用户名: 密码: 验证码:
数字图像操作取证技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着数字媒体编辑技术的快速发展,数字图像修改或篡改变得非常容易,违规编辑和虚假图像也频繁出现,严重损害了数字媒体信息的可信性与安全性。在司法取证和新闻纪实等应用领域,常需要通过技术手段验证图像数据的原始性和真实性,并还原图像的操作历史以获取更多取证信息。因此,研究数字图像取证技术对于实现数字媒体内容认证具有重要意义和实用价值。本论文以数字图像操作取证技术为主要研究内容,取得创新性研究成果包括:
     1)提出了两种基于边缘特征一致性分析的图像拼接检测方法。第一种方法利用自然边缘与拼接边界在CFA (Color Filter Array)内插特征一致性方面的差异,提出了一种快速有效的图像拼接检测算法,可有效克服现有大多数拼接检测技术需要统计学习导致算法复杂度较高的缺陷。第二种方法针对图像拼接后进行边界模糊润饰这一实际篡改情形,提出了一种基于边缘模糊度估计的拼接检测算法,可有效定位模糊润饰后的拼接边界。
     2)提出了分别针对USM(Unsharp Masking)锐化和中值滤波的图像操作取证算法。在国际上较早提出了数字图像锐化和中值滤波取证问题。对图像USM锐化过程进行信号建模且给出了相应的数学描述,分析了过冲效应的产生机理,由此设计了有效的USM锐化检测方案。同时,从理论上分析了中值滤波所引起的图像一阶微分域统计特性异常,提出了一种快速有效的中值滤波操作检测算法。实验结果表明,此锐化和中值滤波取证算法均可有效鉴别相应的图像滤波操作。
     3)提出了图像对比度增强取证系列算法。为有效检测中低等质量JPEG图像上的对比度增强操作,提出了一种基于灰度直方图峰谷形状分析的对比度增强检测方法;利用峰谷位置分布与像素值映射函数之间的对应关系设计了一种快速有效的伽玛参数盲估计方法;针对源图像区域经历不同的对比度增强情形,设计了一种有效的图像拼接检测方法;最后简要分析了现有对比度增强取证算法的安全性。实验结果表明,所提对比度增强取证相关算法均取得较高性能。
     4)提出了一种半侵入式重采样算子源取证算法。从理论上推导出严格单调信号在经历传统型和几何抖动型重采样后一阶微分极性的变化规律,通过设计合适的模式图像,提出了一套完整的重采样算子源鉴别方法。实验结果表明,该方法既可识别重采样软件的内含算子,也可在特定情形下检测反取证型重采样操作。
With the rapid development of digital media editing techniques, digital image alter-ation and tampering become quite easy. The illegally manipulated and forged images emerge frequently. As such the credibility and security of digital media information are destroyed seriously. In the applications such as law enforcement and news recording, it is necessary to verify the originality and authenticity of digital images, and make clear the image manipulation history to get more information. Therefore, the research on dig-ital image manipulation forensics is significant and valuable for realizing the auth-entication of multimedia content. This thesis addresses the digital image manipulation forensics problem and gains the following novel research achievements:
     1) Two splicing detection algorithms are proposed based on the consistency analysis of edge related features in digital images. First, the consistency between the CFA (Color Filter Array) interpolation artifacts in natural edges and those in splicing boundaries is exploited to design an image slicing detection algorithm. Comparing with the most prior methods based on statistical learning, our proposed method is cost-efficient and owns lower algorithm complexity. Second, another splicing detection algorithm is proposed based on the estimation of edge-based blurriness. Such an algorithm could be used in the practical scenario that post-burring is enforced onto the splicing boundary, which would be located accordingly.
     2) Two forensic algorithms are proposed to detect the digital image USM (Unsharp Masking) sharpening and median filtering manipulations, respectively. The authors address the image sharpening and median filtering forensics problems earlier in the digital forensics community. The USM sharpening process is modeled in signal and described in mathematics. The mechanism of producing overshoot artifacts is analyzed. And consequently, an effective sharpenging detection scheme is designed. Meanwhile, the statistical abnormity in the image's first-order difference domain, which is incurred by median filtering, is analyzed theoretically. A fast and effective median filtering detection algorithm is proposed. Test results show the proposed sharpening and median filtering forensic algorithms could identify the corresponding manipulations efficiently.
