(北京郵電大學計算機學院,北京 100876)
摘 要 對數字圖像取證技術及其研究現狀進行介紹,將數字圖像取證研究領域按照其研究角度劃分為圖像來源認證(源識別)和圖像篡改取證(篡改檢測)兩個方面,為現有技術進行綜述。針對數字圖像來源認證,將現有的技術方法按實現的機理不同分為4 大類:基于鏡頭畸變的方法、基于像素缺陷的方法、基于模式噪聲的方法、基于CFA 插值的方法。針對圖像篡改取證分別介紹了3 大類方法的特征及其所屬各種典型算法。
關鍵詞 圖像取證; 被動取證; 篡改檢測; 幾何透視; 真實性鑒定
A Survey on the Method of Digital Image Forensics
Ming LU, Shaozhang NIU, Yanli HUANG
(School of Computer, Beijing University of Posts and Telecommunications, Beijing, China, 100876)
Abstract Digital image forensics technology and research status are introduced, the field of digital image forensics research according to the different research direction is divided into the two aspects: the image authentication source (source) and the image tamper evidence (tamper detection). For the existing technology was summarized. The implementation mechanism for different methods of digital image authentication technology, the current method is divided into 4 categories: the method based on lens distortion Based, the method based on pixel defect, the method based on the pattern noise, the method based CFA interpolation. For image tamper evidence respectively introduces the characteristics of 3 kinds of methods and the typical algorithm.
Key words Image forensics; passive forensics; tamper detection; perspective geometry; authenticity identification
參考文獻
[1] Z. J. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki, and N. Saitoh, “Methods for Identification of Images Acquired with Digital Cameras”, Proc. of SPIE, Enabling Technologies for Law Enforcement and Security, vol. 4232, February 2001.
[2] J. Lukas, J. Fridrich, and M. Goljan, “Digital Camera Identification from Sensor Pattern Noise”, IEEE Transactions on Information Forensics and Security, June 2006
[3] S. Bayram, H. T. Sencar, N. Memon, and I. Avcibas, “Source Camera Identification Based on CFA Interpolation”, ICIP 2005.
[4] Alin C Popescu,Hany Farid.Exposing digital forgeries in color filter array interpolated images[J].IEEE Transactions on Signal Processing,2005,53(10):3948-3959.
[5] Micah K . Johnson, Hany Farid . Exposing Digital Forgeries Through Chromatic Aberration[C].Proceedings of the Multimedia and Security Workshop 2006,v2006:48-55
[6] Hany Farid . Blind Inverse Gamma Correction[J] . IEEE Transactions ON Image Processing, 2001,10(10):1428-1433
[7] Hsu Yu-Feng, Chang, Shih-Fu.Detecting image splicing using geometry invariants and camera characteristics consistency[C].IEEE International Conference on Multimedia and Expo,2006, 2006:549-552
[8] Christine McKay, Ashwin Swaminathan, Hongmei Gou.Image Acquisition Forensics: Forensic Analysis To Identify Imaging Source[C] .IEEE International Conference on Acoustics, Speech and Signal Processing – Proceedings, 2008:1657-1660
[9] Oya Celiktutan, Ismail Avcibas,Bulent Sankur.Blind identification of Cellular Phone Cameras[C].SPIE 2007, San Jose, CA, USA, 2007:1-4
[10]Hongmei Gou, Ashwin Swaminathan, Min Wu.Robust scanner identification based on noise features.[C].Proceedings of SPIE - The International Society for Optical Engineering, 2007:6505,
[11] M. K. Johnson and H. Farid. Exposing digital forgeries by detecting inconsistencies in lighting, in Proc. ACM Multimedia and Security Workshop, NewYork, NY, 2005, pp. 1–10.
[12] M. K. Johnson and H. Farid, “Exposing digital forgeries in complex lighting environments,” IEEE Trans. Inform. Forensics Security, vol. 3, no. 2, pp. 450–461, 2007.
[13] M. K. Johnson and H. Farid, “Exposing digital forgeries through specular highlights on the eye,” in Proc. 9th Int. Workshop on Information Hiding, Saint Malo, France, 2007, pp. 311–325.
[14] E. Kee and H. Farid, Exposing digital forgeries from 3-D lighting environments, in: Proceedings of IEEE International Workshop on Information Forensics and Security, Seattle, USA, December 12-15, 2010, pp.1-6.
[15] M. K. Johnson and H. Farid, Exposing digital forgeries through chromatic aberration, in: Proceedings of ACM workshop on Multimedia and security, Geneva, Switzerland, September 26-27, 2006, pp. 48-55.
[16] I. Yerushalmy and H. Hel-Or, Digital image forgery detection based on lens and sensor aberration, International Journal of Computer Vision, 2011, 92(1): 71-91.
[17] X. Pan, X. Zhang, and S. Lyu, Exposing image forgery with blind noise estimation,in: Proceedings of ACM workshop on Multimedia and security, Buffalo, USA,September 29-30, 2011, pp.15-20.
[18] D. Zoran and Y. Weiss, Scale invariance and noise in nature image, in: Proceedings of IEEE International Conference on Computer Vision, Kyoto, Japan, September 27- October 4, 2009, pp. 2209-2216.