CN109919927B - Multi-object tampering detection method based on rapid quaternion polar harmonic transformation - Google Patents

Multi-object tampering detection method based on rapid quaternion polar harmonic transformation Download PDF

Info

Publication number
CN109919927B
CN109919927B CN201910166026.6A CN201910166026A CN109919927B CN 109919927 B CN109919927 B CN 109919927B CN 201910166026 A CN201910166026 A CN 201910166026A CN 109919927 B CN109919927 B CN 109919927B
Authority
CN
China
Prior art keywords
quaternion
image
polar
fast
point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910166026.6A
Other languages
Chinese (zh)
Other versions
CN109919927A (en
Inventor
牛盼盼
王超
杨红颖
王向阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liaoning Normal University
Original Assignee
Liaoning Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liaoning Normal University filed Critical Liaoning Normal University
Priority to CN201910166026.6A priority Critical patent/CN109919927B/en
Publication of CN109919927A publication Critical patent/CN109919927A/en
Application granted granted Critical
Publication of CN109919927B publication Critical patent/CN109919927B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Image Analysis (AREA)

Abstract

The invention belongs to the technical field of digital image authentication, and particularly relates to a multi-object tampering detection method based on fast quaternion polar harmonic transformation. The invention provides a multi-object tampering detection method based on fast quaternion polar harmonic transformation, which comprises the steps of firstly obtaining a functional relation between an entropy rate and a gFAST characteristic point extraction threshold value through learning, determining an adaptive threshold value by using the function and extracting a gFAST characteristic point; then, constructing local features of the image through an FQPCET algorithm; then, obtaining a matching result by using a kNN-based feature matching algorithm; and finally, performing k-means clustering on the offset of the matching result, and performing RANSAC, ZNCC and morphological processing on various types to obtain a final positioning result. The experimental result shows that the method not only can effectively detect the multi-copy-paste tampering, but also has good robustness to conventional signal attack and geometric attack, and the time cost of the algorithm is very low.

