首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
王兴元  张继明 《物理学报》2014,63(2):20701-020701
提出了一种基于混沌映射和汉明码的数字图像篡改检测及修复算法.该算法采用了目前在信道编码中广泛使用的编组码汉明码,将差错控制应用于图像认证和修复,并使用混沌映射保证算法的有效性和安全性.分析及实验表明:该算法在保证良好的视觉效果,嵌入较少认证信息的前提下,可以有效地进行数字图像篡改检测,并能够完成一定程度的图像修复.  相似文献   

2.
提出一种基于深度神经网络的图像修复取证算法,该算法可通过编码器网络自动提取图像修复遗留的痕迹特征,通过解码器网络预测像素类别,从而判断出图像是否经过修复篡改以及修复篡改的区域。同时,采用特征金字塔网络对解码器网络中的特征图进行信息补充。采用MIT Place数据集作为训练集,UCID数据集作为测试集,对训练集和测试集分别使用了不同的修复篡改算法。实验结果表明,与其他图像修复取证算法相比,所提算法的修复区域定位更精准,处理速度更快,且对不同的修复篡改方法具有较好的稳健性和较强的泛化能力。  相似文献   

3.
王兴元  张继明 《物理学报》2014,63(21):210701-210701
本文提出了一种基于抖动和混沌技术的数字图像篡改检测及修复算法.该算法使用小波变换后的低频子图和抖动技术生成图像的认证及修复信息,在有效减少水印数据量的同时,将水印嵌入小波变换后的高频子图,从而达到水印的不可见性.运用混沌技术完成水印的嵌入和加密,并结合中国余数定理,进一步减少水印嵌入对图像质量的影响.实验证明,该算法兼顾了水印的不可见性和鲁棒性,并且能够一定程度修复篡改图像,在图像认证和修复方面具有较高的实用意义.  相似文献   

4.
闫旭  姜威  贲晛烨 《光学技术》2018,(2):171-176
提出了一种针对图像的复制-粘贴篡改进行检测的方法。算法以图像子带编码为基础,利用Hu不变矩和Zernike矩的不变量对篡改图像进行检测。对图像做子带编码处理,得到近似子带(LL)图像,对近似子带图像进行Hu不变矩和Zernike矩的特征提取,用来表征图像的信息,最后采用上述特征信息进行图像的相关匹配。实验中将所提算法与极余弦变换(PCT)算法以及图像Zernik矩算法进行比较,结果表明所提算法对图像的旋转、平移攻击具有更优质的鲁棒性,提高了检测准确率。  相似文献   

5.
一种基于图像处理技术获取尾流特性的新方法   总被引:8,自引:1,他引:7  
提出了一种利用图像处理手段获取舰船尾流中气泡大小和密度的新方法.该方法对利用高速数字摄影设备拍摄的尾流图像进行处理;具有直观、实时、高效等特点,可以方便地应用在实际的工程项目中.  相似文献   

6.
基于图像熵的高动态范围场景的自动曝光算法   总被引:2,自引:0,他引:2  
自动曝光控制是通过控制曝光量使图像亮度最优化的过程,由于图像亮度与曝光值有着直接的关系,因而图像亮度在自动曝光算法中被广泛应用.虽然熵已用于各种图像处理应用,但是很少应用在自动曝光中.基于图像熵提出一种新的自动曝光算法,不同于传统的主要依赖于图像亮度的算法.首先根据图像熵值大小来判断光照条件,通过图像熵大小的比较,把图像的各区域划分为感兴趣区域与不感兴趣区域.然后由图像熵值大小采用分配权重方法对不同区域分配权重,最后进行准确地自动曝光.由于该算法主要基于图像熵值的大小,所以曝光效果不受图像中对象位置影响,使得该算法更灵活.实验结果表明,该算法对高动态范围场景可以准确地检测出各种光照条件,提高相机系统输出图像的动态范围,同时还增加了自动曝光的准确性.  相似文献   

7.
基于相似度的立体图像对中右视点图像质量评价方法   总被引:1,自引:0,他引:1  
黄大江  郁梅  杨铀  蒋刚毅 《光子学报》2008,37(8):1693-1697
结合立体视频中左右视点图像序列之间的关系、模糊数学方法以及客观图像质量评价的特点,提出了一种用于立体视频图像中右视点图像进行质量评价的方法.该方法对在解码端通过重建左视点的图像序列对生成右视点图像序列进行基于相似度的图像质量评价.实验结果表明,该方法能较好地反映立体视频右视点图像的质量水平.  相似文献   

