CN100440255C - Image zone duplicating and altering detecting method of robust - Google Patents
Image zone duplicating and altering detecting method of robust Download PDFInfo
- Publication number
- CN100440255C CN100440255C CNB2006100366009A CN200610036600A CN100440255C CN 100440255 C CN100440255 C CN 100440255C CN B2006100366009 A CNB2006100366009 A CN B2006100366009A CN 200610036600 A CN200610036600 A CN 200610036600A CN 100440255 C CN100440255 C CN 100440255C
- Authority
- CN
- China
- Prior art keywords
- image
- region
- transfer vector
- piece
- image block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The present invention provides a method of detecting copying and distorting in robust region based on image block similarity, and belongs to the field of multimedia information safety technology. The method includes the following steps: 1. extracting image block characteristic; 2. seeking similar block pairs; 3. eliminating mismatched block pairs; and 4. judging the image distorting and locating the distorted area. The present invention may be used to detect distorted image effectively and is significant in judging the truth of image data.
Description
Technical field
The invention belongs to the multi-media information security field, be specifically related to a kind of can be to given digital picture f, judge whether it has passed through the image zone duplicating and altering detecting method of the robust of the location that region duplication distorts and can realize distorting.
Background technology
High-resolution digital camera, popularizing and using of powerful PC and various image processing softwares makes that general user can both realize distorting of digital picture do not stayed obvious marks at an easy rate.Nowadays, soon be not real, if false photograph is abused, will bring some problems, as relate to the authenticity of legal argument, the copyright of Digital Media, individual's secret protection etc., the authenticity of inspection image data has crucial meaning.
It is that a zone in the digital picture is duplicated and pasted in the zone that will remove that region duplication is distorted, and it is a kind of simple tampering methods of effectively removing the image important information, shown in Figure of description 2.Because information such as consistent noise, texture, color are arranged in same width of cloth image, human eye is difficult to the image after distorting is distinguished.And the interpolater adds some subsequent operations toward the contact meeting in " copy-paste " back, makes the difficulty that detects increase greatly.The judgement to the view data true or false etc. of distorting that detects this form has important and practical meanings.
Summary of the invention
The invention provides a kind of image zone duplicating and altering detecting method of robust, this method can judge whether it has passed through region duplication and distorted to given digital picture f, also need orient the zone of distorting if having then, thereby confirm the true or false of its view data.
The inventive method utilized some statistical properties in the natural image as: exist the possibility of large-area similar area very little in same width of cloth natural image, " mean value " characteristic of image block is operated robustness etc. preferably to general Flame Image Process.Step of the present invention is as follows: 1) abstract image block feature; 2) similar of searching is right; The match block of 3) removal mistake is right; 4) judge tampered image and positioning tampering zone.
The concrete grammar of the feature of described step 1) abstract image piece is: at first testing image f (establish its size and be M*N) is decomposed into the piece B that b * b size has the overlapping region
i, i=1... (M-b+1) (N-b+1) extracts its seven feature: c as follows for each image block
1, c
2, c
3The mean value of three Color Channels of difference document image piece red, green, blue, c
4, c
5, c
6, c
7About pressing, about, after merotypes such as oblique down 45 degree and four kinds of 45 degree obliquely decompose, first-class subregional pixel value summation accounts for the ratio of whole Y piecemeal gray-scale value summation, and utilizes proper vector V (i)=(c
1, c
2, c
3, c
4, c
5, c
6, c
7) presentation video piece B
iInformation, all V (i) are stored among the array A.
Described step 2) seeking similar right method is: will be stored among the array A all proper vectors earlier by the dictionary ordering, if the proper vector of each image block relatively in twos then is image block B
i, B
jIn the absolute difference of corresponding 7 features less than [2.5,1.5,3.0,0.006,0.005,0.005,0.005], and the distance between corresponding blocks makes L=50 greater than L, then thinks B
i, B
jBe similar right, and " transfer vector " d:d=(d that record block is right as follows
x, d
y), d
x=x
1-x
2, d
y=y
1-y
2, (x wherein
1, y
1), (x
2, y
2) be the coordinate of the position, the upper left corner of two image blocks.
Described step 3) is removed the wrong right method of match block: statistic procedure 2) " transfer vector ", make the maximum conduct " main transfer vector " of the frequency of occurrences, all pieces that " transfer vector " are not equal to " main transfer vector " are to thinking that wrong match block is to being got rid of, seek out two maximum connected components remaining piece centering, and the hole region in the connected component is filled up.
