首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于zernike矩图像区域复制篡改认证
引用本文:何坤,周激流,刘昶,琚生根,刘然.基于zernike矩图像区域复制篡改认证[J].四川大学学报(自然科学版),2009,46(1):85-88.
作者姓名:何坤  周激流  刘昶  琚生根  刘然
作者单位:四川大学计算机学院,成都,610065
摘    要:分析了区域复制篡改图像的特征,提出了运用zernike 矩的不变性对自然图像区域复制篡改进行认证.对于尺寸较大的篡改图像运用小波变换得到低频子图像,把低频子图像分割为一系列图像子块,对子块序列图像分别进行zernike矩分析并判断图像区域是否复制篡改.将各个相邻复制篡改的子块进行区域合并.实验结果表明,本文的篡改认证方法既克服了噪声对认证的影响又解决了几何变换对认证的影响.

关 键 词:自然图像  复制篡改  zernike矩  篡改认证

Tamper authentication by region duplication based on zernike moments
HE Kun,ZHOU Ji-Liu,LIU Chang,JU Sheng-geng,LIU Ran.Tamper authentication by region duplication based on zernike moments[J].Journal of Sichuan University (Natural Science Edition),2009,46(1):85-88.
Authors:HE Kun  ZHOU Ji-Liu  LIU Chang  JU Sheng-geng  LIU Ran
Institution:Collage of Compute Science, Sichuan University;Collage of Compute Science, Sichuan University;Collage of Compute Science, Sichuan University;Collage of Compute Science, Sichuan University;Collage of Compute Science, Sichuan University
Abstract:This paper analyzes region duplication to tamper with characteristics of picture and proposes tamper authentication by region duplication based on invariability of zernike moments. It is proposed that using wavelet transform to obtain low frequency sub-image for bigger tampered picture that is divided into a series of sub-block, judging regions whether they are tampered with duplication, and merging neighboring tampered sub-block lastly. The experimentations indicate that the method can not only overcome the influence of noise,but also solve the influence of geometry transform to authentication.
Keywords:image  copy tamper  zernike moment  tamper authentication
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《四川大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《四川大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号