会员注册 | 登录 | 微信快捷登录 QQ登录 微博登录 | 帮助中心 人人文库renrendoc.com美如初恋!
站内搜索 百度文库

热门搜索: 直缝焊接机 矿井提升机 循环球式转向器图纸 机器人手爪发展史 管道机器人dwg 动平衡试验台设计

Passive detection of copy-paste forgery between JPEG imagesPassive detection of copy-paste forgery between JPEG images -- 5 元

宽屏显示 收藏 分享

页面加载中... ... 广告 0 秒后退出

资源预览需要最新版本的Flash Player支持。
您尚未安装或版本过低,建议您

J.Cent.SouthUniv.20121928392851DoIl0.1007/sl177l一012一l3505PassivedetectionofcopypasteforgerybetweenJPEGimagesLIXianghua香7匕ZttAOYuqian0前,LIAOMiao,F.Y_Shih,YQ,Shi垒Springer1.SchoolofCivilEnginecring,CentralSouthUniversity,Changsha410083,China2.SchoolofGeoscienccsandlnfoPhysics,CentralSouthUniversity,Changsha410083,China3.ComputingSciences,NewJerseyInstituteofTechnology,NewarkNJ07102,USA4.ElectricalandComputerEngineering,NewJerseyInstituteofTechnology,NewarkNJ07102,USA◎CentralSouthUniversityPressandSpringerVerlagBerlinHeidelberg2012AbstractAblinddigita1jmageforensicmethodf0rdetectingcopypasteforgerybetweenJPEGimageswasproposed.I、vocopypastetamperingscenarioswereintroducedatfirstthetamperedimagewassavedinanuncompressedformatorinaJPEGcompressedformat.Thentheproposeddetectionmethodwasanalyzedandsimulatedforal1thecasesofthetwotamperingscenarios.ThetamperedregionisdetectedbycomputingtheaveragedSHillofabsolutedifierenceASADimagesbetweentheexaminedimageandaresavedJPEGcompressedimageatdifferentqualityfactors.Theexperimentalresultsshowtheadvantagesoftheproposedmethodcapabilityofdetectingsinai1and/ormultipletamperedregions.simplecomputation.andhencefastspeedinprocessing.KeywordsimageforensicJPEGcompressioncopypasteforgerypassivedetectiontamperedimagecompressedimage1IntroductionTheauthenticityofdigitalimagesplaysanimportantroleinmanyfieldssuchasforensicinvestigation,criminalinvestigation,surveillancesystems,intelligenceservices,disasterforecast,andjournalism1.Theartofmakinganimagefakeryhasalonghistory.Intherapidlydevelopingdigitalage,theimagecanbetamperedeasilywithoutleavingperceptibletraces.Undoubtedly,thisbringsdifficultyforpeopletoprovethetrustworthinessofdigitalimages.Therefore,theimageforensicstechnologiesarebecomingincreasinglyimportant23.Recently,manypassiveimageforensicauthenticitytechniqueshavebeendevelopedwhichcanbegroupedintothefollowingfivecategories【41pixelbasedtechniques,2format.basedtechniques,3camerabasedtechniques,4physicallybasedtecbniques,and5geometricbasedtechniques.Thesetechniquesareusedtoidentifytheimagesourcesandexposeforgeriesthroughdetectingsomeintrinsicimageregularitiesorsomecommontamperinganomaliesf5.JPEGisacommonlyusedcompressionstandardforphotographicimages.Thedegreeofcompressioncanbeadjusted,allowingaselectabletradeoffbetweenstoragesizeandimagequality.JPEGisalsothemostcommonimageformat,usedbydigitalcamerasandotherphotographicimagecapturedevices.JPEGcompressioniSbasedonblocksplittinganddiscretecosinetransforillDCT,soitintroducesblockingartifact.InfacttheblockingartifactcanberegardedasaspeciaIhiddenwatermarkinJPEGimages.andtamperingcanbefoundbydetectingtheintegrityandconsistenceofthespecialwatermark.InRef.6,theblockingartifactgridBAGextractionmethodwasproposedtodetectthedoctoredJPEGimagesbycheckingthemismatchedblockartifactcausedbycopypastedJPEGimages.InRe7,LU0etalpresentedtheblockingartifactcharacteristicsmatrixBACM,whichexhibitsregularsymmeica1shapefororiginalJPEGimages,andappliedittoexposedigitalforgeriesbydetectingthesymmetricalchangeofBACM.ThemethodisonlyefHcientforthecroppedandrecompressedimages.BasedonBACM,BARNIetal『81proposedtwoalgorithmsofdetectingthecopypastetamperingbydoubleJPEGdetectionandimagesegmentation.ButbOthofthealgorithinsaretimeconsuming,andthesegmentationcouldbeverydjfficultforsometamperedimagesifthetamperedregionscannotbesegmentedSuccessfullv.11omeasuretheinconsistenciesofblockingartifact,YEeta1f91presentedafastquantizationtableestimationalgorithmbasedonthehistogrampowerspectrumofDCTcoefficients.Butsuspiciousareamustbefirstlyselectedforevaluation,whichisactuallydifficult.InReff101,astatistica1modelbasedonthegeneralizedBenfordslawFoundationitemProject61172184suppolledbytheNationalNaturalScienceFoundationofChinaProject200902482supposedbyChinaPostdoctoralScienceFoundationSpeciallyFundedProjectProject12JJ6062supportedbytheNaturalScienceFoundationofHunanProvince,ChinaReceiveddate20120202Accepteddate20120502CorrespondingauthorZHAOYuqian,AssociateProfessor,PhDTel十8689929876Emailzhaocsuhotmailcom2840一兰三二三forgerydetectionmethodisproposed.fortheprobabilitydistributionsofthefirstdigitsofthequantizedJPEGcoefficientsisusedtodetecttheJPEGcompressionandimageforensics.LINetal『1l1developedamethodfordetectingchetamperedJPEGimagesbyexaminingthedoublequantizationeffecthiddenamongtheDCTcoefficients,andcomputingtheblockposteriorprobabilitymapBPPMbyBayesianapproach.CopymoveforgerydetectionmethodswereproposedinRefs.12一l6】,buttheyareonlyeffectivewhenapartoftheimageiscopiedandpastedintoanotherpartofthesameimage.LUOetal17introducedtheJPEGquantization,rounding,andtruncationerrorstoidentif3,whetherabitmapimagehaspreviouslybeenJPEGcompressed.toestimatethequantizationstepsofaJPEGimage,andtodetectthequantizationtableofaJPEGimage.WANGetal18】proposedatamperedregionlocalizationmethodbyemployingprincipalcomponentanalysisPCAonJPEGcompressionnoise,inwhichtheextractedhighfrequencyquantizationnoiseregioninthedifferenceimagebetweentheorigina1imageandJPEGcompressedimageisconsideredasthetamperedregion.Fordigitalforensics,FARIDetalhaveconductedsomepioneeringworksandhavedevelopedsomeeffectivemethodsf192l】.InRef.『2o1,JPEGghostwasproposedtodetectimagetampering.ThisisacomputationallysimpletechniquefordetectingtamperedregionwhenaJPEGcompressedimagewithqualityfactorQIisinsertedintoanuncompressedimage,andthenthetamperedimageissavedataJPEGcompressedimagewithaqualityfactorQ2andQ2Q1.InspiredbyRe£201,weproposeinthisworkablinddigitalimageforensicsmethodfordetectingcopypasteforgerybetweenJPEGimagesItworksfortwotamperingscenarios.First,tamperingisconductedbetweenJPEGimages,andthecompositeimageissavedinanuncompressedformat,suchasBMPorTIForPNGSecond,tamperingisdonebetweenJPEGimages.andthecompositeimageissavedintheJPEGformat.TheregionsthatareobviouslybrighterordarkerthantherestintheimageofaveragedsumofabsolutedifferenceASADareidentifiedasthetamperedregions.AlthoughtheJPEGqualityfactorisrelevantinourproposedmethod,theestimationoftheprimaryquantizationmatrix10,2224isnotrequired.2MethodologyInthissection,wefirstintroducetwocopypasteimagetamperingscenariosandbrieflyreviewJPEGcompressionanddecompression.Thenweanalyzetwotamperingscenariosbysimulationanddetectthetamperedimagesbyexamples.Finally,thecopypaste2.1TamperingscenariosCopy。