Location:
Search - image tampering
Search list
Description: 本程序实现焊盘孔位识别,特采用图象处理技术,具有一定的防干扰作用-the program pad Kong-identification, using special image-processing techniques, which have a certain role in the anti-tampering
Platform: |
Size: 35342 |
Author: 张颖 |
Hits:
Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: |
Size: 238214 |
Author: ghostsx |
Hits:
Description: 本程序实现焊盘孔位识别,特采用图象处理技术,具有一定的防干扰作用-the program pad Kong-identification, using special image-processing techniques, which have a certain role in the anti-tampering
Platform: |
Size: 34816 |
Author: 张颖 |
Hits:
Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: |
Size: 237568 |
Author: ghostsx |
Hits:
Description: 摘要 电子证据即为电子数据证据,通常指在计算机或计算机系统运行过程中产生的以其记录
内容来证明案件事实的电磁记录物。电子证据取证包括证据获取、证据分析和证据报告三个过
程。同时,电子证据作为诉讼证据必须具备客观性、关联性、合法性的特征。当前,以数字化形
式出现的电子证据对传统的证据形式提出了挑战。
关键词 电子证据;取证技术;分析探讨-summary of electronic evidence, namely, electronic data evidence, usually refers to the computer or computer system running the course record with the contents to prove the facts of the case records from the electromagnetic . Electronic evidence, including evidence obtained evidence, the evidence analysis and report evidence of three process. Meanwhile, electronic evidence as evidence in judicial proceedings must have objectivity, relevance, legitimacy features. Currently, a digital form of electronic evidence, the evidence of the traditional form of a challenge. Keywords electronic evidence; Forensics; Analysis
Platform: |
Size: 206848 |
Author: air |
Hits:
Description: 数字水印具有很大参考价值的文章 基于DCT变换、分块DCT混沌脆弱水印、自嵌入水印、图像篡改定位及恢复的脆弱水印等15篇最新水印技术文章-Digital Watermarking of great reference value to the article based on the DCT transform, DCT block chaotic fragile watermarking, since the embedded watermark, image tampering localization and recovery fragile watermarking, such as the latest 15 articles watermarking technology
Platform: |
Size: 6259712 |
Author: zhangyiyi |
Hits:
Description: 针对现有水印只能确定篡改位置,但不能区分篡改类型的问题,提出能区分是图像篡改还是水印篡改的方案-Existing watermark tampering could only be determined location, but should not distort the distinction between types of problems is to distinguish between image tampering or tampered watermark program
Platform: |
Size: 540672 |
Author: zhangyiyi |
Hits:
Description: 基于空域的脆弱水印,可以有效检测出图像发生篡改的区域-Airspace based on fragile watermarking can effectively detect the occurrence of tampering with the image of the region
Platform: |
Size: 22528 |
Author: Robin |
Hits:
Description: 摘 要: 提出了一种基于医学图像中感兴趣区域(ROI)的盲检测水印算法, 将包含重要病理信息的灰度图像作为数字水印, 经置乱后在混沌序列的控制下嵌入到宿主小波域非感兴趣区域中。实验结果表明, 该算法在保护医学 ROI 的同时提高了水印抗 JPEG 压缩的鲁棒性, 并对篡改、 几何剪切、 滤波等均具有良好的鲁棒性和透明性, 而且混沌序列增强了系统的安全性。-Abstract: This paper presents a region of interest based on medical images (ROI) of the blind detection watermarking algorithm will contain important pathological information of gray image as digital watermark, after scrambling after the chaotic sequence embedded into the host under the control of wavelet-domain Non-interest area. The experimental results show that the algorithm in the protection of medical ROI while increasing watermark robustness against JPEG compression, and tampering, cropping, filtering Dengjun has good robustness and transparency, but also enhanced the system chaotic sequence security.
Platform: |
Size: 418816 |
Author: 还都 |
Hits:
Description: 针对现有的图像复制遮盖篡改检测算法需要某些先验信息、对后处理操作失效且计算量大等问题,
借鉴图像匹配技术中的SIFT(scale invariant feature transform)特征匹配算法,首次提出将其用于检测复制
遮盖的篡改操作。
-Cover the existing image copy for tamper detection algorithm needs some prior information on the calculation of post-processing and the failure of large issues, draw the image matching technology in the SIFT (scale invariant feature transform) features matching algorithm, first proposed The cover copy for the detection of the tampering operation.
Platform: |
Size: 466944 |
Author: LIDAN |
Hits:
Description: Image Forensic Analyses that Elude the
Human Visual System
While historically we may have been overly trusting of photographs, in recent years there has been a backlash
of sorts and the authenticity of photographs is now routinely questioned. Because these judgments are often
made by eye, we wondered how reliable the human visual system is in detecting discrepancies that might arise
from photo tampering. We show that the visual system is remarkably inept at detecting simple geometric
inconsistencies in shadows, reflections, and perspective distortions. We also describe computational methods
that can be applied to detect the inconsistencies that seem to elude the human visual system.
Platform: |
Size: 417792 |
Author: hussam |
Hits:
Description: 图像篡改检测恢复的相关文章,主要是用自嵌入数字水印来处理-image tampering detection and recovery
Platform: |
Size: 28292096 |
Author: 哈哈 |
Hits:
Description: 基于DCT压缩前后不变量,编写的抗JPEG压缩的数字图像认证证水印算法,具有良好的抵抗压缩、剪切、篡改等性能的水印仿真程序
-Invariants based on before and after the DCT compression, digital image authentication certificate watermark algorithm written anti-JPEG compression with good resistance to compression, shear, tampering watermarks performance simulation program
Platform: |
Size: 1741824 |
Author: 举例 |
Hits:
Description: 一种新颖的数字图像复制粘贴篡改被动取证算法的论文-A novel digital image copy and paste tampering passive forensics algorithm paper
Platform: |
Size: 438272 |
Author: 高皜 |
Hits:
Description: matlab程序,图像应用处理,可实现散焦模糊篡改图像的定位和分离,实现模糊图像真实性的检测-matlab program, image processing applications can be realized defocus blurred image tampering localization and separation, to achieve authenticity blurred image detection
Platform: |
Size: 66560 |
Author: 王扣准 |
Hits:
Description: 本软件具有简单的界面,能够通过简单的操作对图像进行水印加密、图像篡改检测、图像篡改定位、图像篡改修复。-The software has a simple interface that can be encrypted watermark image by a simple operation, image tamper detection, image tamper localization, image tampering repair.
Platform: |
Size: 2247680 |
Author: 杨洪滨 |
Hits:
Description: Since the birth of digital data hiding, image authentication has been one of its most widespread applications. During the first years, aside a few numbers of works, this application was limited to verifying the integrity of the image or locating its tampered regions. Nowadays, these watermarks are designed in sophisticated ways to not only localize the image tampering, but also recover the lost content in those areas. In tampering protection and self-recovery schemes, the goal is to embed a representation of the original image into itself in a way to efficiently compromise between three design parameters the quality of the watermarked image, the quality of the content recovery in tampered areas, and the tolerable tampering rate (TTR). -Since the birth of digital data hiding, image authentication has been one of its most widespread applications. During the first years, aside a few numbers of works, this application was limited to verifying the integrity of the image or locating its tampered regions. Nowadays, these watermarks are designed in sophisticated ways to not only localize the image tampering, but also recover the lost content in those areas. In tampering protection and self-recovery schemes, the goal is to embed a representation of the original image into itself in a way to efficiently compromise between three design parameters the quality of the watermarked image, the quality of the content recovery in tampered areas, and the tolerable tampering rate (TTR).
Platform: |
Size: 250880 |
Author: parthiban |
Hits:
Description: 此工程是基于jpeg重压缩检测的篡改区域定位的opencv的svm分类器应用程序,可以检测出经过PS或者美图秀秀修改过的jpeg重压缩图片的篡改区域。-This project is based on jpeg recompression tamper detection area positioning opencv of svm classification application, or can be detected through the PS beauties Xiu Xiu modified heavy compression jpeg image tampering area.
Platform: |
Size: 3652608 |
Author: 赖学金 |
Hits:
Description: 2014-TIFS-WeiWang-Exploring DCT Coefficient Quantization Effects for Local Tampering Detection 这篇论文的代码,可用于重压缩图像篡改的区域定位(2014-TIFS-WeiWang-Exploring DCT Coefficient Quantization Effects for Local Tampering Detection This paper's code can be used to re compress the image tampering regional positioning)
Platform: |
Size: 4649984 |
Author: 黑黑的
|
Hits:
Description: 基于RGB流和噪声流的图像篡改检测,该工程提供了完整的实现技术。(Based on image tampering detection of RGB stream and noise stream, the project provides a complete implementation technology.)
Platform: |
Size: 12659712 |
Author: 毛竹meng |
Hits: