[1]赵洁,刘萌萌,武斌,等.数字图像区域复制篡改的盲取证技术研究进展[J].华侨大学学报(自然科学版),2016,37(1):48-53.[doi:10.11830/ISSN.1000-5013.2016.01.0048]
 ZHAO Jie,LIU Mengmeng,WU Bin,et al.Research Advances on Blind Forensics Technology of Digital Image Region Duplication Forgery[J].Journal of Huaqiao University(Natural Science),2016,37(1):48-53.[doi:10.11830/ISSN.1000-5013.2016.01.0048]
点击复制

数字图像区域复制篡改的盲取证技术研究进展()
分享到:

《华侨大学学报(自然科学版)》[ISSN:1000-5013/CN:35-1079/N]

卷:
第37卷
期数:
2016年第1期
页码:
48-53
栏目:
出版日期:
2016-01-03

文章信息/Info

Title:
Research Advances on Blind Forensics Technology of Digital Image Region Duplication Forgery
文章编号:
1000-5013(2016)01-0048-06
作者:
赵洁 刘萌萌 武斌 翟大伟
天津城建大学 计算机与信息工程学院, 天津 300384
Author(s):
ZHAO Jie LIU Mengmeng WU Bin ZHAI Dawei
School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin 300384, China
关键词:
盲取证 区域复制 篡改检测 数字取证
Keywords:
blind forensics region duplication forgery detection digital forensics
分类号:
TP391.41
DOI:
10.11830/ISSN.1000-5013.2016.01.0048
文献标志码:
A
摘要:
由于盲取证技术不需要任何预先嵌入的认证信息,而仅根据图像本身的统计特性就能鉴别数字图像的原始性、真实性和完整性,已经成为数字媒体安全领域的研究热点.文中介绍了数字图像中常见的区域复制篡改方式,分析实际篡改过程中可能涉及到的图像处理操作,总结归纳了区域复制篡改盲取证方法的一般流程.最后,指出现有目前方法存在的问题,并对盲取证技术未来的研究方向进行展望.
Abstract:
Blind forensics technology has become a hot research topic in the field of digital media security, due to the advantage that it does not need any authentication information embedded in advance,only to identify image primitiveness, authenticity and integrity according to the statistical features of the image itself. In this paper, region duplication which is a common forgery in digital images is introduced. The image processing operations which may be involved in the practical tampering are analyzed. The general process of blind forensics method for detecting region duplication forgery is summarized. Finally, limitations existing in available methods are analyzed, and perspectives of further research work on blind forensics technology are presented.

参考文献/References:

