A Robust Image Tampering Detection Method Based on Maximum Entropy Criteria

被引:6
作者
Zhao, Bo [1 ]
Qin, Guihe [1 ,2 ]
Liu, Pingping [1 ,2 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Minist Educ, Key Lab Symbol Computat & Knowledge Engn, Changchun 130012, Peoples R China
基金
中国国家自然科学基金;
关键词
image tampering detection; watermarking; maximum entropy; offset image; AUTHENTICATION; WATERMARKING; DCT;
D O I
10.3390/e17127854
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This paper proposes a novel image watermarking method based on local energy and maximum entropy aiming to improve the robustness. First, the image feature distribution is extracted by employing the local energy model and then it is transformed as a digital watermark by employing a Discrete Cosine Transform (DCT). An offset image is thus obtained according to the difference between the extracted digital watermarking and the feature distribution of the watermarked image. The entropy of the pixel value distribution is computed first. The Lorenz curve is used to measure the polarization degree of the pixel value distribution. In the pixel location distribution flow, the maximum entropy criteria is applied in segmenting the offset image into potentially tampered regions and unchanged regions. All-connected graph and 2-D Gaussian probability are utilized to obtain the probability distribution of the pixel location. Finally, the factitious tampering probability value of a pending detected image is computed through combining the weighting factors of pixel value and pixel location distribution. Experimental results show that the proposed method is more robust against the commonly used image processing operations, such as Gaussian noise, impulse noise, etc. Simultaneously, the proposed method achieves high sensitivity against factitious tampering.
引用
收藏
页码:7948 / 7966
页数:19
相关论文
共 29 条
[1]   A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition [J].
Agoyi, Mary ;
Celebi, Erbug ;
Anbarjafari, Gholamreza .
SIGNAL IMAGE AND VIDEO PROCESSING, 2015, 9 (03) :735-745
[2]   Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor [J].
Akhaee, Mohammad Ali ;
Sahraeian, S. Mohammad Ebrahim ;
Sankur, Bulent ;
Marvasti, Farokh .
IEEE TRANSACTIONS ON MULTIMEDIA, 2009, 11 (05) :822-833
[3]  
[Anonymous], 2012, INT J COMPUT APPL
[4]   Lossless watermarking for image authentication: A new framework and an implementation [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (04) :1042-1049
[5]  
Che S.-B., 2007, P INT C WAV AN PATT
[6]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[7]  
Cruz C., 2008, P 51 MIDW S CIRC SYS
[8]  
Eggers J.J., 2001, P 2001 IEEE INT C AC
[9]   Representation of Cross-Frequency Spatial Phase Relationships in Human Visual Cortex [J].
Henriksson, Linda ;
Hyvarinen, Aapo ;
Vanni, Simo .
JOURNAL OF NEUROSCIENCE, 2009, 29 (45) :14342-14351
[10]  
Ho C.K., 2004, P INT C INF TECHN CO