研究生: |
陳以雷 Chen, Yi-Lei |
---|---|
論文名稱: |
對於JPEG壓縮影像之竄改偵測 Tampering Detection in JPEG Images |
指導教授: |
許秋婷
Hsu, Chiou-Ting |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2009 |
畢業學年度: | 97 |
語文別: | 英文 |
論文頁數: | 61 |
中文關鍵詞: | 數位影像竄改 、壓縮特性 、週期性分析 、壓縮雜訊模型 、影像還真 |
外文關鍵詞: | Digital image tampering, Compression characteristics, Periodicity analysis, Quantization noise model, Image restoration |
相關次數: | 點閱:1 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
由於JPEG影像壓縮技術普遍被使用,今日,在討論數位影像竄改議題時,對於JPEG儲存格式影像的研究早已不可或缺。一般而言,在壓縮影像上進行人為竄改,通常會牽涉重新壓縮(recompression)的步驟。此步驟會消除竄改區塊上未壓縮前的特徵,提高偵測困難性。但相對地,我們亦可以透過重新壓縮的特性分析應用於竄改偵測。本論文中,重點將放在偵測JPEG儲存格式的來源影像是否經過竄改。首先,利用壓縮影像在空間(spatial domain)與頻域(DCT domain)上的壓縮特徵(compression artifacts),我們提出有效的週期性分析方法來判斷一張影像是否被重新壓縮。接著,透過提出的壓縮雜訊模型(quantization noise model)以及影像還真技術(image restoration techniques),進一步偵測出被竄改的局部區塊。實驗數據顯示,無論是偵測重新壓縮影像或者局部竄改偵測,我們提出的方法與模型的準確性都超越現有研究。此外,實驗同樣顯示在我們提出的影像還真技術(image restoration techniques)下,局部竄改偵測可以達到滿意的效果。
Since JPEG has been a popularly used image compression standard, tampering detection in JPEG images now plays an important role. Tampering on compressed images often involve recompression and tend to erase those tampering traces existed in uncompressed images. We could, however, try to discover new traces caused by recompression and use these traces to detect the recompression tampering. The artifacts introduced by lossy JPEG compression can be seen as an inherent signature for recompressed images. In this thesis, we first propose a robust tampered image detection approach by periodicity analysis with the compression artifacts both in spatial and DCT domain. To locate the forged regions, we then propose a forged regions localization method via quantization noise model and image restoration techniques. Finally, we conduct a series of experiments to demonstrate the validity of the proposed periodic features and quantization noise model, which all outperform the existing methods. Also, we show the effectiveness and feasibility of our forged regions localization method with proposed image restoration techniques.
[1] A.C. Popescu and H. Farid, “Exposing Digital Forgeries by Detecting Traces of Re-sampling”, IEEE Trans. on Signal Processing, vol. 53, no.2 ,pp 758-767, 2005.
[2] A.C. Popescu and H. Farid, “Exposing Digital Forgeries in Color Filter Array Interpolated Images,” IEEE Trans. on Signal Processing, vol. 53, no. 10, pp. 3948-3959, 2005.
[3] A. Swaminathan, M.Wu, and K.J.R. Liu, “Non-intrusive Component Forensics of Visual Sensors Using Output Images,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 1, pp. 91-106, March 2007.
[4] J. Lukas and J. Fridrich, “Digital Camera Identification From Sensor Pattern Noise”, IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 205-214, June 2006.
[5] M.K. Johnson and H. Farid, “Exposing Digital Forgeries by Detecting Inconsistencies in Lighting”, ACM Multimedia and Security Workshop, New York, NY, 2005.
[6] S. Lyu and H. Farid, “How Realistic is Photorealistic?”, IEEE Trans. on Signal Processing, vol. 53, no. 2, pp. 845-850, Feb. 2005.
[7] J. Fridrich, M. Goljan, and R. Du, “Steganalysis based on JPEG compatibility,” SPIE Multimedia Systems and Applications IV, Denver, CO, August 2001, pp. 275-280.
[8] Z. Fan and R.L. de Queiroz, “Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation,” IEEE Trans. on Image Processing, vol. 12, no. 2, pp. 230-235, Feb. 2003.
[9] S. Ye, Q. Sun, and E.C. Chang, “Detecting Digital Image by Measuring Inconsistencies of Blocking Artifact”, Proc. ICME, pp. 12-15, July 2007.
[10] W. Luo, Z. Qu, J. Huang, and G. Qiu, “A Novel Method for Detecting Cropped and Recompressed Image Block,” Proc. ICASSP, vol.2, pp. 217-220, April 2007.
[11] Y. L. Chen, and C. T. Hsu, “Image Tampering Detection by Blocking Periodicity Analysis in JPEG Compressed Images,” Proc. MMSP, 2008.
[12] D. Fu, Y. Q. Shi, and W. Su, “ A Generalized Benford’s Law for JPEG Coefficients and Its Applications in Image Forensics,” SPIE, 2007.
[13] B. Li, Y. Q. Shi, and J. Huang,, “Detecting Doubly Compressed JPEG Images by Mode Based First Digit Features,” Proc. MMSP, 2008.
[14] H. Farid, “Exposing digital forgery from JPEG ghosts,” IEEE Trans. on Information Forensic and Security, vol.1, 2009.
[15] A. Zakhor, “Iterative procedures for reduction of blocking effects in transform image coding,” IEEE Trans. on Circuit and System for Video Technology, vol. 2, no. 1, March 1992.
[16] A. Papoulis, “Probability, random variables, and stochastic process,” 4th edition, 2002.
[17] Y. Kin, C. S. Park, and S. J. Ko, “Fast POCS based post-processing technique for HDTV,” IEEE Trans. on Consumer Electronics, vol. 49, no. 4, November 2003.
[18] Y. C. Liaw, W. Lo and Z. C. Lai, “Image restoration of compressed image using classified vector quantization,” Pattern Recognition, pp 329-340, 2002.