CN110097124A - Based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation - Google Patents

Based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation Download PDF

Info

Publication number
CN110097124A
CN110097124A CN201910367646.6A CN201910367646A CN110097124A CN 110097124 A CN110097124 A CN 110097124A CN 201910367646 A CN201910367646 A CN 201910367646A CN 110097124 A CN110097124 A CN 110097124A
Authority
CN
China
Prior art keywords
image
action type
chain
treatment effects
distorted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910367646.6A
Other languages
Chinese (zh)
Other versions
CN110097124B (en
Inventor
廖鑫
陈嘉欣
秦拯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan University
Original Assignee
Hunan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan University filed Critical Hunan University
Priority to CN201910367646.6A priority Critical patent/CN110097124B/en
Publication of CN110097124A publication Critical patent/CN110097124A/en
Application granted granted Critical
Publication of CN110097124B publication Critical patent/CN110097124B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • G06F18/254Fusion techniques of classification results, e.g. of results related to same input data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Theoretical Computer Science (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Analysis (AREA)

Abstract

The present invention relates to a kind of based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation.The method includes constructing the operation disjunctive model of the digital image manipulation chain based on blind source separating;Estimate the degree of correlation of digital characteristics of image, it is preliminary to identify distorted image action type;According to Dempster-Shafer evidence theory, estimation distorts operation confidence interval, accurately identifies distorted image action type.Compared with prior art, provided by the invention a kind of based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation, scene is distorted towards more actual jpeg image is multiple.Method of the invention is feasible and effective, identification image experience distort action type in terms of can obtain good effect.

