CN100440255C - Image zone duplicating and altering detecting method of robust - Google Patents

Image zone duplicating and altering detecting method of robust Download PDF

Info

Publication number
CN100440255C
CN100440255C CNB2006100366009A CN200610036600A CN100440255C CN 100440255 C CN100440255 C CN 100440255C CN B2006100366009 A CNB2006100366009 A CN B2006100366009A CN 200610036600 A CN200610036600 A CN 200610036600A CN 100440255 C CN100440255 C CN 100440255C
Authority
CN
China
Prior art keywords
image
region
transfer vector
piece
image block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2006100366009A
Other languages
Chinese (zh)
Other versions
CN1900970A (en
Inventor
骆伟祺
黄继武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Sun Yat Sen University filed Critical National Sun Yat Sen University
Priority to CNB2006100366009A priority Critical patent/CN100440255C/en
Publication of CN1900970A publication Critical patent/CN1900970A/en
Application granted granted Critical
Publication of CN100440255C publication Critical patent/CN100440255C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention provides a method of detecting copying and distorting in robust region based on image block similarity, and belongs to the field of multimedia information safety technology. The method includes the following steps: 1. extracting image block characteristic; 2. seeking similar block pairs; 3. eliminating mismatched block pairs; and 4. judging the image distorting and locating the distorted area. The present invention may be used to detect distorted image effectively and is significant in judging the truth of image data.

