WO2019061661A1 - Image tamper detecting method, electronic device and readable storage medium - Google Patents

Image tamper detecting method, electronic device and readable storage medium Download PDF

Info

Publication number
WO2019061661A1
WO2019061661A1 PCT/CN2017/108765 CN2017108765W WO2019061661A1 WO 2019061661 A1 WO2019061661 A1 WO 2019061661A1 CN 2017108765 W CN2017108765 W CN 2017108765W WO 2019061661 A1 WO2019061661 A1 WO 2019061661A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
detected
data set
recognition model
grid
Prior art date
Application number
PCT/CN2017/108765
Other languages
French (fr)
Chinese (zh)
Inventor
王健宗
王晨羽
马进
肖京
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019061661A1 publication Critical patent/WO2019061661A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/50Extraction of image or video features by performing operations within image blocks; by using histograms, e.g. histogram of oriented gradients [HoG]; by summing image-intensity values; Projection analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/10Segmentation; Edge detection
    • G06T7/11Region-based segmentation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/90Determination of colour characteristics

Definitions

  • the present application relates to the field of computer technologies, and in particular, to an image tamper detecting method, an electronic device, and a readable storage medium.
  • the purpose of the present application is to provide an image tamper detecting method, an electronic device, and a readable storage medium, which are intended to enable detection of tampering image types and not limited to JPEG, to detect tampering of different types of images.
  • a first aspect of the present application provides an electronic device including a memory, a processor, and an image tamper detecting system operable on the processor, the image tampering
  • the detection system implements the following steps when executed by the processor:
  • the second aspect of the present application provides an image tampering detection method, where the image tampering detection method includes:
  • Step 1 performing block segmentation on the detected image, and dividing the image to be detected into several Presetting a grid image block of a specification, and extracting a preset number of tamper detecting features from a plurality of grid image blocks;
  • Step 2 Identify the image to be detected based on a preset number of tamper detection features and a predetermined recognition model, and analyze whether the image to be detected is tampered according to the recognition result; wherein the predetermined recognition model is A deep neural network model obtained by training a sample picture marked with different tamper trace features in advance.
  • the predetermined recognition model is A deep neural network model obtained by training a sample picture marked with different tamper trace features in advance.
  • a third aspect of the present application provides a computer readable storage medium storing an image tamper detecting system, the image tamper detecting system being executable by at least one processor to cause the at least one processor The steps of the image tampering detection method as described above are performed.
  • the image tamper detecting method, system and readable storage medium proposed by the present application identify a detected image by using a deep neural network model obtained by training a plurality of sample images marked with different tamper trace features, and analyzing the detected image according to the recognition result Whether the image to be detected has been tampered with.
  • the tamper detection feature is extracted from each grid image block by dividing the image to be detected into a plurality of grid image blocks, and the extracted tamper detection feature is identified by using a pre-trained deep neural network model to It is recognized that the image to be detected has tampering marks, and does not depend on the traditional JPEG compression trace detection algorithm, so that the type of tamper-detected image can be detected and is not limited to the JPEG format, and detection of different types of image tampering is realized.
  • FIG. 1 is a schematic diagram of an operating environment of a preferred embodiment of an image tamper detecting system 10 of the present application;
  • FIG. 2 is a schematic structural diagram of an optional identification model according to various embodiments of the present application.
  • FIG. 3 is a schematic flowchart diagram of an embodiment of an image tampering detection method according to the present application.
  • FIG. 1 is a schematic diagram of an operating environment of a preferred embodiment of the image tamper detecting system 10 of the present application.
  • the image tamper detecting system 10 is installed and operated in the electronic device 1.
  • the electronic device 1 may include, but is not limited to, a memory 11, a processor 12, and a display 13.
  • Figure 1 shows only the electronic device 1 with components 11-13, but it should be understood that not all illustrated components may be implemented, and more or fewer components may be implemented instead.
  • the memory 11 comprises at least one type of readable storage medium, which in some embodiments may be an internal storage unit of the electronic device 1, such as a hard disk or memory of the electronic device 1.
  • the memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in hard disk equipped on the electronic device 1, a smart memory card (SMC), and a secure digital device. (Secure Digital, SD) card, flash card, etc.
  • the memory 11 may also include both an internal storage unit of the electronic device 1 and an external storage device.
  • the memory 11 is configured to store application software and various types of data installed in the electronic device 1, such as program codes of the image tamper detecting system 10, and the like.
  • the memory 11 can also be used to temporarily store data that has been output or is about to be output.
  • the processor 12 in some embodiments, may be a central processing unit (CPU), a microprocessor or other data processing chip for running program code or processing data stored in the memory 11, for example
  • CPU central processing unit
  • microprocessor or other data processing chip for running program code or processing data stored in the memory 11, for example
  • the image tampering detection system 10 and the like are executed.
  • the display 13 in some embodiments may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch sensor, or the like.
  • the display 13 is for displaying information processed in the electronic device 1 and a user interface for displaying visualization, such as an image to be detected, image tampering information, and the like.
  • the components 11-13 of the electronic device 1 communicate with one another via a system bus.
  • the image tamper detecting system 10 includes at least one computer readable instructions stored in the memory 11, the at least one computer readable instructions being executable by the processor 12 to implement various embodiments of the present application.
  • Step S1 performing block segmentation on the image to be detected, dividing the image to be detected into a plurality of grid image blocks of a preset specification, and extracting a preset number of tamper detecting features from the plurality of grid image blocks.
  • the image tampering detection system 10 receives an image tampering detection request sent by a user, which includes, but is not limited to, JPEG, PNG, and the image to be detected.
  • a user which includes, but is not limited to, JPEG, PNG, and the image to be detected.
  • Various formats such as GIF.
  • receiving an image tampering detection request sent by a user through a terminal such as a mobile phone, a tablet computer, or a self-service terminal device, such as receiving an image tampering detection request sent by a user on a client pre-installed in a terminal such as a mobile phone, a tablet computer, or a self-service terminal device.
  • a preset number of tamper detection features are presented.
  • the image to be detected is first converted from an original color space (for example, an RGB color space) to a YCrCb color space; and the image to be detected is subjected to block segmentation, and the image is to be detected.
  • the detected image is divided into a number of 16*16 grid image blocks.
  • the image to be detected is divided into 16*16 pixel grid image blocks for feature extraction, which is generally divided into 32*32 pixels in the conventional segmentation process, and the grid image is in this embodiment.
  • the block is reduced to a quarter of the conventional segmentation specification, and each detail feature of the image to be detected can be extracted in a more detailed manner, and each 16*16 is obtained by using Dobecy wavelet, Dobecy orthogonal, and the like.
  • the summary statistical coefficient of the grid image block of the pixel is used as the tamper detection feature, which can make the extracted tamper detection feature more accurate.
  • Step S2 Identify the image to be detected based on a preset number of tamper detecting features and a predetermined recognition model, and analyze whether the image to be detected is tampered according to the recognition result; wherein the predetermined recognition model is A deep neural network model obtained by training a sample picture marked with different tamper trace features in advance.
  • the predetermined recognition model is A deep neural network model obtained by training a sample picture marked with different tamper trace features in advance.
  • the image to be detected may be identified based on the extracted preset number of tamper detecting features and a predetermined recognition model. And analyzing whether the image to be detected is tampered with according to the recognition result.
  • the recognition model can be continuously trained, learned, verified, optimized, etc. by identifying a large number of sample images marked with different tamper trace features, so as to train them into models capable of accurately identifying various tamper trace features. For example, a plurality of sample pictures corresponding to common picture tampering trace features may be prepared, such as in a picture.
  • a specific location (such as the upper left corner, the lower left corner, the upper right corner, the lower right corner, the top end, the micro end, the middle right) is pasted with a tampering image of a signature, a watermark, etc., and the corresponding tampering trace features can be marked, and different tampering marks are marked for the label.
  • the sample picture of the feature is trained, learned, verified, optimized, etc. to generate a recognition model.
  • the recognition model may be a Convolutional Neural Network (CNN) model, a stack-type automatic encoder, etc., and is not limited herein.
  • the training process of the recognition model is as follows:
  • the final label is not the tampering part of the image sample, but the tampering trace of the image sample, which is equivalent to the feature of training the tampering trace, instead of tampering with the content, and marking the tampering trace as 1 ( Positive class), other labels are 0 (negative class), the segmented grid image block is reduced to a quarter of the traditional segmentation specification (32*32 pixels to 16*16 pixels), which can better train and identify The traces of slender tampering that are common in practical applications are more practical.
  • All image samples are divided into a first data set and a second data set according to a ratio of X:Y (for example, 8:2), and the number of image samples in the first data set is greater than the number of image samples in the second data set, first The data set is used as a training set, and the second data set is used as a test set, wherein X is greater than 0 and Y is greater than 0;
  • the recognition model is used to identify that the image to be detected has a tampering mark feature, It is analyzed that the image to be detected has been tampered with; if the image to be detected does not have the tampering trace feature by using the predetermined recognition model, then the image to be detected is analyzed and not falsified.
  • the embodiment identifies the image to be detected by using a deep neural network model obtained by training a plurality of sample pictures marked with different tamper trace features, and analyzes whether the image to be detected is tampered with according to the recognition result. .
  • the image to be detected is divided into a plurality of grid image blocks, the tamper detection features are extracted from the respective grid image blocks, and the extracted tamper detection features are identified by the pre-trained deep neural network model to identify Whether the image to be detected has tampering marks does not depend on the traditional JPEG compression trace detection algorithm, so that the type of tamper-detected image can be detected and is not limited to the JPEG format, and detection of different types of image tampering is realized.
  • the predetermined recognition model is a deep neural network model that is a fully connected layer, and the number of neurons in the deep neural network model They are 450, 500, 256, 128, and 2, respectively, where 450 is the number of input features, 500, 256, and 128 are the preset number of hidden features, and 2 is the number of final classification categories.
  • FIG. 2 it is a schematic structural diagram of an optional identification model according to various embodiments of the present application. Extracting a preset number, such as 450 tamper detection features, from a plurality of grid image blocks after the image block to be detected is segmented, and inputting the extracted 450 tamper detection features as input features of the deep neural network model into the depth neural network.
  • the input layer of the model is processed by the hidden layer 1 of the deep neural network model, the hidden layer 2, and the hidden layer 3 to perform feature reduction filtering, etc., to reach the final classification layer, and output the final two classification results.
  • it is "not falsified” and "tampered", thereby completing image tampering detection of the image to be detected.
  • FIG. 3 is a schematic flowchart of an image tampering detection method according to an embodiment of the present invention.
  • the image tampering detection method includes the following steps:
  • Step S10 Perform block segmentation on the image to be detected, divide the image to be detected into a plurality of grid image blocks of a preset specification, and extract a preset number of tamper detecting features from the plurality of grid image blocks.
  • the image tampering detection system receives an image tampering detection request sent by the user, which includes, but is not limited to, JPEG, PNG, GIF, and the like.
  • receiving an image tampering detection request sent by a user through a terminal such as a mobile phone, a tablet computer, or a self-service terminal device, such as receiving an image tampering detection request sent by a user on a client pre-installed in a terminal such as a mobile phone, a tablet computer, or a self-service terminal device.
  • a preset number of tamper detection features are presented.
  • the image to be detected is first converted from an original color space (for example, an RGB color space) to a YCrCb color space; and the image to be detected is subjected to block segmentation, and the image is to be detected.
  • the detected image is divided into a number of 16*16 grid image blocks.
  • each YCrCb color space component such as a plurality of levels (for example, 3 levels) of 2D Daubechies Wavelet decomposition to obtain a plurality of (for example, 30) corresponding ones.
  • a coefficient map which calculates a summary statistical coefficient for each of the pixel coefficient mappings (for example, a pixel standard deviation corresponding to a pixel coefficient map of each grid image block, a pixel mean and a pixel sum, and a horizontal direction, a vertical direction, and a pair The coefficient of the angular direction), and apply wavelet functions such as Doubeches Orthogonal wavelets D2-D5 to obtain multiple summary statistical coefficients on each grid image block, and transform the summary statistical coefficients of all grid image blocks.
  • multiple summary statistical coefficients are obtained as tamper detection features. For example, 450 features can be obtained as tamper detection features.
  • the image to be detected is divided into 16*16 pixel grid image blocks for feature extraction, which is generally divided into 32*32 pixels in the conventional segmentation process, and the grid image is in this embodiment.
  • the block is reduced to a quarter of the conventional segmentation specification, and each detail feature of the image to be detected can be extracted in a more detailed manner, and each 16*16 is obtained by using Dobecy wavelet, Dobecy orthogonal, and the like.
  • the summary statistical coefficient of the grid image block of the pixel is used as the tamper detection feature, which can make the extracted tamper detection feature more accurate.
  • Step S20 Identify the image to be detected based on a preset number of tamper detecting features and a predetermined recognition model, and analyze whether the image to be detected is tampered according to the recognition result; wherein the predetermined recognition model is A deep neural network model obtained by training a sample picture marked with different tamper trace features in advance.
  • the image to be detected After extracting a preset number of tamper detecting features from the plurality of mesh image blocks after the image block to be detected is divided, the image to be detected may be identified based on the extracted preset number of tamper detecting features and a predetermined recognition model. And analyzing whether the image to be detected is tampered with according to the recognition result.
  • the recognition model can be continuously trained, learned, verified, optimized, etc. by identifying a large number of sample images marked with different tamper trace features, so as to train them into models capable of accurately identifying various tamper trace features.
  • a plurality of sample pictures corresponding to a common picture tampering trace feature may be prepared, such as a signature, a watermark at a specific position of the picture (eg, upper left corner, lower left corner, upper right corner, lower right corner, top end, micro end, medium middle).
  • the tampering pictures can be labeled with different tamper trace features, and the sample images with different tamper trace features are trained, learned, verified, optimized, etc. to generate the recognition model.
  • the recognition model may be a Convolutional Neural Network (CNN) model, a stack-type automatic encoder, etc., and is not limited herein.
  • CNN Convolutional Neural Network
  • the training process of the recognition model is as follows:
  • the final label is not the tampering part of the image sample, but the tampering trace of the image sample, which is equivalent to the feature of training the tampering trace, instead of tampering with the content, and marking the tampering trace as 1 ( Positive class), other labels are 0 (negative class), the segmented grid image block is reduced to a quarter of the traditional segmentation specification (32*32 pixels to 16*16 pixels), which can better train and identify The traces of slender tampering that are common in practical applications are more practical.
  • All image samples are divided into a first data set and a second data set according to a ratio of X:Y (for example, 8:2), and the number of image samples in the first data set is greater than the number of image samples in the second data set, first The data set is used as a training set, and the second data set is used as a test set, wherein X is greater than 0 and Y is greater than 0;
  • the recognition model is used to identify that the image to be detected has a tampering mark feature, It is analyzed that the image to be detected has been tampered with; if the image to be detected does not have the tampering trace feature by using the predetermined recognition model, then the image to be detected is analyzed and not falsified.
  • the embodiment identifies the image to be detected by using a deep neural network model obtained by training a plurality of sample pictures marked with different tamper trace features, and analyzes whether the image to be detected is tampered with according to the recognition result. .
  • the tamper detection feature is extracted from each grid image block by dividing the image to be detected into a plurality of grid image blocks, and the extracted tamper detection feature is identified by using a pre-trained deep neural network model to It is recognized that the image to be detected has tampering marks, and does not depend on the traditional JPEG compression trace detection algorithm, so that the type of tamper-detected image can be detected and is not limited to the JPEG format, and detection of different types of image tampering is realized.
  • the predetermined recognition model is a deep neural network model that is a fully connected layer, and the number of neurons in the deep neural network model is 450 respectively.
  • 500, 256, 128, 2 wherein 450 is the number of input features, 500, 256, 128 are the number of preset hidden features, and 2 is the number of final classification categories.
  • FIG. 2 it is a schematic structural diagram of an optional identification model according to various embodiments of the present application. Extracting a preset number, such as 450 tamper detection features, from a plurality of grid image blocks after the image block to be detected is segmented, and inputting the extracted 450 tamper detection features as input features of the deep neural network model into the depth neural network.
  • the input layer of the model is processed by the hidden layer 1 of the deep neural network model, the hidden layer 2, and the hidden layer 3 to perform feature reduction filtering, etc., to reach the final classification layer, and output the final two classification results.
  • it is "not falsified” and "tampered", thereby completing image tampering detection of the image to be detected.
  • the present application also provides a computer readable storage medium storing an image tamper detecting system, the image tamper detecting system being executable by at least one processor to cause the at least one processor.
  • the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and can also be implemented by hardware, but in many cases, the former is A better implementation.
  • the technical solution of the present application which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Image Analysis (AREA)