Description

Based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation
Technical field
The present invention relates to image forensics and multi-media safety technical field, and in particular to one kind is divided based on Treatment Effects are obscured From image operational chain in action type recognition methods.
Background technique
With the prevalence of the image editing softwares such as Photoshop, GIMP, the editor and modification of digital image content are become It is more and more convenient, and majority distorts pseudo- manufacturing operation all and will not cause the visual suspection of people.If digital picture is by malice It distorts and wide-scale distribution, serious public trust crisis will be brought to society.Therefore, how combine digital image processing techniques and Statistical analysis technique carries out the verifying of authenticity and integrity to image, is that image forensics and the great of multi-media safety field are chosen War.
The statistical property of original digital image can be changed due to distorting forgery behavior, image is passively collected evidence according to number These statistical properties of word image itself realize the verifying to digital image's authenticity and integrality.Passive forensic technologies have Good adaptability was increasingly becoming the hot spot of image forensics technical field research in recent years.
However, most of passive forensic technologies of image be all based on image only by the hypothesis that single operation is distorted carry out operation take Card, or only judge whether image undergoes to distort, it is thus possible to the multiple image forensics result distorted is undergone in limitation Accuracy.For example, document " Yifang Chen, Xiangui Kang, Z.Jane Wang, and Qiong Zhang. “Densely connected convolutional neural network for multi-purpose image forensics under anti-forensic attacks.”ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC), 2018. " disclose and a kind of singly distort behaviour based on dense convolutional neural networks Make evidence collecting method, document " Haodong Li, Weiqi Luo, and Jiwu Huang. " Identification of various image operations using residual-based features.”IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2018. " disclose one kind based on Image Residual Characteristic of field singly distorts operation evidence collecting method, document " Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni. " A framework for decision Fusion in image forensics based on dempster–shafer theory of evidence.”IEEE Transactions on Information Forensics and Security (TIFS), 2013. ", which disclose one kind, is based on The image true-false method of discrimination of Dempster-Shafer evidence theory.
In view of this, the present invention proposes one kind and is based on obscuring place towards deeper image operational chain evidence obtaining target Manage effect separation image operational chain in action type recognition methods, with improve distorted in jpeg image operation detection it is accurate Property.
Summary of the invention
The invention proposes a kind of based on separation method is operated in the image operational chain for obscuring Treatment Effects separation, to know Include in other operational chain distorts action type, which comprises
(1) the operation disjunctive model of the digital image manipulation chain based on blind source separating is constructed;
(2) according to the degree of correlation of digital picture feature, action type is distorted in preliminary identification;
(3) according to Dempster-Shafer evidence theory, estimation distorts operation confidence interval, accurately identifies and distort operation Type.
Particular content is as follows:
(1) the operation disjunctive model of the digital image manipulation chain based on blind source separating: the schematic diagram of the model such as Fig. 1 is constructed It is shown, comprehensively consider the relevance between the operation separation of image operational chain and blind source separating, realizes in digital image manipulation chain Distort action type identification.
Blind source separating refers to for unknown system, the Independent sources signal of its input is totally unknown or only a small amount of priori In the case where knowledge, only restore the process for inputting source signal by output signal, that is, mixed signal of system.To digital picture Operation may be distorted comprising multiple simultaneously when distort forgery, these operations form image operation with certain sequencing Chain.In described image operational chain, different distorting is independent from each other between operation.Digital picture undergoes the multiple mistake distorted Journey can be broadly considered as digital picture and multiple noise signals and mix the process being superimposed, to a certain extent image operational chain Action type identification can also be considered as the separation identification to multiple noise signals of distorted image process addition.Therefore, image is grasped The operation separation problem and blind source separating problem for making chain are similar.
The method will be considered as source signal in blind source separating problem to the multiple process for distorting operation that original image carries out Mixed process, it is similar with a series of source signal that separating treatments are estimated is carried out to the mixed signal observed at this time, When distorting operation separation of image operational chain is carried out, the feature for extracting the digital picture after multiple distort (obscures Treatment Effects The composite character of generation), only composite character need to be inputted separation system, by separating treatment, can restore singly to distort operation spy Sign.
It is described to obscure Treatment Effects to refer to that digital picture is subjected to a variety of when distorting processing, what distorted image was left in each operation Trace, which is overlapped mutually, to be obscured or even subsequent distorts that operation reduction is previous to operate the trace left.
