智能城市应用

复制粘贴篡改图像检测技术综述

丁远晴

摘要


复制粘贴篡改是一种常见的图像篡改方式,其恶意使用和广泛传播造成了严重的社会影响。首先介绍了复制粘贴篡改的概念,原理和模型。随后,将现有复制粘贴篡改检测算法大致分为了基于图像块的方法、基于关键点的方法和深度学习的方法,并分别对这三类方法进行了综述。此外,还介绍了用于评价复制粘贴篡改检测技术的常用数据集和客观评价标准。最后,总结了当前图像复制粘贴篡改检测技术的优势和劣势,并给出了发展方向,以期对该领域的后续研究有所裨益。

关键词


图像篡改;复制粘贴;检测;数据集

全文:

PDF

参考


Fridrich A J , Soukal B D , AJ Luká?. Detection of copy-move forgery in digital images[J].Proceedings of Digital Forensic Research Workshop,2003(2):102.

Lowe D G . Distinctive Image Features from Scale-Invariant Keypoints[J].International Journal of Computer Vision,2004,60(2):91-110.

Luo W , Huang J , Qiu G . Robust Detection of Region-Duplication Forgery in Digital Image[J].International Conference on Pattern Recognition. IEEE,2006(2):102.

Liu G , Wang J , Lian S , et al. A passive image authentication scheme for detecting region-duplication forgery with rotation[J].Journal of Network and Computer Applications,2011,34(5):1557-1565.

Zhao J , Guo J . Passive forensics for copy-move image forgery using a method based on DCT and SVD[J].Forensic Science International,2013,233(1):158-166.

Cozzolino D , Poggi G , Verdoliva L . Efficient Dense-Field Copy–Move Forgery Detection[J].IEEE Transactions on Information Forensics and Security,2015,10(11):11.

Christlein, Vincent, Riess, et al. An Evaluation of Popular Copy-Move Forgery Detection Approaches[J].Information Forensics and Security, IEEE Transactions on,2012(2):14-15.

Tralic D , Zupancic I , Grgic S , et al. CoMoFoD - New Database for Copy-Move Forgery Detection[S].ELMAR 2013.

G. Serra, “MICC-F600, MICC-F220, MICC-F2000, and MICC-F8multi,” [S].Available: http://giuseppeserra.com/content/sift-based-forensic-method-copy-move-detection.

National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Science, “CASIA image tampering detection evaluation database (CASIA TIDE) v1.0, v2.0,” [S]. Available: http://forensics.idealtest.org.

Wen B , Ye Z , Subramanian R , et al. COVERAGE — A novel database for copy-move forgery detection[J].IEEE International Conference on Image Processing. IEEE,2016(2):105.

Alberry H A , Hegazy A , Salama G I . A fast SIFT based method for copy move forgery detection[J].Future Computing & Informatics Journal,2018(3):114.

Yadav N , Kapdi R . Copy move forgery detection using SIFT and GMM[J].2015 5th Nirma University International Conference on Engineering (NUiCONE). IEEE,2015(2):146.

Das T , Hasan R , Azam M R , et al. A Robust Method for Detecting Copy-Move Image Forgery Using Stationary Wavelet Transform and Scale Invariant Feature Transform[S].2018.

Muzaffer G , Ulutas G . A fast and effective digital image copy move forgery detection with binarized SIFT[J].International Conference on Telecommunications & Signal Processing.IEEE,2017(2):595-598.

Jin G , Wan X . An improved method for SIFT-based copy–move forgery detection using non-maximum value suppression and optimized J-Linkage[J].Signal Processing: Image Communication,2017(3):113-125.

Shahroudnejad A , Rahmati M . Copy-move forgery detection in digital images using affine-SIFT[J].2016 2nd International Conference of Signal Processing and Intelligent Systems (ICSPIS). IEEE,2016(3):101.

Resmi M R , Vishnukumar S . A novel segmentation based copy-move forgery detection in digital images[J].2017 International Conference on Networks & Advances in Computational Technologies (NetACT),2017(1):105.

Li Y , Zhou J . Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching[J].IEEE Transactions on Information Forensics and Security,2019(8):1-1.

Huang H , Guo W , Zhang Y . Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm[J].Workshop on Computational Intelligence & Industrial Application. IEEE,2009(2):131.

Bay H, Tuytelaars T, Van Gool L. Surf: Speeded up robust features[J].Lecture notes in computer science,2006(3951):404-417.

Shivakumar B L, Baboo S S. Detection of region duplication forgery in digital images using SURF[J].International Journal of Computer Science Issues (IJCSI),2011,8(4):199.

Jaberi M, Bebis G, Hussain M, et al. Accurate and robust localization of duplicated region in copy–move image forgery[J].Machine vision and applications,2014(25):451-475.

Shivakumar B, Baboo S S. Automated forensic method for copy-move forgery detection based on Harris interest points and SIFT descriptors[J].International Journal of Computer Applications,2011,27(3):9-17.

Ardizzone E, Bruno A, Mazzola G. Detecting multiple copies in tampered images[J].2010 IEEE International Conference on Image Processing. IEEE,2010(2):2117-2120.

Ardizzone, Edoardo, Mazzola, et al. Copy-Move Forgery Detection by Matching Triangles of Keypoints[J].IEEE Transactions on Information Forensics & Security,2015(5):121.

Yuan R , Ni J . A deep learning approach to detection of splicing and copy-move forgeries in images[J].2016 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE,2017(2):141.

Ouyang J , Liu Y , Miao L . Copy-move forgery detection based on deep learning[J].2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI),2017(3):145.

Yue W , Abd-Almageed W , Natarajan P . Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network[J].2018 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE,2018(5):146.

Yue W , Abd-Almageed W , Natarajan P . BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization[J].European conference on computer vision,2018(2):46.

Zhou P , Han X , Morariu V I , et al. Learning Rich Features for Image Manipulation Detection[J].2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE,2018(15):184.

Wu Y , Abdalmageed W , Natarajan P . ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features[J].2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE,2019(15):140.

Barni M , Phan Q T , Tondi B . Copy Move Source-Target Disambiguation through Multi-Branch CNNs[J].IEEE Transactions on Information Forensics and Security,2020(99):1-1.

Zhong J L , Pun C M . An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection[J].IEEE Transactions on Information Forensics and Security,2020(15):2134-2146.

Chen B, Tan W, Coatrieux G, et al. A serial image copy-move forgery localization scheme with source/target distinguishment[J].IEEE Transactions on Multimedia,2020(23):3506-3517.

Islam A, Long C, Basharat A, et al. Doa-gan: Dual-order attentive generative adversarial network for image copy-move forgery detection and localization[J].Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition,2020(2):4676-4685.




DOI: https://doi.org/10.33142/sca.v6i3.8823

Refbacks

  • 当前没有refback。


版权所有(c){$ COPYRIGHTYEAR} {$ copyrightHolder}

Creative Commons License
此作品已接受知识共享署名-非商业性使用 4.0国际许可协议的许可。