- 1、本文档共12页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
A study on features for the detection of copy-move forgeries
A Study on Features for the Detection of Copy-Move
Forgeries
Vincent Christlein, Christian Riess, Elli Angelopoulou
{sivichri@stud, riess@i5, elli@i5}.informatik.uni-erlangen.de
Abstract: Blind image forensics aims to assess image authenticity. One of the most
popular families of methods from this category is the detection of copy-move forg-
eries. In the past years, more than 15 different algorithms have been proposed for
copy-move forgery detection. So far, the efficacy of these approaches has barely been
examined. In this paper, we: a) present a common pipeline for copy-move forgery
detection, b) perform a comparative study on 10 proposed copy-move features and c)
introduce a new benchmark database for copy-move forgery detection. Experiments
show that the recently proposed Fourier-Mellin features perform outstandingly if no
geometric transformations are applied to the copied region. Furthermore, our experi-
ments strongly support the use of kd-trees for the matching of similar blocks instead
of lexicographic sorting.
1 Introduction
The goal of blind image forensics is to examine image authenticity without the help of an
embedded security scheme (like watermarks). In the past few years, a diverse set of meth-
ods for blind image forensics has been developed, see e. g. [SM08, NCLS06, Far09a]. The
existing methods can be divided into three categories. The first group focuses on detecting
the existence of expected artifacts that have been introduced in the process of image sens-
ing. The detection of inconsistensies in such artifacts is a cue for the lack of authenticity
of an image. Particular examples include the recovery of a camera-specific sensor noise
pattern by Lukas et al. [LFG06], the estimation of the camera response function [HC07],
demosaicing [GC08], or the extraction of lens properties [JF06].
A second approach is to search for inconsistencies in the scene that have been introduced
as a side effect of tampering. Johnson and Farid presented an approach
您可能关注的文档
- 2014年8月9日雅思写作真题解析及雅思大作文范文.pdf
- 2014年8月9日雅思写作考试预测.pdf
- 2014年北京师范大学遥感原理考博试题,试题解析.pdf
- 2014年7月10日雅思机经.pdf
- 2014年南开大学经济学考博试题,真题解析,复试真题,考博经验,真题笔记.pdf
- 2014年MTI翻译硕士英语 考研阅读理解模拟真题三(含标准答案).doc
- 2014年同等学力申硕英语真题一卷.pdf
- 2014年秋季人教版九年级英语SectionA 2d.ppt
- 2014年高考英语一轮复习 Body language单元测试(含解析)新人教版必修4.doc
- 2014杭州求是高复高考研究专用 英语试卷(定).pdf
文档评论(0)