- 1、本文档共86页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Forensics MotivationSeeing is believing … or is it? Easy to be deceived Goals Identify image tampering methods. Assess methods available for protecting images. Assess image authentication techniques. Identify directions for future work. Categories of Image Tampering There are three main categories of image tampering: Enhancing Compositing Copy/Move Enhancing Changing the color of objects Changing the weather conditions Blurring out objects Compositing Copy-Move Copying regions of the original image and pasting into other areas. The yellow area has been copied and moved to conceal the truck. What can be done to protect digital images? Watermarking Fragile watermarks Semi-fragile watermarks Self-embedding watermarks Digital cameras with watermarking capabilities Digital Fingerprinting/Signatures Digital cameras with fingerprinting capabilities Digital Watermarking The basic concept of digital watermarking an image is that a low level signal is placed directly into the image data. Any manipulation of the image will impact the watermark and subsequent retrieval of the watermark and examination of its condition will indicate if tampering has occurred. Fragile Watermarks Fragile watermarks are designed to detect every possible change in pixel values . Variety of Techniques but in most cases, the watermark is embedded in the least significant bit (LSB) of the image. Advantages: Pick up all image manipulations – malicious and non-malicious Disadvantages: Too sensitive Passive Authentication Techniques Detecting Copy-Move Detecting Traces of Re-sampling Detecting Light Inconsistencies Copy-Move Detection Copy-Move Detection Re-sampling Detection Inconsistencies in Lighting Conclusions Digital image forgeries can be used to deceive the public and the authorities. They are here to stay. Until non destructible/ non removal digital watermarks are perfected, passive authentication will remain necessary. Currently no single passive authentication technique can d
您可能关注的文档
最近下载
- 大模型原理与技术-课件 chap6 大模型微调.pptx
- 2025年物业保洁培训课件.pdf VIP
- 第13课制作数字相册(课件)三年级全一册信息技术人教版.pptx
- 【培训课件】《中华人民共和国公务员法》解读.ppt VIP
- 2024郑州电力高等专科学校教师招聘考试题库及答案.docx VIP
- 2025年陕西省单招考试英语模拟试题 完整版2025.pdf VIP
- 3.2.4 植物在自然界中的作用(课件)2024-2025学年度人教版生物七年级下册.pptx VIP
- 免疫治疗在食管癌新辅助及辅助治疗中的临床进展.pptx
- 2016陕西交通职业技术学院单招英语模拟试题及答案.pdf VIP
- 铁路货车的常见故障(全).ppt VIP
文档评论(0)