pasteprocessingisarudimentaryandoftenprimarymethodfordigitalimagetampering.AsJPEGisawidelyusedimageformatinourdailylife.wediscusscopy。pastetamperingbetweenJPEGimageswhichhavedifferentJPEGqualityfactors.Thatis,aregioncanbeselectedcomingfromanJPEGcompressedimagewithaqualityfactorofQ1A.Itisthendecompressedand1nsertedintoanotherimagewiththeJPEGqualityfactorofQ1B.ThecompositeimageisthensavedaseitheranuncompressedformatscenarioI、oraJPEGcompressedformatwithaqualityfactorofQ。scenarioIi.Ifitisnotspecified,intherestofthepaper,wedenoteJPEGqualityfactorbycapitalletterQ,andquantizationstepbylowercaseletterq.NotethattheIocationsofcopyandpastecanbearbitraryandtheabovecopypasteprocessingcanalsobeconductedonthesameimage.2.2BriefreviewaboutJPEGcompressionanddecompressionPriortopresentingourmethod,webrieflyreviewthestandardJEPGcompressioninthefollowingfoursteps.1ARGBcolorimageisfirstlyconvertedtoYCbCrformat,containingoneluminancecomponentYandtwochrominancecomponentsCbandCr1.2Theimageisthensplitintononoverlappingblocksof8x8pixels.Ineachblock,theYCb,andCrcomponentsundergoaDCTtransformafterallthesepixelsvaluesbeingconvertedfromunsignedtosignedintegerse.g.,from0,255to一128,127.f3EachDCTcoefficientcisdividedbyaquantizationstepqandthenroundedtoitsnearestinteger.41ThequantizedDCTcoefficientsforall8x8blocksareentropyencoded,using,say,Huffmancode.Instep3,alargerquantizationstepgwillyieldaseverercompressionrate,whichmeanslowerqualityofJPEGimage,andviceversa.Becausehumanvisualsystemismuchmoresensitivetosmal1variationsoverlowfrequencycomponentsthantothatoverhighfrequencycomponents,themagnitudesofthehi曲frequencycomponentsarestoredwithaloweraccuracy也anthatofthelowfrequencycomponents.ThedecodingofaJPEGimageinvolvesstraightforwardlytheinversestepsofJPEGcompressionentropydecoding,inverseDCTfIDCTandinverseJPEGquantization.Inourmethod,todetectthecopypasteandthetamperedregion.wefirstresavedtheto.bedetectedJ.Cent.SouthUniv.2012l928392851imageinJPEGformatwithdifferentJPEGqualityfactors,andthencomputetheASADimagesbetweentheto_bedetectedimageandeachresavedJPEGcompressedimage.Finally,wejudgewhethertheimagehasbeentamperedand,ifso,determinethetamperedregionbyobservingthegeneratedASADimages.IfanyregionintheASADimagesturnsouttobebrighterordarkerthantherestregionsofthesameASADimage,theregmncorrespondingtotheimageunderexaminationisconsideredtobetampered.Notethatinthefirststepofourmethod,afterbeingresavedinJPEGformat,thetO_bedetectedimageundergoesanotherJPEGcompression.28412.3TamperingdetectionforScenario1Inthissection,weintroducethesimulationcurvesofcopypastetamperingdetectionforScenarioI。andprovideanexampletoillustratehowtodetectthetamperedregion.Tofacilitateouranalysis,weobtainasequenceofcoefficientsthepixelvaluesfroma512512uncompressedgrayscaleLenaimagecolumnbycolumnfrom,e.g.,lefttorightanddenotethesecoefficientsbyCoWeapplydoubleJPEGcompressiontothesecoefficientswiththefirstquantizationstep,g1z,toobtaincoefficientsc1f,andthenthesecondquantizationstep,q2f,toyieldcoefficientsc2f.WecomputetheASADvaluebetweenc2iandc1assADf512512厶一nlc2,z一c1I,f0,1Letgldenoteintegersfrom9to23inanincrementof7,q2aq2Kl6,andq2a一g2g.ThesoliddashcurveineachgraphofFig.1showstheASADvaluebetweenc2andc】c】/7asafunctionofqrangingfrom1to30inanincrementof1.Itcanbeobservedthatcurves6candineachgraphdonotoverlapexceptwheng1n1,asshowninFig.1b.ThecurveCreachesitsminimumifqlngIisintegermultiplesofg,andcurvereachesitsloca1maximumwhenqisdoubleof1d,i.e.q2q218,asshowninFig.1a.FromFigs.1aandfc1。