Blind detection system for digital image tampering

A digital image and blind detection technology, applied in the field of image information security, can solve the problems of prolonged matching time of feature points, detection results relying on the location of copied areas and tampered areas, affecting detection efficiency, etc., so as to improve detection accuracy and avoid high Computational problem, the effect of resisting human interference

Inactive Publication Date: 2015-05-13
沈阳普日软件技术有限公司
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The method of region copy detection based on pixel matching, although this method reduces the computational complexity, its detection results are too dependent on the location of copy regions and tampered regions
[0005] (2) Fourier Merlin transform is used as the block feature, and the bloom filter counting method is used to replace the previous dictionary sorting method. This method can effectively resist zooming, translation and slight rotation post-processing operations, but cannot resist the interference of Gaussian noise and blur
[0006] (3) Using the invariance of SIFT feature rotation and scaling to perform SIFT feature matching to realize region copying and t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blind detection system for digital image tampering
  • Blind detection system for digital image tampering
  • Blind detection system for digital image tampering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Combined with the accompanying drawings, the present invention has three main modules, which are respectively based on image forgery process trace module, imaging device consistency module, and natural image statistical characteristic module. The specific way is as figure 1 shown.

[0057] The image tampering blind detection process is as follows: figure 2 As shown, there are 8 steps involved. Among them, steps 1 to 3 perform normalized expansion on the round window; steps 4 to 6 calculate the phase correlation of adaptive band shrinkage; step 7 estimates the offset angle; step 8 estimates the border of the tampering region.

[0058] Step 1: Polar coordinate system - Cartesian coordinate system conversion

[0059] Let (x, y) be any point in the rectangular coordinate system, ρ is the polar diameter in the polar coordinate system, and θ is the polar angle, then the formula for converting polar coordinates to rectangular coordinates is as follows:

[0060] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a blind detection system for digital image tampering, belongs to the field of image information security, and particularly relates to the blind detection system for the digital image tampering. The invention provides the blind detection system for the digital image tampering, which can effectively resist geometric attacks and is high in detection efficiency and detection precision. The blind detection system comprises the following steps: (1) carrying out image feature extraction, and establishing a consistency model; (2) carrying out an image blind forensics algorithm; (3) carrying out image classification and blind-revision image positioning; and (4) outputting a result.

Description

technical field [0001] The invention belongs to the field of image information security, in particular to a digital image tampering blind detection system. Background technique: [0002] The ever-increasing number of digital images has been widely used in daily life and production. At the same time, various image editing software has also emerged, making it easy for general and professional users to "transfer" images. In recent years, image forgery incidents have seriously affected many fields such as politics, culture, news, military affairs, and science, and have produced immeasurable and serious consequences. In the past, the active forensics method, which relied entirely on embedding watermarks or digital signatures into images in advance, could no longer meet the needs of the current situation due to the complexity of its preprocessing, while passive forensics technology can realize image forensics without any external help information. The final forensics is more in l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T7/00
CPCG06T7/0002G06T7/60
Inventor 邵虹崔文成曲阳
Owner 沈阳普日软件技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products