Described step 4) judges that the method in tampered image and positioning tampering zone is: suppose to have obtained two region R in step 3)
1, R
2, if satisfy:
min(|R
1|,|R
2|)>αM*N*0.85%||R
1|-|R
2||/max(|R
1|,|R
2|)<Tr
Think that then image f has passed through region duplication and distorted R
1, R
2It is detected tampered region.
The inventive method can judge whether it has passed through region duplication and distorted to given digital picture f, also need orient the zone of distorting if having then, thereby confirm the true or false of its view data.Compare with more existing detection methods, the present invention can more effectively resist more, stronger aftertreatment and attack, and the realization of algorithm only needs carry out on the spatial domain of image, and efficient is also higher.
Description of drawings
Fig. 1 is four kinds of piecemeal pattern diagram on the image block Y passage;
Fig. 2 is that region duplication is distorted synoptic diagram;
Fig. 3 has unified transfer vector synoptic diagram between corresponding blocks between the tampered region;
Fig. 4 is a test legend 1;
Fig. 5 is that test legend 1 is in the detection accuracy and the error rate that add under the varying strength white noise;
Fig. 6 is detection accuracy and the error rate of test legend 1 under the compression of the different quality factor;
Fig. 7 is that the experimental result of this method and the described method of document [1] relatively (is tested example 1);
Fig. 8 be utilize this method to 100 width of cloth images carry out adding of varying strength make an uproar, JPEG compression, distort the mean value that detects accuracy and error rate under the block size in difference;
Embodiment
The invention will be further described below in conjunction with accompanying drawing.
The inventive method may further comprise the steps: 1) abstract image block feature; 2) similar of searching is right; The match block of 3) removal mistake is right; 4) judge tampered image and positioning tampering zone.
1) feature of abstract image piece
Suppose that image to be detected is f, its size is M*N.At first f is decomposed into the image block of b * b (setting b=16) size of overlapping region, establishing image block is B
iI=1... (M-b+1) (N-b+1).For each image block B
i, we write down the feature of its seven " mean values ".
At first utilize c
1, c
2, c
3Document image piece B
iThe mean value of three Color Channels of red, green, blue.
Utilize formula then:
Y=0.299R+0.587G+0.114B
With B
iBe transformed into the Y passage, and it be divided into two parts, be made as Part (1) and Part (2) by 4 kinds of resolution models shown in Figure 1.Utilize c
4, c
5, c
6, c
7Write down the ratio that Part (1) gray scale accounts for whole Y piecemeal respectively.Both:
c
i=sum(part(1))/sum(part(1)+part(2))i=4,5,6,7
Thereby obtain image block B
iProper vector V (i)=(c
1, c
2, c
3, c
4, c
5, c
6, c
7), all proper vectors are stored among the array A.
2) similar of searching is right
At first to array A (M-b+1) (N-b+1) individual proper vector do the dictionary ordering.Their similarity degree relatively in twos then, if the absolute value of the difference of two proper vector character pairs is less than our preset threshold:
[2.5,1.5,3.0,0.006,0.005,0.005,0.005]
And the distance of two correspondence image interblocks is greater than L (setting L=50).Then think similar right, and as follows record block to " transfer vector " d.
d=(d
x,d
y) d
x=x
1-x
2,d
y=y
1-y
2
(x wherein
1, y
1), (x
2, y
2) be the coordinate of the position, the upper left corner of two image blocks.
The match block of 3) removal mistake is right
Because the influence of the similarity of natural image close region, be not similar region D finding in 2 in steps to all coming to distort
1, D
2Shown in Fig. 2,3, from the process that region duplication is distorted, the D that all come
1, D
2Piece unified transfer vector is all arranged, and compare with other similar right transfer vector, the probability of its appearance is maximum often.In view of the above, we utilize " main transfer vector " method to remove wrong match block to also realizing the location.Its step is as follows: at first add up all transfer vectors in 2, select frequency maximum conducts " main transfer vector " to occur then, all pieces that " transfer vector " are not equal to " main transfer vector " are to thinking that wrong match block is to being got rid of.Seek out two maximum connected components remaining piece centering, and the hole region in the connected component is filled up, obtain two zone: R
1, R
2
4) judge tampered image and positioning tampering zone
Owing in general image, also can have similar zone, but its area is generally less.Through a large amount of experiment, we are provided with following rule judgment testing image and whether have passed through region duplication and distort operation.If in step 3, obtained two region R
1, R
2, and they satisfy:
min(|R
1|,|R
2|)>αM*N*0.85% ||R
1|-|R
2||/max(|R
1|,|R
2|)<Tr
Think that then image f has passed through region duplication and distorted R
1, R
2It is detected tampered region.α=61% wherein, Tr=6%.