wealsoobserveanothercharacteristicthat,thedifferencebetweencurvesand,denotedbyd,isobviousatsomequantizationstepsq.Itisobservedfromtheabovesimulationthatifthesame1.Ddatasequenceisquantizedwithtwodifferentquantizationsteps,onecandoublyquanfizethesetwosequenceswithaseriesofdifferentquantizationstepsandobtaintwodifferentASADcurves.ThedifferencebetweenthesetwoASADcurveswillberatherobviousatsomequantizationstepsusedinthedoublequantization.Thisdifferenceindicatesthatthe凸矗尝∽昙Quantizationstep,qQuantizationstep,qQuantizationstep,qFig.1ASADbetweendatasequencequantizedbyqxdg1,followedquantizedbyqinrangeof1,30Thedifferencebetweencurvesandisdenotedbyag19bgIn16cql23quantizationstepsusedinthefirstquantizationfortwodatasequencesaredifferent.ThisobservationcanbeusedforthecopypasteforgerydetectionofscenarioI.Figure2showsthetamperedimage,inwhichacentralportion,havingbeenJPEGcompressedatquality兰二tamperedsincethegrayvaluesofthecentralregionandtheremainingregionaredistinctlydifferentintheASADimage.28432.4TamperingdetectionforScenarioIISimilartoScenarioI,weprocessdatasequence,Co,usingthefollowingprocedurefirstlytheyarequantizedbyq】,subsequentlyquantizedbyg2toyieldcoefficientsc2,andlastlyquantizedbyq3itoyieldcoefficientsc3i.TheASADvaluebetweenc3fandc2fiscomputedas1512x512VASAO∽,TherearetwodifferentcasesinScenarioII乱sminOIA,Olgandb.Qs_minQ1A,Q1BWeexplaintheprocessbyillustratinganexample.Letqlgl11andq123.Letq2aq2flbeintegersfrom7to15inanincrementof4,andq3q3gbeintegersfrom1to30inanincrementof1.InFig.3,thesoliddashedcurve。【showstheASADvaluebetweenc3c3pandc2c3∥asafunctionofq.ItisobservedthatbothASADvaluesineachgraphreachtheirminimaVASAD0whengIisintegermultiplesofq.Mostimportantly,thedifferencebetweenCHIVES仅andisobviousatsomequantizationstepsg,suchasfrom20to30inFigs.3aandb,andfrom25to30inFig.3c.Thedifferencebetweencurvesdandreachesitsmaximumatg。二23asshowninFig.3b,whichismainlybecausethequantizationstepql/J23isnearlydoubledasthatofq2p11.Figure4ashowsthetamperedimage,whichwasproducedbyinsertingaregionfromanimagewithJPEGqualityfactorofQ1A85intothecentralportionofanotherimagewithJPEGqualityfactorofQ1B55,andsavingthecompositeimageatJPEGqualityfactorofQs75.ShownineachsubsequentpanelistheASADimagebetweenthetamperedimageandaresavedJPEGcompressedimageatdifferentqualityfactorsQrschangingfrom30to60inanincrementof5.Figure4clearlyindicatestheevidenceofcopypastetamperingconductedbetweenJPEGimages.Caseb.QminQ1A,Q,BSimilartoCasea,letql11,g1口23,g2g2changefrom25to29inanincrementof2,andq3aq3pqchangefrom1to30inanincrementof1.WeobservefromFig.5that,ineachgraph,curvesandalmostchangesynchronouslyandoverlap,andtherefore,thedifferencebetweencurvesandissmallforal1ofthequantizationstepsq.Therefore,itseemsprohibitedtodetectthetamperedregioninthiscasebytheproposedmethod.