CN103561271B - The moving target of static camera shooting is removed video spatial domain altering detecting method - Google Patents
The moving target of static camera shooting is removed video spatial domain altering detecting method Download PDFInfo
- Publication number
- CN103561271B CN103561271B CN201310580713.5A CN201310580713A CN103561271B CN 103561271 B CN103561271 B CN 103561271B CN 201310580713 A CN201310580713 A CN 201310580713A CN 103561271 B CN103561271 B CN 103561271B
- Authority
- CN
- China
- Prior art keywords
- suspicious
- image
- row
- frame
- motion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Image Analysis (AREA)
- Image Processing (AREA)
Abstract
The moving target of a kind of static camera shooting is removed video spatial domain altering detecting method, belongs to electronic evidence-collecting technical field, beneficially the method and can position the tampered position on spatial domain.First, extract and distort frame sequence, then calculate suspicious motion dot image by frame difference method, extract the suspicious motion image block on spatial domain, according to energy suspicious degree exclusive PCR image block, determine object removal block, thus realize the tampering location on spatial domain.This algorithm can detect that whether moving target is removed under fixed background, improves detection efficiency effectively, and the authenticity for video differentiates to provide effective foundation.
Description
Technical field:
The present invention relates to a kind of electronic evidence-collecting technical field, the moving target being specific to static camera shooting is removed
Video spatial domain altering detecting method.
Background technology:
Along with the development of multimedia technology, the extensive utilization of Video editing software, people can utilize various video
Existing video is distorted by software for editing, and in these are distorted, some brings amusement to the life of people, but there is also very
A big part brings harm to society, makes people throw doubt upon the authenticity of digital video, therefore, and video tampering detection skill
Art has become an important subject of current information-intensive society.Current existing detection method is both for the specifically side of distorting
Formula is authenticated, and scratches the means of distorting removed herein for moving target and proposes a kind of effective video altering detecting method.
Digital multimedia forensic technologies is mainly the analysis that digital medium information carries out authenticity, primitiveness, at present,
Research to this technology focuses more on digital picture aspect, and the passive forensic technologies of digital video is because of himself technical system
Complexity development lag far behind the passive forensic technologies of digital picture, both at home and abroad digital video is distorted the method detected also
Seldom.The research of digital video tampering detection mainly divides two classes, a class to be active certifications, as Shenzhen Research Institute of Sun Yat-Sen University invents
One based on compression sensing semi-fragile watermarking video tampering detection patent, active certification technology is to regard in protected numeral
Embed watermark or digital signature etc. in Pin and be difficult to the signal specific of perception, distort operation and can destroy these signals, believed by detection
Number integrality, signal destroy position and destructiveness judge whether video is tampered, the position distorted and distort type.
But active certification exists limitation, many imaging devices do not have the function embedding the signals such as watermark, and the signal embedded is difficult to
Guarantee not to be easily removed or again embed.And another kind of video tampering detection technology be not embedded at video specific
Detect on the premise of signal whether video passes through the passive authentication techniques distorted, according to distorting the coding characteristic of before and after's video, system
The change of meter feature and some other characteristic value judges that whether video is distorted, and has important using value.
It is that video distorts common form that moving target removes from video.At present, video tamper detection method mainly has
The most several: sequence of frames of video feature detection based on the operation of MPEG dual compression, special by extracting the residual of fixed type frame
Levy and judge whether video is tampered, but the method is just for mpeg format video, detect the insertion of whole frame, deletion or whole frame and replicate viscous
The situation of patch, is not suitable for frame internal object and deletes detection;Zhang Jing, Song Yi of University Of Tianjin et al. propose to use Space-time domain Block-matching
Method detection remove object, need image block is carried out Secondary Match search location, the most time-consuming, and quantify to make an uproar
Sound can affect matching detection accuracy, easily produces flase drop district;Zhang Mingyu proposes to use the method for accumulative difference image to judge fortune
Whether moving-target is removed, but the method cannot position the tampered position in time domain, and is easily subject to strong marginal information point and the back of the body
The interference at sight spot.
