Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Slides:



Advertisements
Similar presentations
Eigen Decomposition and Singular Value Decomposition
Advertisements

Informatik 4 Lab 1. Laboratory Exercise Overview 1. Define size of 20 radius vectors 2. DCT transformation 3. Create Microsoft Excel spreadsheet 4. Create.
Eigen Decomposition and Singular Value Decomposition
3D Geometry for Computer Graphics
Noise & Data Reduction. Paired Sample t Test Data Transformation - Overview From Covariance Matrix to PCA and Dimension Reduction Fourier Analysis - Spectrum.
Fourier Transforms and Their Use in Data Compression
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: The Linear Prediction Model The Autocorrelation Method Levinson and Durbin.
Lecture 15 Orthogonal Functions Fourier Series. LGA mean daily temperature time series is there a global warming signal?
Chapter 3 Image Enhancement in the Spatial Domain.
Machine Learning Lecture 8 Data Processing and Representation
CS 551 / CS 645 Antialiasing. What is a pixel? A pixel is not… –A box –A disk –A teeny tiny little light A pixel is a point –It has no dimension –It occupies.
1cs542g-term High Dimensional Data  So far we’ve considered scalar data values f i (or interpolated/approximated each component of vector values.
Principal Component Analysis CMPUT 466/551 Nilanjan Ray.
School of Computing Science Simon Fraser University
Lecture05 Transform Coding.
Principal Component Analysis
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Face Recognition Using Eigenfaces
Lecture 2: Image filtering
Continuous Latent Variables --Bishop
Computer Vision Lecture 3: Digital Images
Laurent Itti: CS599 – Computational Architectures in Biological Vision, USC Lecture 7: Coding and Representation 1 Computational Architectures in.
Digital Image Processing Final Project Compression Using DFT, DCT, Hadamard and SVD Transforms Zvi Devir and Assaf Eden.
5. 1 JPEG “ JPEG ” is Joint Photographic Experts Group. compresses pictures which don't have sharp changes e.g. landscape pictures. May lose some of the.
SVD(Singular Value Decomposition) and Its Applications
JPEG C OMPRESSION A LGORITHM I N CUDA Group Members: Pranit Patel Manisha Tatikonda Jeff Wong Jarek Marczewski Date: April 14, 2009.
Summarized by Soo-Jin Kim
Principle Component Analysis Presented by: Sabbir Ahmed Roll: FH-227.
Chapter 2 Dimensionality Reduction. Linear Methods
Presented By Wanchen Lu 2/25/2013
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
Transforms. 5*sin (2  4t) Amplitude = 5 Frequency = 4 Hz seconds A sine wave.
Under Supervision of Dr. Kamel A. Arram Eng. Lamiaa Said Wed
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL Presented by 2006/8.
Wavelet-based Coding And its application in JPEG2000 Monia Ghobadi CSC561 final project
ECE 8443 – Pattern Recognition LECTURE 10: HETEROSCEDASTIC LINEAR DISCRIMINANT ANALYSIS AND INDEPENDENT COMPONENT ANALYSIS Objectives: Generalization of.
SINGULAR VALUE DECOMPOSITION (SVD)
Descriptive Statistics vs. Factor Analysis Descriptive statistics will inform on the prevalence of a phenomenon, among a given population, captured by.
CCN COMPLEX COMPUTING NETWORKS1 This research has been supported in part by European Commission FP6 IYTE-Wireless Project (Contract No: )
Dr. Scott Umbaugh, SIUE Discrete Transforms.
PCA vs ICA vs LDA. How to represent images? Why representation methods are needed?? –Curse of dimensionality – width x height x channels –Noise reduction.
MACHINE LEARNING 7. Dimensionality Reduction. Dimensionality of input Based on E Alpaydın 2004 Introduction to Machine Learning © The MIT Press (V1.1)
Feature Extraction 主講人:虞台文. Content Principal Component Analysis (PCA) PCA Calculation — for Fewer-Sample Case Factor Analysis Fisher’s Linear Discriminant.
Image hole-filling. Agenda Project 2: Will be up tomorrow Due in 2 weeks Fourier – finish up Hole-filling (texture synthesis) Image blending.
Intro. ANN & Fuzzy Systems Lecture 16. Classification (II): Practical Considerations.
Chapter 13 Discrete Image Transforms
Detecting Image Features: Corner. Corners Given an image, denote the image gradient. C is symmetric with two positive eigenvalues. The eigenvalues give.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
Principal Components Analysis ( PCA)
Unsupervised Learning II Feature Extraction
Image Enhancement in the Spatial Domain.
Machine Learning Supervised Learning Classification and Regression K-Nearest Neighbor Classification Fisher’s Criteria & Linear Discriminant Analysis Perceptron:
Principal Component Analysis (PCA)
JPEG Compression What is JPEG? Motivation
Interest Points EE/CSE 576 Linda Shapiro.
Principal Component Analysis
PCA vs ICA vs LDA.
Principal Component Analysis
Parallelization of Sparse Coding & Dictionary Learning
JPEG Still Image Data Compression Standard
Digital Image Processing Week IV
Chapter 8 The Discrete Fourier Transform
Chapter 8 The Discrete Fourier Transform
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
Geology 491 Spectral Analysis
Lecture 16. Classification (II): Practical Considerations
Marios Mattheakis and Pavlos Protopapas
Presentation transcript:

Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery in Digital Images (J.Fridrich, D. Soukal, and J. Lukas) Samah Ghazawi

Overview Copy-Paste Forgery. Copy-Paste Forgery Detection. Possible Approaches. Exhaustive approach. Autocorrelation. Exact block matching. PCA - Principal component analysis. Copy-Paste Forgery Detection Using PCA DCT - discrete cosine transform. Copy-Paste Forgery Detection Using DCT

Copy-Paste Forgery The copy-paste attack in which a part of the image is copied and pasted somewhere else in the same image with the intent to cover an important image feature.

Copy-Paste Forgery Detection Given an image with MN pixels (image of size M×N) our task is to determine if it contains duplicated regions of unknown location and shape.

Possible Approaches Exhaustive approach (1). Exhaustive approach (2). Autocorrelation approach. Exact block matching.

Exhaustive approach (1) examine every possible pair of regions would have an exponential complexity in the number of image pixels.  Such an approach is obviously computationally prohibitive.

Exhaustive approach (2) In this method, the image and its circularly shifted version are overlaid looking for closely matching image segments.

Exhaustive approach (2)

Autocorrelation Autocorrelation function computes the energy of original image with shifted image for different shifts. The original and copied segments will introduce peaks in the autocorrelation for the shifts that correspond to the copied-moved segments. Autocorrelation witch computed directly for the image itself, would have very large peaks at the image corners and their neighborhoods.

Autocorrelation Natural images contain most of their power in low- frequencies. Computing the autocorrelation not from the image directly, but from its high-pass filtered version.

Autocorrelation

Assuming the minimal size of a copied-moved segment is K. autocorrelation copy-move detection method consists of the following steps: 1. Apply the Marr high-pass filter to the tested image. 2. Compute the autocorrelation r of the filtered image. 3. Remove half of the autocorrelation.  Autocorrelation is symmetric.

Autocorrelation 4. Set r = 0 in the neighborhood of two remaining corners of the entire autocorrelation. 5. Find the maximum of r, identify the shift vector, and examine the shift using the exhaustive method  this is now computationally efficient because we do not have to perform the exhaustive search for many different shift vectors. 6. If the detected area is larger than K, finish, else repeat Step 5 with the next maximum of r.

Autocorrelation This method is simple and does not have a large computational complexity, it often fails to detect the forgery unless the size of the forged area is at least ¼ of linear image dimensions.

Exact Block Matching

Image block block vector

Exact Block Matching

block vectors array ordered array

Exact Block Matching

Results

Exact match analysis did not show any exactly matching blocks.

Results If the forged image had been saved as JPEG, vast majority of identical blocks would have disappeared because the match would become only approximate and not exact.

And differently… Ordered array of what ?!

Principal Component Analysis – PCA Discrete Cosine Transform - DCT PCA of a data set X. DCT of a data set X.

Principal Component Analysis - PCA Mainstay of modern data analysis. Used abundantly in all forms of analysis - from neuroscience to computer graphics. Simple, non-parametric method of extracting relevant information from confusing data sets. Reduces a complex data set to a lower dimension to reveal the sometimes hidden. Computes the most meaningful basis to re-express a noisy, garbled data set.

Principal Components Orthogonal directions of greatest variance in data.

