Exposing Photo Manipulation with Geometric Inconsistencies
|
|
- Michael Silas Small
- 5 years ago
- Views:
Transcription
1 Exposing Photo Manipulation with Geometric Inconsistencies James F. O Brien U.C. Berkeley Collaborators Hany Farid Eric Kee Valentina Conotter Stephen Bailey 1 image-forensics-pg14.key - October 9, 2014
2 Communication by Images 2-1 image-forensics-pg14.key - October 9, 2014
3 Communication by Images 2-2 image-forensics-pg14.key - October 9, 2014
4 Image Manipulation Iranian missile test, image-forensics-pg14.key - October 9, 2014
5 Image Manipulation Iranian missile test, image-forensics-pg14.key - October 9, 2014
6 Image Manipulation Iranian stealth fighter, image-forensics-pg14.key - October 9, 2014
7 Image Manipulation Iranian stealth fighter, image-forensics-pg14.key - October 9, 2014
8 Image Manipulation Economist manipulates image of Obama, image-forensics-pg14.key - October 9, 2014
9 Image Manipulation Economist manipulates image of Obama, image-forensics-pg14.key - October 9, 2014
10 Image Manipulation Fabricated image of John Kerry and Jane Fonda, image-forensics-pg14.key - October 9, 2014
11 Image Manipulation Fabricated image of John Kerry and Jane Fonda, image-forensics-pg14.key - October 9, 2014
12 Video Manipulation Flying Birdman Hoax, image-forensics-pg14.key - October 9, 2014
13 Video Manipulation Flying Birdman Hoax, image-forensics-pg14.key - October 9, 2014
14 Historical Image Manipulation Image manipulation as old as photography Primitive techniques work surprisingly well Library of Congress archive photo of Abraham Lincoln image-forensics-pg14.key - October 9, 2014
15 Historical Image Manipulation Image manipulation as old as photography Primitive techniques work surprisingly well Library of Congress archive photo of Abraham Lincoln image-forensics-pg14.key - October 9, 2014
16 Historical Image Manipulation 9-1 image-forensics-pg14.key - October 9, 2014
17 Historical Image Manipulation 9-2 image-forensics-pg14.key - October 9, 2014
18 Image Forensics Detect forgeries Detect signs of manipulation Prove image was modified in some way Cannot prove an image unmodified! Suite of detection tools Individual methods can be countered by informed attacker Individual tools may not apply in all cases Each additional method makes forgery harder 10 image-forensics-pg14.key - October 9, 2014
19 Advantage: Forgers People: Good at understanding scene content Poor at noticing many types of inconsistencies Simple manipulation methods work well New manipulation methods being developed 11 image-forensics-pg14.key - October 9, 2014
20 Example Inconsistency Selected as correct: 62.1% Selected as correct: 50.1% N = 20; RT = 7.6s Farid and Bravo image-forensics-pg14.key - October 9, 2014
21 Things we don t see 13 image-forensics-pg14.key - October 9, 2014
22 Things we don t see 14 image-forensics-pg14.key - October 9, 2014
23 Advantage: Forgers People: Good at understanding scene content Poor at noticing many types of inconsistencies Simple manipulation methods work well New manipulation methods being developed 15 image-forensics-pg14.key - October 9, 2014
24 Image Forensics Format Methods EXIF meta data Quantization tables Coding decisions Signatures or watermarks Pixel Methods Linear dependance Bayer pattern artifacts Chromatic aberration Compression artifacts Not tied to scene content Easy to apply Easy to fool (informed attacker) Not robust to common operations 16 image-forensics-pg14.key - October 9, 2014
25 Image Forensics Geometric methods Content inconsistencies Require human annotation Computer analysis Examples: Shadows Lighting Reflections 17 image-forensics-pg14.key - October 9, 2014
26 Geometric Image Forensics Not same as Computer Vision Possibly user involved in loop Only looking for inconsistencies only Don t need to fully extract scene content 18 image-forensics-pg14.key - October 9, 2014
27 19 image-forensics-pg14.key - October 9, 2014
28 20 image-forensics-pg14.key - October 9, 2014
29 21 image-forensics-pg14.key - October 9, 2014
30 22 image-forensics-pg14.key - October 9, 2014
31 23 image-forensics-pg14.key - October 9, 2014
32 24 image-forensics-pg14.key - October 9, 2014
33 25 image-forensics-pg14.key - October 9, 2014
34 26 image-forensics-pg14.key - October 9, 2014
35 27 image-forensics-pg14.key - October 9, 2014
36 28 image-forensics-pg14.key - October 9, 2014
37 29 image-forensics-pg14.key - October 9, 2014
38 30 image-forensics-pg14.key - October 9, 2014
39 31 image-forensics-pg14.key - October 9, 2014
40 32 image-forensics-pg14.key - October 9, 2014
41 33 image-forensics-pg14.key - October 9, 2014
42 34 image-forensics-pg14.key - October 9, 2014
43 35 image-forensics-pg14.key - October 9, 2014
44 Light in front of camera Light behind camera 36 image-forensics-pg14.key - October 9, 2014
45 37 image-forensics-pg14.key - October 9, 2014
46 38 image-forensics-pg14.key - October 9, 2014
47 39 image-forensics-pg14.key - October 9, 2014
