CN110728653A - Composite image tampering detection method based on discrete polarity complex exponential transformation - Google Patents

Composite image tampering detection method based on discrete polarity complex exponential transformation Download PDF

Info

Publication number
CN110728653A
CN110728653A CN201910835245.9A CN201910835245A CN110728653A CN 110728653 A CN110728653 A CN 110728653A CN 201910835245 A CN201910835245 A CN 201910835245A CN 110728653 A CN110728653 A CN 110728653A
Authority
CN
China
Prior art keywords
discrete
image
transformation
rotation invariant
invariant moment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910835245.9A
Other languages
Chinese (zh)
Inventor
甘艳芬
钟君柳
杨继翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southland Business College Of Guangdong University Of Foreign Studies
Original Assignee
Southland Business College Of Guangdong University Of Foreign Studies
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southland Business College Of Guangdong University Of Foreign Studies filed Critical Southland Business College Of Guangdong University Of Foreign Studies
Priority to CN201910835245.9A priority Critical patent/CN110728653A/en
Publication of CN110728653A publication Critical patent/CN110728653A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/0002Inspection of images, e.g. flaw detection
    • G06T7/0004Industrial image inspection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/30Determination of transform parameters for the alignment of images, i.e. image registration
    • G06T7/33Determination of transform parameters for the alignment of images, i.e. image registration using feature-based methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/10Image acquisition modality
    • G06T2207/10004Still image; Photographic image

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a composite image tampering detection method based on discrete polarity complex exponential transformation, which comprises the following steps: constructing a frame with a polarity complex exponential transformation of a rotation invariant moment; discretizing under a frame of polarity compound exponential transformation with rotation invariant moment to construct discrete rotation invariant moment of polarity compound exponential transformation; converting the detected image into a gray image, and defining the detected image in a discrete space domain; constructing a 9 x 9 pixel template, and approximately mapping the rotation invariant moment realizing discrete polarity compound index transformation in the pixel template from a polar coordinate space to a Cartesian space; extracting the characteristics of the detected image by using the rotation invariant moment of discrete polarity compound index transformation to obtain effective image characteristics; and obtaining a matching feature pair through consistency sensitive hash operation, and displaying the matching feature pair in a sectional manner. The invention aims at the copying-pasting tampered images of translation and rotation deformation, has higher detection success rate and eliminates background interference.

Description

Composite image tampering detection method based on discrete polarity complex exponential transformation
Technical Field
The invention relates to the field of image tampering detection, in particular to a composite image tampering detection method based on discrete polarity complex exponential transformation.
Background
In recent years, with the increasing functionality of digital image editing software, digital images are widely used in various industries in society, such as news reports, scientific research, law, and the like. A potential problem with such digital images is that they can be easily modified by using these powerful image editing tools. Some users misuse picture editing software for various purposes to produce some images that are contrary to reality. Today, those tampering behaviors that are not allowed by the author become so severe that our social lives are deeply influenced by them. Therefore, digital image tamper detection has become increasingly important in the field of information security.
Tampering with a "copy-and-paste" image is the copying of a portion of the image content one or more times to cover an important image feature for the purpose of hiding the associated content. During the last decade, many research institutes, researchers, have conducted intensive research into methods of detecting copy-paste tampered images.
Among them, Fridrich, J., Soukal, D. & Luk' as, J. [2003] "Detection of copy-motion formation in Digital images," Digital imaging Research works, pp.55-61, proposes a method of dividing an image into 8 × 8 overlapping blocks and extracting DCT coefficients for these blocks. Popescu, a.c. [2005] "explicit dimensions for generations by detecting tracks of reconstruction," ieee trans. signal.process.53, 758-767, proposes a method of Principal Component Analysis (PCA) to extract and compactly represent feature vectors from overlapping blocks, one advantage of the PCA method is to reduce the dimensionality of the feature vectors. Chakraborty, S. [2013] "Copy mobile image for detection using the technical information," 4th int. Conf. computing, Communications and Networking Technologies (ICCCNT), pp.1-4, propose to use information common in different regions of an image to detect Copy-paste tampered images.
The detection method can achieve good effect on detecting common tampered images without post-processing. However, these cases do not all approach the real case. In image tampering operations, post-processing is quite common, such as geometric deformation, blur deformation, additive noise, and so forth. Since forgers have created new images using various morphing forgery operations, conventional image verification methods have been unable to detect and identify images that include scaling, rotation, translation, and other geometric operations.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a composite image tampering detection method based on discrete polarity complex exponential transformation. The technical scheme of the invention is realized in such a way that the method for detecting the falsification of the synthetic image based on the discrete polarity complex exponential transformation comprises the following steps
Step 1: constructing a frame with a polarity complex exponential transformation of a rotation invariant moment;
step 2: discretizing under the frame of the polar compound exponential transformation with the rotation invariant moment to construct a discrete polar compound exponential transformation rotation invariant moment;
and step 3: converting the detected image from an RGB digital image into a gray image, and defining the detected image in a discrete space domain;
and 4, step 4: constructing a 9 x 9 pixel template, and approximately mapping the rotation invariant moment realizing discrete polarity compound index transformation in the pixel template from a polar coordinate space to a Cartesian space;
and 5: extracting the characteristics of the detected image by using the rotation invariant moment of the discrete polarity compound index transformation to obtain effective image characteristics;
step 6: and obtaining a matching feature pair through consistency sensitive hash operation, and displaying the matching feature pair in a sectional manner.
Further, the extraction of the pixel features of the detected image in step 4 is performed by MATLAB software.
Compared with the prior art, the method has the advantages that the detection success rate is higher for the copying-pasting tampered images of translation and rotation deformation; meanwhile, the invention also eliminates background interference, such as similar colors of a large area, such as sky, ocean, wall and the like.
Drawings
FIG. 1 is a flow chart of a composite image tamper detection method based on discrete polarity complex exponential transformation according to the present invention;
FIG. 2 is a schematic diagram of the pixel coordinates of an inspected image in MATLAB space in accordance with one embodiment of the present invention;
FIG. 3 is a schematic representation of pixel coordinates of FIG. 2 after mapping to Cartesian space;
FIG. 4 is a schematic diagram of a matching analysis of MATLAB space and Cartesian space pixel coordinate systems;
FIG. 5 is a diagram illustrating the transformation of MATLAB space and Cartesian space pixel coordinates in accordance with an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the method for detecting tampering of a composite image based on discrete polarity complex exponential transformation of the present invention includes
Step 1: constructing a frame with a polarity complex exponential transformation of a rotation invariant moment;
step 2: discretizing under the frame of the polar compound exponential transformation with the rotation invariant moment to construct a discrete polar compound exponential transformation rotation invariant moment;
and step 3: converting the detected image from an RGB digital image into a gray image, and defining the detected image in a discrete space domain;
step 4: constructing a 9 x 9 pixel template, and approximately mapping the rotation invariant moment realizing discrete polarity compound index transformation in the pixel template from a polar coordinate space to a Cartesian space;
and 5: extracting the characteristics of the detected image by using the rotation invariant moment of the discrete polarity compound index transformation to obtain effective image characteristics;
step 6: and obtaining a matching feature pair through consistency sensitive hash operation, and displaying the matching feature pair in a sectional manner.
The polar harmonic transformation consists of Polar Complex Exponential Transformation (PCET), Polar Cosine Transformation (PCT) and Polar Sine Transformation (PST). PCET has proven to be highly robust in detecting, identifying and locating duplicate or similar regions in images, particularly in terms of resistance to rotational deformation and gaussian noise. In step 1, for the image function f (r, θ), PCET is defined as:
Figure BDA0002191998160000041
wherein M isklIs a PCET expression having a function f (r, θ) of k-order ordinal numbers and l-order repetition coefficients, and | k |, | l |, 0,1Representing a basis function HklComplex conjugation of (r, θ). In the case of a PCET,consisting of a circular harmonic component and a radial component. Definition of