     3) A series of algorithms on image contrast enhancement forensics are proposed. To efficiently detect contrast enhancement in middle/low quality JPEG compressed images, a global contrast enhancement detection algorithm is proposed based on the shape an- alysis of the gray level histogram peak/gap bins. By means of the correspondence be tween the peak/gap bins position distribution and the involved pixel value mapping, a fast and efficient algorithm is proposed to estimate the gamma parameter blindly. As for the scenario that source regions suffer different contrast enhancement mappings, an effi-cient source-enhanced spliced image detection method is designed. Lastly, the security of existing contrast enhancement forensic algorithms is analyzed briefly. Test results demonstrate that our proposed contrast enhancement forensics methods could achieve good performance.
     4) A semi non-intrusive forensic algorithm is proposed to identify the digital image resampling operator. As for the strictly monotone signal, its first derivative polarity regularity after suffering the traditional and geometric-dithering types of resampling is analyzed theoretically. Through designing suitable test pattern images, a unified resam-pling operator identification scheme is proposed. Test results show that the proposed method could identify the resampling operator embedded in softwares, as well as detect the anti-forensic type of resampling manipulation in some specific scenarios.
引文
[1]A. Popescu and H. Farid. Statistical tools for digital forensics. Proc. of International Conference on Information Hiding. Toronto:Springer.2004:128-147
    [2]A. Popescu. Statistical tools for digital image forensics [Dissertation]. New Hampshire, USA. Dartmouth College.2005
    [3]J. Fridrich. Digital image forensics. IEEE Signal Processing Magazine.2009,26(2):26-37
    [4]曹刚,赵耀,倪蓉蓉.多媒体内容认证.中国计算机学会通讯.2011,7(2):37-42
    [5]赵耀,曹刚,倪蓉蓉.2011中国计算机科学技术发展报告.北京:机械工业出版社.2012:260-262
    [6]Digital image forgeries:http://www.cs.dartmouth.edu/farid/research/digitaltampering
    [7]T.-T. Ng. Statistical and geometric methods for passive-blind image forensics [Dissertation]. New York, USA. Columbia University.2007
    [8]骆伟祺.多媒体被动认证方法研究[学位论文].广州.中山大学.2008
    [9]H. Farid. A survey of image forgery detection. IEEE Signal Process. Mag..2009,2(26):16-25.
    [10]J. A. Redi, W. Taktak and J.-L. Dugelay. Digital image forensics:A booklet for beginners. Multimedia Tools Application.2011,51(1):133-162
    [11]B. Mahdian and S. Saic. A bibliography on blind methods for identifying image forgery. Signal Processing:Image Communication.2010,25(6):389-399
    [12]吴琼,李国辉,涂丹,孙韶杰.基于真实性鉴别的数字图像盲取证技术综述.自动化学报.2008,34(12):1458-1466
    [13]王波,孔祥维,沈林杰,孟凡洁,尤新刚.司法文检中的数字取证技术.第七届全国信息隐藏暨多媒体信息安全学术大会论文集.南京.2007:271-275
    [14]R. C. Gonzalez and R. E. Woods. Digital image processing (2nd Edition). Prentice Hall.2002
    [15]阮秋琦.数字图像处理.北京:电子工业出版社.2007
    [16]T.S.Huang(ed.). Two-dimensional digital signal processing Ⅱ, Transforms and Median Filters. Springer-Verlag.1981
    [17]A.V. Oppenheim and R.W. Schafer. Discrete-time signal processing. Prentice Hall.1989
    [18]姚天任,江太辉.数字信号处理.武汉:华中科技大学出版社.2007
    [19]W. B. Pennebaker and J. L. Mitchell. JPEG still image data compression standard. Van Nostr-and Reinhold, New York.1993
    [20]M. K. Johnson and H. Farid. Exposing digital forgeries in complex lighting environments. IEEE Trans, on Information Forensics and Security.2007,2(3):450-461
    [21]D. Mahajan, R. Ramamoorthi and B. Curless. A theory of frequency domain Invariants: spherical harmonic identities for BRDF/lighting transfer and image consistency. IEEE Trans, on Pattern Analysis and Machine Intelligence.2008,30(2):197-213
