| 研究生: |
李永安 Li, Yung-An |
|---|---|
| 論文名稱: |
以色彩分析應用於相機機型辨識與影像竄改偵測 Camera Model Recognition and Image Tampering Detection Based on Color Analysis |
| 指導教授: |
王明習
Wang, Ming-Shi |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 工程科學系 Department of Engineering Science |
| 論文出版年: | 2011 |
| 畢業學年度: | 99 |
| 語文別: | 中文 |
| 論文頁數: | 83 |
| 中文關鍵詞: | 相機辨識 、竄改偵測 、支援向量機 |
| 外文關鍵詞: | camera model recognition, forgery detection, support vector machine |
| 相關次數: | 點閱:77 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在數位化時代來臨的今天,許多的媒體都以數位化的形式記錄、呈現,而數位影像雖然容易取得,卻也容易經由人為合成修改,因此該如何確認其攝影內容的完整性與真實性是一件越來越重要的議題。本論文提出一個被動式數位影像鑑識系統,此系統不需要依賴任何預先嵌入的資訊來驗證數位影像之真實性,亦不需要由使用者手動選取檢測區域。本研究分別利用二階導數之頻譜特徵與馬可夫特徵對未壓縮與壓縮過之影像進行來源相機機型辨識,並藉由所得到的相機機型取出其相對應之參考樣板雜訊與目前測試影像之樣板雜訊做比對,最後使用樣板雜訊之區塊相關性來定位出影像中被竄改的區域。由實驗結果可以顯示出本系統對於一般拍攝環境下之拼接竄改影像具有不錯的檢測效果。
In this digital era, all kinds of media data are recorded and presented digitally. The digital devices are popular. However, even though the digital photos is easy to obtain, it is also easily forged by digital tool. It brings up the needs for new digital data applications such like digital forensics. In this research, a passive spliced forgery detection system for digital image is proposed. This system does not depend on any pre-embedded information to verify the authenticity of the digital image, and the user doesn’t need select the detection area manually. This study used the spectral of the second derivative characteristics and Markov features on the uncompressed and compressed images of the camera models recognition. Then the sensor noise pattern is pre-evaluated by averaging the noise of this camera images and used to determine the tampered region for test image. The experimental results show that the detection rates of the camera models recognition are above 90%, which results for uncompressed data are even greater than 92%. Moreover, the system can locate the tampering region precisely.
[1] Kai San Choi, Edmund Y. Lam, and Kenneth K.Y. Wong, “Source camera identification using footprints from lens aberration,” Digital Photography II SPIE, 2006
[2] Jan Lukas, and Jessica Fridrich, “Digital Camera Identification from Sensor Pattern Noise,” IEEE Transactions on Information Forensics and Security, vol.1, no.2, 2006.
[3] S. Bayram, and H. T. Sencar, “Source Camera Identification Based on CFA In-terpolation,” ICIP, 2005.
[4] Bo Wang, Xiangwei Kong and Xingang You, “Source Camera Identification Using Support Vector Machines,” IFIP Advances in Information and Commu-nication Technology, vol.306, 2009.
[5] Hany Farid, “Blind Inverse Gamma Correction,” IEEE Transactions on Image Processing, vol.10, pp.1428-7671433, 2001.
[6] Yu-Feng Hsu, and Shih-Fu Chang, “Detecting image splicing using geometry invariants and camera characteristics consistency,” International Conference onMultimedia and Expo, 2006.
[7] Alin Constantin Popescu, and Hany Farid, “Exposing digital forgeries by de-tecting traces of resampling,” IEEE Transactions on Signal Processing, vol.53, no.2, pp.758-767, 2005.
[8] Zhouchen Lin, Junfeng He, Xiaoou Tang, and Chi-Keung Tang, "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognition, vol.42, issue 11, pp.2492-2501, Nov. 2009.
[9] Micah Kimo Johnson, and Hany Farid, “Exposing digital forgeries through specular highlights on the eye,” In: Proceedings of the 9th International Work-shop on Information Hiding, Saint Malo, France, pp.311-325, 11-13 Jan. 2007.
[10] Micah Kimo Johnson, and Hany Farid, “Exposing digital forgeries through chromatic aberration,” In: Proceedings of the 8th workshop on Multimedia and security, Geneva, Switzerland, pp.48-55, 26-27 Sep. 2006.