Description

Multi-object tampering detection method based on rapid quaternion polar harmonic transformation
Technical Field
The invention belongs to the technical field of digital image authentication, and particularly relates to a multi-object tampering detection method based on fast quaternion polar harmonic transformation.
Background
Digital images are important sources of information and play an indispensable role in the fields of mass media, litigation testimony, academic research and the like. But some behaviors that maliciously tamper with the image semantics cause the reliability of the digital image to be reduced; among them, copy-paste tampering (CMF) is a more common form. CMF copies one or more regions in an image into the same image for the purpose of hiding, duplicating, or moving semantic components in the image. With the development and popularity of image processing software (e.g., PS, etc.), such tampering is also easy to implement for those without technical background. However, since the source and target regions are both from the same image, the various statistical features are similar, and the tampered image may be subject to both conventional signature and geometric attacks, making detection of CMFs relatively difficult.
In recent years, many researchers have invested time and resources in the detection and localization algorithms of CMFs. The proposed method is mostly based on the following three steps: feature extraction: calculating the proper characteristics of each pixel point or specific partial key points to represent the field of the pixel points; matching: measuring the similarity degree of any two characteristics by using a certain distance evaluation index, and classifying the characteristics which are close to each other into one class; and (3) post-treatment: and accurately positioning the actual boundary of the CMF by using the matching result obtained in the last step. The detection techniques of CMF can be divided into two categories according to whether the local features of the image are extracted from each pixel or only from some selected key points: block-based methods and feature point-based methods.
The block-based method divides the image to be detected into several regular blocks, which are then used to construct feature vectors. Although this type of method can detect tampering, especially small and smooth areas, with high accuracy without attack, the time complexity of this type of method is large and it cannot effectively resist large-scale geometric attacks. Feature point-based methods detect some specific keypoints from the image and then use the neighborhood of these keypoints to construct a feature vector. Since the number of feature points is often much smaller than the total number of pixels of an image, this type of method has certain advantages in terms of time and space complexity. However, the method based on feature points sometimes cannot accurately locate the tampered area, and is mainly limited by the following three aspects: firstly, most of feature point extraction algorithms cannot extract uniform key points in a small region or a smooth region; second, feature point features do not perform well in terms of robustness and distinctiveness; third, most post-processing algorithms can only estimate a single model from a set of matching points, and therefore cannot effectively detect multiple copy-paste tampering.
Disclosure of Invention
The invention provides a multi-object tampering detection method based on fast quaternion polar harmonic transformation, aiming at solving the technical problems existing in the existing copying and pasting tampering detection technology.
In order to solve the technical problems, the invention adopts the following technical scheme:
a, step a: acquiring an image I to be detected, and setting thresholds C =0.1, delta =0.01, N =5 and M =4N; wherein C is an ideal feature point density threshold; Δ is a maximum deviation threshold; n represents the neighborhood diameter of the feature point; m represents the fast quaternion polar harmonic transform FQPCET upsampling parameters;
step b: training to obtain image set (TP) i An entropy-threshold fitting function T = f (E);
wherein, the step b specifically comprises the following steps:
step b.1: executing SLIC algorithm on any image in FAU library to obtain training image set { TP } i };
Step b.2: calculating TP i Entropy E of i Obtaining an entropy description vector E = { E = } i };
Step b.3: extraction of TP i The characteristic points of (1); calculating a point-extracting threshold parameter T when the density X of the characteristic points belongs to (C-delta, C + delta) by using a dichotomy i Obtaining a threshold description vector T = { T = { (T) } i };
Step b.4: performing function fitting by using E and T to obtain an entropy-threshold fitting function T = f (E);
step c: self-adaptive gFAST feature point detection;
wherein, the step c specifically comprises the following steps:
step c.1: executing SLIC block partitioning algorithm on an image I to be detected to obtain a non-overlapping image block set B = { B = i };
Step c.2: using 8 pre-defined filtering templates for an image I to be detected
Figure BDA0001986279530000031
Filtering to obtain 8 filtered images
Figure BDA0001986279530000032
Step c.3: whether any pixel (x, y) in the image I to be detected meets (x, y) epsilon B or not is examined i (ii) a Wherein, (x, y) refers to cartesian coordinates of the pixel points; if so, calculate B i Global entropy E of i And then obtaining a lifting point threshold value T i =f(E i );
Step c.4: survey vector
Figure BDA0001986279530000033
If the investigation vector contains 5 continuous elements which are connected end to end and are all larger than T i Then (x, y) is marked as gFAST feature point; and traversing all pixels to obtain a preliminary gFAST feature point set X' = { X i =(x,y) i };
Step c.5: executing an NMS algorithm on the X' to obtain a gFAST key point set X;
step d: extracting FQPCET characteristics;
wherein, the step d specifically comprises:
step d.1: determining any element X in a set X i Circular neighborhood O of i
Step d.2: from O i Obtaining the red, green and blue color channel components f R [i,j]、f G [i,j]And f B [i,j]Wherein, (i, j) refers to pixel point location;
and performing upsampling to obtain f [ u, v ], (u, v) representing the position of the upsampled pixel; :
Figure BDA0001986279530000034
step d.3: by calculating f [ u, v ]]Fast two-dimensional Fourier transform to obtain polar harmonic transform PCET coefficient matrix M nl
Figure BDA0001986279530000041
Wherein the content of the first and second substances,
Figure BDA0001986279530000042
representing a fast two-dimensional fourier transform;
step d.4: will f is mixed R [i,j]、f G [i,j]And f B [i,j]Calculating the obtained polar harmonic transformation PCET coefficient matrix
Figure BDA0001986279530000043
Polar harmonic transformation PCET coefficient matrix
Figure BDA0001986279530000044
Sum-polar harmonic transformation PCET coefficient matrix
Figure BDA0001986279530000045
Substituting the formula to obtain a quaternion polar harmonic transformation QPCET coefficient matrix
Figure BDA0001986279530000046
Figure BDA0001986279530000047
Figure BDA0001986279530000048
Step d.5: QPCET coefficient matrix for quaternion polar harmonic transformation
Figure BDA0001986279530000049
And (3) selecting characteristics to form a characteristic vector f:
Figure BDA00019862795300000410
step d.6: traversing the feature point set X and aiming at any feature point X i Step d.1-step d.5 are performed, get the characteristic direction set of quantities F = { F i Get the coordinate-feature set S = { S = } i ={x i ,f i }};
Step e: performing kNN-based feature matching on the coordinate-feature set S to obtain a matching point set P = { (S, S') i };
Step f: clustering post-processing based on k-means;
wherein, the step f specifically comprises:
step f.1: for matching point set P = { (s, s') i Performing offset vector calculation to obtain an offset vector set Dt:
Dt={(Δx,Δy) i }={(x-x′) i };
step f.2: calculating the length and direction of any offset vector in Dt to obtain a length set Le and a direction set Or:
Figure BDA00019862795300000411
step f.3: carrying out histogram statistics on Le and Or to obtain an offset vector set Dt' after primary screening;
step f.4: performing k-means clustering on Dt' to obtain k classes { C 1 ,C 2 ,…,C k };
Step f.5: traversing all the clustering results, and clustering C to any one of the clustering results i RANSAC, ZNCC and morphological processing operations are sequentially executed, and the union of the obtained results is used as a final detection result.
