Reflection Correspondence for Exposing Photograph Manipulation

Slides:



Advertisements
Similar presentations
Distinctive Image Features from Scale-Invariant Keypoints
Advertisements

Exposing Photo Manipulation with Inconsistent Reections James F. OBrien University of California, Berkeley Hany Farid Dartmouth College Presented by: Jinjie.
3D Model Matching with Viewpoint-Invariant Patches(VIP) Reporter :鄒嘉恆 Date : 10/06/2009.
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Detecting Re-captured Videos using Shot-Based Photo Response Non-Uniformity Dae-Jin Jung.
IIIT Hyderabad Pose Invariant Palmprint Recognition Chhaya Methani and Anoop Namboodiri Centre for Visual Information Technology IIIT, Hyderabad, INDIA.
Vision Based Control Motion Matt Baker Kevin VanDyke.
Robust and large-scale alignment Image from
A Study of Approaches for Object Recognition
Processing Digital Images. Filtering Analysis –Recognition Transmission.
Introduction to Image Quality Assessment
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
Automatic Image Alignment (feature-based) : Computational Photography Alexei Efros, CMU, Fall 2005 with a lot of slides stolen from Steve Seitz and.
Automatic Image Alignment (feature-based) : Computational Photography Alexei Efros, CMU, Fall 2006 with a lot of slides stolen from Steve Seitz and.
COS 429 PS3: Stitching a Panorama Due November 4 th.
The 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems October 11-15, 2009 St. Louis, USA.
Overview Introduction to local features
My Research Experience Cheng Qian. Outline 3D Reconstruction Based on Range Images Color Engineering Thermal Image Restoration.
Automatic Registration of Color Images to 3D Geometry Computer Graphics International 2009 Yunzhen Li and Kok-Lim Low School of Computing National University.
1. Introduction Motion Segmentation The Affine Motion Model Contour Extraction & Shape Estimation Recursive Shape Estimation & Motion Estimation Occlusion.
Overview Harris interest points Comparing interest points (SSD, ZNCC, SIFT) Scale & affine invariant interest points Evaluation and comparison of different.
Local invariant features Cordelia Schmid INRIA, Grenoble.
K. Selçuk Candan, Maria Luisa Sapino Xiaolan Wang, Rosaria Rossini
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
COMP322/S2000/L171 Robot Vision System Major Phases in Robot Vision Systems: A. Data (image) acquisition –Illumination, i.e. lighting consideration –Lenses,
11/29/ Image Processing. 11/29/ Systems and Software Image file formats Image processing applications.
Automatic License Plate Location Using Template Matching University of Wisconsin - Madison ECE 533 Image Processing Fall 2004 Project Kerry Widder.
Autonomous Robots Vision © Manfred Huber 2014.
Jack Pinches INFO410 & INFO350 S INFORMATION SCIENCE Computer Vision I.
Overview Introduction to local features Harris interest points + SSD, ZNCC, SIFT Scale & affine invariant interest point detectors Evaluation and comparison.
Visual Computing Computer Vision 2 INFO410 & INFO350 S2 2015
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
776 Computer Vision Jan-Michael Frahm Spring 2012.
Digital Image Processing CSC331
COS 429 PS3: Stitching a Panorama Due November 10 th.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
776 Computer Vision Jan-Michael Frahm Spring 2012.
IMAGE PROCESSING is the use of computer algorithms to perform image process on digital images   It is used for filtering the image and editing the digital.
- photometric aspects of image formation gray level images
Photorealistic Rendering vs. Interactive 3D Graphics
Lecture 07 13/12/2011 Shai Avidan הבהרה: החומר המחייב הוא החומר הנלמד בכיתה ולא זה המופיע / לא מופיע במצגת.
Image enhancement algorithms & techniques Point-wise operations
Registration of Pathological Images
Reconstruction For Rendering distribution Effect
DONE BY S.MURALIRAJAN M.NIRMAL
Digital image self-adaptive acquisition in medical x-ray imaging
Fast Preprocessing for Robust Face Sketch Synthesis
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Cheng-Ming Huang, Wen-Hung Liao Department of Computer Science
- photometric aspects of image formation gray level images
Vehicle Segmentation and Tracking in the Presence of Occlusions
Features Readings All is Vanity, by C. Allan Gilbert,
Image Based Modeling and Rendering (PI: Malik)
IMAGE FORGERY DETECTION
Brief Review of Recognition + Context
Noah Snavely.
SIFT.
ECE734 Project-Scale Invariant Feature Transform Algorithm
Computational Photography
Multi-Information Based GCPs Selection Method
Detecting Digital Forgeries using Blind Noise Estimation
Review and Importance CS 111.
Name: ____ Concentration Theme: _______
Presentation transcript:

