| With the popularization of high-definition digital cameras and powerful, and simple operation of the image processing software widely application, appear some ax-grinders use this kind of image processing software of digital images, modify, forgery attack, in order to achieve political opponents, malicious manufacturing false news ulterior motives. In order to ensure public trust order, cracking down on crimes and maintaining judicial justice, news honesty and network security, identify the technology image true bogus become very important and urgent.At present, the authenticity of digital images of two main research evidence based on general, a digital watermark is active digital image forensic technology, its basic idea is embedded in the image by additional information for authenticity and integrity of authentication, this study is very mature, but poor universality; Another kind is passive digital image blind forensic technology, according to the information directly image itself on digital image content, it is identified a new image identification, although digital image analysis methods as active passive blind forensic technology, digital image forensics mature technology, but its inevitable will become multimedia security domain new hotspot.This paper first introduces digital image blind forensics research background and significance and current research institutions, analyzes the formation and all kinds of natural images, sure digital image tamper with the way the most basic of tampering with fuzzy operation as the research emphases in this paper.In view of the present algorithm for simple image mosaicing only synthetic digital images of evidence, not after mosaics on the digital image processing retouching testing needle. This article through in-depth analysis of image edge characteristics and artificially fuzzy operation, according to the characteristics of digital forge synthetic post processing is the most commonly used fuzzy operation, used first homomorphic filter enhance artificially fuzzy operations of fuzzy boundaries, remove the interference of natural fuzzy, and then use morphological operation localization image fuzzy joining together to detect the image edge of counterfeit tamper with the area. |