Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep. 2006.

Slides:



Advertisements
Similar presentations
Image Effects 2.01 Investigate graphic image design.
Advertisements

CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 4 – Digital Image Representation Klara Nahrstedt Spring 2009.
PANKAJ MALVIYA RUCHIRA NASKAR
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
Course Objectives… In this course, you will learn how to:  Capture pictures from many sources  Enhance your pictures with graphics software (Photoshop.
This is the Adobe Photoshop tool bar.
Sheng-Wen Peng  Introduction  WATERMARKING FOR IMAGE AUTHENTICATION  COPY-COVER IMAGE FORGERY DETECTION  PCA Domain Method  EXPERIMENTAL.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Image processing (spatial &frequency domain) Image processing (spatial &frequency domain) College of Science Computer Science Department
Do Now: Do Not Log In. Take out your notebook and a pen. Good Morning Do Now: Do Not Log In. Take out your notebook and a pen. Good Morning Aim: In Photoshop,
Do Now: Do Not Log In. Take out your notebook and a pen. Good Morning Do Now: Do Not Log In. Take out your notebook and a pen. Good Morning Aim: What tools.
Ales Zita. Publication Digital Image Forgery Detection Based on Lens and Sensor Aberration Authors : Ido Yerushalmy, Hagit Hel-Or Dept. of Computer Science,
Digital Image Forensics
3. Introduction to Digital Image Analysis
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Tampering Detection Using Bayesian Analytical Methods 04/11/2005 As presented by Jason Kneier ELEN E6886 Spring 2005.
Introduction to Computer Vision CS / ECE 181B Thursday, April 22, 2004  Edge detection (HO #5)  HW#3 due, next week  No office hours today.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Chapter 3 Image Enhancement in the Spatial Domain.
CSC/FAR 020, Computer Graphics, October 23, 2013 Dr. Dale E. Parson Week 7 More filters, compositional effects.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Multimedia Databases (MMDB)
Media Arts – Review Day 2 Photoshop Tools and Functions.
Statistical Tools for Digital Forensics Multimedia Security.
Presented By Nicole Stegall. Photoshop Uses Enhance and retouch digital photos Create Paintings Add Special Effects to Film Stills Create Web-Ready Graphics.
Summary Marie Yarbrough. Introduction History of Image Forgery Method Segmentation Classification Common-Sense Reasoning Conclusion.
J. Shanbehzadeh M. Hosseinajad Khwarizmi University of Tehran.
How to detect non-obvious changes Some of the following slides will illustrate how Photoshop can be used to help our eyes visualize alterations to images,
Do Now: Take out your notebook and a pen. List the 3 Tools that can help you retouch photographs. Good Morning Do Now: Take out your notebook and a pen.
Show images on digital camera, select one and click open with… Photoshop. Camera Photos:
Scene Completion Using Millions of Photographs James Hays, Alexei A. Efros Carnegie Mellon University ACM SIGGRAPH 2007.
8-1 Chapter 8: Image Restoration Image enhancement: Overlook degradation processes, deal with images intuitively Image restoration: Known degradation processes;
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
COMP322/S2000/L171 Robot Vision System Major Phases in Robot Vision Systems: A. Data (image) acquisition –Illumination, i.e. lighting consideration –Lenses,
11/29/ Image Processing. 11/29/ Systems and Software Image file formats Image processing applications.
Implementation, Comparison and Literature Review of Spatio-temporal and Compressed domains Object detection. By Gokul Krishna Srinivasan Submitted to Dr.
Do Now: Take out your notebook and a pen. Log in. Open Photoshop. Do Now: Take out your notebook and a pen. Log in. Open Photoshop. Aim: What Photoshop.
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
Cryptographic Anonymity Project Alan Le
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
DIGITAL IMAGE PROCESSING
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Edge Segmentation in Computer Images CSE350/ Sep 03.
S KIN This will be our first tutorial on the subject of re-touching a photograph in photoshop. We will be working on a photo of a model and using a few.
Digital Image Processing Week V Thurdsak LEAUHATONG.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DIGITAL IMAGE FORGERY Name: Reshma P.D Roll No:19.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
Digital Image Processing Lecture 10: Image Restoration II Naveed Ejaz.
The Frequency Domain Digital Image Processing – Chapter 8.
Photoshop: Painting and Retouching Computer Information Technology Section 60.
Do Now: Take out your notebook and a pen. How can the Clone Stamp tool help you retouch a photo? Good Morning Do Now: Take out your notebook and a pen.
REDEFINING CONFINES OF PHOTO-EDITING OF DENTAL RECORDS
Digital Image Processing
Photoshop: Painting and Retouching
Exposing Digital Forgeries Through Chromatic Aberration Micah K
IMAGE FORGERY DETECTION
2.01 Investigate graphic image design.
9th Lecture - Image Filters
Digital Media Objective
Ceng466 Fundamentals of Image Processing
2.01 Investigate graphic image design.
2.01 Investigate graphic image design.
2.01 Investigate graphic image design.
2.01 Investigate graphic image design.
CSC/FAR 020, Computer Graphics, October 15, 2014
Detecting Digital Forgeries using Blind Noise Estimation
CS-101 Introduction to Computing
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep. 2006

Image Tampering Digital Tampering: Compositing. Morphing. Re-touching. Enhancing. Computer graphics. Painted.

Forensics Forensic science, the application of a broad spectrum of sciences to answer questions of interest to the legal system. Digital forensics, the application of the scientific method to digital media in order to establish factual information for judicial review.

Discussion The problem of detecting digital forgeries is a complex one with no universally applicable solution. Reliable forgery detection should be approached from multiple directions.

Exposing Digital Forgeries in Scientific Images In at least one journal, it is estimated that as many as 20% of accepted manuscripts contain figures with inappropriate manipulations, and 1% with fraudulent manipulations.

Image Manipulation Action of each manipulation scheme: Deletion, (a). A band was erased. Healing, (b). Several bands were removing using Photoshop ’ s “ healing brush. ” Duplication, (c). A band was copied and pasted into a new location.

Image Manipulation Effect of each manipulation scheme: Deletion. Remove small amounts of noise that are present through the dark background of the image. Healing. Disturb the underlying spatial frequency (texture). Duplication. Leave behind an obvious statistical pattern – two regions in the image are identical. Formulate the problem of detecting each of these statistical patterns as an image segmentation problem.

Image Segmentation: Texture For healing. I g ( . ): the magnitude of the image gradient at a given pixel.

Image Segmentation: Texture s d ( . ): 1D deravative filter. [ − − −0.0187] p ( . ): low-pass filter. [ ]

Automatic Detection