一种基于极坐标正弦变换的复制移动伪造检测方法

Yanfen Gan, Jixiang Yang
{"title":"一种基于极坐标正弦变换的复制移动伪造检测方法","authors":"Yanfen Gan, Jixiang Yang","doi":"10.1109/IICSPI48186.2019.9096005","DOIUrl":null,"url":null,"abstract":"Nowadays, as rapid development of image processing technique, it is necessary to authenticate whether an image is an artificial image or not. Copy-move forgery is the frequently-used image manipulation means. In this paper, Polar Sine Transform (PST) and Locality Sensitive Hashing (LSH) are combined to detect copy-move forgery image. First, the detected image is divided into lots of overlapping blocks. And then, PST is applied to extract feature from each block. Subsequently, LSH is applied to classify these block features, and we search the similar features in same class as candidate block feature pairs. Finally, the post-processing operation using Euclidean distance is presented to filter out the weak block feature pairs. A series of experiments show that the proposed method has robustness to rotation and JPEG compression and is superior to the state-of-the-art methods.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Effective Scheme for Copy-move Forgery Detection Using Polar Sine Transform\",\"authors\":\"Yanfen Gan, Jixiang Yang\",\"doi\":\"10.1109/IICSPI48186.2019.9096005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, as rapid development of image processing technique, it is necessary to authenticate whether an image is an artificial image or not. Copy-move forgery is the frequently-used image manipulation means. In this paper, Polar Sine Transform (PST) and Locality Sensitive Hashing (LSH) are combined to detect copy-move forgery image. First, the detected image is divided into lots of overlapping blocks. And then, PST is applied to extract feature from each block. Subsequently, LSH is applied to classify these block features, and we search the similar features in same class as candidate block feature pairs. Finally, the post-processing operation using Euclidean distance is presented to filter out the weak block feature pairs. A series of experiments show that the proposed method has robustness to rotation and JPEG compression and is superior to the state-of-the-art methods.\",\"PeriodicalId\":318693,\"journal\":{\"name\":\"2019 2nd International Conference on Safety Produce Informatization (IICSPI)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Safety Produce Informatization (IICSPI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IICSPI48186.2019.9096005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IICSPI48186.2019.9096005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在图像处理技术飞速发展的今天,对图像是否为人工图像进行鉴别是十分必要的。复制-移动伪造是常用的图像篡改手段。本文将极坐标正弦变换(PST)和局部敏感散列(LSH)相结合,用于检测复制-移动伪造图像。首先,将检测到的图像分割成许多重叠的块。然后,应用PST对每个块进行特征提取。然后利用LSH对这些块特征进行分类,并在同一类中搜索相似的特征作为候选块特征对。最后,利用欧几里得距离进行后处理,过滤出弱块特征对。一系列实验表明,该方法对旋转和JPEG压缩具有鲁棒性,优于现有方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An Effective Scheme for Copy-move Forgery Detection Using Polar Sine Transform
Nowadays, as rapid development of image processing technique, it is necessary to authenticate whether an image is an artificial image or not. Copy-move forgery is the frequently-used image manipulation means. In this paper, Polar Sine Transform (PST) and Locality Sensitive Hashing (LSH) are combined to detect copy-move forgery image. First, the detected image is divided into lots of overlapping blocks. And then, PST is applied to extract feature from each block. Subsequently, LSH is applied to classify these block features, and we search the similar features in same class as candidate block feature pairs. Finally, the post-processing operation using Euclidean distance is presented to filter out the weak block feature pairs. A series of experiments show that the proposed method has robustness to rotation and JPEG compression and is superior to the state-of-the-art methods.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Analysis and Design of System of Experimental Consumables Based on Django and QR code Analysis and Research on the Characteristics of Boiled Yolk based on Hyperspectral Remote Sensing Images Density Peaks Spatial Clustering by Grid Neighborhood Search Modeling of Superheated Steam Temperature Characteristics Based on Fireworks Algorithm Optimized Extreme Learning Machine Fusion Chaotic Prediction Model for Bearing Performance by Computer Technique
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1