Ales Zita. Publication Digital Image Forgery Detection Based on Lens and Sensor Aberration Authors : Ido Yerushalmy, Hagit Hel-Or Dept. of Computer Science,

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Color Imaging Analysis of Spatio-chromatic Decorrelation for Colour Image Reconstruction Mark S. Drew and Steven Bergner
PANKAJ MALVIYA RUCHIRA NASKAR
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Identification of Tamper Detection Techniques for Digital Video Forensics By Susinda Perera Department of Computer Science and Engineering, University.
Camera Model Identification Based on the Characteristics of CFA and Interpolation Shang Gao 1, Guanshuo Xu 2, Rui-Min Hu 1,*
Seminar: Image Tampering MC919 - Prof. Anderson Rocha Arthur Espíndola Ribeiro Vinicius Dias de Oliveira Gardelli /11/2014.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Digital Image Forensics
CM613 Multimedia storage and retrieval Lecture: Video Compression Slide 1 CM613 Multimedia storage and retrieval Content-based image retrieval D.Miller.
Color spaces CIE - RGB space. HSV - space. CIE - XYZ space.
1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye.
Chapter 8. Basic Image Process The visual information can be recorded by a TV camera or a 2D array of CCD sensors. A digital image is formed.
Applications of Image Processing. Outline What YOU are going to learn Image Processing in use.
Content-based Image Retrieval CE 264 Xiaoguang Feng March 14, 2002 Based on: J. Huang. Color-Spatial Image Indexing and Applications. Ph.D thesis, Cornell.
Imaging Science FundamentalsChester F. Carlson Center for Imaging Science Classical Photography and Geometric Optics Imaging Science Fundamentals.
Digital Cameras CCD (Monochrome) RGB Color Filter Array.
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
1 Image Processing(IP) 1. Introduction 2. Digital Image Fundamentals 3. Image Enhancement in the spatial Domain 4. Image Enhancement in the Frequency Domain.
CPSC 643 Robot Vision Introduction to Computer Vision Dezhen Song,
Imaging Science FundamentalsChester F. Carlson Center for Imaging Science Mirrors and Lenses.
A Fast and Robust Fingertips Tracking Algorithm for Vision-Based Multi-touch Interaction Qunqun Xie, Guoyuan Liang, Cheng Tang, and Xinyu Wu th.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Multimedia Databases (MMDB)
How A Camera Works Image Sensor Shutter Mirror Lens.
1 © 2010 Cengage Learning Engineering. All Rights Reserved. 1 Introduction to Digital Image Processing with MATLAB ® Asia Edition McAndrew ‧ Wang ‧ Tseng.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Vehicle License Plate Detection Algorithm Based on Statistical Characteristics in HSI Color Model Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh.
1 Computer Vision 一目 了然 一目 了然 一看 便知 一看 便知 眼睛 頭腦 眼睛 頭腦 Computer = Image + Artificial Vision Processing Intelligence Vision Processing Intelligence.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Sensing for Robotics & Control – Remote Sensors R. R. Lindeke, Ph.D.
Summary Marie Yarbrough. Introduction History of Image Forgery Method Segmentation Classification Common-Sense Reasoning Conclusion.
Computational Photography
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
1. What is depth of field? 2. Everything else equal, what effect will each of the following have on depth of field (larger, smaller?): -Larger aperture.
CSE 185 Introduction to Computer Vision Cameras. Camera models –Pinhole Perspective Projection –Affine Projection –Spherical Perspective Projection Camera.
Cameras. Question: If you’re building a camera and want to make a larger image (a telephoto lens) you should: 1.increase the diameter of the lens 2.decrease.
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
3.30. Image location by ray tracing Consider a real object that is placed in front of a convex lens. The location of the image can be found by considering.
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Histogram Equalization- Based Color Image.
Digital Imaging. Introduction Digital Imaging is used every day in life. Has become less expensive and easier to use than film.
Digital Images and Digital Cameras take notes in your journal.
DIGITAL VIDEO AUTHENTICATION. Contents  What is Quantization ?  What is Double MPEG/JPEG Compression?  Video Compression/Decompression  What is JPEG/Frame.
Face Detection Final Presentation Mark Lee Nic Phillips Paul Sowden Andy Tait 9 th May 2006.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
19.3 Optical Instruments
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
WLD: A Robust Local Image Descriptor Jie Chen, Shiguang Shan, Chu He, Guoying Zhao, Matti Pietikäinen, Xilin Chen, Wen Gao 报告人:蒲薇榄.
Visual Information Processing. Human Perception V.S. Machine Perception  Human perception: pictorial information improvement for human interpretation.
Introduction to Skin and Face Detection
Reflection Correspondence for Exposing Photograph Manipulation
DIGITAL SIGNAL PROCESSING
Terahertz sensors, machine learning, and concealed weapon detection
DONE BY S.MURALIRAJAN M.NIRMAL
Spatiochromatic Vision Models for Imaging
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Content-based Image Retrieval
IMAGE FORGERY DETECTION
Elements of design Elements are the building blocks of any design.
How to Digitize the Natural Color
A Multicolor FISH Assay Does Not Detect DUP25 in Control Individuals or in Reported Positive Control Cells  Yanina Weiland, Jürgen Kraus, Michael R. Speicher 
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Ales Zita

