[1]柴新新,邱晓晖. 基于提升小波变换的图像篡改检测算法[J].计算机技术与发展,2016,26(04):78-81.
 CHAI Xin-xin,QIU Xiao-hui. Image Forgery Detection Algorithm Based on Lifting Wavelet Transform[J].,2016,26(04):78-81.
点击复制

 基于提升小波变换的图像篡改检测算法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年04期
页码:
78-81
栏目:
智能、算法、系统工程
出版日期:
2016-04-10

文章信息/Info

Title:
 Image Forgery Detection Algorithm Based on Lifting Wavelet Transform
文章编号:
1673-629X(2016)04-0078-04
作者:
 柴新新邱晓晖
 南京邮电大学 通信与信息工程学院
Author(s):
 CHAI Xin-xinQIU Xiao-hui
关键词:
 复制粘贴提升小波变换奇异值分解欧氏距离
Keywords:
 copy-movelifting wave transformSVDEuclidean distance
分类号:
TP301.6
文献标志码:
A
摘要:
 图像在人类的感知中扮演着非常重要的角色,所传递的信息比其他任何形式更加丰富真切,而互联网中存在着大量的图像图片并且传播快速,这就使得辨别图像的真伪变得尤为重要。复制粘贴操作是最为常见的图像篡改手段之一,通过该手段可以达到修改或隐藏目标图像的目的。针对复制粘贴操作,文中提出了一种基于提升小波变换的图像复制粘贴篡改检测算法。首先,对图像进行提升小波变换,提取低频分量,并将其按像素重叠分块;其次,对每个小块图像进行奇异值分解得到奇异值特征向量矩阵,并进行字典排序,再进行欧氏距离修正;最后,根据偏移向量判断相似图块。实验结果表明,该算法能够有效地减少计算量,降低复杂度,使检测结果更准确。
Abstract:
 Image in human perception plays a very important role,whose content is more plentiful. There are a large number of images in the Internet which spread quickly,so identifying image of authenticity is particularly important. The operation of copy-move is one of the frequently used techniques in image tampering,which can modify or hide the target image’ s information. For this means,a new approach toward copy-move forgery detection is proposed based on lifting wavelet transform. Firstly,the input image is decomposed into approxi-mation ( LL) subbands using lifting wavelet transform,and the LL subbands are divided into overlapping blocks. Secondly,singular value decomposition is applied to each block to obtain singular value feature matrix which is lexicographically sorted,and after sorting the ma-trix is fixed by Euclidean distance. Finally,the similar blocks can be judged by offset vectors. The experimental results demonstrate that the proposed method can reduce calculation amount and complexity effectively,and have more accurate detection results.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(04):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(04):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(04):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(04):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(04):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(04):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(04):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(04):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(04):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(04):47.

更新日期/Last Update: 2016-06-16