IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.

Slides:



Advertisements
Similar presentations
Object Specific Compressed Sensing by minimizing a weighted L2-norm A. Mahalanobis.
Advertisements

1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Seminar: Image Tampering MC919 - Prof. Anderson Rocha Arthur Espíndola Ribeiro Vinicius Dias de Oliveira Gardelli /11/2014.
Digital Image Forensics
Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
SWE 423: Multimedia Systems
Detecting Digital Image Forgeries Using Sensor Pattern Noise presented by: Lior Paz Jan Lukas, jessica Fridrich and Miroslav Goljan.
Spatial and Temporal Data Mining
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Steganography Rayan Ghamri.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
1 Basics of Digital Imaging Digital Image Capture and Display Kevin L. Lorick, Ph.D. FDA, CDRH, OIVD, DIHD.
02/14/02(c) University of Wisconsin 2002, CS 559 Last Time Filtering Image size reduction –Take the pixel you need in the output –Map it to the input –Place.
1 JPEG Compression CSC361/661 Burg/Wong. 2 Fact about JPEG Compression JPEG stands for Joint Photographic Experts Group JPEG compression is used with.jpg.
Image Compression JPEG. Fact about JPEG Compression JPEG stands for Joint Photographic Experts Group JPEG compression is used with.jpg and can be embedded.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Trevor McCasland Arch Kelley.  Goal: reduce the size of stored files and data while retaining all necessary perceptual information  Used to create an.
Digital Image Characteristic
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Compression is the reduction in size of data in order to save space or transmission time. And its used just about everywhere. All the images you get on.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
DIGITAL Video. Video Creation Video captures the real world therefore video cannot be created in the same sense that images can be created video must.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital Cameras And Digital Information. How a Camera works Light passes through the lens Shutter opens for an instant Film is exposed to light Film is.
Section 8.1 Create a custom theme Design a color scheme Use shared borders Section 8.2 Identify types of graphics Identify and compare graphic formats.
MULTIMEDIA TECHNOLOGY SMM 3001 MEDIA - VIDEO. In this chapter How digital video differs from conventional analog video How digital video differs from.
December 9, 2014Computer Vision Lecture 23: Motion Analysis 1 Now we will talk about… Motion Analysis.
Digital Media Lecture 4: Bitmapped images: Compression & Convolution Georgia Gwinnett College School of Science and Technology Dr. Jim Rowan.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
CSCI-100 Introduction to Computing Hardware Part II.
The task of compression consists of two components, an encoding algorithm that takes a file and generates a “compressed” representation (hopefully with.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
DIGITAL VIDEO AUTHENTICATION. Contents  What is Quantization ?  What is Double MPEG/JPEG Compression?  Video Compression/Decompression  What is JPEG/Frame.
Introduction to JPEG m Akram Ben Ahmed
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
DIGITAL IMAGE FORGERY Name: Reshma P.D Roll No:19.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
IMAGE PROCESSING is the use of computer algorithms to perform image process on digital images   It is used for filtering the image and editing the digital.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Section 8.1 Section 8.2 Create a custom theme Design a color scheme
Michael Gormish Prepared by:Emin Sinan Mimaroglu
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Reflection Correspondence for Exposing Photograph Manipulation
DCT IMAGE COMPRESSION.
JPEG2000: Still Image Compression
DONE BY S.MURALIRAJAN M.NIRMAL
Data Compression.
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Watermarking for Image Authentication ( Fragile Watermarking )
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
IMAGE FORGERY DETECTION
Parag Agarwal Digital Watermarking Parag Agarwal
Image Coding and Compression
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35

Contents Introduction Digital Watermarking Image Forensic Tools Conclusion

Introduction We are living in an age where we are exposed to remarkable array of visual imagery. Today's digital technology had begun to erode the integrity of images. Over the past few years,the field of digital forensics has emerged to restore some trust to digital images.

Digital Watermarking One solution to image authentication problem is digital watermarking. Water marking is actually a technique of message hiding in some image or text. The main advantage of using watermarks is to encode information which can prove ownership, e.g., copyrights. The drawback of this approach is that a watermark must be inserted at the time of recording, which would limit to specially equipped digital cameras.

