Image tampering detection method based on comprehensive features of triangular mesh

A triangular mesh and comprehensive feature technology, applied in the field of passive forensics of digital images, can solve problems such as unsatisfactory performance, and achieve the effects of fast processing speed, good robustness, and accelerated detection speed

Active Publication Date: 2021-11-19
LIAONING NORMAL UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Point-based methods have advantages in terms of processing time and storage capacity, but perform poorly in smooth, small areas, and regions of the same height

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image tampering detection method based on comprehensive features of triangular mesh
  • Image tampering detection method based on comprehensive features of triangular mesh
  • Image tampering detection method based on comprehensive features of triangular mesh

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The method of the present invention is as Figure 7 There are six stages shown: superpixel generation, image feature point extraction, triangular mesh construction, triangular mesh feature construction, triangular mesh feature matching, and post-processing.

[0063] Convention: I refers to the image to be detected; I1 is the image after denoising; S u (u=1,2,...,l) represents a superpixel block; is pixel i at S u Probability in ; E u is S u entropy; I2 is the constructed color invariant image; C u Indicates partition coding, coded values ​​0 and 1 correspond to non-texture and texture regions respectively; T k (k=1,2,...,n) is the kth triangle, and n is the number of triangles; I k refers to T k inscribed circle of ; o k 、r k Yes k The center and radius of the circle; A k for I k The outer extension square; Q k means T k except I k the rest of the Respectively represent Q k The gradient entropy H under the three channels of R, G, and B k ; Refers t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image tampering detection method based on triangular mesh comprehensive features. Firstly, the Gaussian filter preprocessing is performed on the input image; secondly, the SLIC algorithm is used for superpixel segmentation, combined with the superpixel content, the SIFER detector is used in the color Adaptive uniformity is carried out on the invariant image, and the triangular mesh is constructed on the feature points according to the DT algorithm, and the two characteristics of the triangular mesh are calculated, that is, the local fast quaternion circular harmonic of the inscribed circle part of the triangular mesh Fourier moment amplitude and the average gradient entropy of other parts; then, the CSH method is used for feature matching of triangular meshes; finally, DLF, optimized ZNCC, and morphological methods are used for post-processing.

Description

technical field [0001] The invention belongs to the technical field of digital image passive (blind) forensics, relates to an image copy and paste tampering detection method, in particular to an image tampering detection method based on triangular mesh comprehensive features. Background technique [0002] In recent years, with the development of computer and network technology, the application of digital images has become more and more extensive. However, due to the characteristics of easy dissemination and modification of digital images, a large number of false forged images are caused, which reduces the reliability of digital images. At present, image tampering detection technology is divided into active and passive (blind) forensics methods: active forensics obtains evidence through additional information of digital images, such as digital watermarks and digital signatures; on the contrary, passive (blind) forensics can obtain evidence without additional information . ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T7/00G06T7/136G06T5/00G06T3/40G06K9/46
CPCG06T3/4053G06T5/002G06T7/0002G06T7/136G06T2207/10004G06V10/462
Inventor 王向阳焦丽仙牛盼盼
Owner LIAONING NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products