Definition: I={ I1,I2,...,ImIndicate raw image data set, wherein m indicates the number of digital image set Amount.O={ o1,o2,...,onIndicating the distorted image operational set for including in image operational chain, operation is distorted in wherein n expression Quantity.F=[f1,f2,...,fm] to concentrate the composite character set extracted from by the multiple digital picture distorted, whereinD indicates characteristic dimension.S=[s1,s2,...,sn] it is single operation characteristic set to be asked, whereinsi Operation o is distorted in expressioniEstimation feature.There are a hybrid matrixMeet:
F=AS (1)
Separation needs to carry out matrix operation from the composite character that digital picture to be detected is extracted:
WF=WAS=S (2)
WhereinIt is the inverse matrix of hybrid matrix A to solve mixed matrix.Using the fixation based on fourth order cumulant Point independent composition analysis algorithm, it is initial to dissolve mixed matrix, optimal solution is acquired by iteration and mixes matrix W:
Wherein t indicates the number of iterations,For the i-th row for solving mixed matrix, E [g] is the average statistical for calculating each iteration, | | g | | it is calculating matrix norm.
Matrix W is mixed using optimal solution, matrixing is made to composite character, and then obtain respectively distorting operation in image operational chain The approximate evaluation of feature realizes the separation for obscuring image operational chain Treatment Effects, provides direct card for single operation type identification According to.
(2) according to the degree of correlation of digital picture feature, action type is distorted in preliminary identification: specific flow chart such as Fig. 2 institute To show, the digital picture feature for comprehensively considering extraction separates degree of correlation between the operating characteristics of acquisition with using disjunctive model, Realize the preliminary identification to distorted image action type.
Forgery is distorted to m original images, it is O={ o that operational chain included, which distorts operation,1,o2,...,on}.From experience Composite character F=[f is extracted in the multiple digital picture distorted1,f2,...,fm].Utilize the digitized map based on blind source separating As the operation disjunctive model of operational chain separates composite character, and then obtain estimation distorts operating characteristics S=[s1, s2,...,sn], and be regarded as distorting the template characteristic of operation.
Given one experienced the multiple digital picture I' distorted, extract composite character f'.In order to identify that the image is undergone Distort operation, measure the composite character f' extracted from image I' and the operation template characteristic s for being separated acquisitioniBetween correlation Property.Degree of correlation is higher, then it represents that image I' may more experienced operation oiDistort forgery.By calculating f' and siPearson came Related coefficient measures the degree of correlation between them, calculation formula are as follows:
Wherein cov (f', si) indicate to calculate feature f' and siCovariance, D (f') and D (si) indicate calculate feature f' and siVariance.ρiIt is characterized f' and siRelated coefficient, value range be [- 1,1].Work as ρiValue closer to 1, indicate related journey It spends higher.To distort operation oiOne threshold tau of corresponding settingi, work as ρi≥τiWhen, indicate that image I' is tampered operation oiDistort puppet It makes.
(3) according to Dempster-Shafer evidence theory, estimation distorts operation confidence interval, accurately identifies and distort operation Type: specific flow chart separates as shown in figure 3, being obscured Treatment Effects, primarily determines that may be present in image operational chain usurp Change operation O={ o1,o2,K,onAfter, further, need to accurately identify these operations.
Joint singly distorts multiple detection algorithms of operation evidence obtaining, excavates different images feature, and study Dempster- The Decision fusion of the composition rule of Shafer evidence theory differentiates in image operational chain according to fusion results and distorts action type.
The Dempster-Shafer evidence theory belongs to a kind of expansion form of probability theory, by by the trust of evidence The value up and down of function and probability theory contacts, and explains multivalued mappings according to belief function and likelihood function, to form processing The evidence theory of uncertain information.The Decision fusion of the composition rule includes melting for multiple operation evidence obtaining algorithm evidence obtaining evidences It closes.Specific steps include:
That chooses Q kind classics distorts operation o to detectiEvidence obtaining algorithm, constitute Q evidence obtaining classifier, extract respectively Feature calculates Q and distorts probability { p1,p2,...,pQ, image is without operation o at this timeiThe probability distorted is { 1-p1, 1-p2,...,1-pQ}。
Using the composition rule based on Dempster-Shafer evidence theory, the evidence obtaining result of Q evidence obtaining classifier is done Integrated decision-making obtains a basic probability assignment m={ m0,m1, wherein m0Indicate image not by operation oiThe probability distorted, m1Table Diagram picture is by operation oiThe probability distorted.
The belief function Bel and likelihood function Pl for being tampered and being not tampered with two kinds of situations are solved according to m, obtain confidence area Between [Bel (m0),Pl(m0)] and [Bel (m1),Pl(m1)], wherein Bel (m0) and Bel (m1) respectively indicate not undergo image and usurp Change operation oiDegree of belief and experience distort operation oiDegree of belief, Pl (m0) and Pl (m1) respectively indicate do not deny image without It goes through and distorts operation oiDegree of belief and experience distort operation oiDegree of belief.Decision rule specifically:
If meeting decision rule, then it represents that exist in image operational chain and distort operation oi;Conversely, being then not present.
Compared with prior art, above-mentioned technical proposal at least has the advantages that
1, it is provided by the invention it is a kind of based on obscure Treatment Effects separation image operational chain in action type recognition methods, By the multiple Treatment Effects of obscuring for distorting generation of separate picture, testing image feature is detected with distorting for estimation is separated and operates spy The degree of correlation between sign, and the size according to the degree of correlation tentatively identify testing image experience distort action type.This method is not It only experienced dependent on testing image that single operation is distorted it is assumed that solving the primary of more actual jpeg image operational chain evidence obtaining The identification of problem, i.e. action type.