[11] Y.-F. Hsu and S.-F. Chang, “Detecting Image Splicing Using Geometry Inva-riants and Camera Characteristics Consistency,” in IEEE International Confe-rence on Multimedia and Expo, Toronto, Ontario, Canada, pp.549-552, 9-12 Jul. 2006.
[12] Sevinç Bayram, Ismail Avcibas, Bülent Sankur, and Nasir Memon, “Image ma-nipulation detection,” Journal of Electronic Imaging, vol.15, issue4, 41102, Oct-Dec. 2006.
[13] Yun-Qing. Shi, Chunhua Chen, and Wen Chen, “A Natural Image Model Ap-proach to Splicing Detection,” International Multimedia Conference Proceedings of the 9th workshop on Multimedia & security, Dallas, Texas, USA, pp.20-21, 20-21 Sep. 2007.
[14] Vladimir N. Vapnik, "The Nature of Statistical Learning Theory," Springer, 1995.
[15] R.Fletcher, "Practical methods of optimization," 2nd edition, Wiley, 1987.
[16] Bernhard E. Boser , Isabelle M. Guyon , and Vladimir N. Vapnik, "A training algorithm for optimal margin classifiers," in Proceedings of the Fifth Annual Workshop on Computational Learning Theory, Pittsburgh, Pennsylvania, United States, pp.144-152, 27-29 Jul. 1992.
[17] The Dresden Image Database http://forensics.inf.tu-dresden.de/dresden_image- _database/
[18] Chih-Chung Chang, and Chih-Jen Lin, LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
[19] Photo Tampering Throughout History, http://www.cs.dartmouth.edu/farid/resea- rch/digitaltampering
[20] Olympus e620 specifications http://www.photographyblog.com/reviews/olym- pus_e620_review/specifications/
[21] Panasonic lumix dmc g3 specifications http://www.photographyblog.com/re- views/panasonic_lumix_dmc_g3_review/specifications/
[22] Wei-Che Chen, and Ming-Shi Wang, “A fuzzy c-means clustering-based fragile watermarking scheme for image authentication,” Expert System with Application, vol.36, pp.1300-1307, 2009.
[23] Hany Farid, “A Survey of Image Forgery Detection,” IEEE Signal Processing Magazine, vol.26 no.2, pp.16-25, 2009.
[24] Weihong Wang, and Hany Farid, "Exposing Digital Forgeries in Video by De-tecting Double Quantization," ACM Multimedia and Security Workshop, Prin-ceton, NJ, 7 May. 2009.
[25] Corinna Cortes and Vladimir Vapnik, "Support-vector networks," Machine Learning, vol.20, pp.273-297, 1995.
[26] Micah Kimo Johnson, and Hany Farid, “Exposing digital forgeries by detecting inconsistencies in lighting,” In: Proceedings of the 7th Workshop on Multimedia and Security, New York, NY, USA, pp.1-10, 1-2 Aug. 2005.
[27] Michihiro Kobayashi, Takahiro Okabe, and Yoichi Sato, “Detecting video for-geries based on noise characteristics,” In Proceedings of the 3rd Pacific-Rim Symposium on Image and Video Technology, Tokyo, Japan, vol.5414, 13-16 Jan. 2009.
[28] Matthias Kirchner, “Efficient Estimation of CFA Pattern Configuration in Digi-tal Camera Images,” Computer and Information Science, vol.7541, pp.1. 2010.
[29] Jessica Fridrich, “Digital Image Forensics Using Sensor Noise,” Signal Processing Magazine, Special Issue on Digital Forensics, vol. 26, no.2, pp.26-37, Mar. 2009.
[30] Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin, and Chiou-Ting Hsu, “Video forgery detection using correlation of noise residue,” In IEEE International Workshop on Multimedia Signal Processing, Cairns, Australia, pp.170-174, 8-10 Oct. 2008.
[31] Mo Chen, Jessica Fridrich, and Jan Lukáš, “Determining image origin and inte-grity using sensor pattern noise,” IEEE Transactions. Information Forensics Security, vol.3, no.1, pp.74-90. 2008.
[32] Yizhen Huang and N. Fan, “Learning from interpolated images using neural networks for digital forensics,” IEEE Conference on Computer Vision and Pat-tern Recognition, pp.177-182. 2010
[33] Thomas Gloe and Rainer Böhme, “The 'Dresden Image Database' for ben-chmarking digital image forensics,” Journal of Digital Forensic Practice, vol.3, Issue2-4, 2010