Description

A kind of image zone duplicating and altering detecting method of robust
Technical field
The invention belongs to the multi-media information security field, be specifically related to a kind of can be to given digital picture f, judge whether it has passed through the image zone duplicating and altering detecting method of the robust of the location that region duplication distorts and can realize distorting.
Background technology
High-resolution digital camera, popularizing and using of powerful PC and various image processing softwares makes that general user can both realize distorting of digital picture do not stayed obvious marks at an easy rate.Nowadays, soon be not real, if false photograph is abused, will bring some problems, as relate to the authenticity of legal argument, the copyright of Digital Media, individual's secret protection etc., the authenticity of inspection image data has crucial meaning.
It is that a zone in the digital picture is duplicated and pasted in the zone that will remove that region duplication is distorted, and it is a kind of simple tampering methods of effectively removing the image important information, shown in Figure of description 2.Because information such as consistent noise, texture, color are arranged in same width of cloth image, human eye is difficult to the image after distorting is distinguished.And the interpolater adds some subsequent operations toward the contact meeting in " copy-paste " back, makes the difficulty that detects increase greatly.The judgement to the view data true or false etc. of distorting that detects this form has important and practical meanings.
Summary of the invention
The invention provides a kind of image zone duplicating and altering detecting method of robust, this method can judge whether it has passed through region duplication and distorted to given digital picture f, also need orient the zone of distorting if having then, thereby confirm the true or false of its view data.
The inventive method utilized some statistical properties in the natural image as: exist the possibility of large-area similar area very little in same width of cloth natural image, " mean value " characteristic of image block is operated robustness etc. preferably to general Flame Image Process.Step of the present invention is as follows: 1) abstract image block feature; 2) similar of searching is right; The match block of 3) removal mistake is right; 4) judge tampered image and positioning tampering zone.
The concrete grammar of the feature of described step 1) abstract image piece is: at first testing image f (establish its size and be M*N) is decomposed into the piece B that b * b size has the overlapping region i, i=1... (M-b+1) (N-b+1) extracts its seven feature: c as follows for each image block 1, c 2, c 3The mean value of three Color Channels of difference document image piece red, green, blue, c 4, c 5, c 6, c 7About pressing, about, after merotypes such as oblique down 45 degree and four kinds of 45 degree obliquely decompose, first-class subregional pixel value summation accounts for the ratio of whole Y piecemeal gray-scale value summation, and utilizes proper vector V (i)=(c 1, c 2, c 3, c 4, c 5, c 6, c 7) presentation video piece B iInformation, all V (i) are stored among the array A.
Described step 2) seeking similar right method is: will be stored among the array A all proper vectors earlier by the dictionary ordering, if the proper vector of each image block relatively in twos then is image block B i, B jIn the absolute difference of corresponding 7 features less than [2.5,1.5,3.0,0.006,0.005,0.005,0.005], and the distance between corresponding blocks makes L=50 greater than L, then thinks B i, B jBe similar right, and " transfer vector " d:d=(d that record block is right as follows x, d y), d x=x 1-x 2, d y=y 1-y 2, (x wherein 1, y 1), (x 2, y 2) be the coordinate of the position, the upper left corner of two image blocks.
Described step 3) is removed the wrong right method of match block: statistic procedure 2) " transfer vector ", make the maximum conduct " main transfer vector " of the frequency of occurrences, all pieces that " transfer vector " are not equal to " main transfer vector " are to thinking that wrong match block is to being got rid of, seek out two maximum connected components remaining piece centering, and the hole region in the connected component is filled up.
Described step 4) judges that the method in tampered image and positioning tampering zone is: suppose to have obtained two region R in step 3) 1, R 2, if satisfy:
min(|R 1|,|R 2|)>αM*N*0.85%||R 1|-|R 2||/max(|R 1|,|R 2|)<Tr
Think that then image f has passed through region duplication and distorted R 1, R 2It is detected tampered region.
The inventive method can judge whether it has passed through region duplication and distorted to given digital picture f, also need orient the zone of distorting if having then, thereby confirm the true or false of its view data.Compare with more existing detection methods, the present invention can more effectively resist more, stronger aftertreatment and attack, and the realization of algorithm only needs carry out on the spatial domain of image, and efficient is also higher.
Description of drawings
Fig. 1 is four kinds of piecemeal pattern diagram on the image block Y passage;
Fig. 2 is that region duplication is distorted synoptic diagram;
Fig. 3 has unified transfer vector synoptic diagram between corresponding blocks between the tampered region;
Fig. 4 is a test legend 1;
Fig. 5 is that test legend 1 is in the detection accuracy and the error rate that add under the varying strength white noise;
Fig. 6 is detection accuracy and the error rate of test legend 1 under the compression of the different quality factor;
Fig. 7 is that the experimental result of this method and the described method of document [1] relatively (is tested example 1);
Fig. 8 be utilize this method to 100 width of cloth images carry out adding of varying strength make an uproar, JPEG compression, distort the mean value that detects accuracy and error rate under the block size in difference;
Embodiment
The invention will be further described below in conjunction with accompanying drawing.
The inventive method may further comprise the steps: 1) abstract image block feature; 2) similar of searching is right; The match block of 3) removal mistake is right; 4) judge tampered image and positioning tampering zone.
1) feature of abstract image piece
Suppose that image to be detected is f, its size is M*N.At first f is decomposed into the image block of b * b (setting b=16) size of overlapping region, establishing image block is B iI=1... (M-b+1) (N-b+1).For each image block B i, we write down the feature of its seven " mean values ".
At first utilize c 1, c 2, c 3Document image piece B iThe mean value of three Color Channels of red, green, blue.
Utilize formula then:
Y=0.299R+0.587G+0.114B