Summary of the invention:
In order to overcome the deficiency of the existing video tamper detection method being removed for moving target, the present invention proposes one
Planting towards the video spatial domain altering detecting method that the moving target captured by static camera removes from background, utilization energy can
Doubtful degree measures the energy variation degree of each frame of video, and improves traditional moving target and add up difference image tracing, introduces
Suspicious motion dot image detects the suspicious motion region on spatial domain, determines that moving target is removed finally according to the suspicious degree of energy
Region.The method is applicable to arbitrary format video, can not only position the tampered position on spatial domain, and detection effect is greatly improved
Rate and accuracy rate, get rid of the strong marginal information interference problem being frequently encountered by conventional detection method.
Frame repair process would generally make the gray value of restoring area embody a moving region over time and space, we
Frame difference method can be used to come the region that pursuit movement target is removed on spatial domain.Known pursuit movement mesh calibration method is to make
With accumulative difference method, the change of pixel same in several two field pictures is added up, but this method is often highly susceptible to edge
The interference of the pixel that information is stronger.Therefore the method is improved by the present invention, find by calculate accumulative difference image and
The differential chart of accumulative edge image, obtains suspicious motion dot image, it is possible to get rid of the interference of marginal information point.
As follows for realizing the concrete technical scheme of purpose of the present invention employing:
The first step, extracts kth frame and distorts sequence to h frame, be labeled as f1,f2,...,fh-k+1.With f1Frame is reference frame, meter
Calculate accumulative difference image ADh-k+1With accumulative edge image AEh-k+1.Calculate suspicious motion dot image AC againh-k+1。
Second step, from suspicious motion dot image ACh-k+1Middle extraction suspect image block.
3rd step, calculates from f1Frame is to fh-k+1The gross energy suspicious degree average of the whole frame of frame image sequence
4th step, calculate spatial filter second step record from f1Frame is to fh-k+1The energy of frame each suspect image block can
Doubt degree averageWhenIt is less thanTime, it is determined that this image block is that the object removal on spatial domain distorts district, thus gets rid of other
Interference image block.
In the described spatial filter first step, accumulative difference image, accumulative edge image, suspicious motion dot image are specifically counted
Calculate as follows:
Assume there is n frame image sequence f1(x,y),f2(x,y),f3(x,y),....,fn(x y), generally makes f1(x, y) for ginseng
Examine frame, the initial value AD of accumulative difference image1Initial value AE with accumulative edge image1It is 0, then the accumulative difference diagram of kth frame
As ADkIt is calculated as follows:
Wherein, 1 < k≤n.Each two field picture of image sequence is compared with reference frame image or its previous frame image
Relatively, when the difference of same pixel is more than a certain threshold value, the corresponding point on accumulative difference image of this pixel just adds 1.
The accumulative edge image AE of kth framekIt is calculated as follows:
Wherein, 1 < k≤n.Each two field picture of image sequence is done rim detection, if a certain pixel is image
Marginal information, then the corresponding point on accumulative edge image of this pixel just adds 1.
Suspicious motion dot image ACnIt is calculated as follows:
To a certain pixel, (x, y), when this gray value has generation large change and be not marginal information point in time domain
Time, then it is assumed that this point may be tampered, and is called suspicious motion point.
In described spatial filter second step, from suspicious motion dot image ACh-k+1The concrete inspection of middle extraction suspect image block
Survey step is as follows:
1. statistics suspicious motion dot image ACh-k+1In laterally suspicious motion count HOR.
2. statistics suspicious motion dot image ACh-k+1Middle longitudinal suspicious motion is counted VER.
3. according to from suspicious motion dot image ACh-k+1The horizontal suspicious motion of middle statistics is counted HOR, when t row is to r row
In the suspicious motion of the every a line HOR (i) that counts be all higher than a certain threshold value, illustrate that t row is to the interval suspicious fortune of this line of r row
Dynamic counting more, be stored in array x1 by t and r, it is interval that t row to r row is referred to as a pair suspicious row.One width suspicious motion point diagram
Interval as there may be multipair suspicious row, all start-stop positions, suspicious row interval meeting condition are all stored in array x1.
According to from suspicious motion dot image ACh-k+1Longitudinal suspicious motion of middle statistics is counted VER, in t arranges r row
The suspicious motion of each row VER (j) that counts is all higher than a certain threshold value, illustrates that t arranges r and arranges the suspicious motion that these row are interval
Counting more, be stored in array x2 by t and r, t arranges r row and is referred to as a pair suspicious row interval.One width suspicious motion dot image
There may be multipair suspicious row interval, all interval start-stop positions of suspicious row meeting condition are all stored in array x2.