    [22]G. Cao, Y. Zhao and R. Ni. Image composition detection using object-based color consistency. Proc. of International Conference on Signal Processing. Beijing:IEEE.2008:1186-1189
    [23]Q. Liu, X. Cao, C. Deng and X. Guo. Identifying image composites through shadow matte consistency. IEEE Trans, on Information Forensics and Security.2011,6(3):1111-1122
    [24]T.-T. Ng and S.-F. Chang. A model for image splicing. Proc. of International Conference on Image Processing. Singapore:IEEE.2004:1169-1172
    [25]W. Chen, Y. Q. Shi and W. Su. Image splicing detection using 2-D phase congruency and statis-tical moments of characteristic function. Proc. of Security, Steganography and Watermarking of Multimedia Contents IX. San Jose:SPIE.2007:65050R
    [26]J. Lukas, J. Fridrich and M. Goljan. Detecting digital image forgeries using sensor pattern noise. Proc. of Security, Steganography, and Watermarking of Multimedia Contents Ⅷ. San Jose: SPIE.2006:362-372
    [27]M. Chen, J. Fridrich, et al. Determining image origin and integrity using sensor noise. IEEE Trans.on Information Forensics and Security.2008,3(1):74-90
    [28]Y.-F. Hsu and S.-F. Chang. Detecting image splicing using geometry invariants and camera characteristics consistency. Proc of International Conference on Multimedia and Expo. Toronto: IEEE.2006:549-552
    [29]Y.-F. Hsu and S.-F. Chang. Image splicing detection using camera response function consis-tency and automatic segmentation. Proc of International Conference on Multimedia and Expo. Beijing:IEEE.2007:28-31.
    [30]Z. Lin, R. Wang, X. Tang and H.-Y. Shum. Detecting doctored images using camera response normality and consistency. Proc. of Conference on Computer Vision and Pattern Recognition. San Diego:IEEE.2005:1087-1092
    [31]曹刚,赵耀,倪蓉蓉.基于边缘CFA内插特征一致性的图像拼接检测.东南大学学报(自然科学版).2009,39(3):459-463
    [32]A. C. Popescu and H. Farid. Exposing digital forgeries in color filter array interpolated images. IEEE Trans.on Signal Processing.2005,53(10):3948-3959
    [33]A. C. Gallagher and T. Chen. Image authentication by detecting traces of demosaicing. Proc. of Computer Vision and Pattern Recognition Workshops (CVPRW). Anchorage:IEEE.2008:1-8
    [34]A. E. Dirik and N. Memon. Image tamper detection based on demosaicing artifacts. Proc. of International Conference on Image Processing. Cairo:IEEE.2009:1497-1500
    [35]P. Ferrara, T. Bianchi, et al. Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans.on Information Forensics and Security.2012,7(5):1566-1577
    [36]J. Fridrich, D. Soukal and J. Lukas. Detection of copy-move forgery in digital images. Proc. of Digital Forensic Research Workshops. Cleveland:DFRWS.2003:55-61
    [37]W. Luo, J. Huang and G. Qiu. Robust detection of region-duplication forgery in digital image. Proc. of International Conference on Pattern Recognition. H. K.:IEEE.2006:746-749
    [38]S. Bayram, H. T. Sencar and N. Memon. An efficient and robust method for detecting copy-move forgery. Proc. of International Conference on Acoustics, Speech and Signal Processing. Taipei:IEEE.2009:19-24
    [39]S.-J. Ryu, M.-J. Lee and H.-K. Lee. Detection of copy-rotate-move forgery using zernike mo-ments. Proc. of International Workshop on Information Hiding. Calgary:Springer.2010:51-65
    [40]X. Pan and S. Lyu. Region duplication detection using image feature matching. IEEE Trans.on Information Forensics and Security.2010,5(4):857-867
    [41]I. Amerini, L. Ballan, et al. A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans.on Information Forensics and Security.2011,6(3):1099 -1110
    [42]M. K. Bashar, K. Noda, N. Ohnishi and K. Mori. Exploring duplicated regions in natural im-ages. IEEE Trans, on Image Processing.2010,1(1):1-40
