Font Size: a A A

Image The Content Zuangai Authenticity Detection Algorithm Analysis And Research

Posted on:2011-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:M JinFull Text:PDF
GTID:2208360302998958Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With more and more image processing devices and software being widely used, it becomes easier to tamper digital images maliciously. As a branch of multimedia information security technology, digital image authentication is paid close attention by one of a growing number of experts. Digital image authentication includes active authentication and passive authentication. Passive authentication technology, also known as blind forensics technology, that need not to add prior additional information to the image, determine whether it is forged by modification, synthesis, retouching etc to identify the authenticity only according to the image itself. Passive authentication methods can be classified into the source detection and tamper detection.This dissertation studies the content-based image tampering detection, the major achievements are as follows:(1) Summarize and generalize the current main research results of the image passive authentication technology(2) Realize several splicing algorithms, make some analysis and comparison on this basis, generalized their advantages and disadvantages at the same time.(3) Verify the performances of some copy-move forgery detection algorithms by doing experiments, analyze and compare their results. On this basis, propose a more realistic model for copy-move forgery.(4) Propose a new copy-move forgery detection algorithm for the actual model. The algorithm has simple principle and easy to achieve. Experimental results show that the method performs good robustness for the distorted image subject to some post-processing operations.At last, the remaining problems of the paper are discussed, and the future works are listed.
Keywords/Search Tags:Content Authentication, Tampering, Splicing, Copy-move, Feature Extraction
PDF Full Text Request
Related items