The invention provides a multi-object tampering detection method based on fast quaternion polar harmonic transformation, which comprises the steps of firstly obtaining a functional relation between an entropy rate and a gFAST characteristic point extraction threshold value through learning, determining an adaptive threshold value by using the function and extracting a gFAST characteristic point; then, constructing local features of the image through an FQPCET algorithm; then, obtaining a matching result by using a characteristic matching algorithm based on kNN; and finally, performing k-means clustering on the offset of the matching result, and performing RANSAC, ZNCC and morphological processing on various types to obtain a final positioning result. The experimental result shows that the method not only can effectively detect the multi-copy-paste tampering, but also has good robustness to conventional signal attack and geometric attack, and the time cost of the algorithm is very low.
Compared with the prior art, the invention has the following beneficial effects:
firstly, an entropy-threshold function fitting algorithm is provided and adopted, the method can self-adaptively determine a point-extracting threshold value, and ensure that the global density of the feature points is uniform, so that the tampering of a small area or a smooth area can be effectively detected;
secondly, a new key point detection method gFAST is provided and adopted, the method is robust to various geometric attacks, the time complexity is small, and the algorithm speed and the geometric attack robustness are improved;
thirdly, a new moment calculation method FQPCET is provided and adopted, and compared with the original calculation method, the method has obvious advantages in the aspects of calculation speed, numerical stability and calculation precision, can effectively reflect the color information of the image and the correlation among color channels, and improves the detection precision and the algorithm speed of the method.
Drawings
Fig. 1 is a schematic flowchart of a multi-object tampering detection method based on fast quaternion polar harmonic transformation according to the present invention;
FIGS. 2 (a) -2 (c) are exemplary images used by the detection method of the present invention; wherein, fig. 2 (a) is an original image; FIG. 2 (b) is a tampered image; FIG. 2 (c) is a tampered area;
FIGS. 3 (a) -3 (l) are schematic diagrams illustrating the effect of the detection process of the present invention; wherein, fig. 3 (a) is an example of performing a SLIC blocking algorithm; fig. 3 (b) is an example of extracted adaptive gFAST feature points; FIG. 3 (c) is a characteristic representation; fig. 3 (d) and fig. 3 (e) are schematic diagrams of the matching pair and the correct matching pair, respectively; fig. 3 (f) and 3 (g) are schematic diagrams of offset vector cluster 1 and offset vector cluster 2, respectively; fig. 3 (h), fig. 3 (i), fig. 3 (j), and fig. 3 (k) are schematic diagrams of a cluster positioning result 1, a cluster positioning result 2, a cluster positioning result 3, and an overlay result, respectively; FIG. 3 (l) shows the result of marking the resulting tampered area;
fig. 4 (a) -4 (d) are diagrams of examples of locating tampered areas in the FAU image library; fig. 4 (a) is a diagram of a tampered region locating sample of a fisherman image in the FAU image library; fig. 4 (b) is a diagram of a tampered region location sample of a motorcycle image in the FAU image library; FIG. 4 (c) is a sample graph of tampered areas of a fricks image in the FAU image library; FIG. 4 (d) is a diagram of a tampered region locating sample of mask images in the FAU image library;
5 (a) -5 (d) are diagrams of examples of locating tampered areas in the GRIP image library; fig. 5 (a) is a diagram of a tampered region positioning sample of TP _ C01_002 in the GRIP image library; FIG. 5 (b) is a diagram of a positioning sample of tampered region of TP _ C01_011 in GRIP image library; FIG. 5 (C) is a diagram of a tampered region location sample of TP _ C02_001 in GRIP image library; fig. 5 (d) is a diagram of a tampered region location sample of TP _ C02_047 in the GRIP image library;
6 (a) -6 (d) a graph of the comparison result of the robustness of the embodiment of the invention and the comparison method in the FAU image library;
7 (a) -7 (d) graphs comparing robustness of the embodiment of the present invention and the comparison method in the GRIP image library.
Detailed Description
The invention provides a multi-object tampering detection method based on fast quaternion polar harmonic transformation, aiming at solving the technical problems existing in the existing copying and pasting tampering detection technology.