48 40 image-forensics-pg14.key - October 9, 2014
49 Shading Constraints (b) (c) 41 image-forensics-pg14.key - October 9, 2014
50 Shading Constraints 1 a b 2 c d a b c d 42 image-forensics-pg14.key - October 9, 2014
51 Shading Constraints a 1 c b d a b c d 43 image-forensics-pg14.key - October 9, 2014
52 Shading Constraints a 4 c 4 b 3 a b c 44 image-forensics-pg14.key - October 9, 2014
53 Motion in Video 45-1 image-forensics-pg14.key - October 9, 2014
54 Motion in Video 45-2 image-forensics-pg14.key - October 9, 2014
55 Parabolic Motion in World (Still Camera) p = p 0 + t v ( t )2 g p = c + (q c) 2 1..n p Solve for: v 0 g q c 46 image-forensics-pg14.key - October 9, 2014
56 Matching observed motion y x z 47 image-forensics-pg14.key - October 9, 2014
57 watch?v=wbah52ji3so 48-1 image-forensics-pg14.key - October 9, 2014
58 watch?v=wbah52ji3so 48-2 image-forensics-pg14.key - October 9, 2014
59 49-1 image-forensics-pg14.key - October 9, 2014
60 49-2 image-forensics-pg14.key - October 9, 2014
61 y x z 50-1 image-forensics-pg14.key - October 9, 2014
62 y x z 50-2 image-forensics-pg14.key - October 9, 2014
63 Parabolic Motion in World (Moving Camera) p = p 0 + t v ( t )2 g p = c + (q c) 2 1..n p Solve for: v 0 g q Track camera motion c 51 image-forensics-pg14.key - October 9, 2014
64 52-1 image-forensics-pg14.key - October 9, 2014
65 52-2 image-forensics-pg14.key - October 9, 2014
66 y z x 53 image-forensics-pg14.key - October 9, 2014
67 Basic Mirror Geometry Linear perspective image Mirror Image View Object Reflection of object 54 image-forensics-pg14.key - October 9, 2014
68 Basic Mirror Geometry 55-1 image-forensics-pg14.key - October 9, 2014
69 Basic Mirror Geometry 55-2 image-forensics-pg14.key - October 9, 2014
70 Basic Mirror Geometry Mirror-Parallel View Object Point Reflected Point n COP Mirror 56 image-forensics-pg14.key - October 9, 2014
71 Basic Mirror Geometry Mirror-Parallel View Object Reflection Mirror 57 image-forensics-pg14.key - October 9, 2014
72 Basic Mirror Geometry Bundle of parallel lines Mirror-Parallel View Object Reflection In original image they must converge to a common vanishing point.! (Possibly at infinity) Mirror 58 image-forensics-pg14.key - October 9, 2014
73 Reflection Vanishing Point Real Photograph 59 image-forensics-pg14.key - October 9, 2014
74 Reflection Vanishing Point Real Photograph v 60 image-forensics-pg14.key - October 9, 2014
75 Reflection Vanishing Point Altered Photograph 61 image-forensics-pg14.key - October 9, 2014
76 Reflection Vanishing Point Altered Photograph 62 image-forensics-pg14.key - October 9, 2014
77 Reflection Vanishing Point Altered Photograph 63 image-forensics-pg14.key - October 9, 2014
78 Reflection Vanishing Point Altered Photograph 64 image-forensics-pg14.key - October 9, 2014
79 Examples 65 image-forensics-pg14.key - October 9, 2014
80 Examples 66-1 image-forensics-pg14.key - October 9, 2014
81 Examples 66-2 image-forensics-pg14.key - October 9, 2014
82 Examples Composite photo World News, copyright image-forensics-pg14.key - October 9, 2014
83 Examples Composite photo World News, copyright image-forensics-pg14.key - October 9, 2014
84 Examples Composite photo World News, copyright image-forensics-pg14.key - October 9, 2014
85 Examples Photo by Alexi Lubomirski, The Saint and the Sinner, copyright image-forensics-pg14.key - October 9, 2014
86 Examples Photo by Alexi Lubomirski, The Saint and the Sinner, copyright image-forensics-pg14.key - October 9, 2014
87 Examples Photo by Alexi Lubomirski, The Saint and the Sinner, copyright image-forensics-pg14.key - October 9, 2014
88 Center of Projection COP determined by 3 orthogonal vanishing points 71-1 image-forensics-pg14.key - October 9, 2014
89 Center of Projection COP determined by 3 orthogonal vanishing points v 1 v 2 v image-forensics-pg14.key - October 9, 2014
90 Center of Projection COP determined by 3 orthogonal vanishing points v 1 v 2 C v 1 Image Plane v 3 v 2 72 image-forensics-pg14.key - October 9, 2014
91 Center of Projection COP determined by 3 orthogonal vanishing points v 1 v 2 C v 1 Image Plane v 3 v image-forensics-pg14.key - October 9, 2014
92 Center of Projection COP determined by 3 orthogonal vanishing points v 1 v 2 v 1 C Image Plane v 2 v 3 (C V 1 ) (C V 2 )= image-forensics-pg14.key - October 9, 2014
93 Center of Projection COP determined by 3 orthogonal vanishing points v 1 v 2 v 1 C Image Plane v 2 v 3 (C V 1 ) (C V 2 )=0 (C V 2 ) (C V 3 )=0 (C V 3 ) (C V 1 )=0 74 image-forensics-pg14.key - October 9, 2014
94 Center of Projection COP determined by 3 orthogonal vanishing points V 1 V 2 C v 1 Image Plane v 2 C V 3 (C V 1 ) (C V 2 )=0 (C V 2 ) (C V 3 )=0 (C V 3 ) (C V 1 )=0 75 image-forensics-pg14.key - October 9, 2014
95 Center of Projection COP determined by 3 orthogonal vanishing points System of quadratic equations (C V 1 ) (C V 2 )=0 (C V 2 ) (C V 3 )=0 (C V 3 ) (C V 1 )=0 Easy to solve by change of variables 76 image-forensics-pg14.key - October 9, 2014
96 Center of Projection Building and other structures Reflectors with rectangular frames!! Frames: two orthogonal vanishing points Reflected features: third vanishing point Compare COP from separate elements in the image 77 image-forensics-pg14.key - October 9, 2014
97 Center of Projection Computation is unstable Step 1: intersect [nearly parallel] lines Step 2: intersect spheres 78-1 image-forensics-pg14.key - October 9, 2014
98 Center of Projection Computation is unstable Step 1: intersect [nearly parallel] lines Step 2: intersect spheres 78-2 image-forensics-pg14.key - October 9, 2014
99 Center of Projection Computation is unstable Step 1: intersect [nearly parallel] lines Step 2: intersect spheres 79-1 image-forensics-pg14.key - October 9, 2014
100 Center of Projection Computation is unstable Step 1: intersect [nearly parallel] lines Step 2: intersect spheres 79-2 image-forensics-pg14.key - October 9, 2014
101 Center of Projection Computation is unstable Step 1: intersect [nearly parallel] lines Step 2: intersect spheres Instability squared 79-3 image-forensics-pg14.key - October 9, 2014
102 Center of Projection Error sources: Image resolution User pointing accuracy Features from different perspectives COP calculation magnifies error Structure in instability 80-1 image-forensics-pg14.key - October 9, 2014
103 Center of Projection Error sources: Image resolution User pointing accuracy Features from different perspectives COP calculation magnifies error Structure in instability Specify regions, not points 80-2 image-forensics-pg14.key - October 9, 2014
104 Center of Projection Error sources: Image resolution User pointing accuracy Features from different perspectives COP calculation magnifies error Structure in instability Specify regions, not points *This diagram not to scale 80-3 image-forensics-pg14.key - October 9, 2014
105 Center of Projection Real Photograph 81-1 image-forensics-pg14.key - October 9, 2014
106 Center of Projection Real Photograph 81-2 image-forensics-pg14.key - October 9, 2014
107 Center of Projection Real Photograph 81-3 image-forensics-pg14.key - October 9, 2014
108 Center of Projection Altered Photograph 82-1 image-forensics-pg14.key - October 9, 2014
109 Center of Projection Altered Photograph 82-2 image-forensics-pg14.key - October 9, 2014
110 Center of Projection Altered Photograph 82-3 image-forensics-pg14.key - October 9, 2014
111 Center of Projection 83-1 image-forensics-pg14.key - October 9, 2014
112 Center of Projection 83-2 image-forensics-pg14.key - October 9, 2014
113 Center of Projection Real Photograph Altered Photograph 83-3 image-forensics-pg14.key - October 9, 2014
114 CoP from Faces Work in progress 84 image-forensics-pg14.key - October 9, 2014
115 CoP from Faces Work in progress 85 image-forensics-pg14.key - October 9, 2014
116 CoP from Faces Work in progress 86 image-forensics-pg14.key - October 9, 2014
117 CoP from Faces Work in progress 87 image-forensics-pg14.key - October 9, 2014
118 Summary Geometric Image Forensics Human annotation Computer analysis Part of analysis toolbox Not always applicable Together make forgery more difficult Constrain image content 88 image-forensics-pg14.key - October 9, 2014
119 Relevant Papers Eric Kee, James F. O'Brien, and Hany Farid. Exposing Photo Manipulation from Shadows and Shading. ACM Transactions on Graphics, too appear. Presented at SIGGRAPH Eric Kee, James F. O'Brien, and Hany Farid. Exposing Photo Manipulation with Inconsistent Shadows. ACM Transactions on Graphics, 32(4):28:1 12, September Presented at SIGGRAPH Valentina Conotter, James F. O'Brien, and Hany Farid. Exposing Digital Forgeries in Ballistic Motion. IEEE Transactions on Information Forensics and Security, 7(1): , February James F. O'Brien and Hany Farid. Exposing Photo Manipulation with Inconsistent Reflections. ACM Transactions on Graphics, 31(1):4:1 11, January Presented at SIGGRAPH image-forensics-pg14.key - October 9, 2014
120 Thank You 90 image-forensics-pg14.key - October 9, 2014
Impeding Forgers at Photo Inception
Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth
More informationDetection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table
Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department
More informationExposing Digital Forgeries from JPEG Ghosts
1 Exposing Digital Forgeries from JPEG Ghosts Hany Farid, Member, IEEE Abstract When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationSapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³
A REVIEW OF TRENDS IN DIGITAL IMAGE PROCESSING FOR FORENSIC CONSIDERATION Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ Department of Forensic Science Sam Higginbottom Institute of agriculture Technology
More informationThe Lee Harvey Oswald backyard photos: real or fake?
Perception, 2009, volume 38, pages 1731 ^ 1734 doi:10.1068/p6580 LAST BUT NOT LEAST The Lee Harvey Oswald backyard photos: real or fake? Hany Farid Department of Computer Science, Dartmouth College, Hanover,
More informationIMAGE SPLICING FORGERY DETECTION
IMAGE SPLICING FORGERY DETECTION 1 SIDDHI GAUR, 2 SHAMIK TIWARI 1 M.Tech, 2 Assistant Professor, Dept of CSE, Mody University of Science and Technology, Sikar,India E-mail: 1 siddhi.gaur14@gmail.com, 2
More informationTampering and Copy-Move Forgery Detection Using Sift Feature
Tampering and Copy-Move Forgery Detection Using Sift Feature N.Anantharaj 1 M-TECH (IT) Final Year, Department of IT, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India 1 ABSTRACT:
More informationSurvey On Passive-Blind Image Forensics
Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal
More informationDIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES
International Journal of Advanced Technology & Engineering Research (IJATER) 3 rd International e-conference on Emerging Trends in Technology DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES Govindraj
More informationNeuro-Fuzzy based First Responder for Image forgery Identification
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationImage Tampering Localization via Estimating the Non-Aligned Double JPEG compression
Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian
More informationAstronomy 80 B: Light. Lecture 9: curved mirrors, lenses, aberrations 29 April 2003 Jerry Nelson
Astronomy 80 B: Light Lecture 9: curved mirrors, lenses, aberrations 29 April 2003 Jerry Nelson Sensitive Countries LLNL field trip 2003 April 29 80B-Light 2 Topics for Today Optical illusion Reflections
More informationSOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS
SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic
More informationChapter 23. Light Geometric Optics
Chapter 23. Light Geometric Optics There are 3 basic ways to gather light and focus it to make an image. Pinhole - Simple geometry Mirror - Reflection Lens - Refraction Pinhole Camera Image Formation (the
More informationChapter 34 Geometric Optics (also known as Ray Optics) by C.-R. Hu
Chapter 34 Geometric Optics (also known as Ray Optics) by C.-R. Hu 1. Principles of image formation by mirrors (1a) When all length scales of objects, gaps, and holes are much larger than the wavelength
More informationAutomatic Selection of Brackets for HDR Image Creation
Automatic Selection of Brackets for HDR Image Creation Michel VIDAL-NAQUET, Wei MING Abstract High Dynamic Range imaging (HDR) is now readily available on mobile devices such as smart phones and compact
More informationForensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification
Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence
More informationFormat Based Photo Forgery Image Detection S. Murali
Format Based Photo Forgery Image Detection S. Murali Govindraj B. Chittapur H. S. Prabhakara Maharaja Research Foundation MIT, Mysore, INDIA Basaveshwar Engineering College Bagalkot, INDIA Maharaja Research
More informationDigital Image Authentication from Thumbnails
Digital Image Authentication from Thumbnails Eric Kee and Hany Farid Department of Computer Science, Dartmouth College, Hanover NH 3755, USA ABSTRACT We describe how to exploit the formation and storage
More informationNotation for Mirrors and Lenses. Chapter 23. Types of Images for Mirrors and Lenses. More About Images
Notation for Mirrors and Lenses Chapter 23 Mirrors and Lenses Sections: 4, 6 Problems:, 8, 2, 25, 27, 32 The object distance is the distance from the object to the mirror or lens Denoted by p The image
More informationMain Subject Detection of Image by Cropping Specific Sharp Area
Main Subject Detection of Image by Cropping Specific Sharp Area FOTIOS C. VAIOULIS 1, MARIOS S. POULOS 1, GEORGE D. BOKOS 1 and NIKOLAOS ALEXANDRIS 2 Department of Archives and Library Science Ionian University
More informationWatermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008
Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright
More informationLENSES. INEL 6088 Computer Vision
LENSES INEL 6088 Computer Vision Digital camera A digital camera replaces film with a sensor array Each cell in the array is a Charge Coupled Device light-sensitive diode that converts photons to electrons
More informationChapters 1 & 2. Definitions and applications Conceptual basis of photogrammetric processing
Chapters 1 & 2 Chapter 1: Photogrammetry Definitions and applications Conceptual basis of photogrammetric processing Transition from two-dimensional imagery to three-dimensional information Automation
More informationDigital Image Forgery Identification Using Motion Blur Variations as Clue
Digital Image Forgery Identification Using Motion Blur Variations as Clue P. M. Birajdar*, N. G. Dharashive** Abstract: Fake images have become common in society today. In all forms of media one can easily
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationAn Automatic JPEG Ghost Detection Approach for Digital Image Forensics
An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif
More informationConsider two lines and. Then we could know. where. By letting L and M be orthogonal and using the fact that become
ECE661 Computer Vision - Fall 2014 - HW3 Fu-Chen Chen chen1623@purdue.edu 2.1.1 Remove projective distortion To remove the projective distortion we have to take back the vanishing line in the image to
More informationCh 24. Geometric Optics
text concept Ch 24. Geometric Optics Fig. 24 3 A point source of light P and its image P, in a plane mirror. Angle of incidence =angle of reflection. text. Fig. 24 4 The blue dashed line through object
More informationCS 443: Imaging and Multimedia Cameras and Lenses
CS 443: Imaging and Multimedia Cameras and Lenses Spring 2008 Ahmed Elgammal Dept of Computer Science Rutgers University Outlines Cameras and lenses! 1 They are formed by the projection of 3D objects.
More informationChapter 23. Mirrors and Lenses
Chapter 23 Mirrors and Lenses Notation for Mirrors and Lenses The object distance is the distance from the object to the mirror or lens Denoted by p The image distance is the distance from the image to
More informationImage Formation: Camera Model
Image Formation: Camera Model Ruigang Yang COMP 684 Fall 2005, CS684-IBMR Outline Camera Models Pinhole Perspective Projection Affine Projection Camera with Lenses Digital Image Formation The Human Eye
More informationChapter 23. Mirrors and Lenses
Chapter 23 Mirrors and Lenses Mirrors and Lenses The development of mirrors and lenses aided the progress of science. It led to the microscopes and telescopes. Allowed the study of objects from microbes
More informationCountering Anti-Forensics of Lateral Chromatic Aberration
IH&MMSec 7, June -, 7, Philadelphia, PA, USA Countering Anti-Forensics of Lateral Chromatic Aberration Owen Mayer Drexel University Department of Electrical and Computer Engineering Philadelphia, PA, USA
More informationImage Processing & Projective geometry
Image Processing & Projective geometry Arunkumar Byravan Partial slides borrowed from Jianbo Shi & Steve Seitz Color spaces RGB Red, Green, Blue HSV Hue, Saturation, Value Why HSV? HSV separates luma,
More informationSplicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies
International Journal of Computer and Communication Engineering, Vol. 4, No., January 25 Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies Bo Liu and Chi-Man Pun Noise patterns
More informationCameras. CSE 455, Winter 2010 January 25, 2010
Cameras CSE 455, Winter 2010 January 25, 2010 Announcements New Lecturer! Neel Joshi, Ph.D. Post-Doctoral Researcher Microsoft Research neel@cs Project 1b (seam carving) was due on Friday the 22 nd Project
More informationApplications of Optics
Nicholas J. Giordano www.cengage.com/physics/giordano Chapter 26 Applications of Optics Marilyn Akins, PhD Broome Community College Applications of Optics Many devices are based on the principles of optics
More informationChapter 18 Optical Elements
Chapter 18 Optical Elements GOALS When you have mastered the content of this chapter, you will be able to achieve the following goals: Definitions Define each of the following terms and use it in an operational
More informationE X P E R I M E N T 12
E X P E R I M E N T 12 Mirrors and Lenses Produced by the Physics Staff at Collin College Copyright Collin College Physics Department. All Rights Reserved. University Physics II, Exp 12: Mirrors and Lenses
More informationApplications of Flash and No-Flash Image Pairs in Mobile Phone Photography
Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography Xi Luo Stanford University 450 Serra Mall, Stanford, CA 94305 xluo2@stanford.edu Abstract The project explores various application
More informationComputer Aided Design Parametric Modelling
Level: 2 Credit value: 10 Unit aim The use of computer aide design (CAD) systems in industry has become an essential part of the modern working environment. It is used at all stages of the design period,
More informationCS 465 Prelim 1. Tuesday 4 October hours. Problem 1: Image formats (18 pts)
CS 465 Prelim 1 Tuesday 4 October 2005 1.5 hours Problem 1: Image formats (18 pts) 1. Give a common pixel data format that uses up the following numbers of bits per pixel: 8, 16, 32, 36. For instance,
More informationDifferent-quality Re-demosaicing in Digital Image Forensics
Different-quality Re-demosaicing in Digital Image Forensics 1 Bo Wang, 2 Xiangwei Kong, 3 Lanying Wu *1,2,3 School of Information and Communication Engineering, Dalian University of Technology E-mail:
More informationTampering Detection Algorithms: A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
More information3D Viewing. Introduction to Computer Graphics Torsten Möller / Manfred Klaffenböck. Machiraju/Zhang/Möller
3D Viewing Introduction to Computer Graphics Torsten Möller / Manfred Klaffenböck Machiraju/Zhang/Möller Reading Chapter 5 of Angel Chapter 13 of Hughes, van Dam, Chapter 7 of Shirley+Marschner Machiraju/Zhang/Möller
More informationIMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZED Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad ssm@iiita.ac.in rctripathi@iiita.ac.in ABSTRACT The multimedia applications
More informationInventor 2016 Essentials Plus
Autodesk NEW Features a chapter on sheet metal design Inventor 2016 Essentials Plus Daniel T. Banach & Travis Jones SDC PUBLICATIONS Better Textbooks. Lower Prices. www.sdcpublications.com Powered by TCPDF
More informationVHT New Photographer Training
VHT New Photographer Training VHT Photography General Requirements Apply to Signature and Premium Keep aperture between f8-f11 always ISO of 200 Shoot as jpg, Size Large and Quality Fine Always take additional
More informationA Mathematical model for the determination of distance of an object in a 2D image
A Mathematical model for the determination of distance of an object in a 2D image Deepu R 1, Murali S 2,Vikram Raju 3 Maharaja Institute of Technology Mysore, Karnataka, India rdeepusingh@mitmysore.in
More informationCOPYRIGHTED MATERIAL. Overview
In normal experience, our eyes are constantly in motion, roving over and around objects and through ever-changing environments. Through this constant scanning, we build up experience data, which is manipulated
More informationMultimedia Forensics
Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer
More informationCS354 Computer Graphics Viewing and Projections
Slide Credit: Donald S. Fussell CS354 Computer Graphics Viewing and Projections Qixing Huang February 19th 2018 Eye Coordinates (not NDC) Planar Geometric Projections Standard projections project onto
More informationCOPYRIGHTED MATERIAL OVERVIEW 1
OVERVIEW 1 In normal experience, our eyes are constantly in motion, roving over and around objects and through ever-changing environments. Through this constant scanning, we build up experiential data,
More informationImplementation of Adaptive Coded Aperture Imaging using a Digital Micro-Mirror Device for Defocus Deblurring
Implementation of Adaptive Coded Aperture Imaging using a Digital Micro-Mirror Device for Defocus Deblurring Ashill Chiranjan and Bernardt Duvenhage Defence, Peace, Safety and Security Council for Scientific
More informationFake Impressionist Paintings for Images and Video
Fake Impressionist Paintings for Images and Video Patrick Gregory Callahan pgcallah@andrew.cmu.edu Department of Materials Science and Engineering Carnegie Mellon University May 7, 2010 1 Abstract A technique
More informationVirtual Reality I. Visual Imaging in the Electronic Age. Donald P. Greenberg November 9, 2017 Lecture #21
Virtual Reality I Visual Imaging in the Electronic Age Donald P. Greenberg November 9, 2017 Lecture #21 1968: Ivan Sutherland 1990s: HMDs, Henry Fuchs 2013: Google Glass History of Virtual Reality 2016:
More informationAutomation of JPEG Ghost Detection using Graph Based Segmentation
International Journal Of Computational Engineering Research (ijceronline.com) Vol. Issue. 2 Automation of JPEG Ghost Detection using Graph Based Segmentation Archana V Mire, Dr S B Dhok 2, Dr P D Porey,
More informationPassive Image Forensic Method to detect Copy Move Forgery in Digital Images
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in
More informationDemosaicing and Denoising on Simulated Light Field Images
Demosaicing and Denoising on Simulated Light Field Images Trisha Lian Stanford University tlian@stanford.edu Kyle Chiang Stanford University kchiang@stanford.edu Abstract Light field cameras use an array
More informationComputer Assisted Drafting (CAD) Level I & II
Computer Assisted Drafting (CAD) Level I & II Program Description: Level I The Computer Assisted Drafting program prepares students for successful careers beginning as entry level design drafters in Architectural,
More informationAN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM
AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,
More informationForgery Detection using Noise Inconsistency: A Review
Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by
More informationCH. 23 Mirrors and Lenses HW# 6, 7, 9, 11, 13, 21, 25, 31, 33, 35
CH. 23 Mirrors and Lenses HW# 6, 7, 9, 11, 13, 21, 25, 31, 33, 35 Mirrors Rays of light reflect off of mirrors, and where the reflected rays either intersect or appear to originate from, will be the location
More informationUnit 1: Image Formation
Unit 1: Image Formation 1. Geometry 2. Optics 3. Photometry 4. Sensor Readings Szeliski 2.1-2.3 & 6.3.5 1 Physical parameters of image formation Geometric Type of projection Camera pose Optical Sensor
More informationBuilding a Real Camera. Slides Credit: Svetlana Lazebnik
Building a Real Camera Slides Credit: Svetlana Lazebnik Home-made pinhole camera Slide by A. Efros http://www.debevec.org/pinhole/ Shrinking the aperture Why not make the aperture as small as possible?
More informationA Watermark for Image Integrity and Ownership Verification
A Watermark for Image Integrity and Ownership Verification Ping Wah Wong Hewlett Packard Company, 11000 Wolfe Road, Cupertino, CA 95014 Abstract We describe in this paper a ing scheme for ownership verification
More informationS SNR 10log. peak peak MSE. 1 MSE I i j
Noise Estimation Using Filtering and SVD for Image Tampering Detection U. M. Gokhale, Y.V.Joshi G.H.Raisoni Institute of Engineering and Technology for women, Nagpur Walchand College of Engineering, Sangli
More information2017 OCALA CAMERA CLUB COMPETITION THEMES
2017 OCALA CAMERA CLUB COMPETITION THEMES MONTH COMPETITION THEME January Single Vanishing Point February Repetition March Balance April Water May Animals sans Humans June Architecture July Motion Blur
More informationImage Formation and Capture
Figure credits: B. Curless, E. Hecht, W.J. Smith, B.K.P. Horn, A. Theuwissen, and J. Malik Image Formation and Capture COS 429: Computer Vision Image Formation and Capture Real world Optics Sensor Devices
More informationA Saturation-based Image Fusion Method for Static Scenes
2015 6th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES) A Saturation-based Image Fusion Method for Static Scenes Geley Peljor and Toshiaki Kondo Sirindhorn
More informationImage stitching. Image stitching. Video summarization. Applications of image stitching. Stitching = alignment + blending. geometrical registration
Image stitching Stitching = alignment + blending Image stitching geometrical registration photometric registration Digital Visual Effects, Spring 2006 Yung-Yu Chuang 2005/3/22 with slides by Richard Szeliski,
More informationImage Processing by Bilateral Filtering Method
ABHIYANTRIKI An International Journal of Engineering & Technology (A Peer Reviewed & Indexed Journal) Vol. 3, No. 4 (April, 2016) http://www.aijet.in/ eissn: 2394-627X Image Processing by Bilateral Image
More informationDigital Image Processing Introduction
Digital Processing Introduction Dr. Hatem Elaydi Electrical Engineering Department Islamic University of Gaza Fall 2015 Sep. 7, 2015 Digital Processing manipulation data might experience none-ideal acquisition,
More informationPart Design. Sketcher - Basic 1 13,0600,1488,1586(SP6)
Part Design Sketcher - Basic 1 13,0600,1488,1586(SP6) In this exercise, we will learn the foundation of the Sketcher and its basic functions. The Sketcher is a tool used to create two-dimensional (2D)
More informationA Copyright Information Embedding System
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 11 April 2015 ISSN (online): 2349-6010 A Copyright Information Embedding System Sreeresmi T.S Assistant Professor
More informationFragile Sensor Fingerprint Camera Identification
Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera
More informationYear 9 Summer Photography Assignment.
Year 9 Summer Photography Assignment. Year 9 GCSE Photography Summer assignment 2018: Task 1. Learning Objective: Writing about photographers in the context of their work related to your own project themes
More informationFake Photos Dan Hyde at Lewisburg Photography Club. Class Exercise. History of Fake Photos. Famous Photo of Abe Lincoln.
Fake Photos Dan Hyde at Lewisburg Photography Club Class Exercise Write a good but useful definition of a fake photo. Share your definition with a pair and discuss. A fake photo is July 19, 2018 Fake Photos
More informationThe Human Visual System!
an engineering-focused introduction to! The Human Visual System! EE367/CS448I: Computational Imaging and Display! stanford.edu/class/ee367! Lecture 2! Gordon Wetzstein! Stanford University! nautilus eye,
More informationAutodesk Inventor Introduction to Solid Modeling
Autodesk Inventor Introduction to Solid Modeling Course Length: 5 days The Autodesk Inventor Introduction to Solid Modeling training course provides you with an understanding of the parametric design philosophy
More informationFORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING
Chapter 21 FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING Gilbert Peterson Abstract The use of digital photography has increased over the past few years, a trend which opens the door for new and creative
More informationDr. Reham Karam. Perspective Drawing. For Artists & Designers. By : Dr.Reham Karam
Perspective Drawing For Artists & Designers By : Dr.Reham Karam Geometry and Art : What is perspective? Perspective, in the vision and visual perception, is : the way that objects appear to the eye based
More informationLenses, exposure, and (de)focus
Lenses, exposure, and (de)focus http://graphics.cs.cmu.edu/courses/15-463 15-463, 15-663, 15-862 Computational Photography Fall 2017, Lecture 15 Course announcements Homework 4 is out. - Due October 26
More informationMulti Viewpoint Panoramas
27. November 2007 1 Motivation 2 Methods Slit-Scan "The System" 3 "The System" Approach Preprocessing Surface Selection Panorama Creation Interactive Renement 4 Sources Motivation image showing long continous
More informationComputational Photography
Computational photography Computational Photography Digital Visual Effects Yung-Yu Chuang wikipedia: Computational photography h refers broadly to computational imaging techniques that enhance or extend
More informationInformation Forensics: An Overview of the First Decade
Received March 8, 2013, accepted April 6, 2013, published May 10, 2013. Digital Object Identifier 10.1109/ACCESS.2013.2260814 Information Forensics: An Overview of the First Decade MATTHEW C. STAMM (MEMBER,
More informationContinuous Flash. October 1, Technical Report MSR-TR Microsoft Research Microsoft Corporation One Microsoft Way Redmond, WA 98052
Continuous Flash Hugues Hoppe Kentaro Toyama October 1, 2003 Technical Report MSR-TR-2003-63 Microsoft Research Microsoft Corporation One Microsoft Way Redmond, WA 98052 Page 1 of 7 Abstract To take a
More informationAdding Realistic Camera Effects to the Computer Graphics Camera Model
Adding Realistic Camera Effects to the Computer Graphics Camera Model Ryan Baltazar May 4, 2012 1 Introduction The camera model traditionally used in computer graphics is based on the camera obscura or
More informationECC419 IMAGE PROCESSING
ECC419 IMAGE PROCESSING INTRODUCTION Image Processing Image processing is a subclass of signal processing concerned specifically with pictures. Digital Image Processing, process digital images by means
More informationCS6670: Computer Vision
CS6670: Computer Vision Noah Snavely Lecture 22: Computational photography photomatix.com Announcements Final project midterm reports due on Tuesday to CMS by 11:59pm BRDF s can be incredibly complicated
More informationTechniques. Introduction to Drawing Final Exam Study Guide
Introduction to Drawing Final Exam Study Guide There are many ways to draw: line-based, value-based, reverse drawing these are just a few. This studyguide will break down your drawing study by techniques
More informationMeasure of image enhancement by parameter controlled histogram distribution using color image
Measure of image enhancement by parameter controlled histogram distribution using color image P.Senthil kumar 1, M.Chitty babu 2, K.Selvaraj 3 1 PSNA College of Engineering & Technology 2 PSNA College
More informationLens Design I. Lecture 3: Properties of optical systems II Herbert Gross. Summer term
Lens Design I Lecture 3: Properties of optical systems II 205-04-8 Herbert Gross Summer term 206 www.iap.uni-jena.de 2 Preliminary Schedule 04.04. Basics 2.04. Properties of optical systrems I 3 8.04.
More informationGeometrical Optics. Have you ever entered an unfamiliar room in which one wall was covered with a
Return to Table of Contents HAPTER24 C. Geometrical Optics A mirror now used in the Hubble space telescope Have you ever entered an unfamiliar room in which one wall was covered with a mirror and thought
More informationIMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE
Second Asian Conference on Computer Vision (ACCV9), Singapore, -8 December, Vol. III, pp. 6-1 (invited) IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE Jia Hong Yin, Sergio
More informationA JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid
A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu
More informationCamera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques
Camera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques Brian A. Barsky 1,2,3,DanielR.Horn 1, Stanley A. Klein 2,3,JeffreyA.Pang 1, and Meng Yu 1 1 Computer Science
More informationIMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES
Chiew K.T., et al. (Eds.): PGRES 2017, Kuala Lumpur: Eastin Hotel, FCSIT, 2017: pp 35-42 IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Thamarai Subramaniam and Hamid
More information