Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Deep multi-scale network-based secondary JPEG compressed image forensics method

A technology for compressing images and deep neural networks, which is applied in the field of secondary JPEG compressed image tampering detection, and can solve problems such as insufficient consideration, low image forensics accuracy, and no solutions.

Active Publication Date: 2018-09-14
XIDIAN UNIV
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because this method does not fully consider some statistical characteristics of the secondary JPEG compression, it simply extracts the features by using the convolutional neural network, and the extracted information is less, and the consideration of the situation is not comprehensive enough. When the JPEG image is the first When the secondary compression quality factor is greater than the second compression quality factor, there is no effective solution, and the accuracy of image forensics is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Deep multi-scale network-based secondary JPEG compressed image forensics method
  • Deep multi-scale network-based secondary JPEG compressed image forensics method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0040] refer to figure 1 , a second JPEG compressed image forensics method based on a deep multi-scale network, including the following steps:

[0041] Step 1) Extract the N DCT coefficient histogram features F of the JPEG image to be forensic:

[0042] Step 1a) Use the JPEG image toolkit to read in a 1024×1024 JPEG image to be forensic, obtain the image data and image header file of the image to be forensic, and extract the DCT coefficients from the image header file to obtain a size of m× n=1024×1024 DCT coefficient matrix;

[0043] Step 1b) check whether the number of rows and the number of columns of the DCT coefficient matrix can be divisible by L=64, if so, perform step (1c), otherwise, fill zeros on the rightmost side of the DCT coefficient matrix column, zero-padded at the bottom OK, and carry out step (1c), because m=10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a deep multi-scale network-based secondary JPEG compressed image forensics method. The invention aims to improve the accuracy of image forensics. The implementation process of the method include the following steps that: N DCT coefficient histogram features of a JPEG image to be subjected to forensics are extracted; four deep neural networks are trained; the preliminary tampering detection result of the corresponding data block of one DCT coefficient histogram feature in the JPEG image to be subjected to forensics is obtained; the final tampering detection result of thecorresponding data block of the one DCT coefficient histogram feature in the JPEG image to be subjected to forensics is obtained; the final tampering detection results of the corresponding data blocksof the other N-1 DCT coefficient histogram features in the JPEG image to be subjected to forensics are obtained; and the forensics result image of the JPEG image to be subjected to forensics is obtained. The method of the invention can be used for fields such as news photography authentication, judicial authentication, insurance authentication and bank electronic bill authentication.

Description

technical field [0001] The invention belongs to the technical field of image processing, and relates to a second JPEG compressed image forensics method, in particular to a second JPEG compressed image tampering detection method based on a deep multi-scale network, which can be used in the field of second JPEG compressed image forensics. Background technique [0002] With the rapid development of image acquisition tools and the popularity of social media, digital images are widely used and become the mainstream information carrier. With various image processing tools, people can easily modify the image to any desired content. In many fields such as journalism, law, business, medical applications, and academic research, the credibility of visual images has been compromised by digital technology. Therefore, digital image forensics, which aims to identify the original source of an image or determine whether the image content has been modified, has become particularly important....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T5/40G06T7/11G06T7/168G06N3/08
CPCG06N3/084G06T5/40G06T7/11G06T7/168G06T2207/20052
Inventor 邓成李昭赵泽雨杨延华
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products