2, it is provided by the invention it is a kind of based on obscure Treatment Effects separation image operational chain in action type recognition methods, The Decision fusion of composition rule according to Dempster-Shafer evidence theory to action type is distorted as a result, accurately known Not.This method can effectively identify jpeg image experience distort operation.
Detailed description of the invention
Fig. 1 is the separation of the present invention " based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation " Model schematic;
Fig. 2 is distorting for the present invention " based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation " The preliminary identification process figure of action type;
Fig. 3 is distorting for the present invention " based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation " Action type accurately identifies flow chart;
Fig. 4 is the present invention " based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation " embodiment The true picture schematic diagram of middle Lena photo;
Fig. 5 is the present invention " based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation " embodiment Image schematic diagram is forged in distorting for middle Lena photo.
Specific embodiment
The present invention is based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation.For the ease of saying Bright, the present embodiment is realized obscure Treatment Effects separation as steps described below so that three are distorted the operational chain of operation composition as an example, but It is that those skilled in the art should know the technical solution of the application distorts operation suitable for any number of.Specific separating step Are as follows:
Step 1: the processing history that clear digital picture may be undergone.
For given digital picture I and distort operation set O={ o1,o2,o3, what may be undergone distorts processing history are as follows:
H0: image I, which is not undergone, to be distorted,
H1: image I undergoes o1It distorts,
H2: image I undergoes o2It distorts,
H3: image I undergoes o3It distorts,
H4: image I undergoes o1And o2It distorts,
H5: image I undergoes o1And o3It distorts,
H6: image I undergoes o2And o3It distorts,
H7: image I undergoes o1、o2And o3Distort
Step 2: according to the disjunctive model, Treatment Effects are obscured in separation, obtain the template characteristic for respectively distorting operation.
From M images of image data base A random selection, with operation o1、o2And o3Handle these images.Then, from this M Composite character, the composite character f of every three images are extracted in imagei、fjAnd fkA composite character set is formed, according to formula (3) it calculates and solves mixed matrix, then realize the separation to composite character according to formula (1) and (2), obtain respectively representing operation o1、o2With o3Template characteristic s1、s2And s3.It repeats the step M/3 times, obtains average template featureWith
Below by taking the testing image of model Lena as an example, to distorted image action type recognition methods provided by the invention into Row compliance test result, specifically:
Step 1: extracting the composite character of testing image.
Fig. 4 illustrates true image, and Fig. 5 illustrates the image after experience is distorted three times, comparison two Image is only that be difficult to find Fig. 5 be the image after being tampered by naked eyes.In the present embodiment, using Fig. 5 as testing image, Therefrom extract composite character f', to detect the image experience distort action type.
Step 2: action type in preliminary identification image operational chain.
Action type criterion of identification in the present embodiment are as follows:
WhereinIndicate the image detected experience distorts operation history, ρiIndicate feature f' andRelated coefficient, τ1、τ2And τ3Respectively correspond operation o1、o2And o3Threshold value.
Composite character f' and template characteristic are calculated according to formula (4)WithRelated coefficient, obtain ρ1、ρ2And ρ3, It was found that ρ1≥τ1、ρ2≥τ2And ρ3≥τ3, therefore deduce thatImage experienced o1、o2And o3Three kinds of operations are distorted.
Step 3: accurately identifying action type in image operational chain.
According to step 2, primarily determine that the operation of image operational chain is o1、o2And o3.At this point, in order to further bright Really operation oiPresence hypothesis is given below for testing image I shown in fig. 5:
H0: image I does not undergo oiIt distorts,
H1: image I undergoes oiDistort
Q kind evidence obtaining algorithm is chosen, Q classifier is constituted, whether o is undergone to imageiIt distorts and classifies, obtain classification knot Fruit { p1,p2,...,pQ}.Evidence obtaining result integrated decision-making based on Dempster-Shafer evidence theory to Q classifier, obtains Basic probability assignment m={ m0,m1}.Belief function and likelihood function are calculated, according to decision rule shown in formula (5), discovery figure As experienced operation oiDistort forgery.
In conclusion for more actual image operational chain evidence obtaining scene, the present invention devises one kind and is based on obscuring place Manage action type recognition methods in the image operational chain of effect separation.Image is obscured Treatment Effects separation mutually to tie with blind source separating Close, and the composition rule of comprehensive Dempster-Shafer evidence theory Decision fusion as a result, the method have it is feasible Property, it is able to achieve effective identification to action type in jpeg image operational chain.
It will be understood by those skilled in the art that protection scope of the present invention is not limited to the specific embodiment.? Under the premise of the principle of the present invention, those skilled in the art can carry out equivalent change or be replaced to the relevant technologies feature It changes, it should be noted that the technical solution after change or replacement will fall within the scope of protection of the present invention.