Figure BDA0002191998160000044
Is composed of
Figure BDA0002191998160000045
Wherein R isk(r) is the radial nucleus of the nucleus,
Figure BDA0002191998160000046
theta denotes the degree of rotation and r denotes the radius of the unit circle. By extracting the rotation features, post-processed copy regions, e.g., rotated and additive noise tampered, can be detected and located. From equations (1) and (2), we assume α ═ θ + β and derive the derivative d θ ═ d α. We assume simultaneously that a region pixel fR(r, α) is obtained by rotating f (r, θ) clockwise by an angle β. Thus, equation (1) can be redefined as:
wherein [ fR]A rotary expression is represented. From(3) In the formula, we can construct a rotation invariant moment with polarity complex exponential transformation, as shown in formula (4):
|Mkl(R)|=|Mkle-ilβ|=|Mkl| (4)
in step 2, a two-dimensional signal function f (x, y) is given, and the Polar Complex Exponential Transform (PCET) of this function is defined in cartesian coordinates as:
Figure BDA0002191998160000051
wherein
Figure BDA0002191998160000052
Hkl(x,y)=Hkl(rcosθ,rsinθ)=Hkl(r,θ)。
From equation (5), the framework of Polar Compound Exponential Transformation (PCET) with rotation invariant moment proposed in step 1 is still confined to a continuous spatial region. Furthermore, the PCET function describes the area where an image or pixels of a sub-image are mapped to the unit circle, which requires a suitable normalization. The above functions are suitable for transformation in a continuous space, and cannot be effectively applied to digital images. Digital images are made up of a number of discrete pixels, each arranged in a two-dimensional or N-dimensional matrix. Therefore, we will use the discretization of equation (3) in continuous space. In addition, equation (3) is a polar equation, which is not conducive to direct discretization. In the discretization process of the polar compound exponential transformation, the pixel position representation of the digital image is converted into a rectangular coordinate system, so that the method is more suitable and convenient. In step 2, the invention discretizes a polar complex exponential transformation defined in a cartesian coordinate system. Assuming that the size of an image is M × N (M is 0, 1.. t.m, N is 0, 1.. t.n), discretization of equation (5) defined in a continuous space is expressed as equation (6):
Figure BDA0002191998160000053
wherein
Figure BDA0002191998160000054
Equation (6) can be redefined as the following equation:
Figure BDA0002191998160000061
wherein,
and step 3: when detecting the detected image, the digital image of RGB needs to be converted into a grayscale image. Equation (7) is a normalization equation by which the detected image can be defined in a discrete spatial domain.
And 4, step 4: in computer processing a digital image is composed and represented by pixels. We assume that the distance between adjacent pixels in the same row or column is equal to 1. In one embodiment of the present invention, to detect a suspect image using MATLAB software, we define a 9 × 9 pixel template, with the 9 × 9 pixels arranged as in FIG. 2. The original pixel coordinates (1, 1) are in the upper left corner of the MATLAB operating space.
The MATLAB-space coordinate system of fig. 2 is neither convenient nor efficient when using MATLAB software to extract image features via the discretized PCET of equation (7). Therefore, we first transform the original pixels from the top left corner to the 9 × 9 pixel template center. The approximate mapping from the polar space of MATLAB to the cartesian space we define is shown in fig. 3.
In fig. 3, the new original coordinates (0, 0) are adjusted to the center of the 9 × 9 pixel template. Assume that the new coordinates of each pixel in the template are (x'm,y'n). The gray grid represents the polar region on the template. The pixels at the top left, top right, bottom left, and bottom right corners are not included in the polar coordinate region. This will result in an error in the conversion from polar to rectangular coordinates. Therefore, we propose a new transformation method between two coordinate systems. In FIG. 3, the transformation of a 9 × 9 pixel template from a polar coordinate system to a Cartesian coordinate system is shown. In fig. 4, equation (7) contains some unreasonable transformations, which may result in a relatively large conversion error. First, discrete pixels near the origin of the polar coordinate system are more strongly clustered near the origin, while discrete pixels of the polar coordinate system are more dispersed from the origin of coordinates. The pixels in the cartesian coordinate system should be stored in a vertically and horizontally equidistant matrix, i.e. all pixels are equally distributed around the origin. First, most pixels in a 9 × 9 template are not in the same position in both coordinate systems. Converting pixels from a polar coordinate system to a cartesian coordinate system using equation (7) will result in conversion errors, while some pixels in cartesian coordinates are not included in the polar coordinate system when the radius of the polar or radial coordinates is less than 1. The conversion system of the present invention is illustrated by an example. We set a pixel to the top left of the template, with the pixel having a pentagon as the marker. From FIG. 5 we find that the coordinates (x, y) are (-3, 2.) the distance from the origin of the coordinates (x, y) is
Figure BDA0002191998160000071
And r is more than 3 and less than 4. The pixel radial coordinate radius for a 9 x 9 template in a polar coordinate system is 3. In both coordinate systems, we match pixels by reducing the distance between pixels in cartesian coordinates or increasing the radius of the pixels in polar coordinates. The arrows as outlined in fig. 5 show the direction of the movement of the pixel, so that the pixel should be directed towards the outlined arrow, keeping the angle moving towards a circle of radius 3. By doing so, we obtain equation (8) as follows:
Figure BDA0002191998160000072
where [ f' ] represents the expression of the transformed coordinates and INT [ ] is an integer function.
We propose a method of converting a pixel feature from polar to rectangular coordinates and from continuous to discrete regions, redefining equation (7) to obtain equation (9):
Figure BDA0002191998160000081
where Δ x 'is 1 and Δ y' is 1.
Equation (9) has the feature that discrete rotation invariance moments can effectively extract a composite image.
And 5: and (3) extracting the block characteristics of all pixels of the detected image by using the formula (9) to obtain effective image characteristics.
Step 6: matching feature pairs are obtained and displayed in a scratch-map manner by Consistency Sensitive Hash (CSH) operations such as B.Fan, F.Wu, and Z.Hu, "aggregation distribution inter-importance descriptors: A novel local image descriptor," in Computer Vision and Pattern Recognition (CVPR),2011 IEEE Conference on,2011, pp.2377-2384, etc. Thus, it is possible to determine whether or not the detected image is a composite image.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention.

