A study on features for the detection of copy-move forgeries.pdf

A study on features for the detection of copy-move forgeries.pdf

  1. 1、本文档共12页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
A study on features for the detection of copy-move forgeries

A Study on Features for the Detection of Copy-Move Forgeries Vincent Christlein, Christian Riess, Elli Angelopoulou {sivichri@stud, riess@i5, elli@i5}.informatik.uni-erlangen.de Abstract: Blind image forensics aims to assess image authenticity. One of the most popular families of methods from this category is the detection of copy-move forg- eries. In the past years, more than 15 different algorithms have been proposed for copy-move forgery detection. So far, the efficacy of these approaches has barely been examined. In this paper, we: a) present a common pipeline for copy-move forgery detection, b) perform a comparative study on 10 proposed copy-move features and c) introduce a new benchmark database for copy-move forgery detection. Experiments show that the recently proposed Fourier-Mellin features perform outstandingly if no geometric transformations are applied to the copied region. Furthermore, our experi- ments strongly support the use of kd-trees for the matching of similar blocks instead of lexicographic sorting. 1 Introduction The goal of blind image forensics is to examine image authenticity without the help of an embedded security scheme (like watermarks). In the past few years, a diverse set of meth- ods for blind image forensics has been developed, see e. g. [SM08, NCLS06, Far09a]. The existing methods can be divided into three categories. The first group focuses on detecting the existence of expected artifacts that have been introduced in the process of image sens- ing. The detection of inconsistensies in such artifacts is a cue for the lack of authenticity of an image. Particular examples include the recovery of a camera-specific sensor noise pattern by Lukas et al. [LFG06], the estimation of the camera response function [HC07], demosaicing [GC08], or the extraction of lens properties [JF06]. A second approach is to search for inconsistencies in the scene that have been introduced as a side effect of tampering. Johnson and Farid presented an approach

您可能关注的文档

文档评论(0)

l215322 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档