Abstract

An image tamper detecting method, an electronic device (1) and a readable storage medium, said method comprising: segmenting an image, which is to be detected, into blocks: segmenting the image, which is to be detected, into several grid image blocks having a preset specification, and extracting, from the several grid image blocks, a preset number of tamper detection features (S10); identifying, on the basis of the preset number of tamper detection features and a pre-determined identification model, the image which is to be detected, and analyzing, according to an identification result, whether the image, which is to be detected, is tampered (S20), the pre-determined identification model being a deep neural network model which is obtained by previously training sample pictures labeled with different tamper trace features. Said method enables that the type of tampered image which can be detected is not only limited to a JPEG format, realizing detection of different types of image tamper.

Description

图像篡改检测方法、电子装置及可读存储介质Image tamper detecting method, electronic device and readable storage medium
本申请基于巴黎公约申明享有2017年9月30日递交的申请号为CN 201710916508.X、名称为“图像篡改检测方法、电子装置及可读存储介质”中国专利申请的优先权,该中国专利申请的整体内容以参考的方式结合在本申请中。The present application is based on the priority of the Chinese Patent Application entitled "Image Tamper Detection Method, Electronic Device and Readable Storage Medium", filed on September 30, 2017, with the application number of CN 201710916508.X, which is filed on September 30, 2017. The overall content is incorporated herein by reference.
技术领域Technical field
本申请涉及计算机技术领域,尤其涉及一种图像篡改检测方法、电子装置及可读存储介质。The present application relates to the field of computer technologies, and in particular, to an image tamper detecting method, an electronic device, and a readable storage medium.
背景技术Background technique
随着Adobe Photoshop、ACDSee等数字图像编辑工具的广泛普及,使越来越多用户对数字照片进行自由随意的修改,同时也给一些带有非法目的的恶意用户可乘之机,在未经授权的情况下对图像内容进行非法操作,如合成虚假、违规编辑等,从而造成危害。现有的传统算法只能针对图像类型为JPEG格式的图片篡改进行检测,使得能够进行图像篡改检测的图像格式比较单一。With the widespread popularity of digital image editing tools such as Adobe Photoshop and ACDSee, more and more users are free to modify digital photos at will, and some malicious users with illegal purposes can take advantage of them. In the case of illegal operation of the image content, such as synthetic false, illegal editing, etc., resulting in harm. The existing conventional algorithms can only detect tampering of images whose image type is JPEG format, so that the image format capable of image tampering detection is relatively simple.
发明内容Summary of the invention
本申请的目的在于提供一种图像篡改检测方法、电子装置及可读存储介质,旨在使能检测篡改的图像类型并不仅限于JPEG,实现对不同类型图像的篡改进行检测。The purpose of the present application is to provide an image tamper detecting method, an electronic device, and a readable storage medium, which are intended to enable detection of tampering image types and not limited to JPEG, to detect tampering of different types of images.
为实现上述目的,本申请第一方面提供一种电子装置,所述电子装置包括存储器、处理器,所述存储器上存储有可在所述处理器上运行的图像篡改检测系统,所述图像篡改检测系统被所述处理器执行时实现如下步骤:To achieve the above object, a first aspect of the present application provides an electronic device including a memory, a processor, and an image tamper detecting system operable on the processor, the image tampering The detection system implements the following steps when executed by the processor:
A、对待检测图像进行块分割,将所述待检测图像分成若干预设规格的网格图像块,并从若干网格图像块中提取出预设数量的篡改检测特征;A. performing block segmentation on the image to be detected, dividing the image to be detected into a plurality of grid image blocks of preset specifications, and extracting a preset number of tamper detecting features from the plurality of grid image blocks;
B、基于预设数量的篡改检测特征及预先确定的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改;其中,所述预先确定的识别模型为预先通过对标注有不同篡改痕迹特征的样本图片进行训练得到的深度神经网络模型。B. Identifying the image to be detected based on a preset number of tamper detection features and a predetermined recognition model, and analyzing whether the image to be detected is tampered according to the recognition result; wherein the predetermined recognition model is A deep neural network model obtained by training sample pictures marked with different tamper trace features.
本申请第二方面提供一种图像篡改检测方法,所述图像篡改检测方法包括:The second aspect of the present application provides an image tampering detection method, where the image tampering detection method includes:
步骤一、对待检测图像进行块分割,将所述待检测图像分成若干 预设规格的网格图像块,并从若干网格图像块中提取出预设数量的篡改检测特征;Step 1: performing block segmentation on the detected image, and dividing the image to be detected into several Presetting a grid image block of a specification, and extracting a preset number of tamper detecting features from a plurality of grid image blocks;
步骤二、基于预设数量的篡改检测特征及预先确定的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改;其中,所述预先确定的识别模型为预先通过对标注有不同篡改痕迹特征的样本图片进行训练得到的深度神经网络模型。Step 2: Identify the image to be detected based on a preset number of tamper detection features and a predetermined recognition model, and analyze whether the image to be detected is tampered according to the recognition result; wherein the predetermined recognition model is A deep neural network model obtained by training a sample picture marked with different tamper trace features in advance.
本申请第三方面提供一种计算机可读存储介质,所述计算机可读存储介质存储有图像篡改检测系统,所述图像篡改检测系统可被至少一个处理器执行,以使所述至少一个处理器执行如上述的图像篡改检测方法的步骤。A third aspect of the present application provides a computer readable storage medium storing an image tamper detecting system, the image tamper detecting system being executable by at least one processor to cause the at least one processor The steps of the image tampering detection method as described above are performed.
本申请提出的图像篡改检测方法、系统及可读存储介质,通过基于标注有不同篡改痕迹特征的若干样本图片进行训练得到的深度神经网络模型来对待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改。由于是通过将待检测图像进行块分割成若干网格图像块,从各个网格图像块中提取出篡改检测特征,并利用预先训练好的深度神经网络模型对提取的篡改检测特征进行识别,以识别出待检测图像是否有篡改痕迹,并不依赖于传统的JPEG压缩痕迹检测算法,使得能检测篡改的图像类型并不仅限于JPEG格式,实现对不同类型图像篡改进行检测。The image tamper detecting method, system and readable storage medium proposed by the present application identify a detected image by using a deep neural network model obtained by training a plurality of sample images marked with different tamper trace features, and analyzing the detected image according to the recognition result Whether the image to be detected has been tampered with. The tamper detection feature is extracted from each grid image block by dividing the image to be detected into a plurality of grid image blocks, and the extracted tamper detection feature is identified by using a pre-trained deep neural network model to It is recognized that the image to be detected has tampering marks, and does not depend on the traditional JPEG compression trace detection algorithm, so that the type of tamper-detected image can be detected and is not limited to the JPEG format, and detection of different types of image tampering is realized.
附图说明DRAWINGS
图1为本申请图像篡改检测系统10较佳实施例的运行环境示意图;1 is a schematic diagram of an operating environment of a preferred embodiment of an image tamper detecting system 10 of the present application;
图2为本申请各个实施例一可选的识别模型的结构示意图;2 is a schematic structural diagram of an optional identification model according to various embodiments of the present application;
图3为本申请图像篡改检测方法一实施例的流程示意图。FIG. 3 is a schematic flowchart diagram of an embodiment of an image tampering detection method according to the present application.
具体实施方式Detailed ways
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。In order to make the objects, technical solutions, and advantages of the present application more comprehensible, the present application will be further described in detail below with reference to the accompanying drawings and embodiments. It is understood that the specific embodiments described herein are merely illustrative of the application and are not intended to be limiting. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without departing from the inventive scope are the scope of the present application.
需要说明的是,在本申请中涉及“第一”、“第二”等的描述仅用于描述目的,而不能理解为指示或暗示其相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现 为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本申请要求的保护范围之内。It should be noted that the descriptions of "first", "second" and the like in the present application are for the purpose of description only, and are not to be construed as indicating or implying their relative importance or implicitly indicating the number of technical features indicated. . Thus, features defining "first" and "second" may include at least one of the features, either explicitly or implicitly. In addition, the technical solutions between the various embodiments may be combined with each other, but must be implemented by those skilled in the art. On the basis of this, when the combination of technical solutions is contradictory or impossible to achieve, it should be considered that the combination of such technical solutions does not exist and is not within the protection scope of the present application.
本申请提供一种图像篡改检测系统。请参阅图1,是本申请图像篡改检测系统10较佳实施例的运行环境示意图。The application provides an image tampering detection system. Please refer to FIG. 1 , which is a schematic diagram of an operating environment of a preferred embodiment of the image tamper detecting system 10 of the present application.
在本实施例中,所述的图像篡改检测系统10安装并运行于电子装置1中。该电子装置1可包括,但不仅限于,存储器11、处理器12及显示器13。图1仅示出了具有组件11-13的电子装置1,但是应理解的是,并不要求实施所有示出的组件,可以替代的实施更多或者更少的组件。In the embodiment, the image tamper detecting system 10 is installed and operated in the electronic device 1. The electronic device 1 may include, but is not limited to, a memory 11, a processor 12, and a display 13. Figure 1 shows only the electronic device 1 with components 11-13, but it should be understood that not all illustrated components may be implemented, and more or fewer components may be implemented instead.
