数字图像及视频篡改检测关键技术研究
[Abstract]:The popularity of various digital images, video editing software, and corresponding tutorials has led to the potential for images and videos to become the tools of the perpetrator, and the trust of the image media has been shaken for a long time. The related theories and techniques of digital image and video tamper detection are in this background. The digital image and the video tampering detection belong to the category of the media content forensic, and the purpose of the invention is to identify the authenticity of the image media content. in the process of shooting the digital image and the video from the shooting to the image, the light reflected by the sensing object in the scene needs to pass through the refraction of the optical lens and undergo the operations of optical filtering, photoelectric conversion, color interpolation, post-processing and the like, each step in this process can be seen as a transformation of light, which is defined herein as a transform chain and the digital image and the video are modeled as a structured combination of several perceptual objects that have undergone a transformation chain, In this paper, a formal analysis of the tampering of the image and the video is carried out, and the trace of the alteration behavior in the media is summed up as two cases: one is a perception object in the media which is similar to the other, and the other is that some of the perceptive objects experience different transformation chains than the other perceptual objects. On the basis of this, the process of modeling the tampering detection of the image and the video is a "Description _ Discovery" process: for the media to be detected, a certain feature is first found to describe a link in the transformation chain experienced by the perceived object or the perceived object in the media, Furthermore, by matching or checking, the perceptually similar perceived objects in the media are found, or some sense objects are found to experience a transformation chain that is not consistent with other perceived objects. In this paper, the key technologies such as feature structure, matching and checking method in the tamper detection model are studied, and some problems in the detection technology of digital image and video tampering are solved. The main research work and innovation points of this paper include the following aspects: first, a feature matching method based on ordered sequence clustering is proposed. The feature matching is one of the key technologies for detecting the abnormal similar objects in the media. In the method of image area copy detection based on the feature point, when a plurality of highly similar features exist in the feature space, the existing feature matching method can miss a large number of actually matching feature pairs. In order to solve this problem, the feature matching method based on the ordered sequence clustering is proposed, and the self-adaptive selection of the parameters in the clustering process is realized based on the Bayesian classifier, and the completeness of the collection of the qualified matching features is remarkably improved. Secondly, aiming at the problem that the image area copy detection method based on the feature point is weak in the detection capability of the smooth region copy behavior, a method for detecting the region copy of the hierarchical feature point detection and combining feature fusion is proposed. The method ensures the coverage rate of the characteristic points in different regions without significantly increasing the total number of the feature points. For the feature point of the smooth region, this paper constructs the fusion feature based on the local gradient and the color, and improves the distinguishing between the local feature and the smooth region. Thirdly, the boundary conditions to be satisfied by the non-uniform detection of the compression history based on the DCT coefficient analysis are put forward, and the corresponding method for solving the parameters is designed. The compression history of each of the perceptual objects in the image is not consistent, that is, the transformation experienced by some of the perceptual objects during the compression encoding stage is different from the other perceptual objects, which means that the image has a local area being tampered with. In the JPEG compression history inconsistency detection method based on the DCT coefficient analysis, the compression history experienced by each DCT block is generally reflected by the DCT coefficient distribution of the tamper component and the non-tamper component as a feature. The estimation of the DCT coefficient distribution of the tampered component and the non-tamper component is dependent on the parameter solving of the mixed model of the two. The existing methods are generally used in "blind" to estimate parameters, and therefore the valuation of the parameters is often not accurate. Considering the actual constraints to be followed by the DCT coefficients, the necessary boundary conditions are added to the likelihood function corresponding to the mixed model, and the method of parameter estimation of the coarse-size search combined with the gradient increase is designed in combination with the smoothness of the likelihood function. And the more accurate detection and positioning of the tampering is realized. Fourth, aiming at the quality reduction video, a matching method based on location sensitive hash and frame registration is proposed. In the quality reduction video, the accumulation of fine changes in the local structure of the video frame will lead to a substantial change in the frame characteristics due to the influence of various quality-reducing factors. Therefore, the conventional "feature extraction _ thresholding" matching method in the traditional method is difficult to realize the stable thunder and the frame detection. In this paper, the preliminary matching of the video frame sequence is realized based on the location-sensitive hash, and the verification of the same frame is completed based on the registration technique. In order to achieve the robustness of the video quality reduction, the stability information of each region in the video frame is encoded into the registration energy function, and the global optimal matching problem is solved based on the way of probability reasoning, and a more robust quality-reducing video frame copy detection is realized. Fifth, a fast frame copy detection method for high code rate video is proposed. In the high code rate video, when there is no significant fluctuation between the frames with the same content, in order to reduce the time cost of the frame copy detection under the premise of ensuring the detection capability, the three-dimensional skeleton feature of the two-dimensional video frame is proposed and the corresponding matching method is designed. In this paper, based on the topology information of the skeleton, the data selection is realized, and the fine-grained Lei-frame discrimination is carried out based on the geometric information, and the fast frame copy detection in the high-code-rate video is realized. And sixth, a method for detecting the video deletion/ insertion frame based on the abnormal mutation of the code stream is provided. The method of deleting/ inserting the frame based on the code stream analysis usually takes the periodic effect of the abnormality in the code stream as the characteristic of the code stream abnormality. However, the periodic effect of the abnormality is not always able to be detected reliably. In addition, the existing method cannot effectively locate the position of the tampering operation. in that invention, the mean value of the prediction residual corresponding to the P-frame in the code stream and the simultaneous mutation of the number of intra-prediction macro-block are taken as the basis for detecting the deletion/ interpolation frame operation, and the index for measuring the variation intensity of the mean value of the prediction residual and the number of the intra-prediction macro-blocks is designed, And then the fusion characteristic is constructed based on the two indexes, and the verification method for capturing the code stream information mutation is realized. In the case of no constraint to the video coding parameters, the method of the present invention can effectively detect and position the video frame insertion/ deletion operation.
【学位授予单位】:哈尔滨工业大学
【学位级别】:博士
【学位授予年份】:2016
【分类号】:TP391.41
【相似文献】
相关期刊论文 前10条
1 骆伟祺;黄继武;丘国平;;鲁棒的区域复制图像篡改检测技术[J];计算机学报;2007年11期
2 张雯;李学明;;改进的基于颜色滤波阵列特性的篡改检测[J];计算机工程与应用;2009年06期
3 王鑫;鲁志波;;数字图像拷贝移动篡改检测方法的分析[J];计算机工程与设计;2009年12期
4 周治平;张小祥;;基于质量评价量和方差分析的图像篡改检测[J];计算机工程;2011年09期
5 马巧梅;邓启森;;基于交叉划分的灰度图像篡改检测与恢复算法[J];微电子学与计算机;2014年09期
6 张震;苏白娜;喻宙;;一种新的图像拷贝篡改检测方法[J];郑州大学学报(工学版);2012年06期
7 黄添强;陈智文;苏立超;郑之;袁秀娟;;利用内容连续性的数字视频篡改检测[J];南京大学学报(自然科学版);2011年05期
8 黄添强;曾文赋;;基于压缩感知的视频异源篡改检测[J];计算机工程与应用;2011年30期
9 周龙龙;;图像空域分析下的篡改检测算法[J];电视技术;2012年23期
10 李晓梅;;基于残留噪声相关性的视频篡改检测算法[J];信息技术;2013年10期
相关会议论文 前2条
1 孔辉;梁洪亮;辛阳;杨义先;陈林顺;;一种高性能的网页篡改检测与恢复机制[A];2010年全国通信安全学术会议论文集[C];2010年
2 韩杰思;朱中梁;沈建京;彭韶峰;;针对拼接图像篡改的检测技术[A];第十四届全国图象图形学学术会议论文集[C];2008年
相关博士学位论文 前3条
1 杨本娟;图像篡改检测中的投影核方法[D];贵州大学;2015年
2 于立洋;数字图像及视频篡改检测关键技术研究[D];哈尔滨工业大学;2016年
3 丁琦;数字音频篡改检测与隐写分析技术研究[D];解放军信息工程大学;2011年
相关硕士学位论文 前10条
1 张璐波;基于运动目标的视频帧内篡改检测算法研究与实现[D];上海交通大学;2015年
2 刘跃强;用于提高篡改检测精度的半脆弱性数字水印技术研究[D];电子科技大学;2014年
3 林志新;基于内容的视频篡改检测系统设计与实现[D];电子科技大学;2014年
4 孙艳茹;数字图像区域复制粘贴篡改检测算法分析与研究[D];黑龙江大学;2015年
5 邓峰;网页防篡改中篡改检测技术的研究[D];西安工业大学;2013年
6 吴俞醒;基于连续性特征的视频帧间篡改检测算法的研究与实现[D];上海交通大学;2015年
7 李君;基于客户端的网页篡改检测研究[D];浙江工业大学;2015年
8 王春井;基于网络爬虫与HASH的网站篡改检测系统的设计与实现[D];内蒙古大学;2016年
9 曾文赋;视频数据特征降维及其在篡改检测中的应用[D];福建师范大学;2011年
10 苏立超;压缩感知在数字视频篡改检测中的应用研究[D];福建师范大学;2014年
,本文编号:2487512
本文链接:https://www.wllwen.com/shoufeilunwen/xxkjbs/2487512.html