Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.

Slides:



Advertisements
Similar presentations
It is not uncommon to see the uproar that manipulated images cause in media. Some slides have images containing messages that may be controversial in nature.
Advertisements

PANKAJ MALVIYA RUCHIRA NASKAR
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
Sheng-Wen Peng  Introduction  WATERMARKING FOR IMAGE AUTHENTICATION  COPY-COVER IMAGE FORGERY DETECTION  PCA Domain Method  EXPERIMENTAL.
Multimedia Security And Forensics Authentication of Digital Images Sarah Summers Sarah Wahl CS525 Semester Project Spring 2006.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Identification of Tamper Detection Techniques for Digital Video Forensics By Susinda Perera Department of Computer Science and Engineering, University.
Camera Model Identification Based on the Characteristics of CFA and Interpolation Shang Gao 1, Guanshuo Xu 2, Rui-Min Hu 1,*
Seminar: Image Tampering MC919 - Prof. Anderson Rocha Arthur Espíndola Ribeiro Vinicius Dias de Oliveira Gardelli /11/2014.
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
Detecting Re-captured Videos using Shot-Based Photo Response Non-Uniformity Dae-Jin Jung.
Ales Zita. Publication Digital Image Forgery Detection Based on Lens and Sensor Aberration Authors : Ido Yerushalmy, Hagit Hel-Or Dept. of Computer Science,
Digital Image Forensics
Object Recognition & Model Based Tracking © Danica Kragic Tracking system.
Amir Hosein Omidvarnia Spring 2007 Principles of 3D Face Recognition.
Presenter/Author: Scott McCloskey Honeywell Labs, Minneapolis, MN, USA Confidence Weighting for Sensor Fingerprinting.
1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye.
Modelling, calibration and correction of nonlinear illumination-dependent fixed pattern noise in logarithmic CMOS image sensors Dileepan Joseph and Steve.
Exchanging Faces in Images SIGGRAPH ’04 Blanz V., Scherbaum K., Vetter T., Seidel HP. Speaker: Alvin Date: 21 July 2004.
Detecting Digital Image Forgeries Using Sensor Pattern Noise presented by: Lior Paz Jan Lukas, jessica Fridrich and Miroslav Goljan.
Image Denoising via Learned Dictionaries and Sparse Representations
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
Image Tampering Detection Using Bayesian Analytical Methods 04/11/2005 As presented by Jason Kneier ELEN E6886 Spring 2005.
Shadow Detection In Video Submitted by: Hisham Abu saleh.
Light and shading Source: A. Efros.
12/2/10 Detecting Fakes Computational Photography Derek Hoiem, University of Illinois Bernadette by Stephen MolyneauxStephen Molyneaux
Digital Watermarking Parag Agarwal
Digital Imaging Systems –I/O. Workflow of digital imaging Two Competing imaging format for motion pictures Film vs Digital Video( TV) Presentation of.
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
Overview of State-of-the-Art in Digital Image Forensics H. T. SENCAR and N. MEMON Ashwini Chapte 12/5/08 ECE-643 New Jersey Institute of Technology.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
How A Camera Works Image Sensor Shutter Mirror Lens.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Chapter Contents  Section B: Bitmap Graphics  Section C: Vector and 3-D Graphics Chapter 8: Digital.
Intelligent Vision Systems Image Geometry and Acquisition ENT 496 Ms. HEMA C.R. Lecture 2.
Computer Graphics & Image Processing Lecture 1 Introduction.
Why is computer vision difficult?
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
Digital Manipulation Amanda Franklin Frances Nicholson.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
COMP322/S2000/L171 Robot Vision System Major Phases in Robot Vision Systems: A. Data (image) acquisition –Illumination, i.e. lighting consideration –Lenses,
DIGITAL IMAGE. Basic Image Concepts An image is a spatial representation of an object An image can be thought of as a function with resulting values of.
CS 325 Introduction to Computer Graphics 03 / 29 / 2010 Instructor: Michael Eckmann.
Visual Computing Computer Vision 2 INFO410 & INFO350 S2 2015
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
Intelligent Vision Systems Image Geometry and Acquisition ENT 496 Ms. HEMA C.R. Lecture 2.
DIGITAL VIDEO AUTHENTICATION. Contents  What is Quantization ?  What is Double MPEG/JPEG Compression?  Video Compression/Decompression  What is JPEG/Frame.
Inside the Digital Camera. Digital Camera Cross Section The digital camera is a complex device The only part that is the same as film cameras is the lens.
Living in a Digital World. YOUR ASSIGNMENT: This power point is designed for you to navigate on your own. Go through each slide and, using the hyperlink.
Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
Edge Segmentation in Computer Images CSE350/ Sep 03.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DIGITAL IMAGE FORGERY Name: Reshma P.D Roll No:19.
Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification Irene Amerini, Roberto Caldelli, Vito.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
Reflection Correspondence for Exposing Photograph Manipulation
Reconstruction For Rendering distribution Effect
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Living in a Digital World
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
IMAGE FORGERY DETECTION
Color-Invariant Motion Detection under Fast Illumination Changes
Illumination Model How to compute color to represent a scene
Living in a Digital World
Detecting Digital Forgeries using Blind Noise Estimation
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Detect Digital Image Forgeries Ting-Wei Hsu

History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun ’ s body

History of photo manipulation 1917: “ Cottingley fairies

History of photo manipulation 1930s: Stalin had disgraced comrades airbrushed out of his pictures

History of photo manipulation 1936: same story with Mao

History of photo manipulation 1936: same story with Mao

History of photo manipulation Oprah Winfrey head on Ann-Margret

History of photo manipulation 1994: O.J. Simpson ’ s mug shot modified to appear more menacing

History of photo manipulation

April 2003: This digital composite of a British soldier in Basra, gesturing to Iraqi civilians urging them to seek cover,

History of photo manipulation

February 2004: Senator John Kerry and Jane Fonda sharing a stage at an anti- war rally emerged during the 2004 Presidential primaries as Senator Kerry was campaigning for the Democratic nomination.

History of photo manipulation

March 2004

History of photo manipulation February 2008:

History of photo manipulation August 2007

History of photo manipulation November 2007

Cue in Forgeries Detection Light Transport Difference Acquisition Difference Model Detect

Detect inconsistencies in Lighting If the photo was composited, it ’ s often difficult to match the lighting conditions from individual photographs.

Detect inconsistencies in Lighting

Color Model Assumption: –the surface of interest is Lambertian –the surface has a constant reflectance value –the surface is illuminated by a point light source infinitely far away

Image Intensity Model R : constant reflectance value N(x,y) : 3 vector representing the surface normal at (x,y) A : constant ambient light L : surface normal

Image Intensity Model

Results

Using in Forgeries Detection

Detect Duplicated Image Region A common manipulation in tampering with an image is to copy and paste portions of the image to conceal a person or object in the scene.

Forgeries Using Duplicated Image

Applying PCA on small fixed size image block. –Reduce dimension representation –This representation is robust to minor variations in the image due to additive noise or lossy compression Do lexicographic sorting

Results Take 10 seconds in 512*512 image using 3 GHz processor

Results

Detect by Tracking Re- sample Processing in making forgeries often necessary to resize or rotate. Assume resizing by linear or cubic interpolation method.

Resample Resample by factor of 4/3

Resample

Use EM algorithm to estimate

Resized Estimate

Rotated Estimate

Rotated and Resized Upsampled by 15% and rotated by 5% Rotated by 5% and upsampled by 15%

Forgery Detect

PATTERN NOISE & DETECTION OF ITS PRESENCE Detection of digitally manipulated images based on the sensor pattern noise. Detection whether image take from same camera or from another region.

Image Fetch Processing

PATTERN NOISE & DETECTION OF ITS PRESENCE Most digital camera with CCD or CMOS use color filter array (CFA)

PRNU Photo-response non-uniformity noise Dominate part of the pattern noise in nature images. PNU – pixel non-uniformity : different sensitivity of pixel to light Caused by stochastic inhomogenities present in silicon wafer

Noise Model x ij : signal from light η ij : random shot noise c ij : dark current ε ij : read-out noise

Learn PNU F : denoising filtering Training by more than 50 picture

Detect Random select n region with m masks Estimate

Forgery Detection Mask

Forgery Detection

Reference Luk?, J., J. Fridrich, et al. "Detecting digital image forgeries using sensor pattern noise." Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII 6072: 16?9. Lyu, S. and H. Farid (2005). "How realistic is photorealistic?" IEEE Transactions on Signal Processing 53(2 Part 2): Ng, T., S. Chang, et al. (2005). Physics-motivated features for distinguishing photographic images and computer graphics, ACM New York, NY, USA. Popescu, A. and H. Farid "Exposing digital forgeries by detecting duplicated image regions." Department of Computer Science, Dartmouth College. Popescu, A. and H. Farid (2005). "Exposing digital forgeries by detecting traces of resampling." IEEE Transactions on Signal Processing 53(2 Part 2): Popescu, A. and H. Farid (2005). "Exposing digital forgeries in color filter array interpolated images." IEEE Transactions on Signal Processing 53(10 Part 2):

Reference esearch/digitaltampering/ esearch/digitaltampering/ ommissar_vanishes/vanishes.htmhttp:// ommissar_vanishes/vanishes.htm earch/fall08/ earch/fall08/