所述存储器11至少包括一种类型的可读存储介质,所述存储器11在一些实施例中可以是所述电子装置1的内部存储单元,例如该电子装置1的硬盘或内存。所述存储器11在另一些实施例中也可以是所述电子装置1的外部存储设备,例如所述电子装置1上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器11还可以既包括所述电子装置1的内部存储单元也包括外部存储设备。所述存储器11用于存储安装于所述电子装置1的应用软件及各类数据,例如所述图像篡改检测系统10的程序代码等。所述存储器11还可以用于暂时地存储已经输出或者将要输出的数据。The memory 11 comprises at least one type of readable storage medium, which in some embodiments may be an internal storage unit of the electronic device 1, such as a hard disk or memory of the electronic device 1. The memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in hard disk equipped on the electronic device 1, a smart memory card (SMC), and a secure digital device. (Secure Digital, SD) card, flash card, etc. Further, the memory 11 may also include both an internal storage unit of the electronic device 1 and an external storage device. The memory 11 is configured to store application software and various types of data installed in the electronic device 1, such as program codes of the image tamper detecting system 10, and the like. The memory 11 can also be used to temporarily store data that has been output or is about to be output.
所述处理器12在一些实施例中可以是一中央处理器(Central Processing Unit,CPU),微处理器或其他数据处理芯片,用于运行所述存储器11中存储的程序代码或处理数据,例如执行所述图像篡改检测系统10等。The processor 12, in some embodiments, may be a central processing unit (CPU), a microprocessor or other data processing chip for running program code or processing data stored in the memory 11, for example The image tampering detection system 10 and the like are executed.
所述显示器13在一些实施例中可以是LED显示器、液晶显示器、触控式液晶显示器以及OLED(Organic Light-Emitting Diode,有机发光二极管)触摸器等。所述显示器13用于显示在所述电子装置1中处理的信息以及用于显示可视化的用户界面,例如待检测图像、图像篡改信息等。所述电子装置1的部件11-13通过系统总线相互通信。The display 13 in some embodiments may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch sensor, or the like. The display 13 is for displaying information processed in the electronic device 1 and a user interface for displaying visualization, such as an image to be detected, image tampering information, and the like. The components 11-13 of the electronic device 1 communicate with one another via a system bus.
所述图像篡改检测系统10包括至少一个存储在所述存储器11中的计算机可读指令,该至少一个计算机可读指令可被所述处理器12执行,以实现本申请各实施例。The image tamper detecting system 10 includes at least one computer readable instructions stored in the memory 11, the at least one computer readable instructions being executable by the processor 12 to implement various embodiments of the present application.
其中,上述图像篡改检测系统10被所述处理器12执行时实现如下步骤:Wherein, when the image tampering detection system 10 is executed by the processor 12, the following steps are implemented:
步骤S1,对待检测图像进行块分割,将所述待检测图像分成若干预设规格的网格图像块,并从若干网格图像块中提取出预设数量的篡改检测特征。Step S1: performing block segmentation on the image to be detected, dividing the image to be detected into a plurality of grid image blocks of a preset specification, and extracting a preset number of tamper detecting features from the plurality of grid image blocks.
本实施例中,图像篡改检测系统10接收用户发出的包含待检测图片的图像篡改检测请求,该待检测图片包括但不限于JPEG、PNG、 GIF等各种格式类型。例如,接收用户通过手机、平板电脑、自助终端设备等终端发送的图像篡改检测请求,如接收用户在手机、平板电脑、自助终端设备等终端中预先安装的客户端上发送来的图像篡改检测请求,或接收用户在手机、平板电脑、自助终端设备等终端中的浏览器系统上发送来的图像篡改检测请求。In this embodiment, the image tampering detection system 10 receives an image tampering detection request sent by a user, which includes, but is not limited to, JPEG, PNG, and the image to be detected. Various formats such as GIF. For example, receiving an image tampering detection request sent by a user through a terminal such as a mobile phone, a tablet computer, or a self-service terminal device, such as receiving an image tampering detection request sent by a user on a client pre-installed in a terminal such as a mobile phone, a tablet computer, or a self-service terminal device. Or receiving an image tampering detection request sent by the user on a browser system in a terminal such as a mobile phone, a tablet, or a self-service terminal device.
对接收到的待检测图像进行块分割,将所述待检测图像分成若干预设规格(如N*M,N和M为正整数)的网格图像块,并从若干网格图像块中提取出预设数量的篡改检测特征。例如,在一种可选的实施方式中,首先将所述待检测图像从原始颜色空间(例如,RGB颜色空间)转换到YCrCb颜色空间;对所述待检测图像进行块分割,将所述待检测图像分成若干16*16的网格图像块。再在每个网格图像块上的每个YCrCb颜色空间分量上应用预设的小波函数如多个级别(例如,3个级别)的二维多贝西小波(2D Daubechies Wavelet)分解,以得到多个(例如,30个)对应的像素系数映射(Coefficient Map),对各个所述像素系数映射计算汇总统计系数(例如,每个网格图像块像素系数映射对应的像素标准差、像素均值和像素总和以及水平方向、垂直方向和对角方向的系数),并应用小波函数如多贝西正交Daubechies Orthogonal wavelets D2-D5在每个网格图像块上获得多个汇总统计系数,并对所有网格图像块的汇总统计系数进行变换,得到多个汇总统计系数作为篡改检测特征。例如,可得到450个特征作为篡改检测特征。Performing block division on the received image to be detected, dividing the image to be detected into a plurality of grid image blocks of preset specifications (such as N*M, N and M are positive integers), and extracting from a plurality of grid image blocks A preset number of tamper detection features are presented. For example, in an optional implementation manner, the image to be detected is first converted from an original color space (for example, an RGB color space) to a YCrCb color space; and the image to be detected is subjected to block segmentation, and the image is to be detected. The detected image is divided into a number of 16*16 grid image blocks. Applying a preset wavelet function to each YCrCb color space component on each grid image block, such as a plurality of levels (for example, 3 levels) of 2D Daubechies Wavelet decomposition, to obtain a plurality of (for example, 30) corresponding pixel coefficient maps (Coefficient Maps), and calculating summary statistical coefficients for each of the pixel coefficient maps (for example, pixel standard deviation, pixel mean value corresponding to each grid image block pixel coefficient map) The sum of the pixels and the coefficients in the horizontal, vertical, and diagonal directions), and apply wavelet functions such as Doubeches Orthogonal wavelets D2-D5 to obtain multiple summary statistical coefficients on each grid image block, and for all The summary statistical coefficients of the grid image blocks are transformed to obtain a plurality of summary statistical coefficients as tamper detection features. For example, 450 features can be obtained as tamper detection features.
本实施例中,将所述待检测图像进行块分割成16*16像素的网格图像块进行特征提取,相比传统的分割处理中一般分成32*32像素,本实施例中将网格图像块缩小为传统分割规格的四分之一,能更细致的提取所述待检测图像的每一细节特征,而且,利用多贝西小波、多贝西正交等方式来获取每一16*16像素的网格图像块的汇总统计系数作为篡改检测特征,能使得提取的篡改检测特征更加精确。In this embodiment, the image to be detected is divided into 16*16 pixel grid image blocks for feature extraction, which is generally divided into 32*32 pixels in the conventional segmentation process, and the grid image is in this embodiment. The block is reduced to a quarter of the conventional segmentation specification, and each detail feature of the image to be detected can be extracted in a more detailed manner, and each 16*16 is obtained by using Dobecy wavelet, Dobecy orthogonal, and the like. The summary statistical coefficient of the grid image block of the pixel is used as the tamper detection feature, which can make the extracted tamper detection feature more accurate.
步骤S2,基于预设数量的篡改检测特征及预先确定的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改;其中,所述预先确定的识别模型为预先通过对标注有不同篡改痕迹特征的样本图片进行训练得到的深度神经网络模型。Step S2: Identify the image to be detected based on a preset number of tamper detecting features and a predetermined recognition model, and analyze whether the image to be detected is tampered according to the recognition result; wherein the predetermined recognition model is A deep neural network model obtained by training a sample picture marked with different tamper trace features in advance.
从待检测图像块分割后的若干网格图像块中提取出预设数量的篡改检测特征之后,可基于提取出的预设数量篡改检测特征及预先确定的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改。该识别模型可预先通过对大量标注有不同篡改痕迹特征的样本图片进行识别来不断进行训练、学习、验证、优化等,以将其训练成能准确识别出各种不同篡改痕迹特征的模型。例如,可为常见的图片篡改痕迹特征准备对应的若干样本图片,如在图片的 特定位置(如左上角、左下角、右上角、右下角、顶端、微端、正中等)粘贴上签名、水印等的篡改图片,可标注对应的不同篡改痕迹特征,并针对标注有不同篡改痕迹特征的样本图片进行训练、学习、验证、优化等,以生成识别模型。该识别模型可采用深度卷积神经网络模型(Convolutional Neural Network,CNN)模型、栈式自动编码器等,在此不做限定。After extracting a preset number of tamper detecting features from the plurality of mesh image blocks after the image block to be detected is divided, the image to be detected may be identified based on the extracted preset number of tamper detecting features and a predetermined recognition model. And analyzing whether the image to be detected is tampered with according to the recognition result. The recognition model can be continuously trained, learned, verified, optimized, etc. by identifying a large number of sample images marked with different tamper trace features, so as to train them into models capable of accurately identifying various tamper trace features. For example, a plurality of sample pictures corresponding to common picture tampering trace features may be prepared, such as in a picture. A specific location (such as the upper left corner, the lower left corner, the upper right corner, the lower right corner, the top end, the micro end, the middle right) is pasted with a tampering image of a signature, a watermark, etc., and the corresponding tampering trace features can be marked, and different tampering marks are marked for the label. The sample picture of the feature is trained, learned, verified, optimized, etc. to generate a recognition model. The recognition model may be a Convolutional Neural Network (CNN) model, a stack-type automatic encoder, etc., and is not limited herein.
在一种可选的实施方式中,该识别模型的训练过程如下:In an optional implementation manner, the training process of the recognition model is as follows:
C、获取预设数量(例如,10万个)的图像样本;C. Obtain a preset number (for example, 100,000) of image samples;
D、对各个图像样本进行块分割,将各个图像样本分成16*16的网格图像块,并对每一网格图像块进行标注,将已篡改的网格图像块标注为1,未篡改的网格图像块标注为0,以对各个图像样本进行篡改痕迹特征的标注。本实施例中,最终标注的并不是图像样本的篡改部分,而是图像样本的篡改痕迹,相当于是在训练篡改痕迹的特征,而不是篡改内容的特征,而且,将篡改的痕迹标注为1(正类),别的标注为0(负类),分割的网格图像块缩小为传统分割规格的四分之一(32*32像素改为16*16像素),能更好的训练及识别出实际应用中常见的细长篡改痕迹,实用性更强。D. Perform block segmentation on each image sample, divide each image sample into 16*16 grid image blocks, and mark each grid image block, and mark the tampered grid image block as 1, untamed The grid image block is labeled as 0 to tamper with the trace features of each image sample. In this embodiment, the final label is not the tampering part of the image sample, but the tampering trace of the image sample, which is equivalent to the feature of training the tampering trace, instead of tampering with the content, and marking the tampering trace as 1 ( Positive class), other labels are 0 (negative class), the segmented grid image block is reduced to a quarter of the traditional segmentation specification (32*32 pixels to 16*16 pixels), which can better train and identify The traces of slender tampering that are common in practical applications are more practical.
E、将所有图像样本按照X:Y(例如,8:2)的比例分成第一数据集和第二数据集,第一数据集中的图像样本数量大于第二数据集中的图像样本数量,第一数据集作为训练集,第二数据集作为测试集,其中,X大于0,Y大于0;E. All image samples are divided into a first data set and a second data set according to a ratio of X:Y (for example, 8:2), and the number of image samples in the first data set is greater than the number of image samples in the second data set, first The data set is used as a training set, and the second data set is used as a test set, wherein X is greater than 0 and Y is greater than 0;
F、利用第一数据集中的各个图像样本训练所述预先确定的识别模型;F. training the predetermined recognition model by using each image sample in the first data set;
G、利用第二数据集中的各个图像样本验证训练的识别模型的准确率,若准确率大于或者等于预设准确率(例如,95%),则训练结束,或者,若准确率小于预设准确率,则增加图像样本的数量并重新执行上述步骤D、E、F和G,直至训练的识别模型的准确率大于或等于预设准确率。G. verifying the accuracy of the trained recognition model by using each image sample in the second data set. If the accuracy is greater than or equal to the preset accuracy (for example, 95%), the training ends, or if the accuracy is less than the preset accuracy Rate, then increase the number of image samples and re-execute the above steps D, E, F and G until the accuracy of the trained recognition model is greater than or equal to the preset accuracy.
在利用训练好的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改时,若利用所述识别模型识别出所述待检测图像具有篡改痕迹特征,则分析所述待检测图像已被篡改;若利用所述预先确定的识别模型识别出所述待检测图像不具有篡改痕迹特征,则分析所述待检测图像未被篡改。When the image to be detected is identified by using the trained recognition model, and the image to be detected is falsified according to the recognition result, if the recognition model is used to identify that the image to be detected has a tampering mark feature, It is analyzed that the image to be detected has been tampered with; if the image to be detected does not have the tampering trace feature by using the predetermined recognition model, then the image to be detected is analyzed and not falsified.
与现有技术相比,本实施例通过基于标注有不同篡改痕迹特征的若干样本图片进行训练得到的深度神经网络模型来对待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改。由于是通 过将待检测图像进行块分割成若干网格图像块,从各个网格图像块中提取出篡改检测特征,并利用预先训练好的深度神经网络模型对提取的篡改检测特征进行识别,以识别出待检测图像是否有篡改痕迹,并不依赖于传统的JPEG压缩痕迹检测算法,使得能检测篡改的图像类型并不仅限于JPEG格式,实现对不同类型图像篡改进行检测。Compared with the prior art, the embodiment identifies the image to be detected by using a deep neural network model obtained by training a plurality of sample pictures marked with different tamper trace features, and analyzes whether the image to be detected is tampered with according to the recognition result. . Because it is through The image to be detected is divided into a plurality of grid image blocks, the tamper detection features are extracted from the respective grid image blocks, and the extracted tamper detection features are identified by the pre-trained deep neural network model to identify Whether the image to be detected has tampering marks does not depend on the traditional JPEG compression trace detection algorithm, so that the type of tamper-detected image can be detected and is not limited to the JPEG format, and detection of different types of image tampering is realized.
在一可选的实施例中,在上述图1的实施例的基础上,所述预先确定的识别模型为都是全连接层的深度神经网络模型,该深度神经网络模型的神经元的个数分别是450、500、256、128、2,其中,450为输入特征的个数,500、256、128为预设的隐特征的个数,2为最终的分类类别的个数。In an optional embodiment, based on the foregoing embodiment of FIG. 1, the predetermined recognition model is a deep neural network model that is a fully connected layer, and the number of neurons in the deep neural network model They are 450, 500, 256, 128, and 2, respectively, where 450 is the number of input features, 500, 256, and 128 are the preset number of hidden features, and 2 is the number of final classification categories.
参阅图2,是本申请各个实施例一可选的识别模型的结构示意图。从待检测图像块分割后的若干网格图像块中提取出预设数量如450个篡改检测特征,并将提取出的450个篡改检测特征作为深度神经网络模型的输入特征输入至该深度神经网络模型的输入层,再依次经深度神经网络模型的隐含层1、隐含层2、隐含层3进行特征降维过滤等处理,到达最终的分类层,输出最终识别出的两种分类结果,在本实施例中即为“未篡改”和“已篡改”,从而完成对待检测图像的图像篡改检测。Referring to FIG. 2, it is a schematic structural diagram of an optional identification model according to various embodiments of the present application. Extracting a preset number, such as 450 tamper detection features, from a plurality of grid image blocks after the image block to be detected is segmented, and inputting the extracted 450 tamper detection features as input features of the deep neural network model into the depth neural network. The input layer of the model is processed by the hidden layer 1 of the deep neural network model, the hidden layer 2, and the hidden layer 3 to perform feature reduction filtering, etc., to reach the final classification layer, and output the final two classification results. In the present embodiment, it is "not falsified" and "tampered", thereby completing image tampering detection of the image to be detected.
如图3所示,图3为本申请图像篡改检测方法一实施例的流程示意图,该图像篡改检测方法包括以下步骤:As shown in FIG. 3, FIG. 3 is a schematic flowchart of an image tampering detection method according to an embodiment of the present invention. The image tampering detection method includes the following steps:
步骤S10,对待检测图像进行块分割,将所述待检测图像分成若干预设规格的网格图像块,并从若干网格图像块中提取出预设数量的篡改检测特征。Step S10: Perform block segmentation on the image to be detected, divide the image to be detected into a plurality of grid image blocks of a preset specification, and extract a preset number of tamper detecting features from the plurality of grid image blocks.
本实施例中,图像篡改检测系统接收用户发出的包含待检测图片的图像篡改检测请求,该待检测图片包括但不限于JPEG、PNG、GIF等各种格式类型。例如,接收用户通过手机、平板电脑、自助终端设备等终端发送的图像篡改检测请求,如接收用户在手机、平板电脑、自助终端设备等终端中预先安装的客户端上发送来的图像篡改检测请求,或接收用户在手机、平板电脑、自助终端设备等终端中的浏览器系统上发送来的图像篡改检测请求。In this embodiment, the image tampering detection system receives an image tampering detection request sent by the user, which includes, but is not limited to, JPEG, PNG, GIF, and the like. For example, receiving an image tampering detection request sent by a user through a terminal such as a mobile phone, a tablet computer, or a self-service terminal device, such as receiving an image tampering detection request sent by a user on a client pre-installed in a terminal such as a mobile phone, a tablet computer, or a self-service terminal device. Or receiving an image tampering detection request sent by the user on a browser system in a terminal such as a mobile phone, a tablet, or a self-service terminal device.
对接收到的待检测图像进行块分割,将所述待检测图像分成若干预设规格(如N*M,N和M为正整数)的网格图像块,并从若干网格图像块中提取出预设数量的篡改检测特征。例如,在一种可选的实施方式中,首先将所述待检测图像从原始颜色空间(例如,RGB颜色空间)转换到YCrCb颜色空间;对所述待检测图像进行块分割,将所述待检测图像分成若干16*16的网格图像块。再在每个网格图像块上的 每个YCrCb颜色空间分量上应用预设的小波函数如多个级别(例如,3个级别)的二维多贝西小波(2D Daubechies Wavelet)分解,以得到多个(例如,30个)对应的像素系数映射(Coefficient Map),对各个所述像素系数映射计算汇总统计系数(例如,每个网格图像块像素系数映射对应的像素标准差、像素均值和像素总和以及水平方向、垂直方向和对角方向的系数),并应用小波函数如多贝西正交Daubechies Orthogonal wavelets D2-D5在每个网格图像块上获得多个汇总统计系数,并对所有网格图像块的汇总统计系数进行变换,得到多个汇总统计系数作为篡改检测特征。例如,可得到450个特征作为篡改检测特征。Performing block division on the received image to be detected, dividing the image to be detected into a plurality of grid image blocks of preset specifications (such as N*M, N and M are positive integers), and extracting from a plurality of grid image blocks A preset number of tamper detection features are presented. For example, in an optional implementation manner, the image to be detected is first converted from an original color space (for example, an RGB color space) to a YCrCb color space; and the image to be detected is subjected to block segmentation, and the image is to be detected. The detected image is divided into a number of 16*16 grid image blocks. On each grid image block A preset wavelet function is applied to each YCrCb color space component such as a plurality of levels (for example, 3 levels) of 2D Daubechies Wavelet decomposition to obtain a plurality of (for example, 30) corresponding ones. a coefficient map (Coefficient Map), which calculates a summary statistical coefficient for each of the pixel coefficient mappings (for example, a pixel standard deviation corresponding to a pixel coefficient map of each grid image block, a pixel mean and a pixel sum, and a horizontal direction, a vertical direction, and a pair The coefficient of the angular direction), and apply wavelet functions such as Doubeches Orthogonal wavelets D2-D5 to obtain multiple summary statistical coefficients on each grid image block, and transform the summary statistical coefficients of all grid image blocks. , multiple summary statistical coefficients are obtained as tamper detection features. For example, 450 features can be obtained as tamper detection features.
本实施例中,将所述待检测图像进行块分割成16*16像素的网格图像块进行特征提取,相比传统的分割处理中一般分成32*32像素,本实施例中将网格图像块缩小为传统分割规格的四分之一,能更细致的提取所述待检测图像的每一细节特征,而且,利用多贝西小波、多贝西正交等方式来获取每一16*16像素的网格图像块的汇总统计系数作为篡改检测特征,能使得提取的篡改检测特征更加精确。In this embodiment, the image to be detected is divided into 16*16 pixel grid image blocks for feature extraction, which is generally divided into 32*32 pixels in the conventional segmentation process, and the grid image is in this embodiment. The block is reduced to a quarter of the conventional segmentation specification, and each detail feature of the image to be detected can be extracted in a more detailed manner, and each 16*16 is obtained by using Dobecy wavelet, Dobecy orthogonal, and the like. The summary statistical coefficient of the grid image block of the pixel is used as the tamper detection feature, which can make the extracted tamper detection feature more accurate.
步骤S20,基于预设数量的篡改检测特征及预先确定的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改;其中,所述预先确定的识别模型为预先通过对标注有不同篡改痕迹特征的样本图片进行训练得到的深度神经网络模型。Step S20: Identify the image to be detected based on a preset number of tamper detecting features and a predetermined recognition model, and analyze whether the image to be detected is tampered according to the recognition result; wherein the predetermined recognition model is A deep neural network model obtained by training a sample picture marked with different tamper trace features in advance.
从待检测图像块分割后的若干网格图像块中提取出预设数量的篡改检测特征之后,可基于提取出的预设数量篡改检测特征及预先确定的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改。该识别模型可预先通过对大量标注有不同篡改痕迹特征的样本图片进行识别来不断进行训练、学习、验证、优化等,以将其训练成能准确识别出各种不同篡改痕迹特征的模型。例如,可为常见的图片篡改痕迹特征准备对应的若干样本图片,如在图片的特定位置(如左上角、左下角、右上角、右下角、顶端、微端、正中等)粘贴上签名、水印等的篡改图片,可标注对应的不同篡改痕迹特征,并针对标注有不同篡改痕迹特征的样本图片进行训练、学习、验证、优化等,以生成识别模型。该识别模型可采用深度卷积神经网络模型(Convolutional Neural Network,CNN)模型、栈式自动编码器等,在此不做限定。After extracting a preset number of tamper detecting features from the plurality of mesh image blocks after the image block to be detected is divided, the image to be detected may be identified based on the extracted preset number of tamper detecting features and a predetermined recognition model. And analyzing whether the image to be detected is tampered with according to the recognition result. The recognition model can be continuously trained, learned, verified, optimized, etc. by identifying a large number of sample images marked with different tamper trace features, so as to train them into models capable of accurately identifying various tamper trace features. For example, a plurality of sample pictures corresponding to a common picture tampering trace feature may be prepared, such as a signature, a watermark at a specific position of the picture (eg, upper left corner, lower left corner, upper right corner, lower right corner, top end, micro end, medium middle). The tampering pictures can be labeled with different tamper trace features, and the sample images with different tamper trace features are trained, learned, verified, optimized, etc. to generate the recognition model. The recognition model may be a Convolutional Neural Network (CNN) model, a stack-type automatic encoder, etc., and is not limited herein.
在一种可选的实施方式中,该识别模型的训练过程如下:In an optional implementation manner, the training process of the recognition model is as follows:
C、获取预设数量(例如,10万个)的图像样本;C. Obtain a preset number (for example, 100,000) of image samples;
D、对各个图像样本进行块分割,将各个图像样本分成16*16的网格图像块,并对每一网格图像块进行标注,将已篡改的网格图像块标注为1,未篡改的网格图像块标注为0,以对各个图像样本进行篡改 痕迹特征的标注。本实施例中,最终标注的并不是图像样本的篡改部分,而是图像样本的篡改痕迹,相当于是在训练篡改痕迹的特征,而不是篡改内容的特征,而且,将篡改的痕迹标注为1(正类),别的标注为0(负类),分割的网格图像块缩小为传统分割规格的四分之一(32*32像素改为16*16像素),能更好的训练及识别出实际应用中常见的细长篡改痕迹,实用性更强。D. Perform block segmentation on each image sample, divide each image sample into 16*16 grid image blocks, and mark each grid image block, and mark the tampered grid image block as 1, untamed The grid image block is labeled 0 to tamper with each image sample Marking of trace features. In this embodiment, the final label is not the tampering part of the image sample, but the tampering trace of the image sample, which is equivalent to the feature of training the tampering trace, instead of tampering with the content, and marking the tampering trace as 1 ( Positive class), other labels are 0 (negative class), the segmented grid image block is reduced to a quarter of the traditional segmentation specification (32*32 pixels to 16*16 pixels), which can better train and identify The traces of slender tampering that are common in practical applications are more practical.
E、将所有图像样本按照X:Y(例如,8:2)的比例分成第一数据集和第二数据集,第一数据集中的图像样本数量大于第二数据集中的图像样本数量,第一数据集作为训练集,第二数据集作为测试集,其中,X大于0,Y大于0;E. All image samples are divided into a first data set and a second data set according to a ratio of X:Y (for example, 8:2), and the number of image samples in the first data set is greater than the number of image samples in the second data set, first The data set is used as a training set, and the second data set is used as a test set, wherein X is greater than 0 and Y is greater than 0;
F、利用第一数据集中的各个图像样本训练所述预先确定的识别模型;F. training the predetermined recognition model by using each image sample in the first data set;
G、利用第二数据集中的各个图像样本验证训练的识别模型的准确率,若准确率大于或者等于预设准确率(例如,95%),则训练结束,或者,若准确率小于预设准确率,则增加图像样本的数量并重新执行上述步骤D、E、F和G,直至训练的识别模型的准确率大于或等于预设准确率。G. verifying the accuracy of the trained recognition model by using each image sample in the second data set. If the accuracy is greater than or equal to the preset accuracy (for example, 95%), the training ends, or if the accuracy is less than the preset accuracy Rate, then increase the number of image samples and re-execute the above steps D, E, F and G until the accuracy of the trained recognition model is greater than or equal to the preset accuracy.
在利用训练好的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改时,若利用所述识别模型识别出所述待检测图像具有篡改痕迹特征,则分析所述待检测图像已被篡改;若利用所述预先确定的识别模型识别出所述待检测图像不具有篡改痕迹特征,则分析所述待检测图像未被篡改。When the image to be detected is identified by using the trained recognition model, and the image to be detected is falsified according to the recognition result, if the recognition model is used to identify that the image to be detected has a tampering mark feature, It is analyzed that the image to be detected has been tampered with; if the image to be detected does not have the tampering trace feature by using the predetermined recognition model, then the image to be detected is analyzed and not falsified.
与现有技术相比,本实施例通过基于标注有不同篡改痕迹特征的若干样本图片进行训练得到的深度神经网络模型来对待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改。由于是通过将待检测图像进行块分割成若干网格图像块,从各个网格图像块中提取出篡改检测特征,并利用预先训练好的深度神经网络模型对提取的篡改检测特征进行识别,以识别出待检测图像是否有篡改痕迹,并不依赖于传统的JPEG压缩痕迹检测算法,使得能检测篡改的图像类型并不仅限于JPEG格式,实现对不同类型图像篡改进行检测。Compared with the prior art, the embodiment identifies the image to be detected by using a deep neural network model obtained by training a plurality of sample pictures marked with different tamper trace features, and analyzes whether the image to be detected is tampered with according to the recognition result. . The tamper detection feature is extracted from each grid image block by dividing the image to be detected into a plurality of grid image blocks, and the extracted tamper detection feature is identified by using a pre-trained deep neural network model to It is recognized that the image to be detected has tampering marks, and does not depend on the traditional JPEG compression trace detection algorithm, so that the type of tamper-detected image can be detected and is not limited to the JPEG format, and detection of different types of image tampering is realized.
在一可选的实施例中,在上述实施例的基础上,所述预先确定的识别模型为都是全连接层的深度神经网络模型,该深度神经网络模型的神经元的个数分别是450、500、256、128、2,其中,450为输入特征的个数,500、256、128为预设的隐特征的个数,2为最终的分类类别的个数。 In an optional embodiment, based on the foregoing embodiment, the predetermined recognition model is a deep neural network model that is a fully connected layer, and the number of neurons in the deep neural network model is 450 respectively. 500, 256, 128, 2, wherein 450 is the number of input features, 500, 256, 128 are the number of preset hidden features, and 2 is the number of final classification categories.
参阅图2,是本申请各个实施例一可选的识别模型的结构示意图。从待检测图像块分割后的若干网格图像块中提取出预设数量如450个篡改检测特征,并将提取出的450个篡改检测特征作为深度神经网络模型的输入特征输入至该深度神经网络模型的输入层,再依次经深度神经网络模型的隐含层1、隐含层2、隐含层3进行特征降维过滤等处理,到达最终的分类层,输出最终识别出的两种分类结果,在本实施例中即为“未篡改”和“已篡改”,从而完成对待检测图像的图像篡改检测。Referring to FIG. 2, it is a schematic structural diagram of an optional identification model according to various embodiments of the present application. Extracting a preset number, such as 450 tamper detection features, from a plurality of grid image blocks after the image block to be detected is segmented, and inputting the extracted 450 tamper detection features as input features of the deep neural network model into the depth neural network. The input layer of the model is processed by the hidden layer 1 of the deep neural network model, the hidden layer 2, and the hidden layer 3 to perform feature reduction filtering, etc., to reach the final classification layer, and output the final two classification results. In the present embodiment, it is "not falsified" and "tampered", thereby completing image tampering detection of the image to be detected.
此外,本申请还提供一种计算机可读存储介质,所述计算机可读存储介质存储有图像篡改检测系统,所述图像篡改检测系统可被至少一个处理器执行,以使所述至少一个处理器执行如上述实施例中的图像篡改检测方法的步骤,该图像篡改检测方法的步骤S10、S20等具体实施过程如上文所述,在此不再赘述。Moreover, the present application also provides a computer readable storage medium storing an image tamper detecting system, the image tamper detecting system being executable by at least one processor to cause the at least one processor The steps of the image tampering detection method in the above embodiment are as follows, and the specific implementation processes of the steps S10 and S20 of the image tampering detection method are as described above, and are not described herein again.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It is to be understood that the term "comprises", "comprising", or any other variants thereof, is intended to encompass a non-exclusive inclusion, such that a process, method, article, or device comprising a series of elements includes those elements. It also includes other elements that are not explicitly listed, or elements that are inherent to such a process, method, article, or device. An element that is defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in the process, method, item, or device that comprises the element.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件来实现,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and can also be implemented by hardware, but in many cases, the former is A better implementation. Based on such understanding, the technical solution of the present application, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk, The optical disc includes a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present application.
以上参照附图说明了本申请的优选实施例,并非因此局限本申请的权利范围。上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。另外,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。The preferred embodiments of the present application have been described above with reference to the drawings, and are not intended to limit the scope of the application. The serial numbers of the embodiments of the present application are merely for the description, and do not represent the advantages and disadvantages of the embodiments. Additionally, although logical sequences are shown in the flowcharts, in some cases the steps shown or described may be performed in a different order than the ones described herein.
本领域技术人员不脱离本申请的范围和实质,可以有多种变型方案实现本申请,比如作为一个实施例的特征可用于另一实施例而得到又一实施例。凡在运用本申请的技术构思之内所作的任何修改、等同替换和改进,均应在本申请的权利范围之内。 A person skilled in the art can implement the present application in various variants without departing from the scope and spirit of the present application. For example, the features of one embodiment can be used in another embodiment to obtain another embodiment. Any modifications, equivalent substitutions and improvements made within the technical concept of the application should be within the scope of the application.

