期刊文献+

真伪之辨——数字图像的防伪认证 被引量:1

Is It Fake?——Image Authentication and Forgery Detection
在线阅读 下载PDF
导出
摘要 数码相机日益普及,数字图像已进入日常生活。以PS为代表的图像处理软件为人们提供了编辑和修改数字图像的有力工具,但同时也成为篡改图像的工具。数字照片被篡改和伪造的事件时有发生,眼见不再为实。采用图像处理和统计分析技术鉴别照片的真伪,揭示篡改造假的事实,进行数字图像防伪认证,确保图像内容完整和真实是信息安全领域的前沿课题。图像被动认证完全根据图像本身而不依赖任何附加信息进行篡改检测,具有重要的学术意义和应用价值,是图像处理和信息安全研究者面临的重大挑战。 Digital photography has become increasingly popular, and digital image processing is now performed by ordinary people, not just professionals. With the widespread use of image editing tools such as Photoshop, one can easily modify a picturc for better visual quality, or for artistic creation. However, these picture manipulation tools also provide a convenient means to produce fake images. Seeing is no more believing. Image authentication is an important research topic in the field of information security and multimedia applications. The aim is to detect malicious forgery and ensure credibility and integrity of the con- tents contained in digital images. Passive image authentication relies only on the image itself without the aid of any additional information. It has significance both in academia and practical applications, and poses great challenge to the researchers in the areas of image processing and information security.
出处 《自然杂志》 北大核心 2010年第5期281-287,I0002-I0003,共9页 Chinese Journal of Nature
基金 国家自然科学基金项目(60773079 60872116)
关键词 信息安全 图像处理 被动认证 篡改检测 information security, image processing, passive authentication, forgery detection
  • 相关文献

参考文献32

  • 1FARID H.Seeing is not believing[J].IEEE Spectrum,2009,46(8):44-51.
  • 2FRIDRICH J,SOUKAL D,LUKAS J.Detection of copy move forgery in digital images[C]//Proc of Digital Forensic Research Workshop 2003,Cleveland,OH,USA,August 5-8 2003.
  • 3POPESCU A C,FARID H.Exposing digital forgeries by detecting duplicated image regions[R].Technical Report,Dartmouth College,TR2004-515,2004.
  • 4MAHDIAN B,SAIC S.Detection of copy-move forgery using a method based on blur moment invariants[J].Forensic Science International,2007,171(13):180-189.
  • 5WU Q,WANG S,ZHANG X.Detection of image region-duplication with rotation and scaling tolerance[C]//To be presented at The 2nd International Conference on ComputationalCollective Intelligence,Kaohsiung,Taiwan,2010.
  • 6NG T T,CHANG S F.A model for image splicing[C]//Proc IEEE International Conference on Image Processing,Singapore,2004,2(1):1169-1172.
  • 7LUKAS J,FRIDRICH J,GOLJAN M.Detecting digital image forgeries using sensor pattern noise[C]//Proc SPIE,2006:362-372.
  • 8CHEN M,FRIDRICH J,GOLJAN M.LUKAS J.Determining image origin and integrity using sensor noise[J].IEEE Transactions on Information Security and Forensics; 2008,3(1):74-90.
  • 9GOLJAN M,FRIDRICH J,FILLER T.Large scale test of sensor fingerprint camera identification[C]//Proc SPIE,Electronic Imaging,Security and Forensics of Multimedia Contents Ⅺ,San Jose,CA,Jan.2009:1-12.
  • 10POPESCU A C,FARID H.Exposing digital forgeries in color filter array interpolated images[J].IEEE Trans Signal Processing,2005,53(10):3948-3959.

二级参考文献24

  • 1S Thiemert,H Liu,M Steinebach,L Croce-Ferri.Joint forensics and watermarking approach for video authentication[A].Proceedings of Conference on Security,Steganography,and Watermarking of Multimedia Contents IX[C].San Jose,USA:SPIE,2007,65050Q.
  • 2C Baris,S Bulent,N Memon.Spatio-temporal transform based video hashing[J].IEEE Transactions on Multimedia,2006,8(6):1190-1208.
  • 3M K Mihcak,I Kozintsev,K Ramchandran.Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising[A].Proceedings of IEEE International Conference on Acoustics,Speech and Signal Processing[C].Phoenix,USA:IEEE Signal Processing Society,1999.3253 -3256.
  • 4N Mondaini,R Caldelli,A Piva,M Bami,V Cappellini.Detection of malevolent changes in digital video for forensic applications[A].Security,Steganography,and Watermarking of Multimedia Contents IX[C].San Jose,USA:SPIE,2007,65050T.
  • 5K Kenji,K Kenro,S Naoki.CCD Fingerprint method-identification of a video camera from videotaped images[A].Proceedings of IEEE International Conference on Image Processing[C].Kobe,Jpn:IEEE Signal Processing Society,1999.537 -540.
  • 6C C Hsu,T Y Hung,C W Lin,C T Hsu.Video forgery detection using correlation of noise residue[A].Proceedings of the 10th Workshop on Multimedia Signal Processing[C].Cairns,Australia:IEEE Computer Society,2008.170-174.
  • 7W Wang,H Farid.Exposing digital forgeries in video by detecting duplication[A].Proceedings of the 9th Multimedia and Security Workshop[C].Dallas,USA:ACM Special Interest Group on Multimedia,2007.35-42.
  • 8M Johnson,H Farid.Exposing digital forgeries by detecting inconsistencies in lighting[A].Proceedings of the 7th Multimediaand Security Workshop[C].New York,USA:ACM SIGMM,2006.1-9.
  • 9W Wang,H Farid.Exposing digital forgeries in interlaced and de-interlaced video[J].IEEE Transactions on Information Forensics and Security,2007,2(3):438-449.
  • 10W Wang,H Farid.Detecting re-projected video[A].Proceedings of the 10th International Workshop on Information Hiding[C].Santa Barbara,USA:Springer,2008.72-86.

共引文献27

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部