    [43]W. Wang and H. Farid. Exposing digital forgeries in video by detecting duplication. Proc. of Workshop on Multimedia and Security. Dallas, TX:ACM.2007:35-42
    [44]J. Jia, J. Sun, C.-K. Tang and H.-Y. Shum. Drag-and-drop pasting. Proc. of Special Interest Group on Graphics and Interactive Techniques (SIGGRAPH). Boston:ACM.2006:631-637
    [45]A. Agarwala. Efficient gradient-domain compositing using quad trees. ACM Trans, on Graph. 2007,26(3):94-106
    [46]G. Cao, Y. Zhao and R. Ni. Edge-based blur metric for tamper detection. Journal of Information Hiding and Multimedia Signal Processing.2010,1(1):20-27
    [47]Y. Sutcu, B. Coskun, H.T. Sencar and N. Memon. Tamper detection based on regularity of wa-velet transform coefficients. Proc. of International Conference on Image Processing. San Anto-nio:IEEE.2007:397-400
    [48]D. Hsiao and S. Pei. Detecting digital tampering by blur estimation. Proc. of First International Workshop on Systematic Approaches to Digital Forensic Engineering. Washington:IEEE.2005: 264-278
    [49]L. Zhou and D. Wang. Blur detection of digital forgery using mathematical morphology. Proc. of First KES International Symposium on Agent and Multi-Agent Systems:Technologies and Applications. Wroclaw:Springer.2007:990-998
    [50]王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术.电子学报.2006,34(12A):2451-2454
    [51]周琳娜,王东明,郭云彪.基于数字图像边缘特性的形态学滤波取证技术.电子学报.2008,36(6):1048-1051
    [52]H. Hu and G Haan. Low cost robust blur estimator. Proc. of International Conference on Image Processing. Atlanta:IEEE.2006:617-620
    [53]S. Bayram, I. Avcubas, B. Sankur and N. Memon. Image manipulation detection. Journal of Electronic Imaging.2006,15(4):04110201-04110217
    [54]W.-H. Chuang, A. Swaminathan and M. Wu. Tampering identification using empirical fre-quency response. Proc. of International Conference on Acoustics, Speech and Signal Processing. Taipei:IEEE.2009:1517-1520
    [55]H. Gou, A. Swaminathan and M. Wu. Noise features for image tampering detection and ste-ganalysis. Proc. of International Conference on Image Processing. San Antonio:IEEE.2007:VI-97-100
    [56]A. Swaminathan, M. Wu and K. J. R. Liu. Digital image forensics via intrinsic fingerprints. IEEE Trans, on Information Forensics and Security.2008,3(1):101-117
    [57]曹刚,赵耀,倪蓉蓉.一种基于振铃效应分析的图像锐化取证算法.计算机研究与发展.2009,46(Suppl.):217-220
    [58]G Cao, Y. Zhao and R. Ni. Detection of image sharpening based on histogram aberration and ringing artifacts. Proc. of International Conference on Multimedia and Expo. New York:IEEE. 2009:1026-1029
    [59]G Cao, Y. Zhao, R. Ni and A. C. Kot. Unsharp masking sharpening detection via overshoot artifacts analysis. IEEE Signal Processing Letters.2011,18(10):603-606
    [60]Unsharp masking sharpenting:http://www.cambridgeincolour.com/tutorials/unsharp-mask.htm
    [61]J. Schavemaker, M. Reinders, J. Gerbrands and E. Backer. Image sharpening by morphological filtering. Pattern Recognition.2000,33(6):997-1012
    [62]G. Ramponi, N. Strobel, S. Mitra and T. Yu. Nonlinear unsharp masking methods for image contrast enhancement. Journal of Electronic Imaging.1996,5(3):353-366
    [63]J. S. Lee. Digital image enhancement and noise filtering by using local statistics. IEEE Trans, on Pattern Analysis Machine Intellegence.1980, PAMI-2(2):165-168
    [64]A. Polesel, G Ramponi and V. J. Mathews. Image enhancement via adaptive unsharp masking. IEEE Trans, on Image Processing.2000,9(3):505-510
    [65]G. Cao, Y. Zhao, R. Ni, L. Yu and H. Tian. Forensic detection of median filtering in digital images. Proc. of International Conference on Multimedia and Expo. Singapore:IEEE.2010:89-94
    [66]M. Kirchner and J. Fridrich. On detection of median filtering in digital images. Proc. of Elec-tronic Imaging:Security, Steganography, and Watermarking of Multimedia Content. CA:SPIE. 2010:754110-12