Claims (20)

  1. 一种电子装置,其特征在于,所述电子装置包括存储器、处理器,所述存储器上存储有可在所述处理器上运行的图像篡改检测系统,所述图像篡改检测系统被所述处理器执行时实现如下步骤:An electronic device, comprising: a memory, a processor, on the memory, an image tamper detecting system operable on the processor, wherein the image tamper detecting system is The following steps are implemented during execution:
    A、对待检测图像进行块分割,将所述待检测图像分成若干预设规格的网格图像块,并从若干网格图像块中提取出预设数量的篡改检测特征;A. performing block segmentation on the image to be detected, dividing the image to be detected into a plurality of grid image blocks of preset specifications, and extracting a preset number of tamper detecting features from the plurality of grid image blocks;
    B、基于预设数量的篡改检测特征及预先确定的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改;其中,所述预先确定的识别模型为预先通过对标注有不同篡改痕迹特征的样本图片进行训练得到的深度神经网络模型。B. Identifying the image to be detected based on a preset number of tamper detection features and a predetermined recognition model, and analyzing whether the image to be detected is tampered according to the recognition result; wherein the predetermined recognition model is A deep neural network model obtained by training sample pictures marked with different tamper trace features.
  2. 如权利要求1所述的电子装置,其特征在于,所述图像篡改检测系统被所述处理器执行实现所述步骤A时,包括:The electronic device according to claim 1, wherein when the image tampering detection system is executed by the processor to implement the step A, the method comprises:
    将所述待检测图像从原始颜色空间映射到YCrCb颜色空间;Mapping the image to be detected from the original color space to the YCrCb color space;
    对所述待检测图像进行块分割,将所述待检测图像分成若干16*16的网格图像块;Performing block division on the image to be detected, and dividing the image to be detected into a plurality of 16*16 grid image blocks;
    在每个网格图像块上的每个YCrCb颜色空间分量上应用二维多贝西小波分解运算,得到对应的像素系数映射,对各个所述像素系数映射计算汇总统计系数,并应用多贝西正交Daubechies Orthogonal wavelets D2-D5对所有网格图像块的汇总统计系数进行变换,得到450个特征作为篡改检测特征。Applying a two-dimensional Dobey wavelet decomposition operation on each YCrCb color space component on each grid image block to obtain a corresponding pixel coefficient mapping, calculating a summary statistical coefficient for each of the pixel coefficient mappings, and applying Dobecy Orthogonal Daubechies Orthogonal wavelets D2-D5 transforms the summary statistical coefficients of all grid image blocks to obtain 450 features as tamper detection features.
  3. 如权利要求2所述的电子装置,其特征在于,所述预先确定的识别模型为都是全连接层的深度神经网络模型,该深度神经网络模型的神经元的个数分别是450、500、256、128、2,其中,450为输入特征的个数,500、256、128为预设的隐特征的个数,2为最终的分类类别的个数。The electronic device according to claim 2, wherein the predetermined recognition model is a deep neural network model which is a fully connected layer, and the number of neurons in the deep neural network model is 450, 500, respectively. 256, 128, 2, wherein 450 is the number of input features, 500, 256, 128 are the number of preset hidden features, and 2 is the number of final classification categories.
  4. 如权利要求1所述的电子装置,其特征在于,所述预先确定的识别模型的训练过程如下:The electronic device according to claim 1, wherein the training process of the predetermined recognition model is as follows:
    C、获取预设数量的图像样本;C. Obtain a preset number of image samples;
    D、对各个图像样本进行块分割,将各个图像样本分成16*16的网格图像块,并对每一网格图像块进行标注,将已篡改的网格图像块标注为1,未篡改的网格图像块标注为0,以对各个图像样本进行篡改痕迹特征的标注;D. Perform block segmentation on each image sample, divide each image sample into 16*16 grid image blocks, and mark each grid image block, and mark the tampered grid image block as 1, untamed The grid image block is labeled as 0 to mark the tampering trace features of each image sample;
    E、将所有图像样本按照X:Y的比例分成第一数据集和第二数 据集,第一数据集中的图像样本数量大于第二数据集中的图像样本数量,第一数据集作为训练集,第二数据集作为测试集,其中,X大于0,Y大于0;E. Divide all image samples into the first data set and the second number according to the ratio of X:Y According to the data set, the number of image samples in the first data set is greater than the number of image samples in the second data set, the first data set is used as a training set, and the second data set is used as a test set, wherein X is greater than 0 and Y is greater than 0;
    F、利用第一数据集中的各个图像样本训练所述预先确定的识别模型;F. training the predetermined recognition model by using each image sample in the first data set;
    G、利用第二数据集中的各个图像样本验证训练的识别模型的准确率,若准确率大于或者等于预设准确率,则训练结束,或者,若准确率小于预设准确率,则增加图像样本的数量并重新执行上述步骤D、E、F和G。G. verifying the accuracy of the trained recognition model by using each image sample in the second data set. If the accuracy is greater than or equal to the preset accuracy, the training ends, or if the accuracy is less than the preset accuracy, the image sample is added. The number and re-execute steps D, E, F and G above.
  5. 如权利要求2所述的电子装置,其特征在于,所述预先确定的识别模型的训练过程如下:The electronic device according to claim 2, wherein the training process of the predetermined recognition model is as follows:
    C、获取预设数量的图像样本;C. Obtain a preset number of image samples;
    D、对各个图像样本进行块分割,将各个图像样本分成16*16的网格图像块,并对每一网格图像块进行标注,将已篡改的网格图像块标注为1,未篡改的网格图像块标注为0,以对各个图像样本进行篡改痕迹特征的标注;D. Perform block segmentation on each image sample, divide each image sample into 16*16 grid image blocks, and mark each grid image block, and mark the tampered grid image block as 1, untamed The grid image block is labeled as 0 to mark the tampering trace features of each image sample;
    E、将所有图像样本按照X:Y的比例分成第一数据集和第二数据集,第一数据集中的图像样本数量大于第二数据集中的图像样本数量,第一数据集作为训练集,第二数据集作为测试集,其中,X大于0,Y大于0;E. Dividing all image samples into a first data set and a second data set according to a ratio of X:Y, the number of image samples in the first data set is greater than the number of image samples in the second data set, and the first data set is used as a training set, The second data set is used as a test set, wherein X is greater than 0 and Y is greater than 0;
    F、利用第一数据集中的各个图像样本训练所述预先确定的识别模型;F. training the predetermined recognition model by using each image sample in the first data set;
    G、利用第二数据集中的各个图像样本验证训练的识别模型的准确率,若准确率大于或者等于预设准确率,则训练结束,或者,若准确率小于预设准确率,则增加图像样本的数量并重新执行上述步骤D、E、F和G。G. verifying the accuracy of the trained recognition model by using each image sample in the second data set. If the accuracy is greater than or equal to the preset accuracy, the training ends, or if the accuracy is less than the preset accuracy, the image sample is added. The number and re-execute steps D, E, F and G above.
  6. 如权利要求1所述的电子装置,其特征在于,所述根据识别结果分析所述待检测图像是否被篡改包括:The electronic device according to claim 1, wherein the analyzing whether the image to be detected is tampered according to the recognition result comprises:
    若利用所述预先确定的识别模型识别出所述待检测图像具有篡改痕迹特征,则分析所述待检测图像已被篡改;If the image to be detected has a tamper-evident feature by using the predetermined recognition model, analyzing that the image to be detected has been tampered with;
    若利用所述预先确定的识别模型识别出所述待检测图像不具有篡改痕迹特征,则分析所述待检测图像未被篡改。If the predetermined recognition model is used to identify that the image to be detected does not have a tampering trace feature, then analyzing the image to be detected is not falsified.
  7. 如权利要求2所述的电子装置,其特征在于,所述根据识别结果分析所述待检测图像是否被篡改包括:The electronic device according to claim 2, wherein the analyzing whether the image to be detected is tampered according to the recognition result comprises:
    若利用所述预先确定的识别模型识别出所述待检测图像具有篡 改痕迹特征,则分析所述待检测图像已被篡改;Recognizing that the image to be detected has a flaw by using the predetermined recognition model Changing the trace feature, analyzing that the image to be detected has been tampered with;
    若利用所述预先确定的识别模型识别出所述待检测图像不具有篡改痕迹特征,则分析所述待检测图像未被篡改。If the predetermined recognition model is used to identify that the image to be detected does not have a tampering trace feature, then analyzing the image to be detected is not falsified.
  8. 一种图像篡改检测方法,其特征在于,所述图像篡改检测方法包括:An image tampering detecting method, wherein the image tampering detecting method comprises:
    步骤一、对待检测图像进行块分割,将所述待检测图像分成若干预设规格的网格图像块,并从若干网格图像块中提取出预设数量的篡改检测特征;Step 1: Perform block segmentation on the detected image, divide the image to be detected into a plurality of grid image blocks of preset specifications, and extract a preset number of tamper detecting features from the plurality of grid image blocks;
    步骤二、基于预设数量的篡改检测特征及预先确定的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改;其中,所述预先确定的识别模型为预先通过对标注有不同篡改痕迹特征的样本图片进行训练得到的深度神经网络模型。Step 2: Identify the image to be detected based on a preset number of tamper detection features and a predetermined recognition model, and analyze whether the image to be detected is tampered according to the recognition result; wherein the predetermined recognition model is A deep neural network model obtained by training a sample picture marked with different tamper trace features in advance.
  9. 如权利要求8所述的图像篡改检测方法,其特征在于,所述步骤一包括:The image tampering detecting method according to claim 8, wherein the step one comprises:
    将所述待检测图像从原始颜色空间映射到YCrCb颜色空间;Mapping the image to be detected from the original color space to the YCrCb color space;
    对所述待检测图像进行块分割,将所述待检测图像分成若干16*16的网格图像块;Performing block division on the image to be detected, and dividing the image to be detected into a plurality of 16*16 grid image blocks;
    在每个网格图像块上的每个YCrCb颜色空间分量上应用二维多贝西小波分解运算,得到对应的像素系数映射,对各个所述像素系数映射计算汇总统计系数,并应用多贝西正交Daubechies Orthogonal wavelets D2-D5对所有网格图像块的汇总统计系数进行变换,得到450个特征作为篡改检测特征。Applying a two-dimensional Dobey wavelet decomposition operation on each YCrCb color space component on each grid image block to obtain a corresponding pixel coefficient mapping, calculating a summary statistical coefficient for each of the pixel coefficient mappings, and applying Dobecy Orthogonal Daubechies Orthogonal wavelets D2-D5 transforms the summary statistical coefficients of all grid image blocks to obtain 450 features as tamper detection features.
  10. 如权利要求9所述的图像篡改检测方法,其特征在于,所述预先确定的识别模型为都是全连接层的深度神经网络模型,该深度神经网络模型的神经元的个数分别是450、500、256、128、2,其中,450为输入特征的个数,500、256、128为预设的隐特征的个数,2为最终的分类类别的个数。The image tampering detecting method according to claim 9, wherein the predetermined recognition model is a deep neural network model which is a fully connected layer, and the number of neurons in the deep neural network model is 450, respectively. 500, 256, 128, 2, wherein 450 is the number of input features, 500, 256, 128 are the number of preset hidden features, and 2 is the number of final classification categories.
  11. 如权利要求8所述的图像篡改检测方法,其特征在于,所述预先确定的识别模型的训练过程如下:The image tampering detecting method according to claim 8, wherein the training process of the predetermined recognition model is as follows:
    C、获取预设数量的图像样本;C. Obtain a preset number of image samples;
    D、对各个图像样本进行块分割,将各个图像样本分成16*16的网格图像块,并对每一网格图像块进行标注,将已篡改的网格图像块标注为1,未篡改的网格图像块标注为0,以对各个图像样本进行篡改痕迹特征的标注; D. Perform block segmentation on each image sample, divide each image sample into 16*16 grid image blocks, and mark each grid image block, and mark the tampered grid image block as 1, untamed The grid image block is labeled as 0 to mark the tampering trace features of each image sample;
    E、将所有图像样本按照X:Y的比例分成第一数据集和第二数据集,第一数据集中的图像样本数量大于第二数据集中的图像样本数量,第一数据集作为训练集,第二数据集作为测试集,其中,X大于0,Y大于0;E. Dividing all image samples into a first data set and a second data set according to a ratio of X:Y, the number of image samples in the first data set is greater than the number of image samples in the second data set, and the first data set is used as a training set, The second data set is used as a test set, wherein X is greater than 0 and Y is greater than 0;