The multi-object tampering detection method based on the rapid quaternion polar harmonic transformation comprises the following steps: as shown in fig. 1, step a: acquiring an image I to be detected, and setting thresholds C =0.1, delta =0.01, N =5 and M =4N; wherein C is an ideal characteristic point density threshold; Δ is a maximum deviation threshold; n represents the neighborhood diameter of the feature point; m represents the fast quaternion polar harmonic transform FQPCET upsampling parameters;
specifically, the experimental images provided in fig. 2 (a) -2 (c) are used as examples for explanation; fig. 2 (a) shows an original image, fig. 2 (b) shows a tampered image, and fig. 2 (c) shows a tampered area.
On the basis of the completion of step a, continuing to implement step b: training to obtain image set (TP) i An entropy-threshold fitting function T = f (E);
wherein, step b specifically includes:
step b.1: executing SLIC algorithm on any image in FAU library to obtain training image set (TP) i };
Step b.2: calculating TP i Entropy E of i Obtaining an entropy description vector E = { E = } i };
Step b.3: extraction of TP i The characteristic points of (1); solving a point-extracting threshold parameter T when the density X of the characteristic points belongs to (C-delta, C + delta) by utilizing a dichotomy i Obtaining a threshold description vector T = { T = { (T) } i };
Step b.4: performing function fitting by using E and T to obtain an entropy-threshold fitting function T = f (E);
on the basis of the completion of step b, continuing to perform step c: self-adaptive gFAST feature point detection;
the step c specifically comprises the following steps:
step c.1: executing SLIC block partitioning algorithm on an image I to be detected to obtain a non-overlapping image block set B = { B = i }; fig. 3 (a) is an example of the SLIC block partitioning algorithm performed on fig. 2 (a).
Step c.2: using 8 pre-defined filtering templates for an image I to be detected
Figure BDA0001986279530000081
Filtering to obtain 8 filtered images
Figure BDA0001986279530000082
Step c.3: examining whether any pixel (x, y) in the image I to be detected meets (x, y) epsilon B i (ii) a Wherein, (x, y) refers to cartesian coordinates of the pixel points; if so, calculate B i Global entropy E of i Further obtain the lifting point threshold T i =f(E i );
Step c.4: survey vector
Figure BDA0001986279530000083
If the investigation vector contains 5 continuous elements which are connected end to end and are all larger than T i Then (x, y) is marked as gFAST feature point; and traversing all pixels to obtain a preliminary gFAST feature point set X' = { X i =(x,y) i }; fig. 3 (b) shows an example of the extracted adaptive gFAST feature points.
Step c.5: executing an NMS algorithm on the X' to obtain a gFAST key point set X;
on completion of step c, continuing to perform step d: extracting FQPCET characteristics;
the step d specifically comprises the following steps:
step d.1: determining any element X in a set X i Circular neighborhood O of i
Step d.2: from O i Obtaining the red, green and blue color channel components f R [i,j]、f G [i,j]And f B [i,j]Wherein, (i, j) refers to pixel point location;
and performing upsampling to obtain f [ u, v ], (u, v) representing the position of the upsampled pixel; :
Figure BDA0001986279530000084
step d.3: by calculating f u, v]Fast two-dimensional Fourier transform to obtain polar harmonic transform PCET coefficient matrix M nl
Figure BDA0001986279530000085
Wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0001986279530000086
representing a fast two-dimensional fourier transform;
step d.4: will f is mixed R [i,j]、f G [i,j]And f B [i,j]Calculating the obtained polar harmonic transformation PCET coefficient matrix
Figure BDA0001986279530000091
Polar harmonic transform PCET coefficient matrix
Figure BDA0001986279530000092
Harmonic-polar transformation PCET coefficient matrix
Figure BDA0001986279530000093
Substituting the formula to obtain a QPCET coefficient matrix of quaternion polar harmonic transformation
Figure BDA0001986279530000094
Figure BDA0001986279530000095
Figure BDA0001986279530000096
Step d.5: QPCET coefficient matrix for quaternion polar harmonic transformation
Figure BDA0001986279530000097
Selecting characteristics to form a characteristic vector f:
Figure BDA0001986279530000098
in this case, the characteristic is shown in fig. 3 (c).
Step d.6: traversing the feature point set X and aiming at any feature point X i Step d.1-step d.5 are performed, get the characteristic to set of quantities F = { F = { F = i Get the coordinate-feature set S = { S } i ={x i ,f i }};
On completion of step d, continuing to perform step e: performing kNN-based feature matching on the coordinate-feature set S to obtain a matching point set P = { (S, S') i }; fig. 3 (d) and fig. 3 (e) are schematic diagrams of a matching pair and a correct matching pair, respectively.
