Cutting-resistant JPEG image compression history and synthetic tamper detection method
A technology of tamper detection and image compression, applied in image analysis, image data processing, instruments, etc., can solve problems such as block position damage, failure, image detection failure, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] Embodiment 1 of the present invention: anti-cropping JPEG image compression history and synthesis tampering detection method:
[0042] 1. Calculate the compression history trace and cropping position of the image to be detected.
[0043] Such as figure 2 , image 3 As shown, usually a JPEG image is obtained, and the tamperer may crop it and save it as an uncompressed image, or crop it and save it as a JPEG image. These operations will destroy the block grid of JPEG compression and use The previous quantization table information is lost. The detection process is as follows:
[0044] (1) Combine the image to be detected I(x,y) with such as Figure 4 The block effect extraction operator shown in the figure performs operations to obtain a block effect image D(x,y)
[0045]
[0046] (2) Divide D(x,y) into 8*8 non-overlapping blocks K 1 , K 2 ,...,K n , n=(M / 8)*(N / 8), M and N are the number of rows and columns of D(x,y) respectively. Calculate the block effect ma...
Embodiment 2
[0061] Embodiment 2 of the present invention: choose another picture to be detected Figure 19 , to determine whether the image to be tested has been tampered with, and then perform the following operations:
[0062] (1) Calculate with step 1 method Figure 19 The clipping position of , the detection result is as follows Figure 12 As shown, the clipping row position is k 1 =6, crop column position is k 2 =7, then cut out 6 rows and 7 columns of the image to be detected, and get a new image as I(x,y).
[0063] (2) Read the current quantization table Q from the JPEG header file 2 , calculate the distance between it and the quantization table corresponding to different quantization factors q (1~100), and the quality factor corresponding to the quantization table with the smallest distance is the current quality factor q 2 ,Right now
[0064]
[0065] Calculated to get q 2 =90.
[0066] (3) Estimate whether it undergoes secondary JPEG compression (when the compression ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com