数字图像复制移动伪造定位的新方法

Gul Tahaoglu, G. Ulutaş, B. Ustubioglu
{"title":"数字图像复制移动伪造定位的新方法","authors":"Gul Tahaoglu, G. Ulutaş, B. Ustubioglu","doi":"10.1109/TSP52935.2021.9522680","DOIUrl":null,"url":null,"abstract":"In this study, newly localization approach is presented to reveal copy-move forgery regions. Firstly, Speed-Up Robust Features (SURF) keypoints are utilized to label whether the suspicious input image is original or forged. With the presence of a sufficient number of the most similar keypoint matches, the image is labeled as forged and the location stage of the forged region is started. In determining the boundaries of the forged region, the blocks received around the matched keypoints are considered seed forged blocks. 8 overlapping neighboring blocks of these blocks in the target and source regions are labeled as candidate blocks. If the candidate blocks corresponding to each other meet the similarity requirement, they are labeled as forged blocks and the candidate block label is removed. The location phase is completed by evaluating the candidate blocks located in the neighborhood of all forged blocks. The high performance of the method has been proved in the freely available GRIP dataset with the experiments.","PeriodicalId":243595,"journal":{"name":"2021 44th International Conference on Telecommunications and Signal Processing (TSP)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A new approach for localization of copy-move forgery in digital images\",\"authors\":\"Gul Tahaoglu, G. Ulutaş, B. Ustubioglu\",\"doi\":\"10.1109/TSP52935.2021.9522680\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this study, newly localization approach is presented to reveal copy-move forgery regions. Firstly, Speed-Up Robust Features (SURF) keypoints are utilized to label whether the suspicious input image is original or forged. With the presence of a sufficient number of the most similar keypoint matches, the image is labeled as forged and the location stage of the forged region is started. In determining the boundaries of the forged region, the blocks received around the matched keypoints are considered seed forged blocks. 8 overlapping neighboring blocks of these blocks in the target and source regions are labeled as candidate blocks. If the candidate blocks corresponding to each other meet the similarity requirement, they are labeled as forged blocks and the candidate block label is removed. The location phase is completed by evaluating the candidate blocks located in the neighborhood of all forged blocks. The high performance of the method has been proved in the freely available GRIP dataset with the experiments.\",\"PeriodicalId\":243595,\"journal\":{\"name\":\"2021 44th International Conference on Telecommunications and Signal Processing (TSP)\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 44th International Conference on Telecommunications and Signal Processing (TSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TSP52935.2021.9522680\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 44th International Conference on Telecommunications and Signal Processing (TSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TSP52935.2021.9522680","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本研究提出了一种新的定位方法来揭示复制-移动伪造区域。首先,利用加速鲁棒特征(SURF)关键点来标记可疑输入图像是原始图像还是伪造图像;当存在足够数量的最相似的关键点匹配时,将图像标记为伪造,并开始伪造区域的定位阶段。在确定锻造区域的边界时,在匹配的关键点周围接收到的块被认为是种子锻造块。将这些块在目标区域和源区域的8个重叠相邻块标记为候选块。如果相互对应的候选块满足相似性要求,则将其标记为伪造块,并删除候选块标签。定位阶段通过评估位于所有伪造块附近的候选块来完成。通过实验证明了该方法的高性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A new approach for localization of copy-move forgery in digital images
In this study, newly localization approach is presented to reveal copy-move forgery regions. Firstly, Speed-Up Robust Features (SURF) keypoints are utilized to label whether the suspicious input image is original or forged. With the presence of a sufficient number of the most similar keypoint matches, the image is labeled as forged and the location stage of the forged region is started. In determining the boundaries of the forged region, the blocks received around the matched keypoints are considered seed forged blocks. 8 overlapping neighboring blocks of these blocks in the target and source regions are labeled as candidate blocks. If the candidate blocks corresponding to each other meet the similarity requirement, they are labeled as forged blocks and the candidate block label is removed. The location phase is completed by evaluating the candidate blocks located in the neighborhood of all forged blocks. The high performance of the method has been proved in the freely available GRIP dataset with the experiments.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信