With B iBe transformed into the Y passage, and it be divided into two parts, be made as Part (1) and Part (2) by 4 kinds of resolution models shown in Figure 1.Utilize c 4, c 5, c 6, c 7Write down the ratio that Part (1) gray scale accounts for whole Y piecemeal respectively.Both:
c i=sum(part(1))/sum(part(1)+part(2))i=4,5,6,7
Thereby obtain image block B iProper vector V (i)=(c 1, c 2, c 3, c 4, c 5, c 6, c 7), all proper vectors are stored among the array A.
2) similar of searching is right
At first to array A (M-b+1) (N-b+1) individual proper vector do the dictionary ordering.Their similarity degree relatively in twos then, if the absolute value of the difference of two proper vector character pairs is less than our preset threshold:
[2.5,1.5,3.0,0.006,0.005,0.005,0.005]
And the distance of two correspondence image interblocks is greater than L (setting L=50).Then think similar right, and as follows record block to " transfer vector " d.
d=(d x,d y) d x=x 1-x 2,d y=y 1-y 2
(x wherein 1, y 1), (x 2, y 2) be the coordinate of the position, the upper left corner of two image blocks.
The match block of 3) removal mistake is right
Because the influence of the similarity of natural image close region, be not similar region D finding in 2 in steps to all coming to distort 1, D 2Shown in Fig. 2,3, from the process that region duplication is distorted, the D that all come 1, D 2Piece unified transfer vector is all arranged, and compare with other similar right transfer vector, the probability of its appearance is maximum often.In view of the above, we utilize " main transfer vector " method to remove wrong match block to also realizing the location.Its step is as follows: at first add up all transfer vectors in 2, select frequency maximum conducts " main transfer vector " to occur then, all pieces that " transfer vector " are not equal to " main transfer vector " are to thinking that wrong match block is to being got rid of.Seek out two maximum connected components remaining piece centering, and the hole region in the connected component is filled up, obtain two zone: R 1, R 2
4) judge tampered image and positioning tampering zone
Owing in general image, also can have similar zone, but its area is generally less.Through a large amount of experiment, we are provided with following rule judgment testing image and whether have passed through region duplication and distort operation.If in step 3, obtained two region R 1, R 2, and they satisfy:
min(|R 1|,|R 2|)>αM*N*0.85% ||R 1|-|R 2||/max(|R 1|,|R 2|)<Tr
Think that then image f has passed through region duplication and distorted R 1, R 2It is detected tampered region.α=61% wherein, Tr=6%.
Provide the example of some detections and the statistics of experiment below.
As shown in Figure 4, Fig. 4 (a) is original image, and Fig. 4 (b) distorts the back image.Do not passing through any post-processing operation, the detection accuracy of utilizing this patent method to obtain is 0.99123, and error rate is 0.1045.Wherein accuracy r and error rate w are defined as follows:
r = | R 1 ∩ D 1 | + | R 2 ∩ D 2 | | D 1 | + | D 2 | , w = | R 1 ∪ D 1 | + | R 2 ∪ D 2 | | D 1 | + | D 2 | - r
Fig. 5, Fig. 6 are the testing results through the JPEG post-processing operation of adding Gaussian noise, diminishing, accuracy and error rate (r that the expression of diagram below detects, w), Fig. 5 (a) expression is to distorting the testing result after the back image adds the white Gauss noise that SNR is 20db, and Fig. 5 (b), Fig. 5 (c) difference correspondence is added the testing result behind 30db and the 40db.To carry out quality factor be testing result after 40 the JPEG compression to distorting the back image for Fig. 6 (a) expression, and Fig. 6 (b), Fig. 6 (c) are corresponding respectively to be 65 with quality factor, the testing result after the 90JPEG compression.Fig. 7 is the experiment contrast that utilizes the inventive method and document [1] method.Document [1] .A.C.Popescu and H.Farid.Exposing digital forgeriesby detecting duplicated image regions.Technical Report TR2004-515, Dartmouth Col lege, Aug.2004.Can see that this method has more robustness.
In addition, the inventive method can also be resisted following attack: Gaussian Blur (n1=n2=5, variances sigma=1) and married operation (carry out Gaussian Blur earlier, add SNR 24db white Gauss noise then, be 60 JPEG compression as quality factor at last), the testing result of above example is as shown in table 1 below:
Table 1
Accuracy/error rate Gaussian Blur Married operation
Test example 1 0.9891/0.1093 0.9845/0.0984
For the validity of testing this method further and to the robustness of various subsequent operations, our picked at random 100 width of cloth images (size is 300*400) test, for each width of cloth image, we choose a square randomly and duplicate, and it is pasted in disjoint zone in the same image, and then the image after these are distorted carries out different operations: Gaussian Blur adds Gauss's white noise, diminish the JPEG compression, and their married operation.In test we to choose the square size be respectively 32*32,48*48,64*64,80*80.
Table 2 has been listed the testing result of not carrying out under the operation of back.Data can be seen from table 2, and the accuracy of all images is up to 99.9%, and error rate all is lower than 5%.
Table 2
No post-treatment operations 32×32 48×48 64×64 80×80
The accuracy average 0.9998 0.9999 0.9998 1.0000
The error rate average 0.0491 0.0254 0.0219 0.0191
False Rate 0.04 0.01 0.00 0.00
Table 3~table 6 has been listed 100 width of cloth images in different big or small tampered regions, the testing result under different post-processing operation with Fig. 8.Table 3 is Gaussian Blur testing results, and table 4 is the False Rates of adding white Gaussian noise, and table 5 is the False Rates that diminish under the JPEG compression, and table 6 is the testing results under the married operation.
Table 3
Gaussian Blur 32×32 48×48 64×64 80×80
The accuracy average 0.9464 0.9677 0.9766 0.9797
The error rate average 0.0926 0.0613 0.0439 0.0371
False Rate 0.07 0.02 0.00 0.00
Table 4
AWGN 20db 24db 28db 32db 36db 40db
32×32 0.20 0.08 0.06 0.06 0.06 0.05
48×48 0.04 0.01 0.01 0.01 0.01 0.01
64×64 0 0 0 0 0 0
80×80 0.01 0.01 0 0 0 0
Table 5
JPEG 40 50 60 70 80 90
32×32 0.18 0.13 0.12 0.12 0.13 0.12
48×48 0.03 0.03 0.01 0.01 0.01 0.01
64×64 0 0 0 0 0 0
80×80 0 0 0 0 0 0
Table 6
Married operation 32×32 48×48 64×64 80×80
The accuracy average 0.9037 0.9326 0.9521 0.9505
The error rate average 0.1295 0.0869 0.0646 0.0618
False Rate 0.13 0.02 0 0
Can see that from above-mentioned form and diagram the inventive method has quite good detecting and positioning function.Even tampered image is through different post-processing operation: as add the JPEG compression making an uproar, blur, diminish etc.Can both identify the tampered region of image well, be that a kind of region duplication of robust is distorted detection technique.

