• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Haipeng, Shen Xuanjing, Lü Yingda, and Jin Yushan. Blind Identification for Image Authenticity Based on Lambert Illumination Model[J]. Journal of Computer Research and Development, 2011, 48(7): 1237-1245.
Citation: Chen Haipeng, Shen Xuanjing, Lü Yingda, and Jin Yushan. Blind Identification for Image Authenticity Based on Lambert Illumination Model[J]. Journal of Computer Research and Development, 2011, 48(7): 1237-1245.

Blind Identification for Image Authenticity Based on Lambert Illumination Model

More Information
  • Published Date: July 14, 2011
  • Based on Lambert illumination model, blind identification algorithm for image authenticity is proposed. For an image, there is an error function between its actual light intensity and calculated light intensity; and for different light source models, there are different constraint functions of light source to light beam. Therefore, for infinite light source images and local light source images, a corresponding algorithm is presented, which calculates the light source direction of different areas in an image according to the error function and the corresponding constraint function. And the image tampering can be determined by the inconsistency in light source direction of different areas in an image. That is to say, if light source directions of different areas in an image are inconsistent, it can be considered that the image has been tampered; on the other hand, if light source directions of different areas in an image are consistent, it can be considered that the image has not been tampered. This has realized blind identification for image authenticity. Experimental results show that the light source direction of different areas in an image could be calculated accurately by the proposed corresponding algorithms for the two kinds of images mentioned above. Thus, the image authenticity could be identified effectively.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (843) PDF downloads (523) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return