4. extract every pair of suspicious row interval and the image block of every pair of suspicious row interval composition in array x2 in array x1, it is assumed that
S block altogether.Add up the suspicious motion in each image block to count Ci=count (ACh-k+1(i)=0), wherein 1≤i≤s.Work as CiGreatly
When a certain threshold value, then this image block i is likely removed region for moving target, and marking this image block is suspect image block.
In described spatial filter the 3rd step and the 4th step, energy suspicious degree NT is specifically calculated as follows:
The lowest high-frequency energy computing formula than B and frequency domain entropy H is as follows:
Block size is that m*n, r represent that image concentrates on the minority low frequency coefficient number in the upper left corner after dct transform.Will
Two-dimensional array after dct transform from the upper left corner carry out Z-type scanning dimensionality reduction so as to get one-dimension array coefficient by decreasing energy
Mode sort, βiRepresent i-th DCT coefficient after sequence.
Accompanying drawing explanation
For the clearer explanation embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly introduced.
Fig. 1 is the spatial filter flow chart of this method
Fig. 2 is experimental series Detection results figure
Detailed description of the invention
Concrete steps and embodiment below in conjunction with the accompanying drawing in the embodiment of the present invention, in detail the narration present invention.
In Fig. 1, it is assumed that tampered image sequence detected in time domain, the kth frame extracting tim e-domain detection distorts sequence to h frame
Row, are labeled as f1,f2,....,fh-k+1.With f1Frame is reference frame, calculates accumulative difference image ADh-k+1With accumulative edge image
AEh-k+1, then calculate suspicious motion dot image ACh-k+1.Then from image ACh-k+1Middle extraction suspect image block.And then calculate
From f1Frame is to fh-k+1The energy suspicious degree average of frame image sequenceBy comparing the energy of suspect image block suspicious degree averageWithJudge tampered image block, the target delete position being on spatial domain.
In fig. 2, the most tampered under being static background for (a)-(c) video segment;D () is for delete sport foreground
After video segment;E suspicious motion dot image that () obtains for using inventive algorithm;F () is for using inventive algorithm detection
To spatial domain on moving target delete position.
Embodiment 1
The video tamper detection method pair that this exemplary application judges based on the suspicious degree of energy and suspicious motion dot image calculates
The authenticity of suspicious video sequence is collected evidence, and Fig. 1 gives spatial filter flow chart of the present invention, is situated between referring now to Fig. 1
Continue specific operation process:
The first step, the 445th frame extracting tim e-domain detection is distorted sequence to the 538th frame, is labeled as f1,f2,....,f94.With f1
Frame is reference frame, calculates accumulative difference image AD94With accumulative edge image AE94.Calculate suspicious motion dot image AC again94。
Second step, adds up suspicious motion dot image AC94In laterally suspicious motion counts HOR and longitudinal suspicious motion is counted
VER。
3rd step, according to from AC94The horizontal suspicious motion of middle statistics is counted HOR, extracts suspicious motion and counts more row
Interval is stored in array x1, x1={44, and 191,380,467};According to from AC94Longitudinal suspicious motion of middle statistics is counted VER, carries
Take the row interval that suspicious motion counts more to be stored in array x2, x2={1,640}.
4th step, the interval image block that each row interval forms with array x2 of each row in extraction array x1, totally 2 pieces.
The position of image block 1 is: row 44-191, arranges 1-640;The position of image block 2 is: row 380-467, arranges 1-640.Add up each figure
As the suspicious motion in block is counted Ci=count (ACh-k+1(i)=0), wherein 1≤i≤2.Due to C1And C2It is all higher than arranging threshold
Value, so image block 1 and image block 2 are likely removed region for moving target, mark image block 1 and image block 2 are suspicious
Image block.
5th step, calculates from f1Frame is to f94The gross energy suspicious degree average of the whole frame of frame image sequence
6th step, calculates each suspect image block from f1Frame is to f94The energy suspicious degree average of frameDue to suspect image
The energy suspicious degree average of block 2Less than gross energy suspicious degree averageIt is determined that suspect image block 2 is the mesh on spatial domain
Mark removes distorts district, thus gets rid of the interference of suspect image block 1.
