METHOD OF DETECTION INTEGRITY VIOLATIONS OF DIGITAL IMAGE BY PERLIN NOISE

K. O. Tryfonova

Abstract


Context. Today informatization is one of the priority directions of economic sectors development. Introduction process of new information technologies in all society spheres is impossible without solving the problem of information security. An integral part of which is the development of methods for determining the authenticity of digital images, the construction of which in many areas is crucial. All thismakes the topic of this work is extremely important.

Objective. To achieve the goal the following tasks are solved. Performed the research of digital image parameters, the presence or absence of the characteristic features of which allows to establish integrity violations of the digital image for the present forgery type. It is proposed to use for forgery detection ensuing form of singular values, as a digital image parameters, that uniquely define a matrix of digital image – a discrete function of the speed change ratio of block singular values. Based on developed form digital image parameters, was architected a way of increasing the efficiency of forgery detection method.

Method. This paper presents a method for forgery detection of the digital image, developed on the basis of a common approach, which is use matrix analysis, perturbation theory, and provides an opportunity to solve the problem of detection integrity violations of the digital signal. Under the digital image forgery in the work refers to a integrity violation of the digital image, which is based on realistic visual simulation of natural phenomena, clouds and sky, as a result of Perlin noise generation.

Results. In order to test the effectiveness of the modified forgery detection method, computational experiments performed for digital images that are stored without losses, to determine errors of the first and second type.

Conclusions. The scientific novelty of the work is as follows: presented method of increasing the efficiency of the method of falsification detection, resulting in the generation of Perlin noise, based on the application instead of a discrete function of singular values of the block, a discrete function rate of change of the relationship matrix of singular values of image block. The result of work is a program product for detecting violation of the integrity of the digital image, based on Perlin noise, which can be used to supplement the complex detection systems integrity violation of the digital image


Keywords


Digital image; forgery; Perlin noise; singular decomposition

References


Kobozeva A. A., Ry’bal’skij O. V., Trifonova E. A. Matrichny’j analiz – osnova obshhego podxoda obnaruzheniya fal’sifikacii cifrovogo signala, Vіsnik Sxіdnoukraїns’kogo nacіonal’nogo unіversitetu іm. V. Dalya, 2008, No. 8(126), Chastina1, pp. 62–72.

Trifonova K. O. Pіdvishhennya efektivnostі metodu viyavlennya nesankcіonovanogo vtruchannya «copypaste» v cifrove zobrazhennya, Vіsnik Nacіonal’nogo unіversitetu «L’vіvs’ka polіtexnіka» «Avtomatika, vimіryuvannya ta keruvannya», 2012, No. 741, pp. 227–230.

Trifonova E. A. Metod identifikacii i lokalizacii masshtabirovaniya v cifrovom izobrazhenii, Informatika i matematicheskie metody’ v modelirovanii, 2013, No. 1, pp. 22–34.

Trifonova K. O., Murova V. V. Adaptacіya іnvarіantnix do afіnnix peretvoren’ momentіv cifrovogo zobrazhennya dlya viyavlennya fal’sifіkacії, Tezi dopovіdej V mіzhnarodnoї naukovo-praktichnoї konferencії «Іnformacіjnі upravlyayuchі sistemi ta texnologії». Odesa, 20–22 veresnya 2016 r, pp. 40–41.

Podlesny’j V.V. Metod procedurnogo modelirovaniya oblakov razlichny’x tipov dlya aviacionnogo trenazhera, Trudy’ SPIIRAN, 2013, No. 5(28), pp. 230–238.

Podlesny’j V. V. Vy’bor metoda modelirovaniya oblakov dlya aviacionny’x trenazherov, MGTU GA: Nauchny’j Vestnik, 2012, No. 177, pp. 105–111.

Harris M., Baxter W., Scheuermann T., Lastra A. Simulation of cloud dynamics on graphics hardware, Proceedings of Graphics Hardware, 2003, pp. 92–101.

Harris M., Coombe G., Scheuermann T., Lastra A. Physicallybased visual simulation on graphics hardware, Proceedings of Graphics Hardware, 2002, pp.1–10.

Harris M., Lastra A. Real-time cloud rendering, Proceedings of Eurographics, 2001, Vol. 20, No. 3, pp. 76–84.

Wang, N. Realistic and fast cloud rendering, Proceeding Siggraph’03 Acm Siggraph 2003 Sketches & Applications, 2003, pp. 1–17.

Demmel’, Dzh. Vy’chislitel’naya linejnaya algebra. Teoriya i prilozheniya. Moscow, Mir, 2001, 430 p.

Bergman S., Davidson J. Unitary Embedding for Data Hiding with the SVD, Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE, 2005, Vol.5681, pp. 619–630.


GOST Style Citations


1. Кобозева А. А. Матричный анализ – основа общего подхода обнаружения фальсификации цифрового сигнала / А. А. Кобозева, О. В. Рыбальский, Е. А. Трифонова // Вісник Східноукраїнського національного університету ім. В. Даля. – 2008. – №8 (126),Частина1. – С. 62–72.

2. Трифонова К. О. Підвищення ефективності методу виявлення несанкціонованого втручання «copypaste» в цифрове зображення / К. О. Трифонова // Вісник Національного університету «Львівська політехніка» «Автоматика, вимірювання та керування». – 2012. – №741. – С. 227–230.

3. Трифонова Е. А. Метод идентификации и локализации масштабирования в цифровом изображении / Е. А. Трифонова // Информатика и математические методы в моделировании. - 2013. – № 1. – С. 22–34.

4. Трифонова К.О. Адаптація інваріантних до афінних перетворень моментів цифрового зображення для виявлення фальсифікації / К. О. Трифонова, В. В. Мурова // Тези доповідей V міжнародної науково-практичної конференції «Інформаційні управляючі системи та технології». – Одеса. – 20–22 вересня 2016р. – С. 40–41.

5. Подлесный В. В. Метод процедурного моделирования облаков различных типов для авиационного тренажера / В. В. Подлесный // Труды СПИИРАН. – 2013. – №5 (28). – С. 230–238.

6. Подлесный В. В. Выбор метода моделирования облаков для авиационных тренажеров / В. В. Подлесный // МГТУ ГА: Научный Вестник. – 2012. – № 177. – С. 105–111.

7. Simulation of cloud dynamics on graphics hardware / [M. Harris, W. Baxter, T. Scheuermann, A. Lastra] // Proceedings of Graphics Hardware. – 2003. – P. 92–101.

8. Harris M. Physically-based visual simulation on graphics hardware / M. Harris, G. Coombe, T. Scheuermann, A. Lastra // Proceedings of Graphics Hardware. – 2002. – P. 1–10.

9. Harris M. Real-time cloud rendering / M. Harris, A. Lastra // Proceedings of Eurographics. – 2001. – Vol. 20, № 3. – P. 76–84.

10. Wang N. Realistic and fast cloud rendering / N. Wang // Proceeding Siggraph’03 Acm Siggraph 2003 Sketches & Applications. – 2003. – P. 1–17.

11. Деммель Дж. Вычислительная линейная алгебра. Теория и приложения / Дж. Деммель. – М. : Мир, 2001. – 430 с.

12. Bergman С. Unitary Embedding for Data Hiding with the SVD / C. Bergman, J. Davidson // Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE. – 2005. – Vol. 5681. – P. 619–630.





DOI: https://doi.org/10.15588/1607-3274-2017-2-15



Copyright (c) 2017 K. O. Tryfonova

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Address of the journal editorial office:
Editorial office of the journal «Radio Electronics, Computer Science, Control»,
Zaporizhzhya National Technical University, 
Zhukovskiy street, 64, Zaporizhzhya, 69063, Ukraine. 
Telephone: +38-061-769-82-96 – the Editing and Publishing Department.
E-mail: rvv@zntu.edu.ua

The reference to the journal is obligatory in the cases of complete or partial use of its materials.