曼凸矗Quantizationstep,qQuantizationstep,qQuantizationstep,qFig.3ASADsimulationcurveswithq2q2psmallerthanmaximumofqlandqlflaq27bq211Cq2152.5ProposedmethodAccordingtothesimulations,analysesandexamplesabove,weproposethecopypasteforgerydetectionmethodconsistingofthefollowingsteps.1JPEGcompression.WeresavethetobedetectedimagefusingJPEGqualityfactorofQrs,toobtainaJPEGcompressedimage尼.1∞J.Cent.SouthUniv.2012192839285128452∽暑∽尝Quantizationstep,qQuantizationstep,qQuantizationstep,qFig.5ASADsimulationcurveswithq2glargerthanqldandgl口aq225bq227cq22931Deterrninewhethertheimagehasexperiencedcopypastetamperingornotand,ifso,determinethetamperedregionbyobservingthegeneratedASADimage.IfanyregionintheASADimagestumsouttobebrighterordarkerthantherestregionsofthesameASADimage,theregioncorrespondingtotheimageunderexaminationisconsideredtampered.f4、RepeattheabovestepsforanotherdifferentresavedJPEGqualityfactorQrsifneeded.Inourmethod,thevalueofblocksizebcanbearbitrarilychosen.Ifbistoosmall,thedetectedtamperedregionwillnotbeclearlyenoughtodifferentiateitfromtherestregion.Ifbistoolarge.theedgeofdetectedtamperedregionwillbeblurrythesmallertamperedregionswillbedifficulttodetectandthecomputingtimewillincreaseremarkably.Inthispaper,bischosenas10.Andwewilldiscussthesizeofbindetailsintheexperiments.3ExperimentalresultsanddiscussionWestartwithoriginaluncompressedimages,eachofsize576x768,fromRe251.EachofthetamperedimagesisobtainedfromtwoJPEGimagesofdifferentqualityfactorsandsavedinanuncompressedformatfortamperingScenarioIorintheJPEGformatfortamperingScenarioII.Figure6ashowsanoriginalimagewithJPEGqualityfactor60.Figure6bshowsatamperedimagegeneratedbyinsertingatravelerfromaJPEGimagewithqualityfactor80,andbycoveringanothertravelerwhowasabitfarawayfromthecamerawithasmallpatchofsceneryfromaJPEGimagewithqualityfactor80,andthensavingthecompositeimageasaJPEGimagewithqualityfactor90.EachsubsequentpanelistheASADimagebetweenthetamperedimageandaresavedJPEGcompressedimageatdifferentqualityfactorsfrom52to64inanincrementof4.ItisclearfromtheseASADimagesthatthegivenimagehasbeentamperedandbothtamperedregionshavebeendetectedeveniftheyaresmallinsize.Figure7ashowsatamperedimageobtainedbyinsertingashrubfromaJPEGimageofqualityfactor10/12AdobePhotoshopCS4intotheoriginalimageFig.7bofJPEGqualityfactor4/12andsavingthecompositeimageasaJPEGimagewithqualityfactor8/12.EachsubsequentpanelistheASADimagebetweenthetamperedimageandaresavedJPEGcompressedimageatdifferentqualityfactorsfrom60to90inanincrementof10.Figure8showsatamperedimageproducedbyinsertingacalffromaJPEGimagewithqualityfactor10/12intotheoriginalJPEGimageofqualityfactor6/12,andsavingthecompositeimageasaBMPformat.ThelasttwopanelsinthefirstrowofFig.8fromlefttorightshowstheBAGimageandthemarkedBAGimage,respectively,generatedbyusingthemethodinRe6.Theirresultsshowthetamperedregionsaswellassomenontamperedregions.EachrowofthebottomportionsaretheASADimagesbetweenthetamperedimageanda
编号:201403101438519298    大小:2.21MB    格式:PDF    上传时间:2014-03-10
  【编辑】
5
关 键 词:
passive detection of copy paste forgery between jpeg images
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 人人文库网仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
  人人文库网所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。
0条评论

还可以输入200字符

暂无评论,赶快抢占沙发吧。

当前资源信息

4.0
 
(2人评价)
浏览:7次
dingyx0101上传于2014-03-10

官方联系方式

客服手机:17625900360   
2:不支持迅雷下载,请使用浏览器下载   
3:不支持QQ浏览器下载,请用其他浏览器   
4:下载后的文档和图纸-无水印   
5:文档经过压缩,下载后原文更清晰   

相关资源

相关资源

相关搜索

passive   detection   of   copy   paste   forgery   between   jpeg   images  
关于我们 - 网站声明 - 网站地图 - 友情链接 - 网站客服客服 - 联系我们
[email protected] 2015-2017 人人文库网网站版权所有
苏ICP备12009002号-5