Claims (2)

1. A composite image tampering detection method based on discrete polarity complex exponential transformation is characterized by comprising
Step 1: constructing a frame with a polarity complex exponential transformation of a rotation invariant moment;
step 2: discretizing under the frame of the polar compound exponential transformation with the rotation invariant moment to construct a discrete polar compound exponential transformation rotation invariant moment;
and step 3: converting the detected image from an RGB digital image into a gray image, and defining the detected image in a discrete space domain;
and 4, step 4: constructing a 9 x 9 pixel template, and approximately mapping the rotation invariant moment realizing discrete polarity compound index transformation in the pixel template from a polar coordinate space to a Cartesian space;
and 5: extracting the characteristics of the detected image by using the rotation invariant moment of the discrete polarity compound index transformation to obtain effective image characteristics;
step 6: and obtaining a matching feature pair through consistency sensitive hash operation, and displaying the matching feature pair in a sectional manner.
2. The method for detecting falsification of a synthetic image based on discrete polarity complex exponential transformation according to claim 1, wherein the extraction of the pixel characteristics of the detected image in step 4 is performed by MATLAB software.
CN201910835245.9A 2019-09-05 2019-09-05 Composite image tampering detection method based on discrete polarity complex exponential transformation Withdrawn CN110728653A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910835245.9A CN110728653A (en) 2019-09-05 2019-09-05 Composite image tampering detection method based on discrete polarity complex exponential transformation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910835245.9A CN110728653A (en) 2019-09-05 2019-09-05 Composite image tampering detection method based on discrete polarity complex exponential transformation

Publications (1)

Publication Number Publication Date
CN110728653A true CN110728653A (en) 2020-01-24

Family

ID=69217799

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910835245.9A Withdrawn CN110728653A (en) 2019-09-05 2019-09-05 Composite image tampering detection method based on discrete polarity complex exponential transformation

Country Status (1)