In fig. 2, (e) is the suspicious motion dot image using inventive algorithm to obtain, and (f) obtains for using inventive algorithm
To tested video in moving target delete position testing result figure.Experiment uses roberts operator extraction to detection video
Marginal information.According to the suspicious motion dot image obtained, count by adding up the suspicious motion on horizontal and vertical, extract suspicious
The suspect image block that motion is counted more, relatively the energy suspicious degree average of each image block, determines object removal image block, gets rid of
Interference image block, result such as table 1
Table 1 spatial filter table
Shown in.
Claims (4)
1. the moving target of static camera shooting is removed a video spatial domain altering detecting method, the concrete technical side of employing
Case is as follows:
The first step, the kth frame extracting tim e-domain detection is distorted sequence to h frame, is labeled as f1,f2,...,fh-k+1, with f1Frame is ginseng
Examine frame, calculate accumulative difference image ADh-k+1With accumulative edge image AEh-k+1, then calculate suspicious motion dot image ACh-k+1;
Second step, from suspicious motion dot image ACh-k+1Middle extraction suspect image block;
3rd step, calculates from f1Frame is to fh-k+1The gross energy suspicious degree average of the whole frame of frame image sequence,
4th step, calculate spatial filter second step record from f1Frame is to fh-k+1The suspicious degree of energy of frame each suspect image block
AverageWhenIt is less thanTime, it is determined that this image block is that the object removal on spatial domain distorts district, thus gets rid of other interference
Image block.
The moving target of a kind of static camera the most according to claim 1 shooting is removed video spatial domain tampering detection side
Method, it is characterised in that in the described spatial filter first step, accumulative difference image, accumulative edge image, suspicious motion dot image
Specifically it is calculated as follows:
Assume there is n frame image sequence f1(x,y),f2(x,y),f3(x,y),...,fn(x y), generally makes f1(x, y) is reference frame,
The initial value AD of accumulative difference image1Initial value AE with accumulative edge image1It is 0, then the accumulative difference image AD of kth framek
It is calculated as follows:
Wherein, 1 < k≤n;
Each two field picture of image sequence is compared with reference frame image or its previous frame image, when same pixel
When difference is more than a certain threshold value, the corresponding point on accumulative difference image of this pixel just adds 1;
The accumulative edge image AE of kth framekIt is calculated as follows:
Wherein, 1 < k≤n;
Each two field picture of image sequence is done rim detection, and edge detection operator uses roberts operator, if a certain pixel
Point is the marginal information of image, then the corresponding point on accumulative edge image of this pixel just adds 1, suspicious motion dot image ACn
It is calculated as follows:
To a certain pixel, (x, y), when this point adds up difference gray value ADn(x is not y) 0 and when not being marginal information point, then recognizes
May be tampered for this point, be called suspicious motion point.
The moving target of a kind of static camera the most according to claim 1 shooting is removed video spatial domain tampering detection side
Method, it is characterised in that in described spatial filter second step, from suspicious motion dot image ACh-k+1The tool of middle extraction suspect image block
Body detecting step is as follows:
(1). statistics suspicious motion dot image ACh-k+1In laterally count HOR, HOR (i) of suspicious motion represent the suspicious fortune of the i-th row
Move and count;
(2). statistics suspicious motion dot image ACh-k+1Middle longitudinal suspicious motion count VER, VER (j) represent jth row suspicious fortune
Move and count;
(3). according to from suspicious motion dot image ACh-k+1The horizontal suspicious motion of middle statistics is counted HOR, when in t row to r row
The suspicious motion of the every a line HOR (i) that counts is all higher than a certain threshold value, illustrates that t row is to the interval suspicious motion of this line of r row
Counting more, be stored in array x1 by t and r, it is interval that t row to r row is referred to as a pair suspicious row, a width suspicious motion dot image
There may be multipair suspicious row interval, all start-stop positions, suspicious row interval meeting condition are all stored in array x1;
According to from suspicious motion dot image ACh-k+1Longitudinal suspicious motion of middle statistics is counted VER, each in t arranges r row
The suspicious motion VER (j) that counts of row is all higher than a certain threshold value, illustrates that t arranges the suspicious motion that r arranges these row interval and counts
More, t and r is stored in array x2, t arranges r row and is referred to as a pair suspicious row interval;One width suspicious motion dot image may
There is multipair suspicious row interval, all interval start-stop positions of suspicious row meeting condition are all stored in array x2;
(4). extract every pair of suspicious row interval and the image block of every pair of suspicious row interval composition in array x2 in array x1, it is assumed that be total to
S block, adds up the suspicious motion in each image block and counts Ci=count (ACh-k+1(i)=0), wherein 1≤i≤s, works as CiIt is more than
During a certain threshold value, then this image block i is likely removed region for moving target, and marking this image block is suspect image block.
