1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye.

Slides:



Advertisements
Similar presentations
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
Advertisements

1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Camera Model Identification Based on the Characteristics of CFA and Interpolation Shang Gao 1, Guanshuo Xu 2, Rui-Min Hu 1,*
Ales Zita. Publication Digital Image Forgery Detection Based on Lens and Sensor Aberration Authors : Ido Yerushalmy, Hagit Hel-Or Dept. of Computer Science,
CS 551 / CS 645 Antialiasing. What is a pixel? A pixel is not… –A box –A disk –A teeny tiny little light A pixel is a point –It has no dimension –It occupies.
Digital Image Forensics
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
Lecture 4 Linear Filters and Convolution
Active Calibration of Cameras: Theory and Implementation Anup Basu Sung Huh CPSC 643 Individual Presentation II March 4 th,
Boundary matting for view synthesis Samuel W. Hasinoff Sing Bing Kang Richard Szeliski Computer Vision and Image Understanding 103 (2006) 22–32.
Detecting Digital Image Forgeries Using Sensor Pattern Noise presented by: Lior Paz Jan Lukas, jessica Fridrich and Miroslav Goljan.
Image processing. Image operations Operations on an image –Linear filtering –Non-linear filtering –Transformations –Noise removal –Segmentation.
Digital Cameras CCD (Monochrome) RGB Color Filter Array.
Technion - Israel Institute of Technology 1 Interpolation Method using Statistical Models RONEN SHER Supervisor: MOSHE PORAT.
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
Face Recognition Based on 3D Shape Estimation
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Imaging Techniques in Digital Cameras Presented by Jinyun Ren Jan
02/14/02(c) University of Wisconsin 2002, CS 559 Last Time Filtering Image size reduction –Take the pixel you need in the output –Map it to the input –Place.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
EI San Jose, CA Slide No. 1 Nearest-neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image* Ariawan Suwendi.
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Image Formation. Input - Digital Images Intensity Images – encoding of light intensity Range Images – encoding of shape and distance They are both a 2-D.
By Meidika Wardana Kristi, NRP  Digital cameras used to take picture of an object requires three sensors to store the red, blue and green color.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Frequency-domain Bayer demosaicking
How A Camera Works Image Sensor Shutter Mirror Lens.
Simple Image Processing Speaker : Lin Hsiu-Ting Date : 2005 / 04 / 27.
Image Resampling CS4670: Computer Vision Noah Snavely.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Sensing for Robotics & Control – Remote Sensors R. R. Lindeke, Ph.D.
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
Digital Image Processing Lecture 10: Image Restoration March 28, 2005 Prof. Charlene Tsai.
MACHINE LEARNING 8. Clustering. Motivation Based on E ALPAYDIN 2004 Introduction to Machine Learning © The MIT Press (V1.1) 2  Classification problem:
Computer Graphics and Image Processing (CIS-601).
Digital Image Processing Lecture 10: Image Restoration
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
Visual Computing Computer Vision 2 INFO410 & INFO350 S2 2015
3.7 Adaptive filtering Joonas Vanninen Antonio Palomino Alarcos.
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
Demosaicking for Multispectral Filter Array (MSFA)
October 1, 2013Computer Vision Lecture 9: From Edges to Contours 1 Canny Edge Detector However, usually there will still be noise in the array E[i, j],
DIGITAL VIDEO AUTHENTICATION. Contents  What is Quantization ?  What is Double MPEG/JPEG Compression?  Video Compression/Decompression  What is JPEG/Frame.
 Forensics of image re-sampling (such as image resizing) is an important issue,which can be used for tampering detection, steganography, etc.  Most of.
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
An Introduction to Digital Image Processing Dr.Amnach Khawne Department of Computer Engineering, KMITL.
Shadow Detection in Remotely Sensed Images Based on Self-Adaptive Feature Selection Jiahang Liu, Tao Fang, and Deren Li IEEE TRANSACTIONS ON GEOSCIENCE.
RECONSTRUCTION OF MULTI- SPECTRAL IMAGES USING MAP Gaurav.
Bayer Color Filter Array Demosaicing
CSE 185 Introduction to Computer Vision
Masaki Hayashi 2015, Autumn Visualization with 3D CG Digital 2D Image Basic.
IMAGE PROCESSING is the use of computer algorithms to perform image process on digital images   It is used for filtering the image and editing the digital.
Digital Image Processing Lecture 10: Image Restoration
Digital 2D Image Basic Masaki Hayashi
Robustness Evaluation of Perceptual Watermarks
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
IMAGE FORGERY DETECTION
How to Digitize the Natural Color
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
Lecture 16. Classification (II): Practical Considerations
Demosaicking Problem in Digital Cameras
Detecting Digital Forgeries using Blind Noise Estimation
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye

2 References  Alin C.Popescu and Hany Farid: Exposing Digital Forgeries in Color Filter Array Interpolated Images.  Yizhen Huang: Can Digital Forgery Detection Unevadable? A Case Study : Color Filter Array Interpolation Statistical Feature Recovery.  Hagit El Or Demosaicing.

3 Outline  Introduction  Digital Cameras  Interpolations  Detecting CFA Interpolation  Results  Crack Methods  Computer Graphics

4 Introduction- forgeries  Low cost: cameras,photo editing software.  Images can be manipulated easily.  Splicing.

5 Introduction- forgeries  Images have a huge impact in public opinion.  Legal world.  Scientific evidence.

6 Introduction - preventing forgeries approaches  Two principal approaches to prevent forgeries: Digital watermarking:  Means that image can be authenticated.  Drawbacks:  Specially equipped digital cameras,that insert the watermark.  Assume that watermark cannot be easily removed and reinserted. (but ….it is???) Statistic analysis:  Most color digital cameras, introduces specific correlation:  A third of the image are captured by a sensor.  Two thirds of the image are interpolated.  Images manipulated must alter this specific statistic.

7 Outline  Introduction  Digital Cameras  Interpolations  Detecting CFA Interpolation  Results  Crack Methods  Computer Graphics

8 Digital Cameras  Most Color digital Cameras have a single monochrome Array of sensors

9 Digital Cameras  How does color form with monochrome sensor for each pixel?

10 Digital Cameras-Bayer Color Array  Half pixels are Green,quarter are Red and quarter are Blue

11 Digital Cameras-Bayer Color Array  Several possible arranges Bayer Diagonal Bayer DiagonalStriped Psudo-random Bayer

12 Digital cameras - forming color

13 Digital cameras - forming color

14 Digital cameras - forming color Interpolation

15 Digital cameras - forming color  Bayer Array For almost all Digital Cameras  Color Interpolation different for each make of Digital Camera Interpolation

16 Outline  Introduction  Digital Cameras  Interpolations  Detecting CFA Interpolation  Results  Crack Methods  Computer Graphics

17 Interpolations  Naive – per channel interpolation Nearest neighbor,Bilinear interpolation  Inter-channel dependencies and correlations – Reconstruct G channel, then reconstruct R & B based on G. Reconstruct all 3 channels constrained with inter-channel dependence.  Adaptive reconstruction – Measure local image variations (e.g. edges, gradients, business) and reconstruct accordingly.

18 Interpolations - Aliasing R R G G G G G G G G G G G G G G G B B B R R R R R R R R R R R R R R R R R R R R R G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G B B B B B B B B B B B B B B B B B B B B B Interpolate

19 Interpolations - Aliasing R R G G G G G G G G G G G G G G G B B B R R R R R R R R R R R R R R R R R R R R R G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G B B B B B B B B B B B B B B B B B B B B B Interpolate Result

20 Interpolations - Samples

21 Interpolation-Bilinear Bicubic  Red and Blue Kernels: Separable 1-D filters Rw Rw = ½(Rnw+Rsw)

22 Interpolation-Bilinear Bicubic  Green kernels 2-D filters:

23 Interpolation- Gradient Based  First, calculate Green channel: Calculate derivates estimators Determination of Green’s values

24 Interpolation – Evaluation Tools

25 Interpolation -Results OriginalLinearKimmel

26 Outline  Introduction  Digital Cameras  Interpolations  Detecting CFA Interpolation  Results  Cracks Methods  Computers Graphics

27 Detecting CFA Interpolation  In Each pixel only one color derives from the sensor,two others derive from interpolation from their neighbors.  The correlation are periodic.  Tampering will destroy these correlations.  Splicing together two images from different cameras will create inconsistent correlations across the composite image.

28 Detecting CFA Interpolation  Two different tools: EM algorithm : EM algorithm  Produce Map of Probabilities and interpolation coefficients  Used to detect kind of interpolation Farid’s Indicator: Farid’s Indicator  Produce Map of Similarities  Used to quantify the similarity to CFA Interpolated Image

29 EM Algorithm (Expectation/Maximization):  Two possible models: M1:the sample is linearly correlated to its neighbors M2:the sample is not correlated to its neighbors

30 EM Algorithm (Expectation/Maximization):  f(x,y) – color channel  alpha - parameters,where(0,0) = 0. denotes the specific correlation.  n - independent and identically samples drawn from a Gaussian distribution, with 0 mean and unknown variance

31 EM Algorithm (Expectation/Maximization):  Two-step iterative algorithm: E-step : calculate the probability of each sample M-step: the specific form of the correlation is estimated.  Based in Bayes rule:

32 Farid’s indicator  The similarity between the probability and a synthetic map is obtained by:  Where:  Similarity measure is phase insensitive

33 Farid’s indicator  How to use it: CFA-Interpolated : if at least one channel is greater than threshold1 Non CFA Interpolated: if all 3 channels are smaller than threshold2 Ind(cfa-isf) Ind(cfa-sf) CFA InterpolatedNon CFA InterpolatedUnknown threshold2threshold1 result

34 Huang indicator  Motivation: Farid’s Indicator is proportional to image size.  Table of Green Channel Indicator  Huang Indicator: Indicator function 32x32128x128256x256512x512 Farid Huang

35 Outline  Introduction  Digital Cameras  Interpolations  Detecting CFA Interpolation  Results  Cracks Methods  Computers Graphics

36 Results  Detecting different interpolation methods  Detecting tampering  Measuring Sensitivity and robustness

37 Detecting different interpolation methods  Hundreds of images from 2 digital cameras  Blur 3x3  Down sampled  Cropped  Resample in CFA Interpolations

38 Detecting different interpolation methods

39 Detecting different interpolation methods

40 Detecting different interpolation methods

41 Detecting different interpolation methods

42 Detecting different interpolation methods  Coefficients are 8 to each color so we are a 24-D vector,LDA classifier,results: 97% Interpolations kinds was detected  2D projection of LDA

43 Detecting tampering  Hiding the damage of the car Air-brushing,smudging,blurring and duplication

44 Detecting tampering  Result: Left F(p) : for tampered portion Right F(p) : for unadulterated portion

45 Measuring Sensitivity and robustness remember False0%Median 5x5 97 Bilinear100%Gradient based 100% Bicubic100%Adaptive color plane 97% Median 3x3 99 Variable number of gradients 100%  Testing different interpolations with Farid’s indicator

46 Measuring Sensitivity and robustness  Testing influence of jpeg

47 Measuring Sensitivity and robustness  Testing influence of Gaussian Noise

48 Outline  Introduction  Digital Cameras  Interpolations  Detecting CFA Interpolation  Results  Crack Methods  Computer Graphics

49 Cracking  What’s a “true digital image”  General Model

50 True digital image  It was taken by a CCD/CMOS digital camera, or other device with similar function and remains intact after shooting except for embedding ownership and other routinely added information.

51 General Model  where: W all images S all possible images tacked by an ideal camera c. N are S enlarged because of noise.  Detection method: Pm(I), a projection of Image I I is true when: I is Artificially CFA-interpolated

52 General Model  The result image should be as close as possible to the original  The mean of the difference to an ideally CFA interpolated image should be controlled in a specific range.  Such difference should be distributed averagely.

53 General Model  Im: Tampered Image  Im’: cracked Image  Int(I) : Ideal Interpolated Dif(Im,Im’) Dif(Im’,Int(Im’)) K2 K1 Dif(Im,Im’,Int(Im’))

54 General Model  We are looking for  We want to minimize the 3d distance:

55 Outline  Introduction  Digital Cameras  Interpolations  Detecting CFA Interpolation  Results  Crack Methods  Computer Graphics

56 Computer Graphic  A naïve approach: Computer Graphic will be detected like non CFA-Interpolated.

57 Computer Graphics  Huge improvement of dedicated hardware in the last 7 years  SGI:Onyx2,Infinity reality 3(2000) : 12 bits * 4 channels No shaders End User license,250,000$  Pc d/core, geforce 8(2006): 32 bits * 4 channels Shaders w/24 parallels pipes 1,500-5,000$

58 Computer Graphics  2001,Final fantasy,first Film made with PC.

59 Computer Graphics  See cg not like an Image, see it like REALITY. Render Reality high resolution,by 32bits for each color Optical distortions, ghost and blurring Sensor CFA sampling and noise Interpolation Image

60 Computer Graphics From Image Forgeries to Science Fiction  Image forgeries are a “positive issue“ for development of: Simulators. Trainers. Robots………

61 Computer Graphics From Image Forgeries to Science Fiction

62 Conclusion  Detection CFA-Interpolated methods are not enough robust.  Compression like jpeg destroy the interpolation correlation.  Interpolation can be artificially made. The End