Claims (1)

1, a kind of image zone duplicating and altering detecting method of robust is characterized in that comprising following four concrete steps:
1) abstract image block feature: at first testing image f is established its size for M*N, be decomposed into the piece B that b * b size has the overlapping region i, i=1... (M-b+1) (N-b+1) extracts its seven feature: c as follows for each image block 1, c 2, c 3The mean value of three Color Channels of difference document image piece red, green, blue, c 4, c 5, c 6, c 7About document image piecemeal Y passage is pressed respectively, about, after merotypes such as oblique down 45 degree and four kinds of 45 degree obliquely decompose, first-class subregional pixel value summation accounts for the ratio of whole Y piecemeal gray-scale value summation, and with proper vector V (i)=(c 1, c 2, c 3, c 4, c 5, c 6, c 7) presentation video piece B iInformation, all V (i) are stored among the array A;
2) seek similar right: will be stored among the array A all proper vectors earlier by the dictionary ordering, if the proper vector of each image block relatively in twos then is image block B i, B jIn corresponding 7 features absolute difference less than: [2.5,1.5,3.0,0.006,0.005,0.005,0.005], and corresponding blocks to distance greater than L, when wherein L is illustrated in common image zone duplicating and altering, be replicated regional location and the minimum value and value between the corresponding blocks of position that is stuck, L gets 50, then thinks B i, B jBe similar right, and write down as follows similar to " transfer vector " d:d=(d x, d y), d x=x 1-x 2, d y=y 1-y 2, (x wherein 1, y 1), (x 2, y 2) be the coordinate of position, two the image block upper left corner;
The match block of 3) removal mistake is right: " transfer vector " statistic procedure 2), make the maximum conduct " main transfer vector " of the frequency of occurrences, all similar that " transfer vector " is not equal to " main transfer vector " to thinking that wrong piece is to being got rid of, seek out two maximum connected components remaining piece centering, and the hole region in the connected component is filled up;
4) judge tampered image and positioning tampering zone: suppose to have obtained two region R in step 3) 1, R 2, if satisfy:
min(|R 1|,|R 2|)>αM*N*0.85% ‖R 1|-|R 2‖/max(|R 1|,|R 2|)<Tr
Think that then image f has passed through region duplication and distorted R 1, R 2Be detected tampered region, parameter alpha=61% wherein, Tr=6%.
CNB2006100366009A 2006-07-20 2006-07-20 Image zone duplicating and altering detecting method of robust Expired - Fee Related CN100440255C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006100366009A CN100440255C (en) 2006-07-20 2006-07-20 Image zone duplicating and altering detecting method of robust

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100366009A CN100440255C (en) 2006-07-20 2006-07-20 Image zone duplicating and altering detecting method of robust

Publications (2)

Publication Number Publication Date
CN1900970A CN1900970A (en) 2007-01-24
CN100440255C true CN100440255C (en) 2008-12-03

Family

ID=37656850

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100366009A Expired - Fee Related CN100440255C (en) 2006-07-20 2006-07-20 Image zone duplicating and altering detecting method of robust

Country Status (1)