8.
基于Krawtchouk矩和Contourlet变换的多目的水印   总被引:3,自引:2,他引:1  
提出了一种基于Krawtchouk矩和Contourlet变换的多目的水印算法.首先对图像进行两级Contourlet分解,通过计算其低频分量的Krawtchouk低阶矩不变量来构建鲁棒水印,然后在剩下的带通分量中选择一个作为水印嵌入域并在其中嵌入半脆弱水印,给出了实验结果,并从水印的不可见性、抗攻击能力及篡改的定位能力三个方面进行了定量评测.实验结果表明,该算法具有很强的鲁棒性和较好的脆弱性,能同时有效地保护版权和认证图像.  相似文献   

9.
一种多光谱与高分辨率全色图像融合新算法   总被引:4,自引:3,他引:1  
吴艳  李明  杨万海 《光子学报》2002,31(11):1399-1404
提出了一种新的基于小波变换的多光谱与高分辨率图像融合方法.该方法通过强度因子有效地将高分辨率图像经小波分解的低频分量信息融合到多光谱图像经小波分解的低频分量中去,使得经过小波反变换的融合图像较大程度地保留了多光谱图像的光谱信息和高分辨率图像的空间分辨率.给出了该方法的融合结果,并与小波变换法(WT方法)进行了比较,证明了该图像融合方法的正确和有效性.  相似文献   

10.
飞行目标姿态测量中的图像处理方法   总被引:9,自引:5,他引:4  
基于一种利用光测图像获取目标空中飞行姿态的方法,对高速电视获取的目标图像进行预处理的问题进行了研究,检验了姿态获取方法的可行性.人工模拟目标的试验结果证明了该图像处理方法的高准确度、有效性和易实现自动化等特点,为姿态获取方法的实际应用提供了依据.  相似文献   

11.
In recent years, digital watermarking technology has been widely used for property rights protection and integrity authentication of digital images. Image integrity authentication is usually done by a fragile watermarking scheme. When authenticating image integrity, one must extract the embedded authentication message from the image for comparison with the image feature to identify whether the image has been tampered with, and if so, locate the affected area. However, such authentication schemes may result in detection error problems. Namely, the tampered area may be misjudged as not having been tampered with, or vice versa. Hence, methods that effectively reduce errors in tampering detection have become an important research topic. This study aims to integrate a probability theory to improve image tampering detection accuracy and precision. The scheme includes two processes: the embedding of an image authentication message and tampering detection. In the image tampering detection process, in addition to identifying whether the image has been tampered with and locating the tampered area, through the authentication message embedded in the image, a probability theory is employed to improve previously obtained detection results to enhance authentication accuracy. The experimental results reveal that the proposed scheme performs well in terms of detection precision and authentication accuracy rate.  相似文献   

12.
This paper presents an image authentication scheme for digital images. The proposed scheme protects a group of n images mutually. It designs a block matching procedure to generate the recovery data for each image, and applies a (t, n − 1), 2 ≤ t < n, threshold mechanism to encode each recovery data in n − 1 shares. The recovery shares are cross-embedded in the n images using a modified reversible contrast mapping watermarking scheme. A signature-based authentication code is finally generated and stamped to provide evidence for integrity of each image. The scheme not only can detect the tampering activities, but also can locate and recover the invalid regions of the tampered image if t or more watermarked images in the same group were intact. A nice characteristic of the proposed scheme is that the original images can be reconstructed lossless if no watermarked image was tampered, making the technique feasible in the application of protecting very sensitive images such as military or medical images. Experimental results show that the proposed scheme successfully detects various kinds of image alterations such as filtering, cropping, and replacement, and the corrupted images are properly recovered using the cross-recovery scheme.  相似文献   

13.
To take invisibility and restoration quality into account, this paper proposes an alterable-capacity watermarking scheme. For each block of size 8 × 8 pixels, the alterable-length code is generated based on the roughness of it. The alterable-length watermark generated by the alterable-length code is divided into three parts and embedded in other three blocks based on the secret key. The authenticity of each block is determined by comparing the watermark reconstructed by the block content and the corresponding extracted watermark. To improve the quality of recovered images, two copies of the significant-code of each block are embedded in different blocks and the image inpainting method is adopted to recover the tampered blocks whose significant-code embedded in other blocks is destroyed. The alterable-payload watermark preserves adequate information of image blocks especially for texture images with as few bits as possible and takes into account invisibility, security and restoration quality. Experimental results demonstrate that the proposed scheme improves the quality of watermarked and reconstructed images and is resilient to the known forgery attacks.  相似文献   

14.
Video cameras have been widely installed in public facilities for the surveillance applications. So, video authentication has becoming increasingly attractive. This paper presents a dual watermarking for video authentication based on moving objects. For each frame, the frame index, as a watermark is first embedded into the moving objects of the corresponding frame using a reversible watermarking method, aiming to detect the temporal tampering. Then the principle content and the details of the moving objects combined with the authentication code, as the other watermark, are embedded into the frame for spatial tampering location and recovery. Specially, a synthesized frame method is proposed for lossless recovery of moving objects and effective extraction of frame index. Statistical analysis and experiment results show that the proposed method can locate spatial, temporal and spatio-temporal tampering accurately. The spatial tampered regions can be recovered approximately and the moving objects can be restored completely when the tampered area is limited.  相似文献   