    F、利用第一数据集中的各个图像样本训练所述预先确定的识别模型;F. training the predetermined recognition model by using each image sample in the first data set;
    G、利用第二数据集中的各个图像样本验证训练的识别模型的准确率,若准确率大于或者等于预设准确率,则训练结束,或者,若准确率小于预设准确率,则增加图像样本的数量并重新执行上述步骤D、E、F和G。G. verifying the accuracy of the trained recognition model by using each image sample in the second data set. If the accuracy is greater than or equal to the preset accuracy, the training ends, or if the accuracy is less than the preset accuracy, the image sample is added. The number and re-execute steps D, E, F and G above.
  12. 如权利要求9所述的图像篡改检测方法,其特征在于,所述预先确定的识别模型的训练过程如下:The image tampering detecting method according to claim 9, wherein the training process of the predetermined recognition model is as follows:
    C、获取预设数量的图像样本;C. Obtain a preset number of image samples;
    D、对各个图像样本进行块分割,将各个图像样本分成16*16的网格图像块,并对每一网格图像块进行标注,将已篡改的网格图像块标注为1,未篡改的网格图像块标注为0,以对各个图像样本进行篡改痕迹特征的标注;D. Perform block segmentation on each image sample, divide each image sample into 16*16 grid image blocks, and mark each grid image block, and mark the tampered grid image block as 1, untamed The grid image block is labeled as 0 to mark the tampering trace features of each image sample;
    E、将所有图像样本按照X:Y的比例分成第一数据集和第二数据集,第一数据集中的图像样本数量大于第二数据集中的图像样本数量,第一数据集作为训练集,第二数据集作为测试集,其中,X大于0,Y大于0;E. Dividing all image samples into a first data set and a second data set according to a ratio of X:Y, the number of image samples in the first data set is greater than the number of image samples in the second data set, and the first data set is used as a training set, The second data set is used as a test set, wherein X is greater than 0 and Y is greater than 0;
    F、利用第一数据集中的各个图像样本训练所述预先确定的识别模型;F. training the predetermined recognition model by using each image sample in the first data set;
    G、利用第二数据集中的各个图像样本验证训练的识别模型的准确率,若准确率大于或者等于预设准确率,则训练结束,或者,若准确率小于预设准确率,则增加图像样本的数量并重新执行上述步骤D、E、F和G。G. verifying the accuracy of the trained recognition model by using each image sample in the second data set. If the accuracy is greater than or equal to the preset accuracy, the training ends, or if the accuracy is less than the preset accuracy, the image sample is added. The number and re-execute steps D, E, F and G above.
  13. 如权利要求8所述的图像篡改检测方法,其特征在于,所述根据识别结果分析所述待检测图像是否被篡改的步骤包括:The image tampering detecting method according to claim 8, wherein the step of analyzing whether the image to be detected is falsified according to the recognition result comprises:
    若利用所述预先确定的识别模型识别出所述待检测图像具有篡改痕迹特征,则分析所述待检测图像已被篡改;If the image to be detected has a tamper-evident feature by using the predetermined recognition model, analyzing that the image to be detected has been tampered with;
    若利用所述预先确定的识别模型识别出所述待检测图像不具有篡改痕迹特征,则分析所述待检测图像未被篡改。If the predetermined recognition model is used to identify that the image to be detected does not have a tampering trace feature, then analyzing the image to be detected is not falsified.
  14. 如权利要求9所述的图像篡改检测方法,其特征在于,所述根据识别结果分析所述待检测图像是否被篡改的步骤包括: The image tampering detecting method according to claim 9, wherein the step of analyzing whether the image to be detected is falsified according to the recognition result comprises:
    若利用所述预先确定的识别模型识别出所述待检测图像具有篡改痕迹特征,则分析所述待检测图像已被篡改;If the image to be detected has a tamper-evident feature by using the predetermined recognition model, analyzing that the image to be detected has been tampered with;
    若利用所述预先确定的识别模型识别出所述待检测图像不具有篡改痕迹特征,则分析所述待检测图像未被篡改。If the predetermined recognition model is used to identify that the image to be detected does not have a tampering trace feature, then analyzing the image to be detected is not falsified.
  15. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有图像篡改检测系统,所述图像篡改检测系统可被至少一个处理器执行,以使所述至少一个处理器执行如下步骤:A computer readable storage medium, characterized in that the computer readable storage medium stores an image tamper detecting system, the image tamper detecting system being executable by at least one processor to cause the at least one processor to execute The following steps:
    S1、对待检测图像进行块分割,将所述待检测图像分成若干预设规格的网格图像块,并从若干网格图像块中提取出预设数量的篡改检测特征;S1, performing block segmentation on the image to be detected, dividing the image to be detected into a plurality of grid image blocks of a preset specification, and extracting a preset number of tamper detecting features from the plurality of grid image blocks;
    S2、基于预设数量的篡改检测特征及预先确定的识别模型对所述待检测图像进行识别,并根据识别结果分析所述待检测图像是否被篡改;其中,所述预先确定的识别模型为预先通过对标注有不同篡改痕迹特征的样本图片进行训练得到的深度神经网络模型。S2, identifying the image to be detected based on a preset number of tamper detection features and a predetermined recognition model, and analyzing whether the image to be detected is tampered according to the recognition result; wherein the predetermined recognition model is A deep neural network model obtained by training sample pictures marked with different tamper trace features.
  16. 如权利要求15所述的计算机可读存储介质,其特征在于,所述图像篡改检测系统被所述处理器执行实现所述步骤S1时,包括:The computer readable storage medium according to claim 15, wherein when the image tampering detection system is executed by the processor to implement the step S1, the method comprises:
    将所述待检测图像从原始颜色空间映射到YCrCb颜色空间;Mapping the image to be detected from the original color space to the YCrCb color space;
    对所述待检测图像进行块分割,将所述待检测图像分成若干16*16的网格图像块;Performing block division on the image to be detected, and dividing the image to be detected into a plurality of 16*16 grid image blocks;
    在每个网格图像块上的每个YCrCb颜色空间分量上应用二维多贝西小波分解运算,得到对应的像素系数映射,对各个所述像素系数映射计算汇总统计系数,并应用多贝西正交Daubechies Orthogonal wavelets D2-D5对所有网格图像块的汇总统计系数进行变换,得到450个特征作为篡改检测特征。Applying a two-dimensional Dobey wavelet decomposition operation on each YCrCb color space component on each grid image block to obtain a corresponding pixel coefficient mapping, calculating a summary statistical coefficient for each of the pixel coefficient mappings, and applying Dobecy Orthogonal Daubechies Orthogonal wavelets D2-D5 transforms the summary statistical coefficients of all grid image blocks to obtain 450 features as tamper detection features.
  17. 如权利要求16所述的计算机可读存储介质,其特征在于,所述预先确定的识别模型为都是全连接层的深度神经网络模型,该深度神经网络模型的神经元的个数分别是450、500、256、128、2,其中,450为输入特征的个数,500、256、128为预设的隐特征的个数,2为最终的分类类别的个数。The computer readable storage medium according to claim 16, wherein the predetermined recognition model is a deep neural network model that is a fully connected layer, and the number of neurons in the deep neural network model is 450 respectively. 500, 256, 128, 2, wherein 450 is the number of input features, 500, 256, 128 are the number of preset hidden features, and 2 is the number of final classification categories.
  18. 如权利要求15所述的计算机可读存储介质,其特征在于,所述预先确定的识别模型的训练过程如下:The computer readable storage medium of claim 15, wherein the training process of the predetermined recognition model is as follows:
    C、获取预设数量的图像样本;C. Obtain a preset number of image samples;
    D、对各个图像样本进行块分割,将各个图像样本分成16*16的网格图像块,并对每一网格图像块进行标注,将已篡改的网格图像块 标注为1,未篡改的网格图像块标注为0,以对各个图像样本进行篡改痕迹特征的标注;D. Perform block segmentation on each image sample, divide each image sample into 16*16 grid image blocks, and mark each grid image block to tamper with the grid image block. Labeled as 1, the untampered grid image block is marked as 0 to tamper with the trace features of each image sample;
    E、将所有图像样本按照X:Y的比例分成第一数据集和第二数据集,第一数据集中的图像样本数量大于第二数据集中的图像样本数量,第一数据集作为训练集,第二数据集作为测试集,其中,X大于0,Y大于0;E. Dividing all image samples into a first data set and a second data set according to a ratio of X:Y, the number of image samples in the first data set is greater than the number of image samples in the second data set, and the first data set is used as a training set, The second data set is used as a test set, wherein X is greater than 0 and Y is greater than 0;
    F、利用第一数据集中的各个图像样本训练所述预先确定的识别模型;F. training the predetermined recognition model by using each image sample in the first data set;
    G、利用第二数据集中的各个图像样本验证训练的识别模型的准确率,若准确率大于或者等于预设准确率,则训练结束,或者,若准确率小于预设准确率,则增加图像样本的数量并重新执行上述步骤D、E、F和G。G. verifying the accuracy of the trained recognition model by using each image sample in the second data set. If the accuracy is greater than or equal to the preset accuracy, the training ends, or if the accuracy is less than the preset accuracy, the image sample is added. The number and re-execute steps D, E, F and G above.
  19. 如权利要求16所述的计算机可读存储介质,其特征在于,所述预先确定的识别模型的训练过程如下:The computer readable storage medium of claim 16 wherein the predetermined training process of the recognition model is as follows:
    C、获取预设数量的图像样本;C. Obtain a preset number of image samples;
    D、对各个图像样本进行块分割,将各个图像样本分成16*16的网格图像块,并对每一网格图像块进行标注,将已篡改的网格图像块标注为1,未篡改的网格图像块标注为0,以对各个图像样本进行篡改痕迹特征的标注;D. Perform block segmentation on each image sample, divide each image sample into 16*16 grid image blocks, and mark each grid image block, and mark the tampered grid image block as 1, untamed The grid image block is labeled as 0 to mark the tampering trace features of each image sample;
    E、将所有图像样本按照X:Y的比例分成第一数据集和第二数据集,第一数据集中的图像样本数量大于第二数据集中的图像样本数量,第一数据集作为训练集,第二数据集作为测试集,其中,X大于0,Y大于0;E. Dividing all image samples into a first data set and a second data set according to a ratio of X:Y, the number of image samples in the first data set is greater than the number of image samples in the second data set, and the first data set is used as a training set, The second data set is used as a test set, wherein X is greater than 0 and Y is greater than 0;
    F、利用第一数据集中的各个图像样本训练所述预先确定的识别模型;F. training the predetermined recognition model by using each image sample in the first data set;
    G、利用第二数据集中的各个图像样本验证训练的识别模型的准确率,若准确率大于或者等于预设准确率,则训练结束,或者,若准确率小于预设准确率,则增加图像样本的数量并重新执行上述步骤D、E、F和G。G. verifying the accuracy of the trained recognition model by using each image sample in the second data set. If the accuracy is greater than or equal to the preset accuracy, the training ends, or if the accuracy is less than the preset accuracy, the image sample is added. The number and re-execute steps D, E, F and G above.
  20. 如权利要求15所述的计算机可读存储介质,其特征在于,所述根据识别结果分析所述待检测图像是否被篡改的步骤包括:The computer readable storage medium according to claim 15, wherein the step of analyzing whether the image to be detected is falsified according to the recognition result comprises:
    若利用所述预先确定的识别模型识别出所述待检测图像具有篡改痕迹特征,则分析所述待检测图像已被篡改;If the image to be detected has a tamper-evident feature by using the predetermined recognition model, analyzing that the image to be detected has been tampered with;
    若利用所述预先确定的识别模型识别出所述待检测图像不具有篡改痕迹特征,则分析所述待检测图像未被篡改。 If the predetermined recognition model is used to identify that the image to be detected does not have a tampering trace feature, then analyzing the image to be detected is not falsified.
PCT/CN2017/108765 2017-09-30 2017-10-31 Image tamper detecting method, electronic device and readable storage medium WO2019061661A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710916508X 2017-09-30
CN201710916508.XA CN107657259A (en) 2017-09-30 2017-09-30 Distorted image detection method, electronic installation and readable storage medium storing program for executing

