Exposing Digital Forgeries Through Chromatic Aberration Micah K

Slides:



Advertisements
Similar presentations
A Robust Super Resolution Method for Images of 3D Scenes Pablo L. Sala Department of Computer Science University of Toronto.
Advertisements

Some problems... Lens distortion  Uncalibrated structure and motion recovery assumes pinhole cameras  Real cameras have real lenses  How can we.
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Seminar: Image Tampering MC919 - Prof. Anderson Rocha Arthur Espíndola Ribeiro Vinicius Dias de Oliveira Gardelli /11/2014.
Foundations of Physics
Ales Zita. Publication Digital Image Forgery Detection Based on Lens and Sensor Aberration Authors : Ido Yerushalmy, Hagit Hel-Or Dept. of Computer Science,
Digital Image Forensics
1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye.

Detecting Digital Image Forgeries Using Sensor Pattern Noise presented by: Lior Paz Jan Lukas, jessica Fridrich and Miroslav Goljan.
Motion Detection And Analysis Michael Knowles Tuesday 13 th January 2004.
Digital Cameras CCD (Monochrome) RGB Color Filter Array.
Spectrophotometer Jan 28, 2002 Deryck Hong Suryadi Gunawan.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
Mark S. Drew and Amin Yazdani Salekdeh School of Computing Science,
Introduction of the intrinsic image. Intrinsic Images The method of Finlayson & Hordley ( 2001 ) Two assumptions 1. the camera ’ s sensors are sufficiently.
Ch 25 1 Chapter 25 Optical Instruments © 2006, B.J. Lieb Some figures electronically reproduced by permission of Pearson Education, Inc., Upper Saddle.
Chapter 17 Optics 17.1 Reflection and Refraction
Basic Principles of Imaging and Photometry Lecture #2 Thanks to Shree Nayar, Ravi Ramamoorthi, Pat Hanrahan.
Digital Photography Basics. Pixels A pixel is a contraction if the term PIcture ELement. Digital images are made up of small squares, just like a tile.
Digital Photography DeCal EECS98/198 Nathan Yan About this course -Technology of Camera Systems -Photographic Technique -Digital Lightroom About Me ^-doesn’t.
Cameras Course web page: vision.cis.udel.edu/cv March 22, 2003  Lecture 16.
Chpater 3 Resolution, File Formats and Storage. Introduction There are two factors that determine the quality of the picture you take; The resolution.
Overview of State-of-the-Art in Digital Image Forensics H. T. SENCAR and N. MEMON Ashwini Chapte 12/5/08 ECE-643 New Jersey Institute of Technology.
Image Formation. Input - Digital Images Intensity Images – encoding of light intensity Range Images – encoding of shape and distance They are both a 2-D.
1 CS6825: Image Formation How are images created. How are images created.
Lab #5-6 Follow-Up: More Python; Images Images ● A signal (e.g. sound, temperature infrared sensor reading) is a single (one- dimensional) quantity that.
Evaluating An Image How things look on the screen doesn’t always matter. A full resolution image from a 6 megapixel camera printed on 4” x 6” paper… each.
Sebastian Thrun CS223B Computer Vision, Winter Stanford CS223B Computer Vision, Winter 2005 Lecture 2 Lenses and Camera Calibration Sebastian Thrun,
1 Computer Vision 一目 了然 一目 了然 一看 便知 一看 便知 眼睛 頭腦 眼睛 頭腦 Computer = Image + Artificial Vision Processing Intelligence Vision Processing Intelligence.
SIGNAL DETECTION IN FIXED PATTERN CHROMATIC NOISE 1 A. J. Ahumada, Jr., 2 W. K. Krebs 1 NASA Ames Research Center; 2 Naval Postgraduate School, Monterey,
CS 376b Introduction to Computer Vision 02 / 08 / 2008 Instructor: Michael Eckmann.
Geometric Camera Models
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
December 9, 2014Computer Vision Lecture 23: Motion Analysis 1 Now we will talk about… Motion Analysis.
1. What is depth of field? 2. Everything else equal, what effect will each of the following have on depth of field (larger, smaller?): -Larger aperture.
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
ELE 488 Fall 2006 Image Processing and Transmission ( )
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
DIGITAL VIDEO AUTHENTICATION. Contents  What is Quantization ?  What is Double MPEG/JPEG Compression?  Video Compression/Decompression  What is JPEG/Frame.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Advanced Computer Vision Chapter 2 Image Formation Chapter 2 Image Formation Presented by: 傅楸善 & 翁丞世
MOTION Model. Road Map Motion Model Non Parametric Motion Field : Algorithms 1.Optical flow field estimation. 2.Block based motion estimation. 3.Pel –recursive.
CSE 185 Introduction to Computer Vision
What is a digital image ? 1.
CS262 – Computer Vision Lect 4 - Image Formation
Reverse-Projection Method for Measuring Camera MTF
Reflection Correspondence for Exposing Photograph Manipulation
CSSE463: Image Recognition Day 21
The lecture Geometric optics By Mukhamedgaliyeva M.A.
Motion Detection And Analysis
Subpixel Registration and Distortion Measurement
Software Equipment Survey
17.3 Optical Systems 1.
Computer Vision Lecture 4: Color
Range Imaging Through Triangulation
What Is Spectral Imaging? An Introduction
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
IMAGE FORGERY DETECTION
Filtering Things to take away from this lecture An image as a function
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
Filtering An image as a function Digital vs. continuous images
Computer Vision II Chapter 20 Accuracy
Detecting Digital Forgeries using Blind Noise Estimation
Random Neural Network Texture Model
Presentation transcript:

Exposing Digital Forgeries Through Chromatic Aberration Micah K Exposing Digital Forgeries Through Chromatic Aberration Micah K. Johnson, Hany Farid, MM&Sec’06, September 26-27, 2006, Geneva, Switzerland Multimedia Security

Chromatic Aberration Ideal imaging system Light passes through the lens and is focused to a single point on the sensor. Longitudinal chromatic aberration Longitudinal aberration manifests itself as differences in the focal planes for different wavelengths of light. Lateral chromatic aberration Lateral aberration manifests itself as a spatial shift in the locations when light of different wavelengths reach the sensor.

Lateral Chromatic Aberration (1/2) 1-D aberration Snell’s Law :

Lateral Chromatic Aberration (2/2) 2-D aberration This model is simply an expansion/contraction about the center of the image. It is common for lens designers to try to minimize chromatic aberration in lenses. Expansion center : Each vector : Model parameters :

Estimating Chromatic Aberration Assume that the lateral chromatic aberration is constant within each color channel (RGB). Using green channel as reference, estimating the aberration between the red and green channels, the model parameters the blue and green channels, the model parameters Seek the best model parameters to approximate following equations, which bring color channels back into alignment.

Alignment by Mutual Information A metric based on mutual information has been proven successful in such situation. The mutual information between R and G, which are the random variables from the pixel intensities of The model parameters are determined by maximizing the mutual information as follows (using brute-force iterative search):

Quantify Estimated Error Using average angular error to quantify the error between the estimated and known model parameters. The angular error can be computed by the displacement vectors : The average angular error over all P pixels in the image is :

Experiment of synthetic images Generate 512*512 color image with anti-aliased discs of various size and color. Simulate aberration by warping blue channel to green channel. Distortion center is image center. Chosen 40 α between 1.0004 and 1.0078, 50 images for each. Average angular error : 3.4 degrees 93% error < 10 degrees The result demonstrate the general efficacy of this algorithm.

Experiment of calibrated images The goal of this part is finding actual parameters. Calibration target : a board with ¼-inch diameter holes spaced 1-inch apart. The camera take 500 holes in each picture. For each channel, computing the center of each hole. Compute displacements of (R, G) and (B, G). Using brute-force search by minimizing r.m.s between the measured and modeled displacements to approximate the actual parameters. 用不同焦距不同孔徑的鏡頭,

Experiment of calibrated images cont. Test the efficacy of this approach on real images. Use the same camera and calibrated lens. Image size 3020*2008, TIFF format, 205 images. Results : Average angular error is 20.3 degree with 96.6% < 60 degrees. Much error is due to other aberrations, that are not considered in this model. Quality 95% JPEG : error 26.1 degrees with 93.7% < 60 degrees Quality 85% JPEG : error 26.7 degrees with 93.4% < 60 degrees Quality 75% JPEG : error 28.9 degrees with 93.2% < 60 degrees

Experiment of forensics Based on inconsistent chromatic aberration. Assume only small portion has been manipulated. Then use global estimate compare against block estimates. Judge : Any block that derivates significantly from the global estimate is suspected of having been manipulated. Difficult to estimate aberration from block with little spatial frequency content. (e.g., sky) Only consider 50 blocks with the largest gradients.

Experiment of forensics cont. Errors are estimated over 50 blocks per 205 images. Result : Average angular error 14.8 degrees with 98% < 60 degrees That is, block error > 60 degrees is considered to be tampered.

Conclusion Digital cameras introduce an inherent amount of noise uniformly spread across an image. When creating tampering, it is common to contain inconsistent pattern. Usually detect tamper image by those inconsistent pattern. The general digital forensics approach : First, statistical changes associated with specific types of tampering. Then, detection methods are designed to estimate these changes and differentiate. There is no general forensics detection method for all types of tampering. But the more detection method can provide the more confidence on tampering detection.