Country Link
CN (1) CN110728653A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080193031A1 (en) * 2007-02-09 2008-08-14 New Jersey Institute Of Technology Method and apparatus for a natural image model based approach to image/splicing/tampering detection
CN101876532A (en) * 2010-05-25 2010-11-03 大连理工大学 Camera on-field calibration method in measuring system
CN102194208A (en) * 2011-05-26 2011-09-21 西安理工大学 Image falsification detecting and falsification positioning method based on image signature
CN107040790A (en) * 2017-04-01 2017-08-11 华南理工大学 A kind of video content certification and tampering location method based on many granularity Hash
KR101993266B1 (en) * 2018-12-19 2019-06-26 주식회사 로민 method for designing and learning varying model and method for detecting video forgeries therewith

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080193031A1 (en) * 2007-02-09 2008-08-14 New Jersey Institute Of Technology Method and apparatus for a natural image model based approach to image/splicing/tampering detection
CN101876532A (en) * 2010-05-25 2010-11-03 大连理工大学 Camera on-field calibration method in measuring system
CN102194208A (en) * 2011-05-26 2011-09-21 西安理工大学 Image falsification detecting and falsification positioning method based on image signature
CN107040790A (en) * 2017-04-01 2017-08-11 华南理工大学 A kind of video content certification and tampering location method based on many granularity Hash
KR101993266B1 (en) * 2018-12-19 2019-06-26 주식회사 로민 method for designing and learning varying model and method for detecting video forgeries therewith

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
KORMAN S, AVIDAN S: "Coherency sensitive hashing", IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, vol. 38, no. 6, pages 1100 *
YANFEN GAN,JUNLIU ZHONG: "Research on Copy-Move Image Forgery Detection Using Features of Discrete Polar Complex Exponential Transform", INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS,, vol. 25, no. 14, pages 1 - 7 *
李硕: "面向局部区域复制的图像篡改检测技术研究", 《中国优秀硕士学位论文全文数据库信息科技辑》, no. 04, pages 138 - 2626 *
李硕: "面向局部区域复制的图像篡改检测技术研究", pages 138 - 2626 *
杜玲 等: "图像篡改检测感知哈希技术综述", 《计算机科学与探索》, vol. 13, no. 5, pages 722 *

Similar Documents

Publication Publication Date Title
Meena et al. A copy-move image forgery detection technique based on tetrolet transform
Davarzani et al. Copy-move forgery detection using multiresolution local binary patterns
Al-Qershi et al. Passive detection of copy-move forgery in digital images: State-of-the-art
Li Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
Yan et al. Quaternion-based image hashing for adaptive tampering localization
Yan et al. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection
Yu et al. Feature point-based copy-move forgery detection: covering the non-textured areas
Wang et al. Robust copy–move forgery detection using quaternion exponent moments
Fadl et al. Robust copy–move forgery revealing in digital images using polar coordinate system
Meena et al. A copy-move image forgery detection technique based on Gaussian-Hermite moments
Zhang et al. A Survey on Passive Image Copy-Move Forgery Detection.
Kaur et al. Image forgery techniques: a review
Zhou et al. Digital image modification detection using color information and its histograms
Huang et al. Perceptual image hashing with locality preserving projection for copy detection
CN110852311A (en) Three-dimensional human hand key point positioning method and device
Lin et al. Region duplication detection based on image segmentation and keypoint contexts
CN102609947B (en) Forgery detection method for spliced and distorted digital photos
Nirmal Jothi et al. Tampering detection using hybrid local and global features in wavelet-transformed space with digital images
Yang et al. Design of cyber-physical-social systems with forensic-awareness based on deep learning
Fatima et al. FAST, BRIEF and SIFT based image copy-move forgery detection technique
Meena et al. Image splicing forgery detection techniques: A review
Ashraf et al. An efficient forensic approach for copy-move forgery detection via discrete wavelet transform
CN107040790A (en) A kind of video content certification and tampering location method based on many granularity Hash
Mehta et al. Copy-move image forgery detection using DCT and ORB feature set
Doegar et al. A review of passive image cloning detection approaches

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200124