12/2/10 Detecting Fakes Computational Photography Derek Hoiem, University of Illinois Bernadette by Stephen MolyneauxStephen Molyneaux

Slides:



Advertisements
Similar presentations
JPEG Compresses real images Standard set by the Joint Photographic Experts Group in 1991.
Advertisements

PANKAJ MALVIYA RUCHIRA NASKAR
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Raster Graphics vs. Vector Graphics
Forensic Imaging The History of Image Forgery Image Splicing Yaniv Lefel Hagay Pollak.
11/11/14 Detecting Fakes Computational Photography Derek Hoiem, University of Illinois Bernadette by Stephen MolyneauxStephen Molyneaux
Digital Image Forensics
Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer.
Face Recognition with Harr Transforms and SVMs EE645 Final Project May 11, 2005 J Stautzenberger.
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
Image Tampering Detection Using Bayesian Analytical Methods 04/11/2005 As presented by Jason Kneier ELEN E6886 Spring 2005.
Graphics and Still Images John H. Krantz Hanover College.
CS 223B Assignment 1 Help Session Dan Maynes-Aminzade.
1 How Realistic is Photorealistic?. 2 Yaniv Lefel Hagay Pollak Based on the work of - Siwei Lyu and Hany Farid.
Tips for Photography Assignment FYS100 Creative Discovery in Digital Art Forms Spring 2007 Burg.
Identifying Computer Graphics Using HSV Model And Statistical Moments Of Characteristic Functions Xiao Cai, Yuewen Wang.
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
By Meidika Wardana Kristi, NRP  Digital cameras used to take picture of an object requires three sensors to store the red, blue and green color.
11/10/11 Detecting Fakes Computational Photography Derek Hoiem, University of Illinois Bernadette by Stephen MolyneauxStephen Molyneaux
The Program Works Ethics and Responsibility. Photo ethics.
Graphics and Animation Multimedia Projects Part 2.
Templates, Image Pyramids, and Filter Banks
Digital Fakery Media Studies 120 Ms. White. Digital Truth  It is true that The National Geographic moved two of the Egyptian pyramids closer together.
Templates and Image Pyramids Computational Photography Derek Hoiem, University of Illinois 09/03/15.
1 COMS 161 Introduction to Computing Title: Digital Images Date: November 12, 2004 Lecture Number: 32.
1984 Pre-Reading IS HISTORY STABLE?. JOURNAL Does the history that we read, watch, and study reflect the reality? Who writes history text books? Can history.
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
MULTIMEDIA By: Matt Mueller. BITMAP GRAPHICS Also called raster graphics. Also called raster graphics. Composed of pixels. Composed of pixels. The graphics.
Digital Manipulation Amanda Franklin Frances Nicholson.
12/7/10 Looking Back, Moving Forward Computational Photography Derek Hoiem, University of Illinois Photo Credit Lee Cullivan.
Digital Media Lecture 4: Bitmapped images: Compression & Convolution Georgia Gwinnett College School of Science and Technology Dr. Jim Rowan.
Histograms and Color Balancing Computational Photography Derek Hoiem, University of Illinois 09/10/15 “Empire of Light”, Magritte.
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
Autonomous Robots Vision © Manfred Huber 2014.
Histograms and Color Balancing Computational Photography Derek Hoiem, University of Illinois 09/13/11 “Empire of Light”, Magritte.
Human Activity Recognition at Mid and Near Range Ram Nevatia University of Southern California Based on work of several collaborators: F. Lv, P. Natarajan,
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
 Forensics of image re-sampling (such as image resizing) is an important issue,which can be used for tampering detection, steganography, etc.  Most of.
Living in a Digital World. YOUR ASSIGNMENT: This power point is designed for you to navigate on your own. Go through each slide and, using the hyperlink.
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
Introduction to JPEG m Akram Ben Ahmed
1 Detecting Hidden Messages using higher-order stats and SVMs Siwei Lyu and Hany Farid.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DIGITAL IMAGE FORGERY Name: Reshma P.D Roll No:19.
Airbrushed History. This iconic portrait of U.S President Abraham Lincoln is actually a composite of Lincoln’s head and the Southern politician John Calhoun’s.
Photography Past and Present. Who got pictures taken in the past? Famous people like presidents and actresses. Wealthy people who could afford to have.
Content Based Coding of Face Images
EE368 Final Project Spring 2003
Power of the Image. Power of the Image Lebanon bombed by Israel (Reuters) Fake or Real?
Beginning Concepts for taking great pictures!
Michael Gormish Prepared by:Emin Sinan Mimaroglu
Accuracy in Photojournalism
Reflection Correspondence for Exposing Photograph Manipulation
Digital 2D Image Basic Masaki Hayashi
Detecting Fakes Computational Photography
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Living in a Digital World
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
IMAGE FORGERY DETECTION
Living in a Digital World
COMS 161 Introduction to Computing
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
Detecting Digital Forgeries using Blind Noise Estimation
Histograms and Color Balancing
Presentation transcript:

12/2/10 Detecting Fakes Computational Photography Derek Hoiem, University of Illinois Bernadette by Stephen MolyneauxStephen Molyneaux 046/

Final two days Today – Detecting fakes – Jia-bin: creative photography Next Tues (last day!!) – Project 5 favorites (Jia-bin, Adair, Wei/Alex) – Anti-summary: summary of stuff I didn’t cover – ICES evals (important!)

Detecting Fakes 1.Detecting photorealistic graphics 2.Detecting manipulated images

CG vs. Real: Can you do it? I got 3 out of 12 right – Chance = 6 out of 12

CG vs. Real -- Why It Matters: Crime 1996 Child Pornography Prevent Act made certain types of “virtual porn” illegal Supreme court over-ruled in 2002 To prosecute, state needs to prove that child porn is not computer-generated images Real Photo CG

Automatically Detecting CG Basic Idea – Decompose the image into wavelet coefficients and compute statistics of these coefficients Lyu and Farid 2005: “How Realistic is Photorealistic?”

2D Wavelets Kind of like the Laplacian pyramid, except broken down into horizontal, vertical, and diagonal frequency Laplacian Pyramid Wavelet Pyramid

2d Wavelets Matlab: wavemenu

Automatically Detecting CG Basic Idea – Decompose the image into wavelet coefficients and compute statistics of these coefficients – Train a classifier to distinguish between CG and Real based on these features Train RBF SVM with 32,000 real images and 4,800 fake images Real images from Fake images from and Lyu and Farid 2005: “How Realistic is Photorealistic?”

Results 98.8% test accuracy on real images 66.8% test accuracy on fake images 10/14 on fakeorfoto.com Lyu and Farid 2005: “How Realistic is Photorealistic?”

Results Fake-or-photo.com: Correct Lyu and Farid 2005: “How Realistic is Photorealistic?” Photos CG

Results Fake-or-photo.com: Wrong Lyu and Farid 2005: “How Realistic is Photorealistic?” Photos misclassified as CG CG misclassified as photos

Results Easily classified fake (photo-realistic) images Lyu and Farid 2005: “How Realistic is Photorealistic?”

Results Photorealistic (fake) images thought to be real Lyu and Farid 2005: “How Realistic is Photorealistic?”

Results Easily classified real photographs Lyu and Farid 2005: “How Realistic is Photorealistic?”

Results Real photos incorrectly thought to be fake Lyu and Farid 2005: “How Realistic is Photorealistic?”

Detecting Forgery: Can You Do It? I got 6/10 – Chance = 5/10

Detecting Forgery -- Why It Matters: Trust Iconic Portrait of Lincoln (1860) Examples collected by Hany Farid:

General Grant in front of Troops (1864)

Mussolini in a Heroic Pose (1942)

1950: Doctored photo of Senator Tydings talking with Browder, the leader of the communist party, contributed to Tydings’ electoral defeat

Pulitzer Prize winning photograph of Kent State killing (1970)

Gang of Four are removed (1976)

Photo from terrorist attack in 1997

1989 composite of Oprah and Ann-Margret (without either’s permission)

2003: Long-time staff photographer for LA Times was fired for this one Published photo

Kerry at Rally for Peace 1971Fonda at rally in 1972 Caption: “Actress and Anti-war activist Jane Fonda speaks to a crowd of Vietnam veterans, as activist and former Vietnam vet John Kerry listens and prepares to speak next concerning the war in Vietnam.” (AP Photo)

2005: Pres Bush scribbles a note to C. Rice during UN Security Council Meeting

2005: USA Today SNAFU

2006: “Women you will never see in Maxim” – movie star Khushboo’s head on a model’s body; Maxim got sued.

2006: Photo by Adnan Hajj of strikes on Lebanon (original on right) Later, all of Hajj’s photos were removed from AP and a photo editor was fired.

2007 Retouching is “completely in line with industry standards”

2007: Zhou Zhenglong claimed to take 71 photos of the nearly extinct South China tiger Claimed PhotoPoster Overlay

2008 Ad against Myers. Myers says he’s never met Bush.

2008

2009: Digital diversity

“Evidence” that Malaysian politician Jeffrey Wong Su En was knighted by the Queen (2010)

Detecting forgeries Work by Hany Farid and colleagues Method 1: 2D light from occluding contours

Estimating lighting direction Method 1: 2D direction from occluding contour Provide at least 3 points on occluding contour (surface has 0 angle in Z direction) Estimate light direction from brightness Estimate Ground Truth

Estimating lighting direction

Average error: 4.8 degrees

Method 2: Light from Eyes Farid – “Seeing is not believing”, IEEE Spectrum 2009

Estimating Lighting from Eyes

Method 2: Light from Eyes

Method 3: Complex light with spherical harmonics Spherical harmonics parameterize complex lighting environment Same method as occluding contours, but need 9 points

Method 3: Complex light with spherical harmonics

Method 4: Demosaicking Prediction In demosaicking, RGB values are filled in based on surrounding measured values Filled in values will be correlated in a particular way for each camera Local tampering will destroy these correlations Farid: “Photo Fakery and Forensics” 2009

Demosaicking prediction Upside: can detect many kinds of forgery Downside: need original resolution, uncompressed image

Method 5: JPEG Ghosts JPEG compresses 8x8 blocks by quantizing DCT coefficients to some level – E.g., coefficient value is 23, quantization = 7, quantized value = 3, error = 23-21=2 Resaving a JPEG at the same quantization will not cause error, but resaving at a lower or higher quantization generally will – Value = 21; quantization = 13; error = 5 – Value = 21; quantization = 4; error = 1 Farid: “Photo Fakery and Forensics” 2009

JPEG Ghosts Original has square cut out and compressed to quality 65, then reinserted Pixel error for image saved at various JPEG qualities

JPEG Ghosts If there is enough difference between the quality of the pasted region and the final saved quality, the pasted region can be detected with high accuracy

JPEG Ghosts Pixel error for manipulated image saved at various JPEG qualities original manipulated

JPEG Ghosts Pixel error for manipulated image saved at various JPEG qualities original manipulated

Summary Digital forgeries are an increasingly major problem as it becomes easier to fake images A variety of automatic and semi-automatic methods are available for detection of well- done forgeries – Checking lighting consistency – Checking demosaicking consistency (for high quality images) – Checking JPEG compression level consistency (for low quality images)