On completion of step e, continuing to perform step f: clustering post-processing based on k-means;
the step f specifically comprises the following steps:
step f.1: for matching point set P = { (s, s') i Performing offset vector calculation to obtain an offset vector set Dt:
Dt={(Δx,Δy) i }={(x-x′) i }; fig. 3 (f) and 3 (g) are schematic diagrams of offset vector cluster 1 and offset vector cluster 2, respectively.
Step f.2: calculating the length and direction of any offset vector in Dt to obtain a length set Le and a direction set Or:
Figure BDA0001986279530000099
step f.3: carrying out histogram statistics on Le and Or to obtain an offset vector set Dt' after primary screening;
step f.4: performing k-means clustering on Dt' to obtain k classes { C 1 ,C 2 ,…,C k }; fig. 3 (h), fig. 3 (i), fig. 3 (j), and fig. 3 (k) are schematic diagrams of a cluster positioning result 1, a cluster positioning result 2, a cluster positioning result 3, and an overlay result, respectively.
Step f.5: traversing all the clustering results, and clustering C to any one of the clustering results i RANSAC, ZNCC and morphological processing operations are sequentially executed, and the union of the obtained results is used as a final detection result. Fig. 3 (l) shows the result of marking the resulting tampered area.
It is noted that fig. 4 (a) -4 (d) of the accompanying drawings respectively provide examples of positioning tampered areas of the FAU image library; fig. 5 (a) -5 (d) provide diagrams of examples of tampered area locations of a GRIP image library, respectively. And FIGS. 6 (a) -6 (d) are graphs showing the comparison result of the robustness of the detection method and the comparison method in the FAU image library provided by the embodiment of the invention. Fig. 7 (a) -7 (d) are graphs showing robustness comparison results of the detection method and the comparison method in the GRIP image library according to the embodiment of the present invention. It should be added that, the above detection method is performed by experiments in Matlab R2016a environment, where the two image libraries involved are FAU and GRIP, respectively; the image library is already disclosed on the internet, and a person skilled in the art can search and download the image library by himself to complete the detection process of the disclosed steps.
The invention provides a multi-object tampering detection method based on fast quaternion polar harmonic transformation, which comprises the steps of firstly obtaining a functional relation between an entropy rate and a gFAST characteristic point extraction threshold value through learning, determining an adaptive threshold value by using the function and extracting a gFAST characteristic point; then constructing local features of the image through an FQPCET algorithm; then, obtaining a matching result by using a characteristic matching algorithm based on kNN; and finally, performing k-means clustering on the offset of the matching result, and performing RANSAC, ZNCC and morphological processing on various types to obtain a final positioning result. The experimental result shows that the method not only can effectively detect the multi-copy-paste tampering, but also has good robustness to conventional signal attack and geometric attack, and the time cost of the algorithm is very low.
Compared with the prior art, the invention has the following beneficial effects:
firstly, an entropy-threshold function fitting algorithm is provided and adopted, the method can self-adaptively determine a point-extracting threshold value, and ensure that the global density of characteristic points is uniform, so that the tampering of a small area or a smooth area can be effectively detected;
secondly, a new key point detection method gFAST is provided and adopted, the method is robust to various geometric attacks, the time complexity is small, and the algorithm speed and the geometric attack robustness are improved;
thirdly, a new moment calculation method FQPCET is provided and adopted, the method has remarkable advantages in the aspects of calculation speed, numerical stability and calculation precision compared with the original calculation method, the color information of the image and the correlation among color channels can be effectively reflected, and the detection precision and the algorithm speed of the method are improved.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (5)