Principal Components First principal component is the direction of greatest variability (covariance) in the data. Second is the next orthogonal (uncorrelated) direction of greatest variability.  So first remove all the variability along the first component, and then find the next direction of greatest variability. And so on …

Principal Components

Principal components with larger associated variances represent interesting dynamics, while those with lower variances represent noise. The principal components are orthogonal.

Principal Components Dimensionality Reduction Can ignore the components of lesser significance You do lose some information, but if the eigenvalues are small, you don’t lose much. n dimensions in original data. calculate n eigenvectors and eigenvalues. choose only the first p eigenvectors, based on their eigenvalues. final data set has only p dimensions.

PCA The number of measurement types is the dimension of the data set. Each data sample is a vector in m dimensional space. Naïve Basis: B is the identity matrix I, X = IX.

PCA PCA asks: Is there another basis, which is a linear combination of the original basis, that best re-expresses our data set? (1) restricting the set of potential bases. (2) formalizing the implicit assumption of continuity in a data set.

Let The Math Begin

PCA

PCA - Now comes the trick

Copy-Paste Forgery Detection Using PCA

For color images: (1) analyze each color channel separately. or (2) build a single color block of size 3b pixels.

Copy-Paste Forgery Detection Using PCA

From the remaining pairs of blocks build a duplication map by constructing a zero image of the same size as the original, and coloring all pixels in a duplicated region with a unique grayscale intensity value.

Results

Principal Component Analysis – PCA Discrete Cosine Transform - DCT PCA of a data set X. DCT of a data set X.

Discrete Cosine Transform - DCT Important to numerous applications in science and engineering, from lossy compression of audio and images, to spectral methods for the numerical solution of partial differential equations. There are eight standard DCT variants, of which four are common. Fourier-related transform similar to the discrete Fourier transform (DFT), but using only real numbers.

DCT Transforms an image from the spatial domain to the frequency domain. Helps separate the image into parts of differing importance. Expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies.

DCT

Let The Math Begin – Again !

DCT

DCT basis functions Computationally easier to implement and more efficient to regard the DCT as a set of basis functions.

DCT

Copy-Paste Forgery Detection Using DCT Scan the image from the upper left corner to the lower right corner while sliding a B×B blocks. Calculate the DCT transform for each block. Quantize the DCT coefficients and store as one row in a matrix A.  The quantization steps are calculated from a user- specified parameter Q.  Lower values of the Q-factor produce more matching blocks, possibly some false matches.

Copy-Paste Forgery Detection Using DCT Lexicographically sort the rows of A. If two consecutive rows of the sorted matrix A are found, store the positions of the matching blocks in a separate list.  the coordinates of the upper left pixel of a block can be taken as its position.

Copy-Paste Forgery Detection Using DCT Let (i 1, i 2 ) and (j 1, j 2 ) be the positions of the two matching blocks. The shift vector s between the two matching blocks is calculated as s = (s 1, s 2 ) = (i 1 – j 1, i 2 – j 2 ) the shift vectors –s and s correspond to the same shift, the shift vectors s are normalized, if necessary, by multiplying by –1 so that s ≥ 0.

Copy-Paste Forgery Detection Using DCT For each matching pair of blocks, increment the normalized shift vector counter C by one. C(s1, s2) = C(s1, s2) + 1  The shift vector C is initialized to zero.  The counter C indicates the frequencies with which different normalized shift vectors occur.

Copy-Paste Forgery Detection Using DCT find all normalized shift vectors s(1), s(2), …, s(K), whose occurrence exceeds a user-specified threshold T: C(s(r)) > T for all r = 1, …, K.  Larger values of T may cause the algorithm to miss some not-so-closely matching blocks, while too small a value of T may introduce too many false matches.

Copy-Paste Forgery Detection Using DCT look at the mutual positions of each matching block pair and output a specific block pair only if there are many other matching pairs in the same mutual position. For all normalized shift vectors, the matching blocks that contributed to that specific shift vector are colored with the same color and thus identified as segments that might have been copied and moved.

Results the elliptic area on the orange hat has been copied to two other locations, three different shift vectors have been correctly found.

Results False matches

Results

DCT VS. Exact Block Matching

References Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery in Digital Images (J.Fridrich, D. Soukal, and J. Lukas) Wikipedia: A Tutorial On Principal Component Analysis - Derivation, Discussion and Singular Value Decomposition (Jon Shlens) =rep1&type=pdf =rep1&type=pdf

THANKS