浏览全部资源
扫码关注微信
1. 北京邮电大学 信息安全中心,北京 100876
2. 北京电子科技学院 信息安全系,北京 100070
3. 中国信息安全认证中心,北京 100020
[ "李岩(1982-),男,河北定州人,北京邮电大学博士生,主要研究方向为信号处理、数字水印、数字图像取证等。" ]
[ "刘念(1981-),男,山东济南人,北京电子科技学院讲师,主要研究方向为云存储加密、数据挖掘、图像取证等。" ]
[ "张斌(1980-),男,山东莱芜人,中国信息安全认证中心工程师,主要研究方向为网络攻防技术、信息安全认证认可体系研究、信息隐藏等。" ]
[ "袁开国(1982-),男,苗族,贵州晴隆人,北京邮电大学讲师,主要研究方向为密码学、数字水印等。" ]
[ "杨义先(1961-),男,四川盐亭人,北京邮电大学教授、博士生导师,主要研究方向为灾备技术、网络与信息攻防等。" ]
网络出版日期:2015-05,
纸质出版日期:2015-05-25
移动端阅览
李岩, 刘念, 张斌, 等. 图像镜像复制粘贴篡改检测中的FI-SURF算法[J]. 通信学报, 2015,36(5):54-65.
IYan L, IUNian L, HANGBin Z, et al. FI-SURF algorithm for image copy-flip-move forgery detection[J]. Journal on communications, 2015, 36(5): 54-65.
李岩, 刘念, 张斌, 等. 图像镜像复制粘贴篡改检测中的FI-SURF算法[J]. 通信学报, 2015,36(5):54-65. DOI: 10.11959/j.issn.1000-436x.2015163.
IYan L, IUNian L, HANGBin Z, et al. FI-SURF algorithm for image copy-flip-move forgery detection[J]. Journal on communications, 2015, 36(5): 54-65. DOI: 10.11959/j.issn.1000-436x.2015163.
针对数字图像版权中的复制粘贴篡改问题,提出FI-SURF (flip invariant SURF)算法。研究了当图像经过镜像翻转后SURF (speeded-up robust features)特征描述符的排列变化关系。提取SURF特征点后,将其特征描述符重新排序,即使复制粘贴区域经过镜像翻转,对应的特征点依然可以进行匹配。实验证明,FI-SURF算法在保留SURF算法运算速度快、顽健性强等优点的前提下,可有效检测出经过镜像翻转的复制粘贴区域,计算出复制粘贴区域的轮廓。
FI-SURF (flip invariant SURF) algorithm was proposed
for the consideration of the copy-move forgery detec-tion of digital images.The arrangement of the SURF (speeded-up robust features) descriptor after image flip was studied.After extract the SURF interest points
rearrange the descriptors
the interest points can still be matched even under the condition of copy-flip-move.The experiment results show that FI-SURF not only reserved the advantage of SURF
but also can detect the copy-flip-move forgery
and can locate the duplicated region.
QAZI T , HAYAT K , KHAN S U , et al . Survey on blind image forgery detection [J ] . IET Image Process , 2013 , 7 ( 7 ): 660 - 670 .
AL-QERSHI O M , KHOO B E . Passive detection of copy-move for-gery in digital images:state-of-the-art [J ] . Forensic Science International , 2013 , 231 ( 1-3 ): 284 - 295 .
KEE E , O'BRIEN J , FARID H . Exposing photo manipulation with inconsistent shadows [J ] . ACM Transactions on Graphics (TOG) , 2013 , 32 ( 3 ): 1 - 12 .
FRIDRICH A J , SOUKAL B D , LUK Š A J . Detection of copy-move forgery in digital images [A ] . Proceeding of the Digital Forensic Research Workshop [C ] . Cleveland,Ohio,USA , 2003 . 1 - 10 .
POPESCU A C , FARID H , Exposing digital forgeries by detecting duplicated image regions [R ] . Dept Comput Sci,Dartmouth College,Tech , 2004 .
CHRISTLEIN V , RIESS C , ANGELOPOULOU E . On rotation invariance in copy-move forgery detection [A ] . Proceeding of the Information Forensics and Security (WIFS) [C ] . Seattle , 2010 . 1 - 6 .
AMERINI I , BALLAN L , CALDELLI R , et al . Copy-move forgery detection and localization by means of robust clustering with J-linkage [J ] . Signal Processing:Image Communication , 2013 , 28 : 659 - 669 .
LOWE D G . Distinctive image features from scale-invariant keypoints [J ] . International Journal of Computer Vision , 2004 , 60 ( 2 ): 91 - 110 .
BAY H , ESS A , TUYTELAARS T , et al . Speeded-up robust features (SURF) [J ] . Computer Vision and Image Understanding , 2008 , 110 ( 3 ): 346 - 359 .
SHIVAKUMAR B , SANTHOSH BABOO S . Detection of region duplication forgery in digital images using SURF [J ] . International Journal of Computer Science Issues (IJCSI) , 2011 , 8 ( 4 ): 199 - 205 .
BO X , JUNWEN W , GUANGJIE L , et al . Image copy-move forgery detection based on SURF [A ] . Proceeding of the Multimedia Information Networking and Security (MINES),2010 International Conference on [C ] . 2010 . 889 - 892 .
QI F , WEIHONG X , QIANG L . Research of image matching based on improved SURF algorith [J ] . Telkomnika Indonesian Journal of Elec-trical Engineering , 2014 , 12 ( 2 ): 1395 - 1402 .
PANG Y , LI W , YUAN Y , et al . Fully affine invariant SURF for image matching [J ] . Neurocomputing , 2012 , 85 : 6 - 10 .
PAN X , LYU S . Region duplication detection using image feature matching [J ] . Information Forensics and Security,IEEE Transactions on , 2010 , 5 ( 4 ): 857 - 867 .
GUO X , CAO X . MIFT:A framework for feature descriptors to be mirror reflection invariant [J ] . Image and Vision Computing , 2012 , 30 : 546 - 556 .
KAKAR P , SUDHA N . Exposing postprocessed copy paste forgeries through transform-invariant features [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 3 ): 1018 - 1028 .
AMERINI I , BALLAN L , CALDELLI R , et al . A sift-based forensic method for copy-move attack detection and transformation recovery [J ] . IEEE Transactions on Information Forensics and Security , 2011 , 6 ( 3 ): 1099 - 1110 .
FISCHLER M A , BOLLES R C . Random sample consensus:a paradigm for model fitting with applications to image analysis and automated cartography [J ] . Communications of the ACM , 1981 , 24 ( 6 ): 381 - 395 .
SUZUKI S . Topological structural analysis of digitized binary images by border following [J ] . Computer Vision,Graphics,and Image Processing , 1985 , 30 ( 1 ): 32 - 46 .
JEGOU H , DOUZE M , SCHMID C . Hamming embedding and weak geometric consistency for large scale image search [A ] . Proceeding of the 10th European conference on Computer vision [C ] . Berlin Heidelberg , 2008 . 304 - 317 .
0
浏览量
1199
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构