Watermarking

Image Forensic Tools Over the last few years, there has been a growing body of work on tools for digital image forensics. These tools are capable of detecting tampering in images from any camera, without relying on watermarks or specialized hardware. Instead of watermarks, these tools assume that images possess certain regularities that are disturbed by tampering.

Tools Pixel-based Format-based Camera-based Physical-based

Pixel-based The emphasis is on pixel Techniques for detecting tampering:  Cloning  Resampling  Splicing  Statistical

Cloning The most common image manipulations is to clone portions of the image to conceal a person or object into screen. If done with care, it is difficult to detect cloning visually. Two algorithms have been developed to detect cloned image regions:  PCA (Principal Component Analysis)  DCT (Discrete Cosine Transformation)

Resampling To create a convincing composite, it is often necessary to resize, rotate or stretch portions of an image. Resampling introduces specific correlations between neighboring pixels. If it is known which pixels are correlated with their neighbors, then specific form of correlation is easily determined. But if neither is known, then a two step iterative algorithm EM (expectation/maximization) is used to solve the problem.

Splicing A common form of photographic manipulation is the digital splicing of two or more images into a single composite. If spicing is done, then it will disrupt higher-order statistics which results in tampering.

Statistical To randomly draw from the possible set of pixel combinations to obtain statistical regularities in natural images to detect image manipulations. Compute first and higher order statistics from a wavelet decomposition. Compute the bit agreements and disagreements across bit planes. Use linear search algorithm called Floating Forward algorithm, which differentiate authentic from manipulated images. Detect manipulations like resizing, filtering etc.

Format-Based Unique properties of lossy compression can be exploited for forensic analysis. Forensic technique that detect tampering deals with JPEG lossy compression scheme.

JPEG Quantization RGB image is first converted into luminance/chrominance space. The full quantization is achieved by DCT method which produce a table of 192 values representing the channel. These values changes according to low and high compression rates. When an image block is individually transformed or quantized,artifacts appear at the border of neighboring blocks.

Conti.. When an image is cropped or recompressed,the specific pattern is disrupted. Only limitation is that there is some overlap across cameras of different makes and models.

Double JPEG Both original and manipulated images are stored in JPEG format. In this scenario, the manipulated image is compressed twice. Double JPEG compression does not necessarily prove malicious tampering.

Camera-Based Techniques for modeling and estimating different camera artifacts:  Chromatic Aberration  Color Filter Array  Camera Response Inconsistencies can be used as evidence of tampering.

Chromatic Aberration In an ideal imaging system, light passes through the lens and is focused to a single point on the sensor. Optical system, they fail to perfectly focus light of all wavelengths. The resulting effect is known as chromatic aberration. two forms: longitudinal and lateral. In both cases, chromatic aberration leads to various forms of color imperfections in the image. Lateral aberration manifests itself as a spatial shift in the locations where light of different wavelengths reach the sensor Local lateral aberration in a tampered region is inconsistent with global aberration.

fig (a) fig (b)

Color Filter Array Digital color image consist of 3 channels (RGB). Only a single color sample is recorded at each pixel location and other two samples are estimated from the neighboring samples. If specific form of correlation is known, then it is easy to determine which pixels are correlated with their neighbors. Any deviations from this pattern is an evidence for tampering.

Camera Response Most digital camera sensors are linear. There should be linear relationship between the amount of light measured by each sensor element and the corresponding pixel value. Difference in response function across an image results in tampering.

Physics -based When image is created by splicing together individual images,there is often difficult to exactly match the lighting effects. There are techniques for estimating the properties of lighting environment. Differences in lighting across an image is the evidence of tampering.

Conclusion Today’s technology allows digital media to be altered and manipulated in ways that were simply impossible 20 years ago. As we continue to develop techniques for exposing photographic frauds, new techniques will be developed to make better fakes that are harder to detect. The field of image forensics, however, has made and will continue to make it harder and more time-consuming (but never impossible) to create a forgery that cannot be detected.

QUESTIONS ???

THANK YOU