网站大量收购独家精品文档,联系QQ:2885784924

北京北京大学人工智能AI6.ppt

  1. 1、本文档共86页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Forensics Motivation Seeing is believing … or is it? Easy to be deceived Goals Identify image tampering methods. Assess methods available for protecting images. Assess image authentication techniques. Identify directions for future work. Categories of Image Tampering There are three main categories of image tampering: Enhancing Compositing Copy/Move Enhancing Changing the color of objects Changing the weather conditions Blurring out objects Compositing Copy-Move Copying regions of the original image and pasting into other areas. The yellow area has been copied and moved to conceal the truck. What can be done to protect digital images? Watermarking Fragile watermarks Semi-fragile watermarks Self-embedding watermarks Digital cameras with watermarking capabilities Digital Fingerprinting/Signatures Digital cameras with fingerprinting capabilities Digital Watermarking The basic concept of digital watermarking an image is that a low level signal is placed directly into the image data. Any manipulation of the image will impact the watermark and subsequent retrieval of the watermark and examination of its condition will indicate if tampering has occurred. Fragile Watermarks Fragile watermarks are designed to detect every possible change in pixel values . Variety of Techniques but in most cases, the watermark is embedded in the least significant bit (LSB) of the image. Advantages: Pick up all image manipulations – malicious and non-malicious Disadvantages: Too sensitive Passive Authentication Techniques Detecting Copy-Move Detecting Traces of Re-sampling Detecting Light Inconsistencies Copy-Move Detection Copy-Move Detection Re-sampling Detection Inconsistencies in Lighting Conclusions Digital image forgeries can be used to deceive the public and the authorities. They are here to stay. Until non destructible/ non removal digital watermarks are perfected, passive authentication will remain necessary. Currently no single passive authentication technique can d

文档评论(0)

wx171113 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档