Font Size: a A A

Research And Implementation Of Digital Photo Authenticity Detection System

Posted on:2024-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:L K SunFull Text:PDF
GTID:2568306941489774Subject:Electronic Information (Computer Technology) (Professional Degree)
Abstract/Summary:PDF Full Text Request
This article designs and implements a digital image authenticity verification system under the background of a news photography competition.In this context,it is necessary to analyze the original and processed images of the photographic works to determine if there is excessive modification in the processed images.Due to the large amount of work data,a comprehensive detection system can improve efficiency in analyzing images.Therefore,this article constructs such a system.The main research work is as follows:(1)This article studies the source identification of images.For image metadata,this article evaluates the authenticity of images by analyzing deeper level metadata information.Through the analysis of structured image data,it is found that some new devices capture more information stored in images,such as depth map and lighting information.This article proposes to use the existence of this information to judge the source and authenticity of image files.In addition,this article discusses the problem of fingerprint tracing of multi-camera devices,and proposes two methods:combined fingerprints and independent fingerprints.(2)This article studies the comparison method of original images and processed images.For photographic works,the verification work requires matching and comparing the original images and processed images to compare their differences.This section uses SIFT algorithm to automatically match and compare images,which improves efficiency compared to manual comparison.(3)This article implements the function of detecting JPEG compression errors.When the original image is not available,the system provides the function of analyzing the image through the compression traces of JPEG,which provides users with various detection methods.(4)Finally,this article designs and implements the system,and establishes the communication flow between the front and back ends.The system is tested and the results show that the system functions normally and the efficiency meets the expected level.
Keywords/Search Tags:image forensics, image authenticity, image source identification
PDF Full Text Request
Related items