Currently, images could be created and tampered easily with low cost image devices and sophisticated editing software. One cannot trust any image to be integrated anymore. Thus there is a strong need to investigate im...
详细信息
Currently, images could be created and tampered easily with low cost image devices and sophisticated editing software. One cannot trust any image to be integrated anymore. Thus there is a strong need to investigate image tampering identification. This paper focuses on blind scheme of tampering identification which is practical in most scenarios. Given an image, our idea is to find its reference image rather than estimating its original image. By further analyzing empirical frequency response (EFR) incorporating calibration, the proposed blind scheme can identify several types of tampering operations. Experiment results show that the novel method classifies tampering operations accurately and also works when including integrity images.
In the digital era, digital photographs become pervasive and are frequently used to record event facts. Authenticity and integrity of such photos can be ascertained by discovering more information about the previously...
详细信息
In the digital era, digital photographs become pervasive and are frequently used to record event facts. Authenticity and integrity of such photos can be ascertained by discovering more information about the previously applied operations. In this paper, we propose a forensic scheme for identifying and reconstructing gamma correction operations in digital images. Statistical abnormity on image grayscale histograms, which is caused by the contrast enhancement, is analyzed theoretically and measured effectively. Graylevel mapping functions involved in gamma correction can be estimated blindly. Experiments both on globally and locally applied corrected images show the validity of our proposed gamma estimation algorithm.
This paper defines a new image feature called Harris feature vector, which is able to describe the image gradient distribution in an effective way. By computing the mean and the standard deviation of the Harris featur...
详细信息
This paper defines a new image feature called Harris feature vector, which is able to describe the image gradient distribution in an effective way. By computing the mean and the standard deviation of the Harris feature vector in a local image region, novel descriptors are constructed for feature matching which are invariable to image rigid transformation and linear intensity change. Experimental evidence suggests that the novel descriptor for point matching has a good adaptability to slight view point changing, JPEG compression and nonlinear changing of intensity, besides, the descriptor for line matching performs well too.
Multicore processor provides large computation capability but also involves the complicate parallel programming. One of major considerations in parallel programming is the performance. Traditional design methodologies...
详细信息
Multicore processor provides large computation capability but also involves the complicate parallel programming. One of major considerations in parallel programming is the performance. Traditional design methodologies which usually start a design on a selected platform spend a lot of effort and time on tuning performance and debugging. When platform is changed even with different number of cores, considerable redesign effort is required. Hence a flexible design methodology is necessary. In this paper, a design methodology is presented for video codec, by using MPEG-4 SP decoder as an example, on multicore processor. The parallelisms of MPEG-4 decoder are discussed and exposed with the dataflow model. The dataflow model provides a high-level abstraction of underlying hardware. Computation and communication of MPEG-4 decoder are separated and represented as modules and channels, respectively. It is possible to synthesize the model targeting to either dedicate hardware or software on multiprocessor. To map the high level dataflow model to Cell processor, the mapping flow, including offline profiling, task allocation and runtime libraries, are developed. According to the profiling results, the allocation algorithm could allocate tasks on multiprocessors as balanced as possible. An efficient synchronization mechanism on Cell processor is also proposed. We also discuss the impact of the model and the mapping flow corresponding to decoding speed. The results show that the proposed methodology gets considerable performance boost when the number of cores is increased.
In this paper we propose a parameter free image classification method based on data compression techniques, so to calculate a measure of similarity between images based on the approximation of the compression to Kolmo...
详细信息
In this paper we propose a parameter free image classification method based on data compression techniques, so to calculate a measure of similarity between images based on the approximation of the compression to Kolmogorov Complexity. For this experiment we use two types of compressors, ZIP the general purpose compressor and JPEG compressor specialized for images. After developing the method and perform the relevant experiments to determine whether the proposed approach is useful or not for image classification.
The well working status of insulators guarantees the safe-running of power system. It is significant to development patrol power transmission line system with UAV, since intelligent supervisory of insulator is very im...
详细信息
The well working status of insulators guarantees the safe-running of power system. It is significant to development patrol power transmission line system with UAV, since intelligent supervisory of insulator is very important for power system in future. This technical note firstly presents the preprocessing of insulator images. Using the improved MPEG-7 EHD (edge histogram method) technique, the method of extracting edge feature of insulator is determined. The identification of insulator image with template matching method is proposed. Finally, the real-time object tracking algorithm based on Kalman filter is derived. The possible position of the insulator in the next frame is predicted by Kalman filter's predictive function, and the global searching of an image is converted to local searching. An illustrative simulation result is given to demonstrate the effectiveness and feasibility of the proposed tracking algorithm.
We propose an application of local statistical models in the form of a locally estimated Gaussian mixture to image forgery detection. The estimated mixture is used to compute the so called log-likelihood transformatio...
详细信息
We propose an application of local statistical models in the form of a locally estimated Gaussian mixture to image forgery detection. The estimated mixture is used to compute the so called log-likelihood transformation of the original image. We show that image manipulations of different type may be visible in a suitably designed log-likelihood image. Unlike other methods the forgery detection based on local statistical model is rather non-specific and suitable to emphasize various traces of possible image tampering without any prior information.
Although several digital watermarking schemes have emerged as a solution to traditional copyright protection technologies, only a few benchmark suites, specialized in still images and audio, have been presented to mea...
详细信息
Although several digital watermarking schemes have emerged as a solution to traditional copyright protection technologies, only a few benchmark suites, specialized in still images and audio, have been presented to measure the robustness and performance of these schemes. The aim of this paper is to single out the particularities in the way of evaluating the performance of video watermarking systems to generate a video watermarking benchmark framework specialized in temporal desynchronization attacks. In this way, this paper presents the most important temporal desynchronization attacks and performance measures for video watermarking systems.
The double compression of JPEG images is one of the important evidences of image tampering. The paper proposes a novel passive double compressed JPEG image detection algorithm using the moment features of the modes ba...
详细信息
ISBN:
(纸本)9781424478712
The double compression of JPEG images is one of the important evidences of image tampering. The paper proposes a novel passive double compressed JPEG image detection algorithm using the moment features of the modes based DCT histogram's characteristic function. Support vector machine is used as the classifier. Experimental results demonstrate that the proposed algorithm significantly increases the detection accuracy when the first compressing quality factor is large such as 95. In order to further improve the overall detection accuracy of double compressed JPEG in various quality factors, the paper proposes an improved algorithm by combing the moment features with the Mode Based Fist Digit features (MBFDF). The experimental results show that the overall detection accuracies can be further improved and the proposed algorithm outperforms some traditional methods, especially when the first compressing quality factor is large such as 95.
In this paper, a DRM bridge concept is proposed and the modular framework of it is designed. In DRM bridge framework, UCON is used to build a rights expression original language, and language mapping tables are used t...
详细信息
In this paper, a DRM bridge concept is proposed and the modular framework of it is designed. In DRM bridge framework, UCON is used to build a rights expression original language, and language mapping tables are used to achieve the equivalent exchange between different REL standards. Besides a encryption/decryption library and a content format module are used to achieve the non-banding of DRM systems and its content format.
暂无评论