    [67]G. Cao, Y. Zhao, R. Ni and A. Kot. Efficient contrast enhancement forensics with application to image forgery detection. IEEE Trans, on Multimedia.2012, under 2nd review
    [68]G Cao, Y. Zhao and R. Ni. Forensic estimation of gamma correction in digital images. Proc. of International Conference on Image Processing. H. K.:IEEE.2010:2097-2100
    [69]M. C. Stamm and K. J. R. Liu. Blind forensics of contrast enhancementin digital images. Proc. of International Conference on Image Processing. San Diego:IEEE.2008:3112-3115
    [70]M. C. Stamm and K. J. R. Liu. Forensic estimation and reconstruction of a contrast enhan-cement mapping. Proc. of International Conference on Acoustics, Speech and Signal. Dallas, Texas:IEEE.2010:1698-1701
    [71]M. C. Stamm and K. J. R. Liu. Forensic detection of image manipulation using statistical in-trinsic fingerprints. IEEE Trans, on Information Forensics and Security.2010,5(3):492-506
    [72]H. Farid. Blind inverse gamma correction. IEEE Trans, on Image Processing.2001,10(10): 1428-1433
    [73]A. C. Popescu and H. Farid. Exposing digital forgeries by detecting traces of resampling. IEEE Trans, on Signal Processing.2005,53(2):758-767
    [74]A. C. Gallagher. Detection of linear and cubic interpolation in JPEG compressed images. Proc. of Canadian Conference on Computer and Robot Vision. Victoria:IEEE.2005:65-72
    [75]B. Mahdian and S. Saic. Blind authentication using periodic properties of interpolation. IEEE Trans, on Information Forensics and Security.,2008,3(3):529-538
    [76]W. Wei, S. Wang, et al. Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. IEEE Trans, on Information Forensics and Security.2010,5(3):507-517
    [77]G. Cao, Y. Zhao and R. Ni. Forensic identification of resampling operators:a semi non-in-trusive approach. Forensic Science International.2012, (216):1-3
    [78]J. Lukas and J. Fridrich. Estimation of primary quantization matrix in double compressed JPEG images. Proc. of Digital Forensic Research Workshops. Cleveland:DFRWS.2003:5-8
    [79]R. Neelamani, R. Queiroz, et al. JPEG compression history estimation for color images. IEEE Trans, on Image Processing.2006,15(6):1365-1378
    [80]H. Farid. Exposing digital forgeries from JPEG ghosts. IEEE Trans, on Information Forensics and Security.2009,4(1):154-160
    [81]Z. Lin, J. He, X. Tang, and C.-K. Tang. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition.2009,42(11):2492-2501
    [82]W. Luo, J. Huang and G. Qiu. JPEG error analysis and its applications to digital image forensics. IEEE Trans, on Information Forensics and Security.2010,5(3):480-491
    [83]W. Wang, J. Dong, and T. Tan. Exploring DCT coefficient quantization effect for image tam-pering localization. Proc. of workshop on Information Forensics and Security. Fozdo Iguacu: IEEE.2011:1-6
    [84]T. Bianchi and A. Piva. Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans, on Information Forensics and Security.2012,7(3):1003-1017
    [85]T. Gloe, M. Kirchner, A. Winkler and R. Bohme. Can we trust digital image forensics? Proc. of International Conference on Multimedia. New York:ACM.2007:78-86
    [86]M. Kirchner and R. Bohme. Hiding traces of resampling in digital images. IEEE Trans, on Information Forensics and Security.2008,3(4):582-592
    [87]G. Cao, Y. Zhao and R. Ni. Attacking contrast enhancement forensics in digital images. SCI-ENCE CHINA Information Sciences. Accpected.2013
    [88]G. Cao, Y. Zhao, R. Ni and H. Tian. Anti-forensics of contrast enhancement in digital images. Proc. of ACM Multimedia and Security Workshop. Roma:ACM.2010:25-34
    [89]C.-W. Kwok, O. C. Au and S.-H. Chui. Alternative anti-forensics method for contrast enhance-ment. Proc. of International Conference on Digital-Forensics and Watermarking. Atlantic City: Springer.2011:23-26
    [90]M. Kirchner and R. Bohme. Synthesis of color filter array pattern in digital images. Proc. of Electronic Imaging:Media Forensics and Security. San Jose:SPIE.2009:72540
    [91]M. C. Stamm and K. J. R. Liu. Anti-forensics of digital image compression. IEEE Trans, on Information Forensics and Security.2011,6(3):1050-1065
    [92]M. C. Stamm, W. S. Lin and K. J. R. Liu. Temporal forensics and anti-forensics for motion compensated video. IEEE Trans, on Information Forensics and Security.2012,7(4):1315-1329
    [93]M. Barni, M. Fontani and B. Tondi. A universal technique to hide traces of histogram-based image manipulations. Proc. of ACM Multimedia and Security Workshop. Coventry:ACM.2012: 97-104
    [94]M. Barni. A game theoretic approach to source identification with known statistics. Proc. of International Conference on Acoustics, Speech and Signal. Kyoto:IEEE.2012:1745-1948
    [95]R. Bohme and M. Kirchner. Counter-forensics:attacking image forensics. A chapter of the book "Digital Image Forensics", H. T. Sencar and N. Memon (eds.). Springer,2012
    [96]C. Fei, D. Kundur and R. H. Kwong. Analysis and design of secure watermark-based auth-entication systems. IEEE Trans, on Information Forensics and Security.2006,1(1):43-55
    [97]The forged image is cited from:http://luxa.org.php
    [98]B. Zhang and J. P. Allebach. Adaptive bilateral filter for sharpness enhancement and noise removal. IEEE Trans, on Image Processing.2008,17(5):664-678
    [99]K. He, J. Sun and X. Tang. Guided image filtering. Proc. of European Conference on Computer Vision. Crete:Springer.2010:1-14
    [100]唐胜.多媒体数字签名技术研究[学位论文].北京:中国科学院计算技术研究所.2006
    [101]Q. Sun and S.-F. Chang. A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Trans, on Multimedia.2005,7(3):480-494
    [102]C.-S. Lu and H.-Y. Mark Liao. Structural digital signature for image authentication:an inci-dental distortion resistant scheme. IEEE Trans, on Multimedia.2003,5(2):161-173
    [103]W. Lu, A. L. Varna and M. Wu. Forensic hash for multimedia information. Proc. of Media Forensics and Security II. San Jose:SPIE.2010:1-10
    [104]R. Ni, Q. Ruan and Y. Zhao. Pinpoint authentication watermarking based on a chaotic system. Forensic Science International.2008,179(1):54-62
    [105]M. Yeung and F. Mintzer. An invisible watermarking technique for image verification. Proc. of International Conference on Image Processing. Santa Barbara:IEEE.1997:680-683
    [106]P. W. Wong and N. Memon. Secret and public key image watermarking schemes for image au-thentication and ownership verification. IEEE Trans, on Image Processing.2001,10(10):1593-1601
    [107]C.-Y. Lin and S.-F. Chang. Semi-fragile watermarking for authenticating JPEG visual content. Proc. of Security and Watermarking of Multimedia Content Ⅱ. San Jose:SPIE.2000:140-151
    [108]T.-Y. Lee and S. D. Lin. Dual watermark for image tamper detection and recovery. Pattern Recognition.2008,41(11):3497-3506
    [109]H. J. Kim, V. Sachnev, et al. A novel difference expansion transform for reversible data em-bedding. IEEE Trans, on Information Forensics and Security.2008,3(3):456-465
    [110]S. Weng, Y. Zhao, J.-S. Pan and R. Ni. Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Processing Letters.2008,15:721-724
    [111]S, Weng, Y. Zhao, R. Ni and J.-S. Pan. Lossless data hiding based on prediction-error adju-stment. Science in China Series F-Information Sciences.2009,52(2):269-275
    [112]A. Swaminathan, M. Wu and K. J. R. Liu. Non-intrusive component forensics of visual sen-sors using output images. IEEE Trans, on Information Forensics and Security.2007,2(1):91-106.
