1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.

Slides:



Advertisements
Similar presentations
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 4 – Digital Image Representation Klara Nahrstedt Spring 2009.
Advertisements

Some problems... Lens distortion  Uncalibrated structure and motion recovery assumes pinhole cameras  Real cameras have real lenses  How can we.
PANKAJ MALVIYA RUCHIRA NASKAR
Sheng-Wen Peng  Introduction  WATERMARKING FOR IMAGE AUTHENTICATION  COPY-COVER IMAGE FORGERY DETECTION  PCA Domain Method  EXPERIMENTAL.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Camera Model Identification Based on the Characteristics of CFA and Interpolation Shang Gao 1, Guanshuo Xu 2, Rui-Min Hu 1,*
Ales Zita. Publication Digital Image Forgery Detection Based on Lens and Sensor Aberration Authors : Ido Yerushalmy, Hagit Hel-Or Dept. of Computer Science,
CS 551 / CS 645 Antialiasing. What is a pixel? A pixel is not… –A box –A disk –A teeny tiny little light A pixel is a point –It has no dimension –It occupies.
Digital Image Forensics
Automatic scene inference for 3D object compositing Kevin Karsch (UIUC), Sunkavalli, K. Hadap, S.; Carr, N.; Jin, H.; Fonte, R.; Sittig, M., David Forsyth.
May 9, 2005 Andrew C. Gallagher1 CRV2005 Detection of Linear and Cubic Interpolation in JPEG Compressed Images Andrew C. Gallagher Eastman Kodak Company.
1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye.
ECE643 DIGITAL IMAGE PROCESSING Steganalysis versus Splicing detection Paper by: Yun Q. Shi, Chunhua Chen, Guorong Xuan and Wei Su By: Nehal Patel Siddharth.
Detecting Digital Image Forgeries Using Sensor Pattern Noise presented by: Lior Paz Jan Lukas, jessica Fridrich and Miroslav Goljan.
Multimedia for the Web: Creating Digital Excitement Multimedia Element -- Graphics.
A Digital Technique for Music Identification Joel R. Martin Columbia University ELENE6886.
3. Introduction to Digital Image Analysis
Processing Digital Images. Filtering Analysis –Recognition Transmission.
Computer Vision Introduction to Image formats, reading and writing images, and image environments Image filtering.
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
Lecture 1: Images and image filtering
Image Tampering Detection Using Bayesian Analytical Methods 04/11/2005 As presented by Jason Kneier ELEN E6886 Spring 2005.
1 How Realistic is Photorealistic?. 2 Yaniv Lefel Hagay Pollak Based on the work of - Siwei Lyu and Hany Farid.
Introduction to Computer Graphics
Computer Graphics Inf4/MSc Computer Graphics Lecture Notes #16 Image-Based Lighting.
Noise Estimation from a Single Image Ce Liu William T. FreemanRichard Szeliski Sing Bing Kang.
Identifying Computer Graphics Using HSV Model And Statistical Moments Of Characteristic Functions Xiao Cai, Yuewen Wang.
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
Overview of State-of-the-Art in Digital Image Forensics H. T. SENCAR and N. MEMON Ashwini Chapte 12/5/08 ECE-643 New Jersey Institute of Technology.
CS559: Computer Graphics Lecture 3: Digital Image Representation Li Zhang Spring 2008.
Distortion Correction ECE 6276 Project Review Team 5: Basit Memon Foti Kacani Jason Haedt Jin Joo Lee Peter Karasev.
High-Resolution Interactive Panoramas with MPEG-4 발표자 : 김영백 임베디드시스템연구실.
+ 5 Things you need to know about images* *Images for the web.
CVPR 2003 Tutorial Recognition and Matching Based on Local Invariant Features David Lowe Computer Science Department University of British Columbia.
1 Reconstructing head models from photograph for individualized 3D-audio processing Matteo Dellepiane, Nico Pietroni, Nicolas Tsingos, Manuel Asselot,
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
Digital Image Processing Definition: Computer-based manipulation and interpretation of digital images.
Converting raster images to XML and SVG The potential of XML - encoded images and SVG image files in Geomatics.
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
October Andrew C. Gallagher, Jiebo Luo, Wei Hao Improved Blue Sky Detection Using Polynomial Model Fit Andrew C. Gallagher, Jiebo Luo, Wei Hao Presented.
Automated Fingertip Detection
Visual Computing Computer Vision 2 INFO410 & INFO350 S2 2015
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
Analysis on CFA Image Compression Methods Sung Hee Park Albert No EE398A Final Project 1.
DIGITAL VIDEO AUTHENTICATION. Contents  What is Quantization ?  What is Double MPEG/JPEG Compression?  Video Compression/Decompression  What is JPEG/Frame.
 Forensics of image re-sampling (such as image resizing) is an important issue,which can be used for tampering detection, steganography, etc.  Most of.
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 4 – Audio and Digital Image Representation Klara Nahrstedt Spring 2010.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
Chapter 24: Perception April 20, Introduction Emphasis on vision Feature extraction approach Model-based approach –S stimulus –W world –f,
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification Irene Amerini, Roberto Caldelli, Vito.
A Framework for Perceptual Studies in Photorealistic Augmented Reality Martin Knecht 1, Andreas Dünser 2, Christoph Traxler 1, Michael Wimmer 1 and Raphael.
Digital Camera Analogy ● How do we take a picture of a person indoor? ● A target (object) needs to be determined. → geometry ● The person needs to wear.
IMAGE PROCESSING is the use of computer algorithms to perform image process on digital images   It is used for filtering the image and editing the digital.
Visual Information Processing. Human Perception V.S. Machine Perception  Human perception: pictorial information improvement for human interpretation.
Program Studi S-1 Teknik Informatika FMIPA Universitas Padjadjaran
Reflection Correspondence for Exposing Photograph Manipulation
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Chapter 8, Exploring the Digital Domain
Image Based Modeling and Rendering (PI: Malik)
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
IMAGE FORGERY DETECTION
Satellite data Marco Puts
A Digital Watermarking Scheme Based on Singular Value Decomposition
How to Digitize the Natural Color
Ceng466 Fundamentals of Image Processing
Detecting Digital Forgeries using Blind Noise Estimation
Presentation transcript:

1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak Company 2

2 The Problem: Authentication Good News: Computer Graphics and Image Manipulation tools are rapidly advancing. Bad News: How can we confirm that an image is authentically captured by a digital camera? Image Credit: Columbia photographic images and photorealistic computer graphics dataset.

3 Computer Graphic vs. Photographic Photo-Realistic Computer Graphics (PRCG) Photographic Images (PIM) Image Credit: Columbia photographic images and photorealistic computer graphics dataset.

4 Local Forgeries Authentic image Locally Modify Content or insert new Content (Photographic or PRCG) Locally Forged Image

5 Goals and Approach Our Goals: Distinguish between Photographic (PIM) and Computer Graphic (PRCG) Find and Localize Forgeries Our Approach: We focus on the image processing differences between digital cameras and computer graphics. We detect local traces of CFA interpolation.

6 Contributions PIM versus PRCG: Hardware specific features vs. image physics or texture features (Ng et al. 2005, Lyu and Farid 2005) Finding the demosaicing parameters is not necessary. (vs. learning with EM as in Popescu and Farid 2005). Excellent (best) performance on a standard test set using interpolation detection. We test with actual JPEG images from digital cameras.

7 Contributions Detecting Local Forgeries: We show CFA detection is useful for accurately localizing suspicious regions. We show results on forgeries created from real digital camera images. The images are available for research.

8 Image Formation Digital Cameras 1 LensSensor Hardware Correction Balance + Tone Render Sharpen + Noise Cleaning JPEG A/D Computer Graphic Systems Scene Model Balance + Tone Render Sharpen + Noise Cleaning JPEG Virtual Camera Lens

9 CFA Interpolation Digital Cameras Use Color Filter Arrays Interpolation is required In general, missing pixels are a linear combination of neighbors Interpolation can be detected (Gallagher 2000, Popescu and Farid 2005). G 1,1 R 1,2 G 1,3 R 1,4 G 1,5 R 1,6 B 2,1 G 2,2 B 2,3 G 2,4 B 2,5 G 2,6 G 3,1 R 3,2 G 3,3 R 3,4 G 3,5 R 3,6 B 4,1 G 4,2 B 4,3 G 4,4 B 4,5 G 4,6 G 5,1 R 5,2 G 5,3 R 5,4 G 5,5 R 5,6 B 6,1 G 6,2 B 6,3 G 6,4 B 6,5 G 6,6 CFA Interpolation

10 Detecting Traces of CFA Interpolation CFA Traces survive camera processing (even compression) Peak Strength: Apply Filter Estimate Variance Canon EOS JPEG Detect Peak Strength Spatial Domain Peak Frequency Domain  0 2 

11 PRCG versus PIM PIM. Distinct Peak at  =  PRCG. No Distinct Peak at  = 

12 Results: PRCG vs. PIM Columbia Image Set: 800 PIM Digital Camera Images (JPEGs) 800 PRCG Photorealistic Computer Graphic Previous Approaches: Texture statistics (wavelets): Lyu and Farid (2005) Geometric and Physical Features: Ng et al. (2005) Our Feature: Peak Strength

13 Results: PRCG vs. PIM Ng et al. Performance as a function of region size

14 Results: PRCG vs. PIM JPEG Quality Factor Quality Factor 99

15 Results: PRCG vs. PIM JPEG Quality Factor Quality Factor 20

16 Results: PRCG vs. PIM Classification Errors PIM misclassified as PRCG PRCG misclassified as PIM

17 Detecting Local Forgeries Peak is computed locally (64x256) Forged regions usually won’t have CFA traces. Suspicious regions have low. Apply Filter Estimate Variance Canon EOS JPEG Detect Peak Strength Spatial Domain Peak Frequency Domain  0 2 

18 Localizing Forgeries AuthenticForged Analysis Suspicious Regions Good results on all three images. Images are Available at:

19 Discussion CFA traces are destroyed by resizing CFA interpolation could be forged by a sophisticated forger. Many tests will likely be necessary to detect forgeries.

20 Conclusions We propose an elegant CFA interpolation detection for: Distinguishing PIM from PRCG Localizing forged image regions Recovering the CFA parameters is not necessary. Our results are the best yet on a standard image set.