METHOD OF DETECTION INTEGRITY VIOLATIONS OF DIGITAL IMAGE BY PERLIN NOISE
DOI:
https://doi.org/10.15588/1607-3274-2017-2-15Keywords:
Digital image, forgery, Perlin noise, singular decompositionAbstract
Context. Today informatization is one of the priority directions of economic sectors development. Introduction process of new information technologies in all society spheres is impossible without solving the problem of information security. An integral part of which is the development of methods for determining the authenticity of digital images, the construction of which in many areas is crucial. All thismakes the topic of this work is extremely important.
Objective. To achieve the goal the following tasks are solved. Performed the research of digital image parameters, the presence or absence of the characteristic features of which allows to establish integrity violations of the digital image for the present forgery type. It is proposed to use for forgery detection ensuing form of singular values, as a digital image parameters, that uniquely define a matrix of digital image – a discrete function of the speed change ratio of block singular values. Based on developed form digital image parameters, was architected a way of increasing the efficiency of forgery detection method.
Method. This paper presents a method for forgery detection of the digital image, developed on the basis of a common approach, which is use matrix analysis, perturbation theory, and provides an opportunity to solve the problem of detection integrity violations of the digital signal. Under the digital image forgery in the work refers to a integrity violation of the digital image, which is based on realistic visual simulation of natural phenomena, clouds and sky, as a result of Perlin noise generation.
Results. In order to test the effectiveness of the modified forgery detection method, computational experiments performed for digital images that are stored without losses, to determine errors of the first and second type.
Conclusions. The scientific novelty of the work is as follows: presented method of increasing the efficiency of the method of falsification detection, resulting in the generation of Perlin noise, based on the application instead of a discrete function of singular values of the block, a discrete function rate of change of the relationship matrix of singular values of image block. The result of work is a program product for detecting violation of the integrity of the digital image, based on Perlin noise, which can be used to supplement the complex detection systems integrity violation of the digital image
References
Kobozeva A. A., Ry’bal’skij O. V., Trifonova E. A. Matrichny’j analiz – osnova obshhego podxoda obnaruzheniya fal’sifikacii cifrovogo signala, Vіsnik Sxіdnoukraїns’kogo nacіonal’nogo unіversitetu іm. V. Dalya, 2008, No. 8(126), Chastina1, pp. 62–72.
Trifonova K. O. Pіdvishhennya efektivnostі metodu viyavlennya nesankcіonovanogo vtruchannya «copypaste» v cifrove zobrazhennya, Vіsnik Nacіonal’nogo unіversitetu «L’vіvs’ka polіtexnіka» «Avtomatika, vimіryuvannya ta keruvannya», 2012, No. 741, pp. 227–230.
Trifonova E. A. Metod identifikacii i lokalizacii masshtabirovaniya v cifrovom izobrazhenii, Informatika i matematicheskie metody’ v modelirovanii, 2013, No. 1, pp. 22–34.
Trifonova K. O., Murova V. V. Adaptacіya іnvarіantnix do afіnnix peretvoren’ momentіv cifrovogo zobrazhennya dlya viyavlennya fal’sifіkacії, Tezi dopovіdej V mіzhnarodnoї naukovo-praktichnoї konferencії «Іnformacіjnі upravlyayuchі sistemi ta texnologії». Odesa, 20–22 veresnya 2016 r, pp. 40–41.
Podlesny’j V.V. Metod procedurnogo modelirovaniya oblakov razlichny’x tipov dlya aviacionnogo trenazhera, Trudy’ SPIIRAN, 2013, No. 5(28), pp. 230–238.
Podlesny’j V. V. Vy’bor metoda modelirovaniya oblakov dlya aviacionny’x trenazherov, MGTU GA: Nauchny’j Vestnik, 2012, No. 177, pp. 105–111.
Harris M., Baxter W., Scheuermann T., Lastra A. Simulation of cloud dynamics on graphics hardware, Proceedings of Graphics Hardware, 2003, pp. 92–101.
Harris M., Coombe G., Scheuermann T., Lastra A. Physicallybased visual simulation on graphics hardware, Proceedings of Graphics Hardware, 2002, pp.1–10.
Harris M., Lastra A. Real-time cloud rendering, Proceedings of Eurographics, 2001, Vol. 20, No. 3, pp. 76–84.
Wang, N. Realistic and fast cloud rendering, Proceeding Siggraph’03 Acm Siggraph 2003 Sketches & Applications, 2003, pp. 1–17.
Demmel’, Dzh. Vy’chislitel’naya linejnaya algebra. Teoriya i prilozheniya. Moscow, Mir, 2001, 430 p.
Bergman S., Davidson J. Unitary Embedding for Data Hiding with the SVD, Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE, 2005, Vol.5681, pp. 619–630.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2017 K. O. Tryfonova
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.