Unlock instant, AI-driven research and patent intelligence for your innovation.

A Blind Forensics Method for Image Tampering

A blind forensics and image technology, applied in image analysis, image enhancement, image data processing, etc., can solve the problems of algorithm accuracy reduction and achieve the effect of improving efficiency, improving accuracy, and improving detection results

Inactive Publication Date: 2019-09-17
FOSHAN UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Similar methods include the DWT-SVD method of Li et al., the DWT-DCT (QCD) method of Ghorbani et al., and Huang et al. proposed an improved method based on discrete cosine transform based on the algorithm of Fridrich et al. They introduced a threshold p to control the dimension of the feature vector of the image block. The above method can reduce the matching time by p% on average, but as the value of p increases, more and more feature dimensions are discarded, and the accuracy of the algorithm also decreased

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Blind Forensics Method for Image Tampering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The specific embodiment of the present invention will be further described below in conjunction with accompanying drawing:

[0031] Such as figure 1 Shown, a kind of image tampering blind forensics method is characterized in that, comprises the following steps:

[0032] S1), the suspicious image to be detected is judged in grayscale, if it is a non-grayscale image, then converted to a grayscale image, the expression is: Gray=0.299R+0.587G+0.114B;

[0033] S2), two 3×3 filters in the vertical and horizontal directions are respectively convoluted with the grayscale image I(i,j) to be detected to obtain the gradient image G(i,j) of the image; for the gradient The image G(i,j) is subjected to threshold segmentation, and its calculation expression is: Among them, k 1 The value is 4, m(G(i,j) is the average value of the gray levels of all pixels in the gradient image G(i,j); to traverse the pixels in the image, the gray points greater than the threshold are set as white p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An image tampering blind evidence collection method based on Sobel edge detection and image block brightness features, which is characterized by including the following steps: convert the suspicious image to be detected into a grayscale image, and convolve the grayscale image I(i,j) Process, obtain the gradient image G(i,j) of the image, perform threshold segmentation on G(i,j) to obtain the gradient image G(i,j), and perform binarization processing on the gradient image G(i,j) The binary image W(i,j) is obtained, and the binary image W(i,j) is converted into 1 pixel. By judging the similarity of the two sub-image sets, the present invention divides the image set into blocks. Brightness mean sorting can effectively improve the efficiency of the forensic algorithm, and by comparing similar brightness values ​​of image blocks, the accuracy is further improved, and the efficiency of image forensics is further improved; the present invention solves the problem of cloning tampering caused by large scale scaling. The problem of inability to accurately detect tampered images, by normalizing the brightness values ​​of image blocks, further improves the detection results of cloned images with different brightness values.

Description

technical field [0001] The invention relates to the technical field of information security and information processing, in particular to a blind image tampering evidence collection method. Background technique [0002] Image passive forensics technology, also known as image blind forensics technology, is a research field that has developed rapidly in recent years. It only uses the characteristics of the image itself to identify its authenticity, without any prior knowledge such as digital signatures or digital watermarks, and does not need to add watermark generation programs to camera equipment, so it has the advantage of a wide range of applications; at the same time , since there is no need to embed any information in the image, it will not reduce the image quality. When natural images are generated, they will be affected by factors such as the hardware and software inside the imaging device or the statistical laws of the natural images themselves. The output images will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T7/00G06T7/11G06T7/13G06T5/00
CPCG06T7/0002G06T5/92
Inventor 林秋明杨滨丘晓琳朱珍李小华
Owner FOSHAN UNIVERSITY