Publications (1)

Publication Number Publication Date
WO2019061661A1 true WO2019061661A1 (en) 2019-04-04

Family

ID=61117280

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/108765 WO2019061661A1 (en) 2017-09-30 2017-10-31 Image tamper detecting method, electronic device and readable storage medium

Country Status (2)

Country Link
CN (1) CN107657259A (en)
WO (1) WO2019061661A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110110611A (en) * 2019-04-16 2019-08-09 深圳壹账通智能科技有限公司 Portrait attribute model construction method, device, computer equipment and storage medium
CN111583180A (en) * 2020-04-03 2020-08-25 苏宁云计算有限公司 Image tampering identification method and device, computer equipment and storage medium
CN111582116A (en) * 2020-04-29 2020-08-25 腾讯科技(深圳)有限公司 Video erasing trace detection method, device, equipment and storage medium
CN112508039A (en) * 2020-12-08 2021-03-16 中国银联股份有限公司 Image detection method and device
CN112907598A (en) * 2021-02-08 2021-06-04 东南数字经济发展研究院 Method for detecting falsification of document and certificate images based on attention CNN
CN113065592A (en) * 2021-03-31 2021-07-02 上海商汤智能科技有限公司 Image classification method and device, electronic equipment and storage medium
CN113674195A (en) * 2020-05-13 2021-11-19 中国移动通信集团有限公司 Image detection method, device, equipment and storage medium
CN113781383A (en) * 2021-01-06 2021-12-10 北京沃东天骏信息技术有限公司 Method, device, equipment and computer readable medium for processing image
CN113971650A (en) * 2020-07-22 2022-01-25 富泰华工业(深圳)有限公司 Product flaw detection method, computer device and storage medium
CN114022928A (en) * 2021-10-22 2022-02-08 长沙理工大学 Dual-stream-based method and system for detecting Deepfakes video
CN114331974A (en) * 2021-12-09 2022-04-12 上海大学 Image tampering detection method based on feature fusion
CN114677670A (en) * 2022-03-30 2022-06-28 浙江康旭科技有限公司 Automatic identification and positioning method for identity card tampering
CN114764858A (en) * 2022-06-15 2022-07-19 深圳大学 Copy-paste image recognition method, device, computer device and storage medium
CN118196427A (en) * 2024-05-20 2024-06-14 深圳前海环融联易信息科技服务有限公司 Image tampering detection method, device, equipment and medium based on multi-model fusion

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108230227B (en) * 2018-02-06 2021-09-03 中国银行股份有限公司 Image tampering identification method and device and electronic equipment
CN108510483B (en) * 2018-03-23 2020-10-20 云南师范大学 Method for generating color image tampering detection by adopting VLAD coding and SVM calculation
KR102112768B1 (en) * 2018-08-06 2020-06-04 네이버웹툰 주식회사 Method, apparatus and computer program for detecting marker using image matching
CN109344747B (en) * 2018-09-17 2024-01-05 平安科技(深圳)有限公司 Tamper graph identification method, storage medium and server
CN109657600B (en) * 2018-12-14 2024-02-27 广东工业大学 Video area removal tampering detection method and device
CN110619631A (en) * 2019-09-16 2019-12-27 中山大学 Super-resolution image detection method based on residual error network
US11704390B2 (en) * 2019-10-10 2023-07-18 Baidu Usa Llc Method and system for signing an artificial intelligence watermark using a query
CN110895811B (en) * 2019-11-05 2023-05-09 泰康保险集团股份有限公司 Image tampering detection method and device
US11797857B2 (en) * 2019-11-25 2023-10-24 Canon Kabushiki Kaisha Image processing system, image processing method, and storage medium
CN110942456B (en) * 2019-11-25 2024-01-23 深圳前海微众银行股份有限公司 Tamper image detection method, device, equipment and storage medium
CN111131322B (en) * 2019-12-31 2022-04-15 奇安信科技集团股份有限公司 Network behavior detection method and device, computer equipment and storage medium
CN111368342B (en) * 2020-03-13 2022-07-05 众安信息技术服务有限公司 Image tampering identification model training method, image tampering identification method and device
CN111882525A (en) * 2020-07-01 2020-11-03 上海品览数据科技有限公司 Image reproduction detection method based on LBP watermark characteristics and fine-grained identification
CN112150483B (en) * 2020-09-27 2023-05-12 深圳壹账通智能科技有限公司 Picture tampering detection method and device, terminal equipment and storage medium
CN112150450B (en) * 2020-09-29 2021-03-16 武汉大学 Image tampering detection method and device based on dual-channel U-Net model
CN112950564B (en) * 2021-02-23 2022-04-01 北京三快在线科技有限公司 Image detection method and device, storage medium and electronic equipment
CN113450330B (en) * 2021-06-29 2022-03-18 山东大学 Image copying-pasting tampering detection method based on segmentation and depth convolution network
CN114612798B (en) * 2022-03-09 2024-05-14 云南大学 Satellite image tampering detection method based on Flow model

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073978A (en) * 2010-12-15 2011-05-25 北京交通大学 Method and system for identifying and recovering digital images by utilizing irregular region segmentation
CN103544692A (en) * 2012-07-13 2014-01-29 深圳市智信达软件有限公司 Blind detection method for tamper with double-compressed JPEG (joint photographic experts group) images on basis of statistical judgment
CN105427350A (en) * 2015-12-28 2016-03-23 辽宁师范大学 Color image replication tamper detection method based on local quaternion index moment
CN106846303A (en) * 2016-12-30 2017-06-13 平安科技(深圳)有限公司 Distorted image detection method and device
US20170277945A1 (en) * 2016-03-28 2017-09-28 Wipro Limited Methods and systems for detecting tampering in a document image

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916442A (en) * 2010-08-05 2010-12-15 大连理工大学 Method for robustly positioning tampered region by utilizing GLCM characteristic
CN104067314B (en) * 2014-05-23 2017-03-08 银河水滴科技(北京)有限公司 Humanoid image partition method
CN105989330A (en) * 2015-02-03 2016-10-05 阿里巴巴集团控股有限公司 Picture detection method and apparatus
CN106558058B (en) * 2016-11-29 2020-10-09 北京图森未来科技有限公司 Segmentation model training method, road segmentation method, vehicle control method and device
CN106951899A (en) * 2017-02-24 2017-07-14 李刚毅 Method for detecting abnormality based on image recognition

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073978A (en) * 2010-12-15 2011-05-25 北京交通大学 Method and system for identifying and recovering digital images by utilizing irregular region segmentation
CN103544692A (en) * 2012-07-13 2014-01-29 深圳市智信达软件有限公司 Blind detection method for tamper with double-compressed JPEG (joint photographic experts group) images on basis of statistical judgment
CN105427350A (en) * 2015-12-28 2016-03-23 辽宁师范大学 Color image replication tamper detection method based on local quaternion index moment
US20170277945A1 (en) * 2016-03-28 2017-09-28 Wipro Limited Methods and systems for detecting tampering in a document image
CN106846303A (en) * 2016-12-30 2017-06-13 平安科技(深圳)有限公司 Distorted image detection method and device

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110110611A (en) * 2019-04-16 2019-08-09 深圳壹账通智能科技有限公司 Portrait attribute model construction method, device, computer equipment and storage medium
CN111583180B (en) * 2020-04-03 2022-12-20 苏宁云计算有限公司 Image tampering identification method and device, computer equipment and storage medium
CN111583180A (en) * 2020-04-03 2020-08-25 苏宁云计算有限公司 Image tampering identification method and device, computer equipment and storage medium
CN111582116A (en) * 2020-04-29 2020-08-25 腾讯科技(深圳)有限公司 Video erasing trace detection method, device, equipment and storage medium
CN113674195A (en) * 2020-05-13 2021-11-19 中国移动通信集团有限公司 Image detection method, device, equipment and storage medium
CN113971650A (en) * 2020-07-22 2022-01-25 富泰华工业(深圳)有限公司 Product flaw detection method, computer device and storage medium
CN112508039A (en) * 2020-12-08 2021-03-16 中国银联股份有限公司 Image detection method and device
CN112508039B (en) * 2020-12-08 2024-04-02 中国银联股份有限公司 Image detection method and device
CN113781383A (en) * 2021-01-06 2021-12-10 北京沃东天骏信息技术有限公司 Method, device, equipment and computer readable medium for processing image
CN112907598A (en) * 2021-02-08 2021-06-04 东南数字经济发展研究院 Method for detecting falsification of document and certificate images based on attention CNN
CN112907598B (en) * 2021-02-08 2023-03-10 东南数字经济发展研究院 Method for detecting falsification of document and certificate images based on attention CNN
CN113065592A (en) * 2021-03-31 2021-07-02 上海商汤智能科技有限公司 Image classification method and device, electronic equipment and storage medium
CN114022928A (en) * 2021-10-22 2022-02-08 长沙理工大学 Dual-stream-based method and system for detecting Deepfakes video
CN114331974A (en) * 2021-12-09 2022-04-12 上海大学 Image tampering detection method based on feature fusion
CN114677670A (en) * 2022-03-30 2022-06-28 浙江康旭科技有限公司 Automatic identification and positioning method for identity card tampering
CN114677670B (en) * 2022-03-30 2024-04-26 康旭科技有限公司 Method for automatically identifying and positioning identity card tampering
CN114764858A (en) * 2022-06-15 2022-07-19 深圳大学 Copy-paste image recognition method, device, computer device and storage medium
CN118196427A (en) * 2024-05-20 2024-06-14 深圳前海环融联易信息科技服务有限公司 Image tampering detection method, device, equipment and medium based on multi-model fusion

Also Published As

Publication number Publication date
CN107657259A (en) 2018-02-02

Similar Documents

Publication Publication Date Title
WO2019061661A1 (en) Image tamper detecting method, electronic device and readable storage medium
WO2019109526A1 (en) Method and device for age recognition of face image, storage medium
TWI665639B (en) Method and device for detecting tampering of images
US10635946B2 (en) Eyeglass positioning method, apparatus and storage medium
US20170109610A1 (en) Building classification and extraction models based on electronic forms
WO2017124990A1 (en) Method, system, device and readable storage medium for realizing insurance claim fraud prevention based on consistency between multiple images
WO2017124940A1 (en) Method and device for recognizing whether image comprises watermark
US20180285676A1 (en) Method and apparatus for processing image information
WO2019033571A1 (en) Facial feature point detection method, apparatus and storage medium
CN105335722A (en) Detection system and detection method based on depth image information
WO2019200802A1 (en) Contract image recognition method, electronic device and readable storage medium
WO2019169767A1 (en) Pornographic picture identification method, electronic device, and readable storage medium
EP4109332A1 (en) Certificate authenticity identification method and apparatus, computer-readable medium, and electronic device
WO2020224325A1 (en) Video fingerprint extraction method and device, video retrieval method and device, terminal, and storage medium
CN110675940A (en) Pathological image labeling method and device, computer equipment and storage medium
RU2018145499A (en) AUTOMATION OF PERFORMANCE CHECK
CN113887438B (en) Watermark detection method, device, equipment and medium for face image
CN110321881B (en) System and method for identifying images containing identification documents
CN111553251A (en) Certificate four-corner incomplete detection method, device, equipment and storage medium
US20160125253A1 (en) Method and apparatus for image matching
CN112001362A (en) Image analysis method, image analysis device and image analysis system
CN111695498B (en) Wood identity detection method
CN114881698A (en) Advertisement compliance auditing method and device, electronic equipment and storage medium
CN108647570B (en) Zebra crossing detection method and device and computer readable storage medium
CN112906671B (en) Method and device for identifying false face-examination picture, electronic equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17926943

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25.09.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17926943

Country of ref document: EP

Kind code of ref document: A1