[1] AL-QERSHI O M,KHOO B E.Passive detection of copy-move forgery in digital images: State-of-the-art[J].Forensic Science International,2013,231(1/2/3):284-295.
[2] CHRISTLEIN V,RIESS C,JORDAN J,et al.An evaluation of popular copy-move forgery detection approaches[J].IEEE Transactions on Information Forensics and Security,2012,7(6):1841-1854.
[3] 赵洁,郭继昌.基于JPEG系数变化率的图像复制粘贴篡改检测[J].浙江大学学报(工学版),2015,49(10):1893-1901.
[4] 王浩明,杨晓元.一种基于DCT系数直方图差异的JPEG图像篡改检测[J].四川大学学报(工程科学版),2014,46(1):41-46.
[5] 王青,张荣.基于DCT系数双量化映射关系的图像盲取证算法[J].电子与信息学报,2014,36(9):2068-2074.
[6] LI Leida,LI Shushang,ZHU Hancheng,et al.Detecting copy-move forgery under affine transforms for image forensics[J].Computers & Electrical Engineering,2014,40(6):1951-1962.
[7] MYNA A N,VENKATESHMURTHY M G,PATIL C G.Detection of region duplication forgery in digital images using wavelets and log-polar mapping[C]//Proceeding of the International Conference on Computational Intelligence and Multimedia Applications.Sivakasi:IEEE Press,2007:371-377.
[8] BASHAR M,NODA K,OHNISHI N,et al.Exploring duplicated regions in natural images[J].IEEE Transactions on Image Processing,2010(99):1-40.
[9] ZHAO Jie,GUO Jichang.Passive forensics for copy-move image forgery using a method based on DCT and SVD[J].Forensic Science International,2013,233(1/2/3):158-166.
[10] YAO Heng,QIAO Tong,TANG Zhenjun,et al.Detecting copy-move forgery using non-negative matrix factorization[C]//Proceedings of the 3rd International Conference on Multimedia Information Networking and Security.Shanghai:IEEE Press,2011:591-594.
[11] MUHAMMAD G,AL-HAMMADI M H,HUSSAIN M,et al.Copy move image forgery detection method using steerable pyramid transform and texture descriptor[C]//Proceedings of the IEEE EUROCON.Zagreb:IEEE Press,2013:1586-1592.
[12] HUSSAIN M,MUHAMMAD G,SALEH S Q,et al.Copy-move image forgery detection using multiresolution Weber descriptos[C]//Proceedings of the 8th International Conference on Signal Image Technology and Internet Based Systems.Naples:IEEE Press,2012:395-401.
[13] YONG L,MEISHAN H,BOGANG L.Robust evidence detection of copy-rotate-move forgery in image based on singular value decomposition[C]//Proceedings of the 14th International Conference on Information and Communications Security.New York:Springer,2012:357-364.
[14] KASHYAP A,JOSHI S.Detection of copy-move forgery using wavelet decomposition[C]//International Conference on Signal Processing and Communication.Noida:IEEE Press,2013:396-400.
[15] LIN S D,WU T.An integrated technique for splicing and copy-move forgery image detection[C]//Proceedings of the 4th International Congress on Image and Signal Processing.Shanghai:IEEE Press,2011:1086-1090.
[16] DYBALA B,JENNINGS B,LETSCHER D.Detecting filtered cloning in digital images[C]//Proceedings of the 9th Multimedia and Security Workshop.New York:ACM Press,2007:43-50.
[17] LIU Guangjie,WANG Junwen,LIAN Shiguo,et al.A passive image authentication scheme for detecting region-duplication forgery with rotation[J].Journal of Network and Computer Applications,2011,34(5):1557-1565.
[18] ZHONG Le,XU Weihong.A robust image copy-move forgery detection based on mixed moments[C]//Proceedings of the 4th IEEE International Conference on Software Engineering and Service Science.Piscataway:IEEE Press,2013:381-384.
[19] WANG Junwen,LIU Guangjie,LI Hongyuan,et al.Detection of image region duplication forgery using model with circle block[C]//Proceedings of the 1st International Conference on Multimedia Information Networking and Security.Wuhan:IEEE Press,2009:25-29.
[20] CAO Yanjun,GAO Tiegang,FAN Li,et al.A robust detection algorithm for copy-move forgery in digital images[J].Forensic Science International,2012,214(1/2/3):33-43.
[21] LI Guohui,WU Qiong,TU Dan,et al.A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[C]//Proceedings of the IEEE International Conference on Multimedia and Expo.Beijing:IEEE Press,2007:1750-1753.
[22] BAYRAM S,SENCAR H T,MEMON N D.An efficient and robust method for detecting copy-move forgery[C]//Proceeding of the IEEE International Conference on Acoustics, Speech, and Signal Processing.Taipei:IEEE Press,2009:1053-1056.
[23] FRIDRICH J,SOUKAL D,LUKAS J.Detection of copy-move forgery in digital images[C]//Proceedings of Digital Forensic Research Workshop.Cleveland:[s.n.],2003:55-61.
[24] HUANG Yanping,LU Wei,SUN Wei,et al.Improved DCT-based detection of copy-move forgery in images[J].Forensic Science International,2011,206(1/2/3):178-184.
[25] POPESCU A C,FARID H.Exposing digital forgeries by detecting duplicated image regions[R].Hanover:Computer Science Department,Dartmouth College,2004:515.
[26] GAN Yanfen,CANG Jing.A detection algorithm for image copy-move forgery based on improved circular projection matching and PCA[J].Sensors & Transducers,2013,159(11):19-25.
[27] BRAVO-SOLORIO S,NANDI A K.Automated detection and localization of duplicated regions affected by reflection, rotation and scaling in image forensics[J].Signal Processing,2011,91(8):1759-1770.
[28] LUO Weiqi,HUANG Jiwu,QIU Guoping.Robust detection of region duplication forgery in digital image[J].Chinese Journal of Computers,2007,4(11):746-749.
[29] WANDJI N D,SUN Xingming.Robust detection of copy-move forgery in color images[C]//Proceedings of the International Conference on Image Processing, Computer Vision & Pattern Recognition.Las Vegas: World,2013:492-495.
[30] MAHDIAN B,SAIC S.Detection of copy-move forgery using a method based on blur moment invariants[J].Forensic Science International,2007,171(2/3):180-189.
[31] RYU S,KIRCHNER M,LEE M,et al.Rotation invariant localization of duplicated image regions based on zernike moments[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1355-1370.
[32] KANG Xiaobing,WEI Shengmin.Identifying tampered regions using singular value decomposition in digital image forensics[C]//Proceedings of the International Conference on Computer Science and Software Engineering.Wuhan:IEEE Press,2008:926-930.
[33] AMERINI I,BALLAN L,CALDELLI R,et al.A SIFT-based forensic method for copy-move attack detection and transformation recovery[J].IEEE Transactions on Information Forensics and Security,2011,6(3):1099-1110.
[34] PAN Xunyu,LYU Siwei.Region duplication detection using image feature matching[J].IEEE Transactions on Information Forensics and Security,2010,5(4):857-867.
[35] 申铉京,朱叶,吕颖达,等.基于SIFT和HSI模型的彩色图像复制-粘贴盲鉴别算法[J].吉林大学学报(工学版),2014,44(1):171-176.
[36] MISHRA P,MISHRA N,SHARMA S,et al.Region duplication forgery detection technique based on SURF and HAC[J].Scientific World Journal,2013,2013(1):267691.
[37] 巩家昌,郭继昌.利用CSURF的图像复制粘贴篡改检测[J].天津大学学报(自然科学与工程技术版),2014,47(9):759-764.
[38] 李岩,刘念,张斌,等.图像镜像复制粘贴篡改检测中的FI-SURF算法[J].通信学报,2015,36(5):54-65.
[39] CHEN Likai,LU Wei,NI Jiangqun,et al.Region duplication detection based on Harris corner points and step sector statistics[J].Journal of Visual Communication and Image Representation,2013,24(3):244-254.
[40] DAVARZANI R,YAGHMAIE K,MOZAFFARI S,et al.Copy-move forgery detection using multi-resolution local binary patterns[J].Forensic Science International,2013,231(1/2/3):61-72.
[41] NGUYEN H C,KATZENBEISSER S.Detection of copy-move forgery in digital images using radon transformation and phase correlation[C]//International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Piraeus:IEEE Press,2012:134-137.

备注/Memo

备注/Memo:
收稿日期: 2015-09-07
通信作者: 赵洁(1984-),男,讲师,博士,主要从事数字取证、图像处理的研究.E-mail:zhaoj@tju.edu.cn.
基金项目: 天津市高等学校科技发展基金计划项目(20120712); 天津城建大学教育教学改革与研究项目(JG-1220)
更新日期/Last Update: 2016-01-20