1. The multi-object tampering detection method based on the fast quaternion polar harmonic transformation is characterized by comprising the following steps of:
step a: acquiring an image I to be detected, and setting thresholds C =0.1, delta =0.01, N =5 and M =4N; wherein C is an ideal feature point density threshold; Δ is a maximum deviation threshold; n represents the neighborhood diameter of the feature point; m represents the fast quaternion polar harmonic transform FQPCET upsampling parameters;
step b: training to obtain image set (TP) i An entropy-threshold fitting function T = f (E);
step c: self-adaptive gFAST feature point detection;
step d: extracting FQPCET characteristics;
step e: to the coordinate-the feature set S performs a kNN-based feature matching, obtaining a matching point set P = { (S, S') i };
Step f: clustering post-processing based on k-means.
2. The method for multi-object tamper detection based on fast quaternion polar harmonic transform as claimed in claim 1, wherein the step b specifically comprises:
step b.1: executing SLIC algorithm on any image in FAU library to obtain training image set (TP) i };
Step b.2: calculating TP i Entropy E of i Obtaining an entropy description vector E = { E = } i };
Step b.3: extraction of TP i The characteristic points of (1); solving a point-extracting threshold parameter T when the density X of the characteristic points belongs to (C-delta, C + delta) by utilizing a dichotomy i Obtaining a threshold value description vector T = { T = { (T) i };
Step b.4: function fitting was performed using E and T, resulting in an entropy-threshold fitting function T = f (E).
3. The method for multi-object tamper detection based on fast quaternion polar harmonic transform as claimed in claim 1, wherein the step c specifically comprises:
step c.1: executing SLIC block partitioning algorithm on an image I to be detected to obtain a non-overlapping image block set B = { B = { (B) } i };
Step c.2: using 8 pre-defined filtering templates for an image I to be detected
Figure FDA0001986279520000011
Filtering to obtain 8 filtered images
Figure FDA0001986279520000012
Step c.3: whether any pixel (x, y) in the image I to be detected meets (x, y) epsilon B or not is examined i (ii) a Wherein, (x, y) refers to cartesian coordinates of the pixel points; if so, calculate B i Global entropy E of i And then getThreshold to lifting point T i =f(E i );
Step c.4: survey vector
Figure FDA0001986279520000021
If the investigation vector contains 5 continuous elements which are connected end to end and are all larger than T i If yes, marking (x, y) as a gFAST characteristic point; and traversing all the pixels to obtain a preliminary gFAST feature point set X' = { X = } i =(x,y) i };
Step c.5: and executing an NMS algorithm on the X' to obtain a gFAST key point set X.
4. The method for multi-object tamper detection based on fast quaternion polar harmonic transform as claimed in claim 1, wherein the step d specifically comprises:
step d.1: determining any element X in a set X i Circular neighborhood O of i
Step d.2: from O i Obtaining the red, green and blue color channel components f R [i,j]、f G [i,j]And f B [i,j]Wherein, (i, j) refers to pixel point locations;
and performing upsampling to obtain f [ u, v ], (u, v) representing the position of the upsampled pixel; :
Figure FDA0001986279520000022
step d.3: by calculating f [ u, v ]]Fast two-dimensional Fourier transform to obtain polar harmonic transform PCET coefficient matrix M nl
Figure FDA0001986279520000023
Wherein the content of the first and second substances,
Figure FDA0001986279520000024
representing a fast two-dimensional fourier transform;
step d.4: will f is mixed R [i,j]、f G [i,j]And f B [i,j]Calculating the obtained polar harmonic transformation PCET coefficient matrix
Figure FDA0001986279520000025
Polar harmonic transformation PCET coefficient matrix
Figure FDA0001986279520000026
Harmonic-polar transformation PCET coefficient matrix
Figure FDA0001986279520000027
Substituting the formula to obtain a quaternion polar harmonic transformation QPCET coefficient matrix
Figure FDA0001986279520000028
Figure FDA0001986279520000029
Figure FDA00019862795200000210
Step d.5: QPCET coefficient matrix for quaternion polar harmonic transformation
Figure FDA0001986279520000031
Selecting characteristics to form a characteristic vector f:
Figure FDA0001986279520000032
step d.6: traversing the feature point set X and aiming at any feature point X i Step d.1-step d.5 are performed, get the characteristic to set of quantities F = { F = { F = i Get the coordinate-feature set S = { S = } i ={x i ,f i }}。
5. The method for multi-object tamper detection based on fast quaternion polar harmonic transform as claimed in claim 1, wherein the step f specifically comprises:
step f.1: for matching point set P = { (s, s') i Performing offset vector calculation to obtain an offset vector set Dt:
Dt={(Δx,Δy) i }={(x-x′) i };
step f.2: calculating the length and direction of any offset vector in Dt to obtain a length set Le and a direction set Or:
Le={||(Δx,Δy) i || 2 },
Figure FDA0001986279520000033
step f.3: carrying out histogram statistics on Le and Or to obtain an offset vector set Dt' after primary screening;
step f.4: performing k-means clustering on Dt' to obtain k classes { C 1 ,C 2 ,…,C k };
Step f.5: traversing all the clustering results, and clustering C to any one of the clustering results i RANSAC, ZNCC and morphological processing operations are sequentially executed, and the union of the obtained results is used as a final detection result.
CN201910166026.6A 2019-03-06 2019-03-06 Multi-object tampering detection method based on rapid quaternion polar harmonic transformation Active CN109919927B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910166026.6A CN109919927B (en) 2019-03-06 2019-03-06 Multi-object tampering detection method based on rapid quaternion polar harmonic transformation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910166026.6A CN109919927B (en) 2019-03-06 2019-03-06 Multi-object tampering detection method based on rapid quaternion polar harmonic transformation