    [113]A. Swaminathan, M. Wu and K. J. R. Liu. Component Forensics:Theory, Methodologies, and Applications. IEEE Signal Processing Magazine.2009,26(2):38-48
    [114]H. Cao and A. Kot. Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans, on Information Forensics and Security.2009,4(4):899-910
    [115]S. Lyu and H. Farid. How realistic is photorealistic? IEEE Trans, on Signal Processing.2005, 53(2):845-850
    [116]N. Khanna, G. T.-C. Chiu, et al. Forensic techniques for classifying scanner, computer gene-rated and digital camera images. Proc. of International Conference on Acoustics, Speech and Signal. Las Vegas:IEEE.2008:1653-1656
    [117]H. Gou, A. Swaminathan and M. Wu. Intrinsic sensor noise features for forensic analysis on scanners and scanned images. IEEE Trans, on Information Forensics and Security.2009,4(3): 476-491
    [118]L. P. Freire. Digital watermarking security [Dissertation]. Vigo:Universidade de Vigo.2008
    [119]M. J. Holliman and N. D. Memon. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans, on Image Processing.2000,9(3):432-441
    [120]R. C.-W. Phan. Tampering with a watermarking-based image authentication scheme. Pattern Recognition.2008,41(11):3493-3496
    [121]G. Cao, Y. Zhao and R. Ni. Tampering attacks on BPOF-Based watermarking schemes for image authentication. Optical Engineering.2011,50(5):057004
    [122]J. Zhou and J. Glotzbach. Image pipeline tuning for digital cameras. Proc. of International Sy-mposium on Consumer Electronics. Dallas:IEEE.2007:1-4
    [123]K. G Bahadir, G John, et al. Demosaicking:color filter array interpolation. IEEE Signal Pro-cessing Magazine.2005,22(1):44-54
    [124]I. Yerushalmy and H. Hel-Or. Digital image forgery detection based on lens and sensor abe-rration. International Journal of Computer Vision.2011,92(1):71-91
    [125]M. K. Johnson and H. Farid. Exposing digital forgeries through chromatic aberration. Proc. of ACM Multimedia and Security Workshop. Geneva:ACM.2006:48-55
    [126]G. E. Healey and R. Kondepudy. Radiometric CCD camera calibration and noise estimation. IEEE Trans, on Pattern Analysis and Machine Intelligence.1994,16(3):267-276
    [127]S. Lyu. Estimating vignetting function from a single image for image authentication. Proc. of ACM Multimedia and Security Workshop. Roma:ACM.2010:3-12
    [128]J. Canny. A computational approach to edge detection. IEEE Trans, on Pattern Analysis and Machine Intelligence.1986,8(6):679-698
    [129]G. Schaefer and M. Stich. UCID-An uncompressed colour image database. Proc. of Storage and Retrieval Methods and Applications for Multimedia. San Jose:SPIE.2004:472-480
    [130]P. Bas, T. Filler and T. Pevny. Break our steganographic system the ins and outs of organizing BOSS. Proc. of International Workshop on Information Hiding. Prague:Springer.2011:59-70

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700