Provide the example of some detections and the statistics of experiment below.
As shown in Figure 4, Fig. 4 (a) is original image, and Fig. 4 (b) distorts the back image.Do not passing through any post-processing operation, the detection accuracy of utilizing this patent method to obtain is 0.99123, and error rate is 0.1045.Wherein accuracy r and error rate w are defined as follows:
Fig. 5, Fig. 6 are the testing results through the JPEG post-processing operation of adding Gaussian noise, diminishing, accuracy and error rate (r that the expression of diagram below detects, w), Fig. 5 (a) expression is to distorting the testing result after the back image adds the white Gauss noise that SNR is 20db, and Fig. 5 (b), Fig. 5 (c) difference correspondence is added the testing result behind 30db and the 40db.To carry out quality factor be testing result after 40 the JPEG compression to distorting the back image for Fig. 6 (a) expression, and Fig. 6 (b), Fig. 6 (c) are corresponding respectively to be 65 with quality factor, the testing result after the 90JPEG compression.Fig. 7 is the experiment contrast that utilizes the inventive method and document [1] method.Document [1] .A.C.Popescu and H.Farid.Exposing digital forgeriesby detecting duplicated image regions.Technical Report TR2004-515, Dartmouth Col lege, Aug.2004.Can see that this method has more robustness.
In addition, the inventive method can also be resisted following attack: Gaussian Blur (n1=n2=5, variances sigma=1) and married operation (carry out Gaussian Blur earlier, add SNR 24db white Gauss noise then, be 60 JPEG compression as quality factor at last), the testing result of above example is as shown in table 1 below:
Table 1
Accuracy/error rate | Gaussian Blur | Married operation |
Test example 1 | 0.9891/0.1093 | 0.9845/0.0984 |
For the validity of testing this method further and to the robustness of various subsequent operations, our picked at random 100 width of cloth images (size is 300*400) test, for each width of cloth image, we choose a square randomly and duplicate, and it is pasted in disjoint zone in the same image, and then the image after these are distorted carries out different operations: Gaussian Blur adds Gauss's white noise, diminish the JPEG compression, and their married operation.In test we to choose the square size be respectively 32*32,48*48,64*64,80*80.
Table 2 has been listed the testing result of not carrying out under the operation of back.Data can be seen from table 2, and the accuracy of all images is up to 99.9%, and error rate all is lower than 5%.
Table 2
No |
32×32 | 48×48 | 64×64 | 80×80 |
The accuracy average | 0.9998 | 0.9999 | 0.9998 | 1.0000 |
The error rate average | 0.0491 | 0.0254 | 0.0219 | 0.0191 |
False Rate | 0.04 | 0.01 | 0.00 | 0.00 |
Table 3~table 6 has been listed 100 width of cloth images in different big or small tampered regions, the testing result under different post-processing operation with Fig. 8.Table 3 is Gaussian Blur testing results, and table 4 is the False Rates of adding white Gaussian noise, and table 5 is the False Rates that diminish under the JPEG compression, and table 6 is the testing results under the married operation.
Table 3
|
32×32 | 48×48 | 64×64 | 80×80 |
The accuracy average | 0.9464 | 0.9677 | 0.9766 | 0.9797 |
The error rate average | 0.0926 | 0.0613 | 0.0439 | 0.0371 |
False Rate | 0.07 | 0.02 | 0.00 | 0.00 |
Table 4
AWGN | 20db | 24db | 28db | 32db | 36db | 40db |
32×32 | 0.20 | 0.08 | 0.06 | 0.06 | 0.06 | 0.05 |
48×48 | 0.04 | 0.01 | 0.01 | 0.01 | 0.01 | 0.01 |
64×64 | 0 | 0 | 0 | 0 | 0 | 0 |
80×80 | 0.01 | 0.01 | 0 | 0 | 0 | 0 |
Table 5
|
40 | 50 | 60 | 70 | 80 | 90 |
32×32 | 0.18 | 0.13 | 0.12 | 0.12 | 0.13 | 0.12 |
48×48 | 0.03 | 0.03 | 0.01 | 0.01 | 0.01 | 0.01 |
64×64 | 0 | 0 | 0 | 0 | 0 | 0 |
80×80 | 0 | 0 | 0 | 0 | 0 | 0 |
Table 6
|
32×32 | 48×48 | 64×64 | 80×80 |
The accuracy average | 0.9037 | 0.9326 | 0.9521 | 0.9505 |
The error rate average | 0.1295 | 0.0869 | 0.0646 | 0.0618 |
False Rate | 0.13 | 0.02 | 0 | 0 |
Can see that from above-mentioned form and diagram the inventive method has quite good detecting and positioning function.Even tampered image is through different post-processing operation: as add the JPEG compression making an uproar, blur, diminish etc.Can both identify the tampered region of image well, be that a kind of region duplication of robust is distorted detection technique.