Country Link
CN (1) CN100440255C (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101685496B (en) * 2008-09-27 2011-10-19 中国科学院计算技术研究所 Video segment duplication detecting method
CN101504655B (en) * 2009-03-06 2011-03-23 中山大学 Color relationship characteristic based image approximate copy detection method
JP2012531130A (en) * 2009-06-26 2012-12-06 インテル・コーポレーション Video copy detection technology
CN102013101A (en) * 2010-11-27 2011-04-13 上海大学 Blind detection method of permuted and tampered images subjected to fuzzy postprocessing
CN102693522A (en) * 2012-04-28 2012-09-26 中国矿业大学 Method for detecting region duplication and forgery of color image
CN103093195B (en) * 2013-01-09 2016-01-06 天津大学 Digital picture regional cloning based on boundary energy is true and false obscures discriminating conduct
WO2014198029A1 (en) * 2013-06-13 2014-12-18 Microsoft Corporation Image completion based on patch offset statistics
EP3281183B1 (en) * 2015-04-09 2022-07-13 FiliGrade B.V. Method of verifying an authenticity of a printed item and data processing terminal
CN106295478A (en) * 2015-06-04 2017-01-04 深圳市中兴微电子技术有限公司 A kind of image characteristic extracting method and device
CN106056122B (en) * 2016-05-26 2019-05-17 中山大学 A kind of image zone duplicating stickup altering detecting method based on KAZE characteristic point
CN107292269B (en) * 2017-06-23 2020-02-28 中国科学院自动化研究所 Face image false distinguishing method based on perspective distortion characteristic, storage and processing equipment
CN108109141B (en) * 2017-12-18 2021-11-19 辽宁师范大学 Homologous local replication detection method based on superpixel multi-feature matching
CN111784708B (en) * 2020-07-03 2021-03-12 上海骏聿数码科技有限公司 Image tamper-proof inspection method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1434165A1 (en) * 2002-11-25 2004-06-30 Eastman Kodak Company Method and system for detecting a geometrically transformed copy of an image
CN1703722A (en) * 2002-10-09 2005-11-30 皇家飞利浦电子股份有限公司 Localisation of image tampering

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1703722A (en) * 2002-10-09 2005-11-30 皇家飞利浦电子股份有限公司 Localisation of image tampering
EP1434165A1 (en) * 2002-11-25 2004-06-30 Eastman Kodak Company Method and system for detecting a geometrically transformed copy of an image

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Exposing Digital Forgeries by Detecting Duplicated ImageRegions. Alin C Popescu and Hany Farid.TR2004-515, Dartmouth College, Computer Science. 2004
Exposing Digital Forgeries by Detecting Duplicated ImageRegions. Alin C Popescu and Hany Farid.TR2004-515, Dartmouth College, Computer Science. 2004 *

Also Published As

Publication number Publication date
CN1900970A (en) 2007-01-24

Similar Documents

Publication Publication Date Title
CN100440255C (en) Image zone duplicating and altering detecting method of robust
Popescu et al. Exposing digital forgeries by detecting duplicated image regions
Wang et al. Detection of image region duplication forgery using model with circle block
Kang et al. Robust median filtering forensics using an autoregressive model
CN102693522A (en) Method for detecting region duplication and forgery of color image
Kumar et al. A fast DCT based method for copy move forgery detection
CN104933721B (en) Stitching image altering detecting method based on color filter array characteristic
Niu et al. Robust median filtering detection based on local difference descriptor
Muhammad et al. Copy-move forgery detection using dyadic wavelet transform
CN101493937B (en) Method for detecting content reliability of digital picture by utilizing gradient local entropy
CN106060568B (en) A kind of video tampering detection and localization method
CN104134204A (en) Image definition evaluation method and image definition evaluation device based on sparse representation
Hou et al. Detection of hue modification using photo response nonuniformity
CN103839083B (en) The detection method that a kind of JPEG picture quantization table is distorted
CN108509870B (en) A kind of Eriocheir sinensis uniqueness recognition methods based on images match
CN102903075A (en) Robust watermarking method based on image feature point global correction
CN102521606B (en) Method for classifying pixel blocks of JPEG images and image falsification detecting and falsified area positioning methods based on same
CN102521821A (en) Automatic identification and tampered area positioning method in digital image
CN104408728A (en) Method for detecting forged images based on noise estimation
CN109523452B (en) Color image steganography detection method based on channel differential residual error
Peng et al. Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU
CN109726733A (en) A kind of video tamper detection method based on frame-to-frame correlation
CN111915568B (en) Image tampering positioning model generation method, image tampering positioning method and device
Wang et al. Keypoints-based image passive forensics method for copy-move attacks
CN101021942A (en) Implicit writing parsing algorithm based on pivot characteristic in implicit writing analysis system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081203

Termination date: 20100720