Reflection Correspondence for Exposing Photograph Manipulation Eric Wengrowski^, Zhaohui H. Sun*, Anthony Hoogs* ^ECE, Rutgers University, Piscataway, NJ, USA * Kitware Inc., Clifton Park, NY, USA Abstract Reflection Integrity Experimental Results Modern photo editing software enables increasingly realistic image manipulations, through splicing, region copy and paste, and content-aware fill. One potential flaw in manipulations is generating realistic object reflections, such as in bodies of water or glass surfaces. Image reflections involve complicated interactions between lighting, surface materials, and geometry, and they can be very hard to fake. Any inconsistency between the directly observed scene and its corresponding reflection is a strong indication of content manipulation. We propose a novel, physical-level image forensic approach to verify the integrity of reflections through identifying mismatches between objects and their reflections. The proposed algorithm consists of reflection-invariant feature detection and matching, geometric transform estimation, and robust change detection between a scene region and its warped reflection region. This approach complements the large body of digital-level forensic methods, with the advantage of being robust to digital-level image transformations such as compression, blurring, and added noise. Experimental results on authentic and manipulated images demonstrate its efficacy. Robust feature matching between a dinosaur piñata and its mirror reflection, before and after the object refection has been removed Reflection matching is robust to the choice of reflection masks Automatic object insertion detection in images with inconsistent reflections Directly observed scene and indirectly observed reflection have to be consistent in geometry as well as appearance. The law of reflection. The angle of incidence equals to the angle of reflection, and the incident, normal, and reflected directions are coplanar. Compression of color. Object reflection appears less colorful than the direct observation. The color may have shifted. However, the area of color region on color gamut does not increase in reflection. Compression of sharpness. The reflecting surface serves as a low-pass filter and the reflection usually appears blurrier than directly observed scene. Compression of contrast. Due to directional reflection, refraction and surface abortion, only part of the light reaches the sensor after reflection, resulting in lower contrast. Processing Modules Problem & Contributions Task: predict reflection integrity score and detection mask of the input image The problem: Assess reflection integrity by predicting reflection locations and geometry using scene context, then comparing reflections to directly imaged objects. Contributions Proposed a physical-level image forensic method based on assessing the consistency between scene and reflection Complementary to the digital-level forensic methods (metadata, JPEG coefficients analysis, PRNU, etc.) Robust to digital-level manipulations (e.g. spatial transform, compression, and blurring) and digital-analog-digital attacks (e.g. recapture by screen shot, printing, scanning, and projection) Automatic processing to increase throughput *James O'Brien and Hany Farid, Exposing photo manipulation with inconsistent reflections, ACM Transactions on Graphics, 2012. Preprocessing by contrast limited adaptive histogram equalization Feature point detection in scene and reflection regions Reflection invariant feature descriptor extraction (ASIFT, MIFT, …) Descriptor matching by Fast Library of Approximate Nearest Neighbors Interest point matching by Random Sample Consensus (RANSAC) Homography estimation Differencing the directly observed scene region and warped reflection region (e.g. local color standard deviation) Thresholding and morphological operation on the difference map Remaining challenges: weak reflections, occlusion, robust change detection Acknowledgement This work was supported by AFRL and DARPA under Contract No. FA8750-16-C-0166. Any findings and conclusions or recommendations expressed in this material are solely the responsibility of the authors and do not necessarily represent the official views of AFRL, DARPA, or the U.S. Government.