Claims (1)
1, a kind of image zone duplicating and altering detecting method of robust is characterized in that comprising following four concrete steps:
1) abstract image block feature: at first testing image f is established its size for M*N, be decomposed into the piece B that b * b size has the overlapping region
i, i=1... (M-b+1) (N-b+1) extracts its seven feature: c as follows for each image block
1, c
2, c
3The mean value of three Color Channels of difference document image piece red, green, blue, c
4, c
5, c
6, c
7About document image piecemeal Y passage is pressed respectively, about, after merotypes such as oblique down 45 degree and four kinds of 45 degree obliquely decompose, first-class subregional pixel value summation accounts for the ratio of whole Y piecemeal gray-scale value summation, and with proper vector V (i)=(c
1, c
2, c
3, c
4, c
5, c
6, c
7) presentation video piece B
iInformation, all V (i) are stored among the array A;
2) seek similar right: will be stored among the array A all proper vectors earlier by the dictionary ordering, if the proper vector of each image block relatively in twos then is image block B
i, B
jIn corresponding 7 features absolute difference less than: [2.5,1.5,3.0,0.006,0.005,0.005,0.005], and corresponding blocks to distance greater than L, when wherein L is illustrated in common image zone duplicating and altering, be replicated regional location and the minimum value and value between the corresponding blocks of position that is stuck, L gets 50, then thinks B
i, B
jBe similar right, and write down as follows similar to " transfer vector " d:d=(d
x, d
y), d
x=x
1-x
2, d
y=y
1-y
2, (x wherein
1, y
1), (x
2, y
2) be the coordinate of position, two the image block upper left corner;
The match block of 3) removal mistake is right: " transfer vector " statistic procedure 2), make the maximum conduct " main transfer vector " of the frequency of occurrences, all similar that " transfer vector " is not equal to " main transfer vector " to thinking that wrong piece is to being got rid of, seek out two maximum connected components remaining piece centering, and the hole region in the connected component is filled up;
4) judge tampered image and positioning tampering zone: suppose to have obtained two region R in step 3)
1, R
2, if satisfy:
min(|R
1|,|R
2|)>αM*N*0.85% ‖R
1|-|R
2‖/max(|R
1|,|R
2|)<Tr
Think that then image f has passed through region duplication and distorted R
1, R
2Be detected tampered region, parameter alpha=61% wherein, Tr=6%.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100366009A CN100440255C (en) | 2006-07-20 | 2006-07-20 | Image zone duplicating and altering detecting method of robust |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100366009A CN100440255C (en) | 2006-07-20 | 2006-07-20 | Image zone duplicating and altering detecting method of robust |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1900970A CN1900970A (en) | 2007-01-24 |
CN100440255C true CN100440255C (en) | 2008-12-03 |
Family
ID=37656850
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100366009A Expired - Fee Related CN100440255C (en) | 2006-07-20 | 2006-07-20 | Image zone duplicating and altering detecting method of robust |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100440255C (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101685496B (en) * | 2008-09-27 | 2011-10-19 | 中国科学院计算技术研究所 | Video segment duplication detecting method |
CN101504655B (en) * | 2009-03-06 | 2011-03-23 | 中山大学 | Color relationship characteristic based image approximate copy detection method |
JP2012531130A (en) * | 2009-06-26 | 2012-12-06 | インテル・コーポレーション | Video copy detection technology |
CN102013101A (en) * | 2010-11-27 | 2011-04-13 | 上海大学 | Blind detection method of permuted and tampered images subjected to fuzzy postprocessing |
CN102693522A (en) * | 2012-04-28 | 2012-09-26 | 中国矿业大学 | Method for detecting region duplication and forgery of color image |
CN103093195B (en) * | 2013-01-09 | 2016-01-06 | 天津大学 | Digital picture regional cloning based on boundary energy is true and false obscures discriminating conduct |
WO2014198029A1 (en) * | 2013-06-13 | 2014-12-18 | Microsoft Corporation | Image completion based on patch offset statistics |
EP3281183B1 (en) * | 2015-04-09 | 2022-07-13 | FiliGrade B.V. | Method of verifying an authenticity of a printed item and data processing terminal |