Publication Digital Image Forgery Detection Based on Lens and Sensor Aberration Authors : Ido Yerushalmy, Hagit Hel-Or Dept. of Computer Science, University of Haifa, Israel Published in International Journal of Computer Vision DOI /s Springer Science + Business Media LLC 2010

Introduction Digital image age Methods of forgery detection Intelligent Reasoning Additional Data Embedding Statistical Detection Without Additional Data

Intelligent reasoning

Methods Intelligent reasoning Semantics, geometry, scene lighting, etc.. Additional data embedding Watermarking Statistics based methods Training sets, classification techniques (SVM) Detection Without Additional Data Brute force, JPEG based, CFA based, Chromatic Aberration based

Detection w/o additional data Brute force – detecting duplicates in the feature space (Fridrich at al. 2003) Colour interpolation algorithm scheme discrepancies (Wolfgang and Delp 1996) Repetitive spatial pattern in JPEG compressed images (Wang and Farid 2006) Lens Chromatic Aberration based (Johnson and Farid 2006)

Lens Chromatic Aberrations Variety of aberration of optical systems Chromatic Aberration – Snell’s law of refraction Spatial Blur Geometric Distortion Lens Chromatic Aberrations Axial Chromatic Aberration Lateral Chromatic Aberration (LCA) Achromatic Doublet Purple Fringing Aberration (PFA)

Johnson and Farid 2006 LCA based Expansion and contraction of blue & red vs. green channel Brute force algorithm – centre and magnitude Non overlapping image regions evaluation Mark the discrepancies

PFA Blue-purple halo on the distal and proximal side of bright and dark object edges respectively. Sometimes tiny yellow tint on the opposite side. More acute with high contrast change Strength increases with is distance from the image centre

PFA sources Causes: Adjacent photodiode cell electron overflow (Ochi et al. 1997) Sensor infrared filter coating not stopping all the IR (Rudolf 1992) Sensor cell microlenses cause ray refraction to neighboring cells (Daly 2001)

PFA Examples

Algorithm Identify PFA edges Determine PFA direction for each event Assign reliability measure to each event Determine the image center Reevaluate directions to detect the inconsistent regions

References Daly, D. (2001). Microlenses arrays. Boca Raton CRC press. Fridrich, J., Soukal, D., & Lukas, J. (2003). Detection of copy-move forgery in digital images. In Proc. Digital forensic research workshop, Cleveland, OH. Johnson, M. K. & Farid, H. (2006) Exposing digital forgeries through chromatic aberration. On Proc. ACM multimedia and security workshop, Geneva, Switzerland. Ochi, S., Lizuka, T., Sato, Y., Hamasaki, M., Abe, H., Narabu, T., Kato, K., & Kagawa, Y. (1997). Charge-coupled device technology. Boca Raton : CRC press. Rudolf, K. (1992). Optics in photography. Bellingham: SIPE. Yerushalmy&Hel-Or (2010) Digital Image Forgery Detection Based on Lens and Sensor Aberration, International Journal of Computer Vision Wang, W., & Farid, H. (2006). Exposing digital forgeries in video by detecting double MPEG compression. In Proc. ACM multimedia and security workshop, Geneva, Switzerland. Wolfgang, R. B., & Delp, E. J., (1996). A watermark for digital images. In Proc. IEEE intl conference on image processing. Wikipedia.org (

Thank you Q ?