一种基于关键点的复制粘贴盲检测算法
Copy-Move Forgeries Detection Based on SIFT Algorithm
DOI: 10.12677/CSA.2015.57033, PDF, HTML, XML,  被引量 下载: 2,423  浏览: 7,173  国家自然科学基金支持
作者: 王珺斌, 杨正洪:中国农业大学理学院,北京;牛少彰:北京邮电大学计算机学院,北京
关键词: 图像取证复制粘贴篡改SIFT算法向量匹配Image Forensics Copy-Move Detection Scale-Invariant Feature Transform (SIFT) Vector Matching
摘要: 鉴于传统的复制粘贴篡改检测时间复杂度较高,而且对于图像的旋转缩放等后续润饰操作的鲁棒性不好,误报率高。提出了一种基于SIFT关键点的复制粘贴检测算法。首先利用SIFT算法对整幅图像提取SIFT关键点,再对提取到的关键点进行匹配。将匹配的关键点连接起来,来定位篡改区域。实验效果表明,相比较于传统的复制粘贴检测算法,该算法可以有效地检测出经过旋转缩放等几何变换的后续篡改。
Abstract: In view of the higher time complexity of traditional copy-move forgery detection, bad robustness for the image rotation zoom and other follow-up retouching operations, a copy-move forgeries detection algorithm based on SIFT key points is studied. First, extract SIFT key points on the image by using SIFT algorithm, and then match the key point of extraction. Connect the key points of the match to locate the tampered area. Experimental results show that the algorithm can effectively detect the subsequent tampering of the geometric transformation such as rotation and zoom.
文章引用:王珺斌, 杨正洪, 牛少彰. 一种基于关键点的复制粘贴盲检测算法[J]. 计算机科学与应用, 2015, 5(7): 255-263. http://dx.doi.org/10.12677/CSA.2015.57033

参考文献

[1] 顾伟, 吕皖丽, 罗斌 (2009) 基于图像分类的矢量量化数字水印算法. 计算机应用研究, 7, 2738-2740.
http://dx.doi.org/10.3969/j.issn.1001-3695.2009.07.097
[2] Fridrich, J., Soukal, D. and Lukáš, J. (2003) Detec-tion of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop.
[3] Popescu, A.C. and Farid, H. (2004) Exposing digital forgeries by detecting duplicated image regions. Comput.sci.dart- mouth College Private Ivy League Res.univ, 646.
[4] Li, G.H.,Wu, Q., Tu, D. and Sun, S.J. (2007) A sorted neighborhood approach for detecting duplicated image regions in image forgeries based on DWT and SVD. Processing of 2007 IEEE Interna-tional Conference on Multimedia and Expo, Beijing, 2-5 July 2007, 1750-1753.
[5] 王鑫, 轩波, 彭思龙 (2010) 基于融合的高分辨率彩色图像拷贝–变换–移动篡改检测. 中国图象图形学报, 7, 1047-1053.
[6] 骆伟祺, 黄继武, 丘国平 (2007) 鲁棒的区域复制图像篡改检测技术. 计算机学报, 11, 1998-2007.
http://dx.doi.org/10.3321/j.issn:0254-4164.2007.11.013
[7] Lowe, D.G. (2004) Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, 60, 91-110.
http://dx.doi.org/10.1023/B:VISI.0000029664.99615.94
[8] Amerini, I. (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics & Security, 6, 1099-1110.
http://dx.doi.org/10.1109/TIFS.2011.2129512
[9] Dellinger, F., Delon, J., Gousseau, Y., et al. (2015) SAR-SIFT: A SIFT-like algorithm for SAR images. IEEE Transactions on Geoscience and Remote Sensing, 53, 453-466.
[10] Zhang, J., Sang, H.S.and Shen, X.B. (2012) Improved SIFT matching algorithm with adaptive matching direction and scale restriction. International Journal of Digital Content Technology and Its Applications, 6, 851-858.
[11] 邹承明, 徐泽前, 薛栋 (2015) 一种基于分块匹配的SIFT算法. 计算机科学, 4, 311-315.
[12] 周丽芬 (2014) 基于SIFT的图像匹配算法. 计算机与现代化, 7, 63-67.