Publications (2)

Publication Number Publication Date
CN109919927A CN109919927A (en) 2019-06-21
CN109919927B true CN109919927B (en) 2022-12-16

Family

ID=66963330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910166026.6A Active CN109919927B (en) 2019-03-06 2019-03-06 Multi-object tampering detection method based on rapid quaternion polar harmonic transformation

Country Status (1)

Country Link
CN (1) CN109919927B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111008955B (en) * 2019-11-06 2023-05-26 重庆邮电大学 Rapid copying, pasting and tampering detection method for multi-scale image block matching
CN113436172A (en) * 2021-06-29 2021-09-24 哈尔滨理工大学 Superpoint-based medical image processing method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427350A (en) * 2015-12-28 2016-03-23 辽宁师范大学 Color image replication tamper detection method based on local quaternion index moment
CN106815852A (en) * 2016-12-24 2017-06-09 辽宁师范大学 Coloured image evidence collecting method based on the extremely humorous conversion of quaternary number

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930493B (en) * 2011-08-12 2017-08-08 索尼公司 Anti-tamper image processing method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427350A (en) * 2015-12-28 2016-03-23 辽宁师范大学 Color image replication tamper detection method based on local quaternion index moment
CN106815852A (en) * 2016-12-24 2017-06-09 辽宁师范大学 Coloured image evidence collecting method based on the extremely humorous conversion of quaternary number

Also Published As

Publication number Publication date
CN109919927A (en) 2019-06-21

Similar Documents

Publication Publication Date Title
Li et al. SAR image change detection using PCANet guided by saliency detection
Li et al. Segmentation-based image copy-move forgery detection scheme
Warif et al. SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack
Wang et al. Detection and localization of image forgeries using improved mask regional convolutional neural network
Bi et al. Fast reflective offset-guided searching method for copy-move forgery detection
CN104331450B (en) Video copying detection method based on multi-mode feature and tensor resolution
Quan et al. Deep feature correlation learning for multi-modal remote sensing image registration
CN108122225B (en) Digital image tampering detection method based on self-adaptive feature points
CN111898428A (en) Unmanned aerial vehicle feature point matching method based on ORB
CN109919927B (en) Multi-object tampering detection method based on rapid quaternion polar harmonic transformation
Lin et al. Saliency detection via multi-scale global cues
CN103294676A (en) Content duplicate detection method of network image based on GIST (generalized search tree) global feature and SIFT (scale-invariant feature transform) local feature
Flenner et al. Resampling forgery detection using deep learning and a-contrario analysis
CN110782442A (en) Image artificial fuzzy detection method based on multi-domain coupling
CN102629325B (en) Image characteristic extraction method, device thereof, image copy detection method and system thereof
JP4721829B2 (en) Image retrieval method and apparatus
Zhang et al. Multi-scale segmentation strategies in PRNU-based image tampering localization
Li et al. Image copy-move forgery detection using hierarchical feature point matching
Sunitha et al. Copy-move tampering detection using keypoint based hybrid feature extraction and improved transformation model
Nawaz et al. Image authenticity detection using DWT and circular block-based LTrP features
Singh et al. Copy move forgery detection on digital images
Mu et al. Finding autofocus region in low contrast surveillance images using CNN-based saliency algorithm
Kang et al. Edge and feature points based video intra-frame passive-blind copy-paste forgery detection
CN109447957B (en) Image copying and pasting detection method based on key point transmission matching
Yadav et al. Copy move forgery detection using SIFT and GMM

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant