Font Size: a A A

Literature Review Of The Blind Autentication For The Copy-Move Forgery Of Digital Image Region

Posted on:2014-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhongFull Text:PDF
GTID:2268330401950233Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the high-speed development of information technology, powerful graphicprocessing software such as Photoshop makes it easy for digital image tampering with cleartraces. Everything has two sides. It is difficult to distinguish the true or the false of imagesafter tampering. People’s credibility for digital media and justice has been seriously reduced.Digital image forensics technology has become a major issue with the important theorysignificance and the practical value.Digital image authentication includes active authentication and passive authentication.Active image authentication includes image watermark, digital signature etc. It needs toembed the additional information into an original image in advance; Passive forensics iscalled blind forensics. It depends on the image itself to judge whether it is after forgingprocessing or not. It has a stronger applicability.This paper studied and analyzed the copy-move forensics commonly used in blindforensics. The main work in the paper is as follows:In order to improve the robustness and reduce the complexity of the copy-move forgerydetection algorithms, this paper put forward one blind detective method based on the mixedmoments. The idea of the algorithm: Firstly used Gaussian pyramid transform to extract thelow-frequency information of the image and divide the low frequency part into overlappingblocks. Then each block would respectively present by an eigenvector which was composedby exponential Fourier moments and the histogram invariant moments, all the eigenvectorswere lexicographically sorted. Finally the forgery part was localized by means of theEuclidean distance and spatial distance.Through the comparison with other similar algorithms and analysis of the experimentalresults, it can be found that the present algorithm has less amount of data、 improves thedetection efficiency and shortens the detection time. When the image brightness or contrastchanges, the algorithm can still successfully detected the forgery parts which throughtranslation, rotation, overturn and tamper with the mixed operation. It indicates the goodrobustness.
Keywords/Search Tags:image processing, mixed moments, gaussian pyramid decomposition, copy forgery region
PDF Full Text Request
Related items