Font Size: a A A

Image Forgery Detect Technulog And Its Application For Network Opinion Monitoring

Posted on:2017-09-08Degree:MasterType:Thesis
Country:ChinaCandidate:C H FuFull Text:PDF
GTID:2348330536467552Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Network public opinion plays an important role in the orientation of public opinion.Digital image as an important carrier of network public opinion,with its intuitive,convenient advantages play an important role,Some bad guys have an ulterior motive to tamper some images by using some image processing software,make false public opinion news,to spread hidden secret into images.The network society and the reality of social harmony and stability has been threatened by these malice actions.The original intention of network public opinion monitoring is to monitor and combat these actions.But how to identify the tampered image is an urgent tasks for the current network monitoring technology,this technology is studied in this paper.First,tamper with the authenticity of digital images,respectively from tampering traces,camera consistency,image statistic feature,some detection methods are analyzed and evaluated.In view of some common tampering methods,a detection method based on local block feature is proposed,In this method,the performance of block effect in frequency domain is regarded as a kind of noise characteristic,The feature of each local block is extracted by using the sliding window,comparison of the extracted results to determine the tamper location.Secondly,image integrity authentication technology and detection method is studied from two aspects.The focus of tailoring detection is to find the coordinates of the camera's main points,According to the position of the principal point of the camera to determine the change of the image.The core of steganography detection is image feature extraction,the extracted features are compared with the normal images,to determine whether the image is embedded in the secret information.Then For the "mistaken identity" type of tampering,an comparison method based on image retrieval is proposed.The concept of the method is described,and the principle and working process of the method are introduced,The key technology of image search is analyzed from two aspects,and a suitable search method is given.Finally,the work of this paper is summarized,the deficiencies are pointed out,and suggestions for future research are put forward.
Keywords/Search Tags:Network Public Opinion Monitoring, Digital Image Forgery Detect, Digital Image Authentication, Quote Counterattack
PDF Full Text Request
Related items