CN106295478A (en) * | 2015-06-04 | 2017-01-04 | 深圳市中兴微电子技术有限公司 | A kind of image characteristic extracting method and device |
CN106056122B (en) * | 2016-05-26 | 2019-05-17 | 中山大学 | A kind of image zone duplicating stickup altering detecting method based on KAZE characteristic point |
CN107292269B (en) * | 2017-06-23 | 2020-02-28 | 中国科学院自动化研究所 | Face image false distinguishing method based on perspective distortion characteristic, storage and processing equipment |
CN108109141B (en) * | 2017-12-18 | 2021-11-19 | 辽宁师范大学 | Homologous local replication detection method based on superpixel multi-feature matching |
CN111784708B (en) * | 2020-07-03 | 2021-03-12 | 上海骏聿数码科技有限公司 | Image tamper-proof inspection method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1434165A1 (en) * | 2002-11-25 | 2004-06-30 | Eastman Kodak Company | Method and system for detecting a geometrically transformed copy of an image |
CN1703722A (en) * | 2002-10-09 | 2005-11-30 | 皇家飞利浦电子股份有限公司 | Localisation of image tampering |
-
2006
- 2006-07-20 CN CNB2006100366009A patent/CN100440255C/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1703722A (en) * | 2002-10-09 | 2005-11-30 | 皇家飞利浦电子股份有限公司 | Localisation of image tampering |
EP1434165A1 (en) * | 2002-11-25 | 2004-06-30 | Eastman Kodak Company | Method and system for detecting a geometrically transformed copy of an image |
Non-Patent Citations (2)
Title |
---|
Exposing Digital Forgeries by Detecting Duplicated ImageRegions. Alin C Popescu and Hany Farid.TR2004-515, Dartmouth College, Computer Science. 2004 |
Exposing Digital Forgeries by Detecting Duplicated ImageRegions. Alin C Popescu and Hany Farid.TR2004-515, Dartmouth College, Computer Science. 2004 * |
Also Published As
Publication number | Publication date |
---|---|
CN1900970A (en) | 2007-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100440255C (en) | Image zone duplicating and altering detecting method of robust | |
Popescu et al. | Exposing digital forgeries by detecting duplicated image regions | |
Wang et al. | Detection of image region duplication forgery using model with circle block | |
Kang et al. | Robust median filtering forensics using an autoregressive model | |
CN102693522A (en) | Method for detecting region duplication and forgery of color image | |
Kumar et al. | A fast DCT based method for copy move forgery detection | |
CN104933721B (en) | Stitching image altering detecting method based on color filter array characteristic | |
Niu et al. | Robust median filtering detection based on local difference descriptor | |
Muhammad et al. | Copy-move forgery detection using dyadic wavelet transform | |
CN101493937B (en) | Method for detecting content reliability of digital picture by utilizing gradient local entropy | |
CN106060568B (en) | A kind of video tampering detection and localization method | |
CN104134204A (en) | Image definition evaluation method and image definition evaluation device based on sparse representation | |
Hou et al. | Detection of hue modification using photo response nonuniformity | |
CN103839083B (en) | The detection method that a kind of JPEG picture quantization table is distorted | |
CN108509870B (en) | A kind of Eriocheir sinensis uniqueness recognition methods based on images match | |
CN102903075A (en) | Robust watermarking method based on image feature point global correction | |
CN102521606B (en) | Method for classifying pixel blocks of JPEG images and image falsification detecting and falsified area positioning methods based on same | |
CN102521821A (en) | Automatic identification and tampered area positioning method in digital image | |
CN104408728A (en) | Method for detecting forged images based on noise estimation | |
CN109523452B (en) | Color image steganography detection method based on channel differential residual error | |
Peng et al. | Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU | |
CN109726733A (en) | A kind of video tamper detection method based on frame-to-frame correlation | |
CN111915568B (en) | Image tampering positioning model generation method, image tampering positioning method and device | |
Wang et al. | Keypoints-based image passive forensics method for copy-move attacks | |
CN101021942A (en) | Implicit writing parsing algorithm based on pivot characteristic in implicit writing analysis system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20081203 Termination date: 20100720 |