGHAR K,HABIB Z,HUSSAIN M.Copy-move and splicing image forgery detection and localization techniques:A review[J].Australian Journal of Forensic Sciences,2017,49(3):281-307.
- [8] HSU Y,CHANG S.Detecting image splicing using geometry invariants and camera characteristics consis-tency[C]//Proceedings of the 2006 IEEE International Conference on Multimedia and Expo.Canada:IEEE,2006:549-552.
- [9] 李叶舟,胡静,牛少彰,等.基于光照方向不一致的图像盲取证技术[J].北京邮电大学学报,2011,34(3):26-30.LI Y Z,HU J,NIU S Z,et al.Exposing digital image forgeries by detecting inconsistence in light source direction[J].Journal of Beijing University of Posts and Telecommunications,2011,34(3):26-30.(in Chinese)
- [10] LYU S,PAN X,ZHANG X.Exposing region splicing forgeries with blind local noise estimation[J].International Journal of Computer Vision,2014,110(2):202-221.
- [11] PUN C,LIU B,YUAN X.Multi-scale noise estimation for image splicing forgery detection[J].Journal of Visual Communication and Image Representation,2016,38:195-206.
- [12] BAHRAMI K,KOT A,LI L,et al.Blurred image splicing localization by exposing blur type inconsistency[J].IEEE Transactions on Information Forensics and Security,2015,10(5):999-1009.
- [13] LIU G,WANG J,LIAN S,et al.Detect image splicing with artificial blurred boundary[J].Mathematical and Computer Modelling,2013,57(11):2647-2659.
- [14] LU Y,JING T.Detection blurred traces based on changing feature of image edge[J].Signal Processing,2011,27(5):732-736.
- [15] ZHENG J,ZHU T,LI Z,et al.Exposing image forgery by detecting traces of feather operation[J].Journal of Visual Languages and Computing,2015,27(1):9-18.
- [16] RAO Y,NI J.A deep learning approach to detection of splicing and copy-move forgeries in images[C]//Proceedings of the 2016 IEEE International Workshop on Information Forensics.Abu Dhabi:IEEE,2016:1-6.
- [17] SALLOUM R,REN Y,KUO C.Image splicing localization using a multi-task fully convolutional network (MFCN)[J].Journal of Visual Communication Image Representation,2018,51:201-209.
- [18] ZHOU P,HAN X,MORARIU VI.Learning rich features for image manipulation detection[C]//Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR),Salt Lake City:IEEE,2018:1053-1061.
- [19] YANG Z,GAN J,ZHOU J,et al.Colorized image forgery detection based onsimilarity measurement of gaussian mixture distribution[J].International Journal of Performability Engineering,2018,14(3):445-452.
- [20] WU Y,ABD-ALMAGEED W,NATARAJAN P.ManTra-net:Manipulation tracing network for detection and localization of image forgeries with anomalous features[C]//Proceedings of the 2019 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).Long Beach:IEEE,2019:9535-9544.
- [21] 李锋,阚建霞.基于Sobel算子的图像快速二维最大熵阈值分割算法[J].计算机科学,2015,42(6A):209-210.LI F,KAN J X.Fast two-dimensional maximum entropy threshold segmentation method based on soble operator[J].Computer Science,2015,42(6A):209-210.(in Chinese)
- [22] 郭萌,胡辽林,赵江涛.基于Kirsch和Canny算子的陶瓷碗表面缺陷检测方法[J].光学学报,2016,36(9):27-33.GUO Y,HU L L,ZHAO J T.Surface defect detection method of ceramic bowl based on Kirsch and Canny operator[J].Acta Optica Sinica,2016,36(9):27-33.(in Chinese)
- [23] DONG J,WANG W,TAN T.CASIA image tampering detection evaluation database[C]//Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing.Beijing:IEEE,2013:422-426.