簡易檢索 / 詳目顯示

研究生: 陳以雷
Chen, Yi-Lei
論文名稱: 對於JPEG壓縮影像之竄改偵測
Tampering Detection in JPEG Images
指導教授: 許秋婷
Hsu, Chiou-Ting
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2009
畢業學年度: 97
語文別: 英文
論文頁數: 61
中文關鍵詞: 數位影像竄改壓縮特性週期性分析壓縮雜訊模型影像還真
外文關鍵詞: Digital image tampering, Compression characteristics, Periodicity analysis, Quantization noise model, Image restoration
相關次數: 點閱:1下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於JPEG影像壓縮技術普遍被使用,今日,在討論數位影像竄改議題時,對於JPEG儲存格式影像的研究早已不可或缺。一般而言,在壓縮影像上進行人為竄改,通常會牽涉重新壓縮(recompression)的步驟。此步驟會消除竄改區塊上未壓縮前的特徵,提高偵測困難性。但相對地,我們亦可以透過重新壓縮的特性分析應用於竄改偵測。本論文中,重點將放在偵測JPEG儲存格式的來源影像是否經過竄改。首先,利用壓縮影像在空間(spatial domain)與頻域(DCT domain)上的壓縮特徵(compression artifacts),我們提出有效的週期性分析方法來判斷一張影像是否被重新壓縮。接著,透過提出的壓縮雜訊模型(quantization noise model)以及影像還真技術(image restoration techniques),進一步偵測出被竄改的局部區塊。實驗數據顯示,無論是偵測重新壓縮影像或者局部竄改偵測,我們提出的方法與模型的準確性都超越現有研究。此外,實驗同樣顯示在我們提出的影像還真技術(image restoration techniques)下,局部竄改偵測可以達到滿意的效果。


    Since JPEG has been a popularly used image compression standard, tampering detection in JPEG images now plays an important role. Tampering on compressed images often involve recompression and tend to erase those tampering traces existed in uncompressed images. We could, however, try to discover new traces caused by recompression and use these traces to detect the recompression tampering. The artifacts introduced by lossy JPEG compression can be seen as an inherent signature for recompressed images. In this thesis, we first propose a robust tampered image detection approach by periodicity analysis with the compression artifacts both in spatial and DCT domain. To locate the forged regions, we then propose a forged regions localization method via quantization noise model and image restoration techniques. Finally, we conduct a series of experiments to demonstrate the validity of the proposed periodic features and quantization noise model, which all outperform the existing methods. Also, we show the effectiveness and feasibility of our forged regions localization method with proposed image restoration techniques.

    誌 謝 I 中文摘要 II Abstract III 1. Introduction 1 2. Related Work and Motivation 3 2.1 Tamper Detection by Inconsistency on Quantization Table 3 2.2 Compression Artifacts Detection in Spatial Domain 5 2.3 Compression Artifacts Detection in DCT Domain 6 2.3.1 A Generalized Benford’s Law for DCT coefficients 6 2.3.2 JPEG ghosts for Digital forgery 7 2.4 Motivation 8 3. Tampering Detection via Blocking Periodicity Analysis 15 3.1 Characteristics Analysis of JPEG Images 15 3.1.1 Periodicity of Blocking Artifacts 16 3.1.2 Periodicity of DCT coefficients 17 3.2 Characteristics Variation after Tampering 18 3.2.1 Periodicity Variation of Blocking artifacts 19 3.2.2 Periodicity Variation of DCT coefficients 21 3.3 Tampering Detection via JPEG Periodic Characteristics 23 3.3.1 Composite JPEG sources detection by Blocking artifacts 23 3.3.2 Composite JPEG Sources Detection by DCT coefficients 27 4. Locating Forged Regions via Quantization Noise Model 33 4.1 Quantization Noise Model 33 4.2 Ground Truth Estimation Based on Image Restoration 37 4.2.1 Deblocking 38 4.2.2 Low Frequency Compensation 39 4.2.3 Modification of Quantization Noise Model 40 5. Experimental Results 45 5.1 Validation of Periodic Features 45 5.1.1 Detecting Cropped and Recompressed Images 46 5.2.2 Detecting Composite JPEG sources 47 5.2 Robustness of Quantization Noise Model 48 5.3 Forgery Detection Based on Image Restoration 50 6. Conclusion and Future Work 59 7. References 60

    [1] A.C. Popescu and H. Farid, “Exposing Digital Forgeries by Detecting Traces of Re-sampling”, IEEE Trans. on Signal Processing, vol. 53, no.2 ,pp 758-767, 2005.
    [2] A.C. Popescu and H. Farid, “Exposing Digital Forgeries in Color Filter Array Interpolated Images,” IEEE Trans. on Signal Processing, vol. 53, no. 10, pp. 3948-3959, 2005.
    [3] A. Swaminathan, M.Wu, and K.J.R. Liu, “Non-intrusive Component Forensics of Visual Sensors Using Output Images,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 1, pp. 91-106, March 2007.
    [4] J. Lukas and J. Fridrich, “Digital Camera Identification From Sensor Pattern Noise”, IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 205-214, June 2006.
    [5] M.K. Johnson and H. Farid, “Exposing Digital Forgeries by Detecting Inconsistencies in Lighting”, ACM Multimedia and Security Workshop, New York, NY, 2005.
    [6] S. Lyu and H. Farid, “How Realistic is Photorealistic?”, IEEE Trans. on Signal Processing, vol. 53, no. 2, pp. 845-850, Feb. 2005.
    [7] J. Fridrich, M. Goljan, and R. Du, “Steganalysis based on JPEG compatibility,” SPIE Multimedia Systems and Applications IV, Denver, CO, August 2001, pp. 275-280.
    [8] Z. Fan and R.L. de Queiroz, “Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation,” IEEE Trans. on Image Processing, vol. 12, no. 2, pp. 230-235, Feb. 2003.
    [9] S. Ye, Q. Sun, and E.C. Chang, “Detecting Digital Image by Measuring Inconsistencies of Blocking Artifact”, Proc. ICME, pp. 12-15, July 2007.
    [10] W. Luo, Z. Qu, J. Huang, and G. Qiu, “A Novel Method for Detecting Cropped and Recompressed Image Block,” Proc. ICASSP, vol.2, pp. 217-220, April 2007.
    [11] Y. L. Chen, and C. T. Hsu, “Image Tampering Detection by Blocking Periodicity Analysis in JPEG Compressed Images,” Proc. MMSP, 2008.
    [12] D. Fu, Y. Q. Shi, and W. Su, “ A Generalized Benford’s Law for JPEG Coefficients and Its Applications in Image Forensics,” SPIE, 2007.
    [13] B. Li, Y. Q. Shi, and J. Huang,, “Detecting Doubly Compressed JPEG Images by Mode Based First Digit Features,” Proc. MMSP, 2008.
    [14] H. Farid, “Exposing digital forgery from JPEG ghosts,” IEEE Trans. on Information Forensic and Security, vol.1, 2009.
    [15] A. Zakhor, “Iterative procedures for reduction of blocking effects in transform image coding,” IEEE Trans. on Circuit and System for Video Technology, vol. 2, no. 1, March 1992.
    [16] A. Papoulis, “Probability, random variables, and stochastic process,” 4th edition, 2002.
    [17] Y. Kin, C. S. Park, and S. J. Ko, “Fast POCS based post-processing technique for HDTV,” IEEE Trans. on Consumer Electronics, vol. 49, no. 4, November 2003.
    [18] Y. C. Liaw, W. Lo and Z. C. Lai, “Image restoration of compressed image using classified vector quantization,” Pattern Recognition, pp 329-340, 2002.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE