Cutting-resistant JPEG image compression history and synthetic tamper detection method

A technology of tamper detection and image compression, applied in image analysis, image data processing, instruments, etc., can solve problems such as block position damage, failure, image detection failure, etc.

Inactive Publication Date: 2011-10-26
GUIZHOU UNIV
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, when a JPEG image is cropped, its tile locations may be corrupted, rendering the above methods partially or completely ineffective
If a JPEG image is saved as a BMP format file after cutting, the detection method of the JPEG compression history detection method for this image will be invalid; will be invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cutting-resistant JPEG image compression history and synthetic tamper detection method
  • Cutting-resistant JPEG image compression history and synthetic tamper detection method
  • Cutting-resistant JPEG image compression history and synthetic tamper detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Embodiment 1 of the present invention: anti-cropping JPEG image compression history and synthesis tampering detection method:

[0042] 1. Calculate the compression history trace and cropping position of the image to be detected.

[0043] Such as figure 2 , image 3 As shown, usually a JPEG image is obtained, and the tamperer may crop it and save it as an uncompressed image, or crop it and save it as a JPEG image. These operations will destroy the block grid of JPEG compression and use The previous quantization table information is lost. The detection process is as follows:

[0044] (1) Combine the image to be detected I(x,y) with such as Figure 4 The block effect extraction operator shown in the figure performs operations to obtain a block effect image D(x,y)

[0045]

[0046] (2) Divide D(x,y) into 8*8 non-overlapping blocks K 1 , K 2 ,...,K n , n=(M / 8)*(N / 8), M and N are the number of rows and columns of D(x,y) respectively. Calculate the block effect ma...

Embodiment 2

[0061] Embodiment 2 of the present invention: choose another picture to be detected Figure 19 , to determine whether the image to be tested has been tampered with, and then perform the following operations:

[0062] (1) Calculate with step 1 method Figure 19 The clipping position of , the detection result is as follows Figure 12 As shown, the clipping row position is k 1 =6, crop column position is k 2 =7, then cut out 6 rows and 7 columns of the image to be detected, and get a new image as I(x,y).

[0063] (2) Read the current quantization table Q from the JPEG header file 2 , calculate the distance between it and the quantization table corresponding to different quantization factors q (1~100), and the quality factor corresponding to the quantization table with the smallest distance is the current quality factor q 2 ,Right now

[0064]

[0065] Calculated to get q 2 =90.

[0066] (3) Estimate whether it undergoes secondary JPEG compression (when the compression ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cutting-resistant JPEG image compression history and synthetic tamper detection method. The method comprises the following steps: (1) calculating compression history trace and cutting position of an image to be detected; (2) determining whether the image to be detected has a tampered operation or not; (3) carrying out tamper area positioning on the image determined in the step (2), respectively figuring out difference images to RGB image three channels according to the mode of the step (2), carrying out binary processing on the difference images, carrying out logic and operation on the obtained three channel binary images to obtain a new binary image, carrying out morphological corrosion expansion operation on the image, and mapping back to the image to be measured to obtain a tampered area positioning image. According to the invention, problem is solved that block position of a JPEG image may be destroyed after cutting, which leads to sectional or complete failure of the prior art. Also effective detection and tampered area positioning on an image with cutting background area can be carried out by the method provided in the invention.

Description

technical field [0001] The invention relates to an image detection method, in particular to an image compression history and synthesis tampering detection method. Background technique [0002] At present, with the increasing popularity of digital image applications, digital image editing and processing tools are becoming more and more advanced. Using these tools, image content can be easily modified, and it is difficult for human eyes to detect traces of forgery. In recent years, there have been many shocking cases of tampering and forgery of digital images at home and abroad in the fields of politics, press and publishing, and science. Therefore, it is urgent to test the authenticity of images. Traditionally, when identifying the authenticity of images, the method of embedding digital watermarks or signatures in digital images in advance-image active authentication is used. However, this method is not enough to solve the problem that case images often have no watermark in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T7/60
Inventor 左菊仙刘本永廖翔
Owner GUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products