Claims (4)

1. a kind of based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation, which is characterized in that described Method includes:
(1) the operation disjunctive model of the digital image manipulation chain based on blind source separating is constructed;
(2) according to the degree of correlation of digital picture feature, action type is distorted in preliminary identification;
(3) according to Dempster-Shafer evidence theory, estimation distorts operation confidence interval, accurately identifies and distort action type.
2. it is according to claim 1 based on obscure Treatment Effects separation image operational chain in action type recognition methods, It is characterized in that, the operation disjunctive model of the digital image manipulation chain of the building based on blind source separating, specifically includes:
Matrixing is carried out to the composite character extracted from digital picture, obtains the digital image manipulation chain based on blind source separating Operation disjunctive model, and according to the model to digital picture operational chain obscure Treatment Effects separation, acquisition singly distort operation Feature assessment, for singly distort action type identification positive evidence is provided.
3. according to claim 1 or 2 based on action type identification side in the image operational chain for obscuring Treatment Effects separation Method, which is characterized in that the degree of correlation according to digital picture feature, preliminary identification are distorted action type, specifically included:
Measurement undergoes the composite character of the digital picture after multiple distort to distort with certain obtained according to the operation disjunctive model Correlation between operating characteristics, obtains degree of correlation between the two, tentatively judges whether the testing image undergoes the behaviour It distorts forgery and what may be undergone distorts action type.
4. according to claim 1 or 2 based on action type identification side in the image operational chain for obscuring Treatment Effects separation Method, which is characterized in that described according to Dempster-Shafer evidence theory, estimation distorts operation confidence interval, accurately identifies and usurp Change action type, specifically include:
Joint singly distorts multiple detection algorithms of operation evidence obtaining, excavates different images feature;Pass through Dempster-Shafer evidence The Decision fusion of theoretical composition rule, according to the fusion results of multiple detection algorithms, operation Estimating Confidence Interval is distorted in acquisition, Action type is distorted in accurate differentiation image operational chain.
CN201910367646.6A 2019-05-05 2019-05-05 Method for identifying operation type in image operation chain based on confusion processing effect separation Active CN110097124B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910367646.6A CN110097124B (en) 2019-05-05 2019-05-05 Method for identifying operation type in image operation chain based on confusion processing effect separation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910367646.6A CN110097124B (en) 2019-05-05 2019-05-05 Method for identifying operation type in image operation chain based on confusion processing effect separation

Publications (2)

Publication Number Publication Date
CN110097124A true CN110097124A (en) 2019-08-06
CN110097124B CN110097124B (en) 2023-05-26

Family

ID=67446854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910367646.6A Active CN110097124B (en) 2019-05-05 2019-05-05 Method for identifying operation type in image operation chain based on confusion processing effect separation

Country Status (1)

