Dissertation > Excellent graduate degree dissertation topics show

Detecting Doctored Images Based on Double JPEG 2000 Compression

Author: WangHaiYing
Tutor: ZhangJing
School: Tianjin University
Course: Signal and Information Processing
Keywords: Double JPEG 2000 compression Image tampering Wavelet Transform Tamper detection
CLC: TP391.41
Type: Master's thesis
Year: 2008
Downloads: 135
Quote: 1
Read: Download Dissertation

Abstract


With the rapid development of computer and network technology , the emergence of high-resolution digital camera and a powerful image-editing software ( such as : Adobe Photoshop , Microsoft Photo Editor , CorelDRAW , etc. ) , image tampering has become increasingly common, and , tampering after the image is difficult to identify the authenticity. If the the tampered image for the news media or court exhibits , will cause a great impact on society . Therefore is very important to identify the authenticity of the digital image for image tampering detection , the current has become a hot research field of information . This article image tamper detection , based on the JPEG 2000 image compression standard , good performance and prospects for the development of the proposed based JPEG 2000 double-compressed image tampering detection algorithm . The article first analyzes the statistical properties of the sub-band of DWT coefficients double-compressed JPEG 2000 , and its amplitude-frequency characteristics of the sub-band DWT coefficients histogram Fourier transform , this feature showed : compared with a compression double compression magnitude there is a big peak point spectrum in the high frequency phenomenon . In this paper, the wavelet transform to extract a larger peak point ( singular point ) , and calculate the the larger peak point the cause of the poor ( the difference between the maximal and minimal values ??) , judged by the poor thresholding images with or without secondary JPEG 2000 compression. Second , the paper elaborated been tampered JPEG 2000 image tampering area and not tampered area can be divided into the basis , and according to this basis proposed method to locate the tampered region . The experiments show that the proposed algorithm not only can effectively detect JPEG 2000 dual compressor , but also accurately locate tampered area of the image .

Related Dissertations

  1. Feature Extraction, Selection and Combination in Lipreading,TP391.41
  2. Research on Identification System of Cashmere and Wool Fiber,TS101.921
  3. Characteristics of sensory stimulation evoked,R318.0
  4. Network transmission ROI image coding algorithm,TN919.81
  5. Image Fusion Algorithms Based on Multi-scale Analysis,TP391.41
  6. Feature Extraction Technologies Research and Implementation of 3D Models Based on Wavelet Transform,TP391.41
  7. An Algorithm on Clustering and Anomaly Detection for Multiple Data Streams,TP311.13
  8. Research on Information Hiding Based on Images,TP309.7
  9. Design and Implication of Image Compression System Based on Wavelet and DM6446,TP391.41
  10. Combined DWT Dynamic Data Reconciliation Research and Application,TP274
  11. Traffic Prediction Model Based on Wavelet and Markov,TP393.06
  12. The Study of Image Watermark Base on Discrete Wavelet Transformation,TP309.7
  13. The Compression and Application of the Brain CT Image,TP391.41
  14. Inspection and Recognition on a Class of Tool Processing Trace,TP391.41
  15. The Research and Design of a Fire Detection System Based on Combustion Audio Recognition,X924.4
  16. The Realization and Study of a Scalable Data Encoder Based on SPIHT,TN762
  17. Research and Implementation of Dwt-based Video Codec System at Low Bit Rates,TN919.81
  18. Improved ROI Coding Method Based on SPIHT,TN919.81
  19. Two Algorithms for Image Processing Based on Chaos and Fractal,TP391.41
  20. Study of Ultrasonic Location for Partial Discharge in Transformer,TM855
  21. NMR logging quadrature detection filter algorithm,TN911.23

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Information processing (information processing) > Pattern Recognition and devices > Image recognition device
© 2012 www.DissertationTopic.Net  Mobile