The moving target of a kind of static camera the most according to claim 1 shooting is removed video spatial domain tampering detection side
Method, it is characterised in that in described spatial filter the 3rd step and the 4th step, energy suspicious degree NT is specifically calculated as follows:
The lowest high-frequency energy computing formula than B and frequency domain entropy H is as follows:
Block size is that m*n, r represent that image concentrates on the minority low frequency coefficient number in the upper left corner after dct transform, is become by DCT
Two-dimensional array after changing from the upper left corner carry out Z-type scanning dimensionality reduction so as to get one-dimension array coefficient by the side of decreasing energy
Formula sorts, βiRepresent i-th DCT coefficient after sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310580713.5A CN103561271B (en) | 2013-11-19 | 2013-11-19 | The moving target of static camera shooting is removed video spatial domain altering detecting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310580713.5A CN103561271B (en) | 2013-11-19 | 2013-11-19 | The moving target of static camera shooting is removed video spatial domain altering detecting method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103561271A CN103561271A (en) | 2014-02-05 |
CN103561271B true CN103561271B (en) | 2016-08-17 |
Family
ID=50015408
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310580713.5A Active CN103561271B (en) | 2013-11-19 | 2013-11-19 | The moving target of static camera shooting is removed video spatial domain altering detecting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103561271B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905816B (en) * | 2014-03-31 | 2016-10-05 | 华南理工大学 | A kind of monitor video based on ENF correlation coefficient distorts blind checking method |
CN104270644A (en) * | 2014-09-28 | 2015-01-07 | 上海交通大学 | Video inter-frame tampering detecting method based on velocity field coincidence |
CN105141969B (en) * | 2015-09-21 | 2017-12-26 | 电子科技大学 | A kind of video interframe distorts passive authentication method |
US10616502B2 (en) | 2015-09-21 | 2020-04-07 | Qualcomm Incorporated | Camera preview |
US10586238B2 (en) * | 2016-06-22 | 2020-03-10 | Microsoft Technology Licensing, Llc | Automation of image validation |
CN106375756B (en) * | 2016-09-28 | 2017-12-19 | 宁波大学 | It is a kind of to remove the detection method distorted for the single object of monitor video |
CN109660814B (en) * | 2019-01-07 | 2021-04-27 | 福州大学 | Method for detecting deletion tampering of video foreground |
CN110084781B (en) * | 2019-03-22 | 2021-11-09 | 西安电子科技大学 | Passive evidence obtaining method and system for monitoring video tampering detection based on feature points |
CN110378934B (en) * | 2019-07-22 | 2021-09-07 | Oppo广东移动通信有限公司 | Subject detection method, apparatus, electronic device, and computer-readable storage medium |
CN113596317B (en) * | 2020-04-30 | 2022-12-09 | 深圳金澜汉源科技有限公司 | Live-action shot image security method, terminal and system |
CN112686331B (en) * | 2021-01-11 | 2022-09-09 | 中国科学技术大学 | Forged image recognition model training method and forged image recognition method |
CN113822866A (en) * | 2021-09-23 | 2021-12-21 | 深圳爱莫科技有限公司 | Widely-adaptive axle number identification method, system, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101610411A (en) * | 2009-07-16 | 2009-12-23 | 中国科学技术大学 | A kind of method and system of video sequence mixed encoding and decoding |
CN101635833A (en) * | 2008-07-22 | 2010-01-27 | 深圳市朗驰欣创科技有限公司 | Method, device and system for video monitoring |
CN101854467A (en) * | 2010-05-24 | 2010-10-06 | 北京航空航天大学 | Method for adaptively detecting and eliminating shadow in video segmentation |
US8146157B2 (en) * | 2005-12-19 | 2012-03-27 | Rockstar Bidco, LP | Method and apparatus for secure transport and storage of surveillance video |
-
2013
- 2013-11-19 CN CN201310580713.5A patent/CN103561271B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8146157B2 (en) * | 2005-12-19 | 2012-03-27 | Rockstar Bidco, LP | Method and apparatus for secure transport and storage of surveillance video |
CN101635833A (en) * | 2008-07-22 | 2010-01-27 | 深圳市朗驰欣创科技有限公司 | Method, device and system for video monitoring |
CN101610411A (en) * | 2009-07-16 | 2009-12-23 | 中国科学技术大学 | A kind of method and system of video sequence mixed encoding and decoding |
CN101854467A (en) * | 2010-05-24 | 2010-10-06 | 北京航空航天大学 | Method for adaptively detecting and eliminating shadow in video segmentation |
Non-Patent Citations (3)
Title |
---|
Video Forgery Detection Using Correlation of Noise;Chih-Chung Hsu;《Multimedia Signal Processing,2008 IEEE 10th Workshop on》;20081010;第170-174页 * |
基于加权累积差分的运动目标检测与跟踪;左风艳;《计算机工程》;20100118;第35卷(第22期);第159-161页 * |
基于滤波检测的视频区域篡改检测算法;张静;《电子测量技术》;20120427;第34卷(第11期);第66-69页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103561271A (en) | 2014-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103561271B (en) | The moving target of static camera shooting is removed video spatial domain altering detecting method | |
Wei et al. | Video tamper detection based on multi-scale mutual information | |
Wu et al. | Exposing video inter-frame forgery based on velocity field consistency | |
Kang et al. | Copy-move forgery detection in digital image | |
Zhang et al. | Exposing digital video forgery by ghost shadow artifact | |
CN102226920B (en) | Cutting-resistant JPEG image compression history and synthetic tamper detection method | |
Muhammad et al. | Blind copy move image forgery detection using dyadic undecimated wavelet transform | |
CN103945228B (en) | Video frame in copy move altering detecting methods based on space-time relationship | |
CN104636764B (en) | A kind of image latent writing analysis method and its device | |
CN102693522A (en) | Method for detecting region duplication and forgery of color image | |
CN103561274B (en) | Video time domain tamper detection method for removing moving object shot by static camera lens | |
CN106157232A (en) | A kind of general steganalysis method of digital picture characteristic perception | |
CN102957915A (en) | Double JPEG (Joint Photographic Experts Group) compressed image-targeted tempertamper detection and tempertamper locating method | |
CN102968803A (en) | Tamper detection and tamper positioning method directing at CFA (Color Filter Array) interpolation image | |
Wandji et al. | Detection of copy-move forgery in digital images based on DCT | |
CN103905816A (en) | Surveillance video tampering blind detection method based on ENF correlation coefficients | |
CN105120294A (en) | JPEG format image source identification method | |
CN101706944A (en) | Quantization table evaluation based method for detecting JPEG image tampering | |
CN102034243B (en) | Method and device for acquiring crowd density map from video image | |
Conotter et al. | Detecting photographic and computer generated composites | |
CN104270644A (en) | Video inter-frame tampering detecting method based on velocity field coincidence | |
CN102592151B (en) | Blind detection method for median filter in digital image | |
CN103679116B (en) | The method and device of detection scene internal object quantity | |
Cozzolino et al. | A comparative analysis of forgery detection algorithms | |
Zhang et al. | Exposing digital image forgeries by using canonical correlation analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230803 Address after: Room B316-1, 3rd Floor, Building 10, Phase 1, Innovation Park, No. 3 Keji East Road, High tech Zone, Fuzhou City, Fujian Province, 350100 Patentee after: Fujian Leji Technology Co.,Ltd. Address before: 350108 science and Technology Department, Fujian Normal University, Minhou, Fuzhou, Fujian Patentee before: Fujian Normal University |
|
TR01 | Transfer of patent right |