Country Link
CN (1) CN110097124B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1941693A (en) * 2006-01-12 2007-04-04 大连理工大学 Method for watermarking small wave threshold digital audio multiple mesh based on blind source separation
CN101056350A (en) * 2007-04-20 2007-10-17 大连理工大学 Digital image evidence collecting method for detecting the multiple tampering based on the tone mode
CN101950408A (en) * 2010-08-12 2011-01-19 合肥工业大学 Digital image creditability measurement method based on D-S evidence theory
CN102073980A (en) * 2011-01-06 2011-05-25 哈尔滨工程大学 Compression sensing theory-based interactive supported dual watermark generating and detecting method
CN105426912A (en) * 2015-11-12 2016-03-23 河南师范大学 Blind separation method for replacement aliasing image
US20170091588A1 (en) * 2015-09-02 2017-03-30 Sam Houston State University Exposing inpainting image forgery under combination attacks with hybrid large feature mining
CN107292133A (en) * 2017-05-18 2017-10-24 深圳中兴网信科技有限公司 The obfuscation method and device of artificial intelligence
US20180107887A1 (en) * 2016-10-14 2018-04-19 ID Metrics Group Incorporated Tamper detection for identification documents

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1941693A (en) * 2006-01-12 2007-04-04 大连理工大学 Method for watermarking small wave threshold digital audio multiple mesh based on blind source separation
CN101056350A (en) * 2007-04-20 2007-10-17 大连理工大学 Digital image evidence collecting method for detecting the multiple tampering based on the tone mode
CN101950408A (en) * 2010-08-12 2011-01-19 合肥工业大学 Digital image creditability measurement method based on D-S evidence theory
CN102073980A (en) * 2011-01-06 2011-05-25 哈尔滨工程大学 Compression sensing theory-based interactive supported dual watermark generating and detecting method
US20170091588A1 (en) * 2015-09-02 2017-03-30 Sam Houston State University Exposing inpainting image forgery under combination attacks with hybrid large feature mining
CN105426912A (en) * 2015-11-12 2016-03-23 河南师范大学 Blind separation method for replacement aliasing image
US20180107887A1 (en) * 2016-10-14 2018-04-19 ID Metrics Group Incorporated Tamper detection for identification documents
CN107292133A (en) * 2017-05-18 2017-10-24 深圳中兴网信科技有限公司 The obfuscation method and device of artificial intelligence

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SHANGDE GAO, ET AL.: "Real-time detecting one specific tampering operation in multiple operator chains", 《SPRINGER》 *

Also Published As

Publication number Publication date
CN110097124B (en) 2023-05-26

Similar Documents

Publication Publication Date Title
Carvalho et al. Illuminant-based transformed spaces for image forensics
Mushtaq et al. Digital image forgeries and passive image authentication techniques: a survey
Zhang et al. Reliable detection of LSB steganography based on the difference image histogram
CN103605958A (en) Living body human face detection method based on gray scale symbiosis matrixes and wavelet analysis
CN107944416A (en) A kind of method that true man's verification is carried out by video
CN104244016B (en) A kind of H264 video contents altering detecting method
CN110457996A (en) Moving Objects in Video Sequences based on VGG-11 convolutional neural networks distorts evidence collecting method
CN102959588A (en) Method for detecting tampering with color digital image based on chroma of image
CN102045357A (en) Affine cluster analysis-based intrusion detection method
CN112668557A (en) Method for defending image noise attack in pedestrian re-identification system
CN103390151A (en) Face detection method and device
CN110147570A (en) It is a kind of that method for distinguishing is known based on the electronic component of texture and shape feature
CN111914912A (en) Cross-domain multi-view target identification method based on twin conditional countermeasure network
Zhang et al. Image splicing localization using noise distribution characteristic
CN110097124A (en) Based on action type recognition methods in the image operational chain for obscuring Treatment Effects separation
Destruel et al. Color noise-based feature for splicing detection and localization
CN101527041B (en) Picture counterfeiting detection method based on shadow matte consistency
Yu et al. A multi-scale feature selection method for steganalytic feature GFR
CN106530199B (en) Multimedia integration steganalysis method based on window type hypothesis testing
Cozzolino et al. A comparative analysis of forgery detection algorithms
CN111325185B (en) Face fraud prevention method and system
Chen et al. Identification of image global processing operator chain based on feature decoupling
CN111597524B (en) Verification method and system for seal sample sampling personnel
CN110852203B (en) Multi-factor suspicious person identification method based on video feature learning
Wang et al. Towards improved steganalysis: When cover selection is used in steganography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant