Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.

Slides:



Advertisements
Similar presentations
Exposing Photo Manipulation with Inconsistent Reections James F. OBrien University of California, Berkeley Hany Farid Dartmouth College Presented by: Jinjie.
Advertisements

It is not uncommon to see the uproar that manipulated images cause in media. Some slides have images containing messages that may be controversial in nature.
Image Registration  Mapping of Evolution. Registration Goals Assume the correspondences are known Find such f() and g() such that the images are best.
A Robust Super Resolution Method for Images of 3D Scenes Pablo L. Sala Department of Computer Science University of Toronto.
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
EDGE DETECTION ARCHANA IYER AADHAR AUTHENTICATION.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Camera Model Identification Based on the Characteristics of CFA and Interpolation Shang Gao 1, Guanshuo Xu 2, Rui-Min Hu 1,*
The Generic Sensor Each photosite converts lightwave energy into photo- electrons Pixels in the output image are a measure of the number of photo-electrons.
Digital Image Forensics
An Introduction to Digital Camera Signal Processor
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye.
Detecting Digital Image Forgeries Using Sensor Pattern Noise presented by: Lior Paz Jan Lukas, jessica Fridrich and Miroslav Goljan.
Digital Cameras CCD (Monochrome) RGB Color Filter Array.
Probabilistic video stabilization using Kalman filtering and mosaicking.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Linear View Synthesis Using a Dimensionality Gap Light Field Prior
Chapter 2 Digital Image Fundamentals. Outline Elements of Visual Perception Light and the Electromagnetic Spectrum Image Sensing and Acquisition Image.
DIGITAL IMAGE PROCESSING Instructors: Dr J. Shanbehzadeh M.Gholizadeh M.Gholizadeh
Noise Estimation from a Single Image Ce Liu William T. FreemanRichard Szeliski Sing Bing Kang.
EI San Jose, CA Slide No. 1 Nearest-neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image* Ariawan Suwendi.
Analog and Digital Cameras  History of Digital cameras  Advantages and Disadvantages / Similarities and Differences of both types of cameras  Types.
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
Overview of State-of-the-Art in Digital Image Forensics H. T. SENCAR and N. MEMON Ashwini Chapte 12/5/08 ECE-643 New Jersey Institute of Technology.
By Meidika Wardana Kristi, NRP  Digital cameras used to take picture of an object requires three sensors to store the red, blue and green color.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
EE 7700 Demosaicking Problem in Digital Cameras. Bahadir K. Gunturk2 Multi-Chip Digital Camera Lens Scene Spectral filters Beam- splitters Sensors To.
Simple Image Processing Speaker : Lin Hsiu-Ting Date : 2005 / 04 / 27.
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Image Processing Xuejin Chen Ref:
Lecture 3 The Digital Image – Part I - Single Channel Data 12 September
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
EE565 Advanced Image Processing Copyright Xin Li Motivating Applications HDTV Internet video Artistic reproduction Widescreen movie.
Visual Computing Computer Vision 2 INFO410 & INFO350 S2 2015
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
Demosaicking for Multispectral Filter Array (MSFA)
Digital Imaging. Introduction Digital Imaging is used every day in life. Has become less expensive and easier to use than film.
DIGITAL VIDEO AUTHENTICATION. Contents  What is Quantization ?  What is Double MPEG/JPEG Compression?  Video Compression/Decompression  What is JPEG/Frame.
 Forensics of image re-sampling (such as image resizing) is an important issue,which can be used for tampering detection, steganography, etc.  Most of.
SNR If the SNR is ____ for ____ frame averages, what will be the SNR for _____ frame averages if N is independent for each frame. S= Signal N= Noise SNR.
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
Ec2029 digital image processing
Instructor: Mircea Nicolescu Lecture 5 CS 485 / 685 Computer Vision.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DIGITAL IMAGE FORGERY Name: Reshma P.D Roll No:19.
Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification Irene Amerini, Roberto Caldelli, Vito.
6/10/20161 Digital Image Processing Lecture 09: Image Restoration-I Naveed Ejaz.
RECONSTRUCTION OF MULTI- SPECTRAL IMAGES USING MAP Gaurav.
Bayer Color Filter Array Demosaicing
0 Assignment 1 (Due: 10/2) Input/Output an image: (i) Design a program to input and output a color image. (ii) Transform the output color image C(R,G,B)
Reflection Correspondence for Exposing Photograph Manipulation
Khallefi Leïla © esa Supervisors: J. L. Vazquez M. Küppers
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Outline Announcement Local operations (continued) Linear filters
Fundamentals Data.
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
IMAGE FORGERY DETECTION
How to Digitize the Natural Color
Acquisition and display of a still color image A-Z
Spread Spectrum Watermarking
Digital Image Fundamentals
Lecture 2: Image filtering
Demosaicking Problem in Digital Cameras
Detecting Digital Forgeries using Blind Noise Estimation
Review and Importance CS 111.
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi

The Goal Low cost high resolution digital camera, sophisticated photo editing  Digital media can be manipulated very easily Fake images… Photos no longer hold the unique stature as a definitive recording of events Automatically detecting digital forgeries in any portion of an image In contrast to other approaches: watermark, signature Drawback: must be inserted at time of recording

The Technique D igital forgeries may leave no visual clues but they may alter the underlying statistics of an image Color image consists of three channels containing samples from different bands of the color spectrum Most digital cameras are equipped with only a single color sensor and use Color Filter Array (CFA) The other two missing colors must be estimated from the neighboring to obtain three CFA Interpolation channel color images – CFA Interpolation

The Technique (Cont.)  A subset of samples, within a color channel, are correlated to neighboring samples The correlations are periodic since the color filters arranged in a periodic pattern Presence or lack of correlation produced by CFA interpolation can be used to detect forgery There are many CFA Interpolation algorithms  Bilinear and Bicubic, Median Filter, Gradient Based, Adaptive Color Plane and more…

Example Bilinear interpolation The Estimated samples are perfectly correlated to their neighbors

The Method - EM Algorithm Two step iterative algorithm We have two models: M1, M2 Outputs:  Probability Map – detect if a color image is a result of CFA interpolation  Linear coefficients – used to distinguish between different CFA interpolation

Results CFA interpolation of their creation  Each color channel was independently blurred with 3x3 binomial filter  Down sample by factor of two in each direction  Re sampled onto Bayer array and CFA interpolated Collected 100 images: 50 of resolution 512x512, 50 of resolution 1024x1024

Gradient 3x3 median No CFA interpolation

Results Detecting Localized Tampering  Composite images – splicing the non CFA image and the same CFA interpolated image  Plausible forgery created using Adobe Photoshop

Sensitivity and Robustness Tested the sensitivity of the model to typical distortions that may conceal trace of tampering  JPEG compression, additive white Gaussian noise, Gamma correction Robustness  Measure of similarity between probability maps of each color channel vs. synthetically generated probability maps Results: bilinear, bicubic, smooth hue, variable number of gradient - 100%, Median 99%, ACP 97%

Discussion Advantages The technique works in the absence of any digital watermark or signature Simple linear model to capture the correlation produced by CFA interpolation Shown efficacy Drawbacks Can be attacked by resampleing onto CFA and then reinterpolating - requires knowledge of camera CFA pattern