15.
新型双染料敏化的宽带光聚物全息特性研究   总被引:6,自引:3,他引:3  
报道了一种新型、两种染料共同敏化的宽带响应光聚物材料.该材料使用孟加拉玫瑰红和亚甲基蓝作为联合光敏剂,由于混合染料的加入,使材料的感光光谱范围大大加宽.用四种波长的光对样品进行曝光,衍射效率均大于40%,最高可达80%,适合于多波长存储,分别用不同波长的激光在样品同一位置存储了四幅不同的图像,其再现图像效果良好,表明该材料是一种较理想的多波长全息存储材料.  相似文献   

16.
The rapid development of multimedia technology has resulted in a rising rate on digital unauthorized utilization and forgery, which makes the situation of image authentication increasingly severe. A novel strong image hashing scheme is proposed based on wave atom transform, which can better authenticate images by precisely distinguishing the malicious tampered images from the non-maliciously processed ones. Wave atom transform is employed since it has significantly sparser expansion and better characteristics of texture feature extraction than other traditional transforms. For better detection sensitivity, gray code is applied instead of natural binary code to optimize the hamming distance. Randomizations are also performed using Rényi chaotic map for the purposes of secure image hashing and key sensitivity. The experimental results show that the proposed strong scheme is robust to non-malicious content-preserving operations and also fragile to malicious content-altering operations. The scheme also outperforms DCT and DWT based schemes in terms of receiving operating characteristic (ROC) curves. Moreover, to provide an application-defined tradeoff, a security enhancement approach based on Rényi map is presented, which can further protect the integrity and secrecy of images.  相似文献   

17.
A method of obtaining ultrasonic images of objects radiating ultrasonic acoustic waves in the air is proposed. Object images are retrieved by spatially matched filtering of the amplitude-phase distribution of the ultrasonic field measured in a planar rectangular region at a distance from the radiating object under investigation. The field is measured at different frequencies in a wide band, which allows one to reduce the level of noise and artifacts in the retrieved images by processing in a wide frequency band.  相似文献   

18.
为在足球视频中有效的检测与跟踪运动目标,需要对足球比赛视频中目标检测与跟踪算法进行研究。当前采用的算法,在动态场景中,存在运动目标检测与跟踪效果不佳的问题。为此,提出一种基于OpenCV的足球比赛视频中目标检测与跟踪算法。该算法结合平均背景算法将足球比赛视频中目标图像分割为前景区与背景区,计算足球比赛视频每一帧目标图像和背景图像之间差值的绝对差值,同时计算每一个目标图像中像素点的平均值与标准值来建立目标图像背景统计模型,利用TMHI算法对足球比赛视频中目标初始图像进行阈值分割,得到初始分割图像,对分割图像进行中值滤波和闭运算,再使用卡尔曼滤波对分割后的目标图像进行处理,得到镜头中目标的质心位置和目标外界矩形框,然后对足球比赛视频中目标进行跟踪。实验证明,该算法有效的检测与跟踪足球视频中运动目标。  相似文献   

19.
The band artifact in steady-state free precession can be reduced by synthesizing the multiple images obtained through different phase increments of successive radiofrequency pulses. Even though the complex summation method was reported to be effective in reducing the band artifact, it has the pitfalls of intensity abnormality and sensitivity to the phase abnormality. Two new methods have been developed for more reliable reduction of the band artifact than the complex summation method. One method is to sum the complex images partially and to take the maximum intensity of the partially summed images. The other method is to sum the free induction decay (FID) and primary echo components of the Fourier series that are obtained through Fourier analysis of the complex base images. Both proposed methods were compared with other magnitude (maximum intensity projection, spectrally decomposed synthesis, sum-of-squares, nonlinear averaging) and complex-based (complex summation, magnitude-weighted complex summation) methods experimentally at 3 T for the phantom and volunteer's head imaging. Both proposed methods were confirmed to maintain the advantage of the complex summation in reducing both the dark and bright band artifacts while reducing the intensity abnormality and sensitivity to the phase abnormality from that of the complex summation method over a wide range of flip angles and relaxation times.  相似文献   

20.
朱甜甜  刘建  宋波  桂生  廉国选 《应用声学》2022,41(1):112-118
超声相控阵检测技术在焊缝检测中具有广泛的应用.超声相控阵检测技术检测信号中常混入噪声导致检测成像时难以分辨真实的缺陷特征.这些噪声主要为无关的反射信号和局部相关的结构噪声,传统的超声图像降噪方法难以有效滤除这些噪声,且存在计算效率低、参数优化复杂等问题.该文提出了一种基于深度学习的焊缝超声相控阵检测技术检测S扫图像的降...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号