跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.103) 您好!臺灣時間:2025/11/22 01:24
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳以雷
研究生(外文):Chen, Yi-Lei
論文名稱:對於JPEG壓縮影像之竄改偵測
論文名稱(外文):Tampering Detection in JPEG Images
指導教授:許秋婷許秋婷引用關係
指導教授(外文):Hsu, Chiou-Ting
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:英文
論文頁數:61
中文關鍵詞:數位影像竄改壓縮特性週期性分析壓縮雜訊模型影像還真
外文關鍵詞:Digital image tamperingCompression characteristicsPeriodicity analysisQuantization noise modelImage restoration
相關次數:
  • 被引用被引用:0
  • 點閱點閱:539
  • 評分評分:
  • 下載下載:68
  • 收藏至我的研究室書目清單書目收藏:1
由於JPEG影像壓縮技術普遍被使用,今日,在討論數位影像竄改議題時,對於JPEG儲存格式影像的研究早已不可或缺。一般而言,在壓縮影像上進行人為竄改,通常會牽涉重新壓縮(recompression)的步驟。此步驟會消除竄改區塊上未壓縮前的特徵,提高偵測困難性。但相對地,我們亦可以透過重新壓縮的特性分析應用於竄改偵測。本論文中,重點將放在偵測JPEG儲存格式的來源影像是否經過竄改。首先,利用壓縮影像在空間(spatial domain)與頻域(DCT domain)上的壓縮特徵(compression artifacts),我們提出有效的週期性分析方法來判斷一張影像是否被重新壓縮。接著,透過提出的壓縮雜訊模型(quantization noise model)以及影像還真技術(image restoration techniques),進一步偵測出被竄改的局部區塊。實驗數據顯示,無論是偵測重新壓縮影像或者局部竄改偵測,我們提出的方法與模型的準確性都超越現有研究。此外,實驗同樣顯示在我們提出的影像還真技術(image restoration techniques)下,局部竄改偵測可以達到滿意的效果。
Since JPEG has been a popularly used image compression standard, tampering detection in JPEG images now plays an important role. Tampering on compressed images often involve recompression and tend to erase those tampering traces existed in uncompressed images. We could, however, try to discover new traces caused by recompression and use these traces to detect the recompression tampering. The artifacts introduced by lossy JPEG compression can be seen as an inherent signature for recompressed images. In this thesis, we first propose a robust tampered image detection approach by periodicity analysis with the compression artifacts both in spatial and DCT domain. To locate the forged regions, we then propose a forged regions localization method via quantization noise model and image restoration techniques. Finally, we conduct a series of experiments to demonstrate the validity of the proposed periodic features and quantization noise model, which all outperform the existing methods. Also, we show the effectiveness and feasibility of our forged regions localization method with proposed image restoration techniques.
誌 謝 I
中文摘要 II
Abstract III
1. Introduction 1
2. Related Work and Motivation 3
2.1 Tamper Detection by Inconsistency on Quantization Table 3
2.2 Compression Artifacts Detection in Spatial Domain 5
2.3 Compression Artifacts Detection in DCT Domain 6
2.3.1 A Generalized Benford’s Law for DCT coefficients 6
2.3.2 JPEG ghosts for Digital forgery 7
2.4 Motivation 8
3. Tampering Detection via Blocking Periodicity Analysis 15
3.1 Characteristics Analysis of JPEG Images 15
3.1.1 Periodicity of Blocking Artifacts 16
3.1.2 Periodicity of DCT coefficients 17
3.2 Characteristics Variation after Tampering 18
3.2.1 Periodicity Variation of Blocking artifacts 19
3.2.2 Periodicity Variation of DCT coefficients 21
3.3 Tampering Detection via JPEG Periodic Characteristics 23
3.3.1 Composite JPEG sources detection by Blocking artifacts 23
3.3.2 Composite JPEG Sources Detection by DCT coefficients 27
4. Locating Forged Regions via Quantization Noise Model 33
4.1 Quantization Noise Model 33
4.2 Ground Truth Estimation Based on Image Restoration 37
4.2.1 Deblocking 38
4.2.2 Low Frequency Compensation 39
4.2.3 Modification of Quantization Noise Model 40
5. Experimental Results 45
5.1 Validation of Periodic Features 45
5.1.1 Detecting Cropped and Recompressed Images 46
5.2.2 Detecting Composite JPEG sources 47
5.2 Robustness of Quantization Noise Model 48
5.3 Forgery Detection Based on Image Restoration 50
6. Conclusion and Future Work 59
7. References 60
[1] A.C. Popescu and H. Farid, “Exposing Digital Forgeries by Detecting Traces of Re-sampling”, IEEE Trans. on Signal Processing, vol. 53, no.2 ,pp 758-767, 2005.
[2] A.C. Popescu and H. Farid, “Exposing Digital Forgeries in Color Filter Array Interpolated Images,” IEEE Trans. on Signal Processing, vol. 53, no. 10, pp. 3948-3959, 2005.
[3] A. Swaminathan, M.Wu, and K.J.R. Liu, “Non-intrusive Component Forensics of Visual Sensors Using Output Images,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 1, pp. 91-106, March 2007.
[4] J. Lukas and J. Fridrich, “Digital Camera Identification From Sensor Pattern Noise”, IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 205-214, June 2006.
[5] M.K. Johnson and H. Farid, “Exposing Digital Forgeries by Detecting Inconsistencies in Lighting”, ACM Multimedia and Security Workshop, New York, NY, 2005.
[6] S. Lyu and H. Farid, “How Realistic is Photorealistic?”, IEEE Trans. on Signal Processing, vol. 53, no. 2, pp. 845-850, Feb. 2005.
[7] J. Fridrich, M. Goljan, and R. Du, “Steganalysis based on JPEG compatibility,” SPIE Multimedia Systems and Applications IV, Denver, CO, August 2001, pp. 275-280.
[8] Z. Fan and R.L. de Queiroz, “Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation,” IEEE Trans. on Image Processing, vol. 12, no. 2, pp. 230-235, Feb. 2003.
[9] S. Ye, Q. Sun, and E.C. Chang, “Detecting Digital Image by Measuring Inconsistencies of Blocking Artifact”, Proc. ICME, pp. 12-15, July 2007.
[10] W. Luo, Z. Qu, J. Huang, and G. Qiu, “A Novel Method for Detecting Cropped and Recompressed Image Block,” Proc. ICASSP, vol.2, pp. 217-220, April 2007.
[11] Y. L. Chen, and C. T. Hsu, “Image Tampering Detection by Blocking Periodicity Analysis in JPEG Compressed Images,” Proc. MMSP, 2008.
[12] D. Fu, Y. Q. Shi, and W. Su, “ A Generalized Benford’s Law for JPEG Coefficients and Its Applications in Image Forensics,” SPIE, 2007.
[13] B. Li, Y. Q. Shi, and J. Huang,, “Detecting Doubly Compressed JPEG Images by Mode Based First Digit Features,” Proc. MMSP, 2008.
[14] H. Farid, “Exposing digital forgery from JPEG ghosts,” IEEE Trans. on Information Forensic and Security, vol.1, 2009.
[15] A. Zakhor, “Iterative procedures for reduction of blocking effects in transform image coding,” IEEE Trans. on Circuit and System for Video Technology, vol. 2, no. 1, March 1992.
[16] A. Papoulis, “Probability, random variables, and stochastic process,” 4th edition, 2002.
[17] Y. Kin, C. S. Park, and S. J. Ko, “Fast POCS based post-processing technique for HDTV,” IEEE Trans. on Consumer Electronics, vol. 49, no. 4, November 2003.
[18] Y. C. Liaw, W. Lo and Z. C. Lai, “Image restoration of compressed image using classified vector quantization,” Pattern Recognition, pp 329-340, 2002.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top