IMAGE FORGERY DETECTION

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

PANKAJ MALVIYA RUCHIRA NASKAR
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
Multimedia Security And Forensics Authentication of Digital Images Sarah Summers Sarah Wahl CS525 Semester Project Spring 2006.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Seminar: Image Tampering MC919 - Prof. Anderson Rocha Arthur Espíndola Ribeiro Vinicius Dias de Oliveira Gardelli /11/2014.
Ales Zita. Publication Digital Image Forgery Detection Based on Lens and Sensor Aberration Authors : Ido Yerushalmy, Hagit Hel-Or Dept. of Computer Science,
Digital Image Forensics
Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints Fernando Barros Filipe Berti Gabriel Lopes Marcos Kobuchi.
Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye.
School of Computing Science Simon Fraser University
Detecting Digital Image Forgeries Using Sensor Pattern Noise presented by: Lior Paz Jan Lukas, jessica Fridrich and Miroslav Goljan.
3. Introduction to Digital Image Analysis
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Managing and Editing Your Photos
CS430 © 2006 Ray S. Babcock Lossy Compression Examples JPEG MPEG JPEG MPEG.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Digital Image Processing 3rd Edition
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
Chpater 3 Resolution, File Formats and Storage. Introduction There are two factors that determine the quality of the picture you take; The resolution.
Tandridge Photographic Society Workshop on PhotoShop Elements presented by Nick Withers.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
This picture was taken on the banks of Sumatra Island (the height of waves was of approx. 32 m = 105 ft). It was found saved in a digital camera, 1 ½.
Tour Guide Image Compression Image Manipulation Image Analysis Image Acquisition Image Perception Image Display Image Generation D.I.P. Theme Park.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
SUBJECT CODE:CS1002 DEPARTMENT OF ECE. “One picture is worth more than ten thousand words” Anonymous.
DIGITAL IMAGE PROCESSING
Digital Image Processing & Analysis Fall Outline Sampling and Quantization Image Transforms Discrete Cosine Transforms Image Operations Image Restoration.
Understanding JPEG MIT-CETI Xi’an ‘99 Lecture 10 Ben Walter, Lan Chen, Wei Hu.
Digital Image Processing (DIP) Lecture # 5 Dr. Abdul Basit Siddiqui Assistant Professor-FURC 1FURC-BCSE7.
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
Rick Parent - CIS681 Background Perception Display Considerations Video Technology.
Rick Parent - CIS681 Background Perception Display Considerations Film and Video, Analog and Digital Technology.
MULTIMEDIA INPUT / OUTPUT TECHNOLOGIES
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
COMP322/S2000/L171 Robot Vision System Major Phases in Robot Vision Systems: A. Data (image) acquisition –Illumination, i.e. lighting consideration –Lenses,
11/29/ Image Processing. 11/29/ Systems and Software Image file formats Image processing applications.
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
DIGITAL VIDEO AUTHENTICATION. Contents  What is Quantization ?  What is Double MPEG/JPEG Compression?  Video Compression/Decompression  What is JPEG/Frame.
Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
CSC/FAR 020, Computer Graphics, September 2-3, 2014 Dr. Dale E. Parson Outline for class # 3.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DIGITAL IMAGE FORGERY Name: Reshma P.D Roll No:19.
Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification Irene Amerini, Roberto Caldelli, Vito.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
IMAGE PROCESSING is the use of computer algorithms to perform image process on digital images   It is used for filtering the image and editing the digital.
DSLR vs. point and shoot.
Reflection Correspondence for Exposing Photograph Manipulation
DCT IMAGE COMPRESSION.
Compression for Synthetic Aperture Sonar Signals
Background Perception Display Considerations Video Technology.
Images, Display, Perception
Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images  Toqeer Mahmood, Aun.
Digital 2D Image Basic Masaki Hayashi
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Software Equipment Survey
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
Satellite data Marco Puts
Image Compression Techniques
Ceng466 Fundamentals of Image Processing
Detecting Digital Forgeries using Blind Noise Estimation
Review and Importance CS 111.
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

IMAGE FORGERY DETECTION Justin Siao IMAGE FORGERY DETECTION

PIXEL BASED FORMAT BASED CAMERA BASED PHYSICS BASED GEOMETRIC BASED OUTLINE

PIXEL BASED METHODS: CLONING Discrete Cosine Transform Principle Component Analysis PIXEL BASED METHODS: CLONING

PIXEL BASED METHODS: OTHER Resampling Scaling Expectation/Maximization Algorithm Splicing Disrupts higher-order Fourier statistics Statistical PIXEL BASED METHODS: OTHER

FORMAT BASED METHODS JPEG Quantization Double JPEG JPEG Blocking Quantization techniques vary by model Double JPEG Editing and saving to JPEG causes double compression JPEG Blocking JPEGs compress by 8x8 pixel blocks Manipulation will disturb these blocks FORMAT BASED METHODS

CAMERA BASED METHODS: CHROMATIC ABERRATION Image have a specific field of misalignment of color channels Any part of the image which mismatches the field indicates manipulation CAMERA BASED METHODS: CHROMATIC ABERRATION

CAMERA BASED METHODS: OTHER Color Filter Array Uses interpolation. Pixels must correspond Camera Response Cameras enhance light non-linearly Sensor Noise Compares expected noise with extracted noise CAMERA BASED METHODS: OTHER

PHYSICS BASED METHODS: LIGHT DIRECTION & ENVIRONMENT Light source can be plotted by angle of luminescence. Light on object must match environmental lighting PHYSICS BASED METHODS: LIGHT DIRECTION & ENVIRONMENT

GEOMETRIC BASED METHODS: PRINCIPLE POINT & METRIC MEASUREMENTS Principal Point Inconsistencies in principal points indicate tampering Metric Measurements Uses a priori knowledge of object geometry to determine forgery GEOMETRIC BASED METHODS: PRINCIPLE POINT & METRIC MEASUREMENTS

J. Fridrich, D. Soukal, and J J. Fridrich, D. Soukal, and J. Lukás, “Detection of copy move forgery in digital images,” in Proc. Digital Forensic Research Workshop, Aug. 2003. “Photo tampering throughout history”, 2004. H. Farid, “Image Forgery Detection”, Mar. 2009. A. Kharag, “#jumping back into the semester”, Instagram, Mar. 2018. Discrete Wavelet Transform on Color Picture Interpolation of Digital Still Camera, ResearchGate J. Stolworthy, “The Expendables 4 to move ahead without Sylvester Stallone”, Apr. 2017. M. Johnson, H. Farid, “Detecting Photographic Composites of People”, 2007 Image Sources

QUESTIONS: