Exposing Photo Manipulation with Geometric Inconsistencies

Size: px
Start display at page:

Download "Exposing Photo Manipulation with Geometric Inconsistencies"

Transcription

1 Exposing Photo Manipulation with Geometric Inconsistencies James F. O Brien U.C. Berkeley Collaborators Hany Farid Eric Kee Valentina Conotter Stephen Bailey 1 image-forensics-pg14.key - October 9, 2014

2 Communication by Images 2-1 image-forensics-pg14.key - October 9, 2014

3 Communication by Images 2-2 image-forensics-pg14.key - October 9, 2014

4 Image Manipulation Iranian missile test, image-forensics-pg14.key - October 9, 2014

5 Image Manipulation Iranian missile test, image-forensics-pg14.key - October 9, 2014

6 Image Manipulation Iranian stealth fighter, image-forensics-pg14.key - October 9, 2014

7 Image Manipulation Iranian stealth fighter, image-forensics-pg14.key - October 9, 2014

8 Image Manipulation Economist manipulates image of Obama, image-forensics-pg14.key - October 9, 2014

9 Image Manipulation Economist manipulates image of Obama, image-forensics-pg14.key - October 9, 2014

10 Image Manipulation Fabricated image of John Kerry and Jane Fonda, image-forensics-pg14.key - October 9, 2014

11 Image Manipulation Fabricated image of John Kerry and Jane Fonda, image-forensics-pg14.key - October 9, 2014

12 Video Manipulation Flying Birdman Hoax, image-forensics-pg14.key - October 9, 2014

13 Video Manipulation Flying Birdman Hoax, image-forensics-pg14.key - October 9, 2014

14 Historical Image Manipulation Image manipulation as old as photography Primitive techniques work surprisingly well Library of Congress archive photo of Abraham Lincoln image-forensics-pg14.key - October 9, 2014

15 Historical Image Manipulation Image manipulation as old as photography Primitive techniques work surprisingly well Library of Congress archive photo of Abraham Lincoln image-forensics-pg14.key - October 9, 2014

16 Historical Image Manipulation 9-1 image-forensics-pg14.key - October 9, 2014

17 Historical Image Manipulation 9-2 image-forensics-pg14.key - October 9, 2014

18 Image Forensics Detect forgeries Detect signs of manipulation Prove image was modified in some way Cannot prove an image unmodified! Suite of detection tools Individual methods can be countered by informed attacker Individual tools may not apply in all cases Each additional method makes forgery harder 10 image-forensics-pg14.key - October 9, 2014

19 Advantage: Forgers People: Good at understanding scene content Poor at noticing many types of inconsistencies Simple manipulation methods work well New manipulation methods being developed 11 image-forensics-pg14.key - October 9, 2014

20 Example Inconsistency Selected as correct: 62.1% Selected as correct: 50.1% N = 20; RT = 7.6s Farid and Bravo image-forensics-pg14.key - October 9, 2014

21 Things we don t see 13 image-forensics-pg14.key - October 9, 2014

22 Things we don t see 14 image-forensics-pg14.key - October 9, 2014

23 Advantage: Forgers People: Good at understanding scene content Poor at noticing many types of inconsistencies Simple manipulation methods work well New manipulation methods being developed 15 image-forensics-pg14.key - October 9, 2014

24 Image Forensics Format Methods EXIF meta data Quantization tables Coding decisions Signatures or watermarks Pixel Methods Linear dependance Bayer pattern artifacts Chromatic aberration Compression artifacts Not tied to scene content Easy to apply Easy to fool (informed attacker) Not robust to common operations 16 image-forensics-pg14.key - October 9, 2014

25 Image Forensics Geometric methods Content inconsistencies Require human annotation Computer analysis Examples: Shadows Lighting Reflections 17 image-forensics-pg14.key - October 9, 2014

26 Geometric Image Forensics Not same as Computer Vision Possibly user involved in loop Only looking for inconsistencies only Don t need to fully extract scene content 18 image-forensics-pg14.key - October 9, 2014

27 19 image-forensics-pg14.key - October 9, 2014

28 20 image-forensics-pg14.key - October 9, 2014

29 21 image-forensics-pg14.key - October 9, 2014

30 22 image-forensics-pg14.key - October 9, 2014

31 23 image-forensics-pg14.key - October 9, 2014

32 24 image-forensics-pg14.key - October 9, 2014

33 25 image-forensics-pg14.key - October 9, 2014

34 26 image-forensics-pg14.key - October 9, 2014

35 27 image-forensics-pg14.key - October 9, 2014

36 28 image-forensics-pg14.key - October 9, 2014

37 29 image-forensics-pg14.key - October 9, 2014

38 30 image-forensics-pg14.key - October 9, 2014

39 31 image-forensics-pg14.key - October 9, 2014

40 32 image-forensics-pg14.key - October 9, 2014

41 33 image-forensics-pg14.key - October 9, 2014

42 34 image-forensics-pg14.key - October 9, 2014

43 35 image-forensics-pg14.key - October 9, 2014

44 Light in front of camera Light behind camera 36 image-forensics-pg14.key - October 9, 2014

45 37 image-forensics-pg14.key - October 9, 2014

46 38 image-forensics-pg14.key - October 9, 2014

47 39 image-forensics-pg14.key - October 9, 2014

48 40 image-forensics-pg14.key - October 9, 2014

49 Shading Constraints (b) (c) 41 image-forensics-pg14.key - October 9, 2014

50 Shading Constraints 1 a b 2 c d a b c d 42 image-forensics-pg14.key - October 9, 2014

51 Shading Constraints a 1 c b d a b c d 43 image-forensics-pg14.key - October 9, 2014

52 Shading Constraints a 4 c 4 b 3 a b c 44 image-forensics-pg14.key - October 9, 2014

53 Motion in Video 45-1 image-forensics-pg14.key - October 9, 2014

54 Motion in Video 45-2 image-forensics-pg14.key - October 9, 2014

55 Parabolic Motion in World (Still Camera) p = p 0 + t v ( t )2 g p = c + (q c) 2 1..n p Solve for: v 0 g q c 46 image-forensics-pg14.key - October 9, 2014

56 Matching observed motion y x z 47 image-forensics-pg14.key - October 9, 2014

57 watch?v=wbah52ji3so 48-1 image-forensics-pg14.key - October 9, 2014

58 watch?v=wbah52ji3so 48-2 image-forensics-pg14.key - October 9, 2014

59 49-1 image-forensics-pg14.key - October 9, 2014

60 49-2 image-forensics-pg14.key - October 9, 2014

61 y x z 50-1 image-forensics-pg14.key - October 9, 2014

62 y x z 50-2 image-forensics-pg14.key - October 9, 2014

63 Parabolic Motion in World (Moving Camera) p = p 0 + t v ( t )2 g p = c + (q c) 2 1..n p Solve for: v 0 g q Track camera motion c 51 image-forensics-pg14.key - October 9, 2014

64 52-1 image-forensics-pg14.key - October 9, 2014

65 52-2 image-forensics-pg14.key - October 9, 2014

66 y z x 53 image-forensics-pg14.key - October 9, 2014

67 Basic Mirror Geometry Linear perspective image Mirror Image View Object Reflection of object 54 image-forensics-pg14.key - October 9, 2014

68 Basic Mirror Geometry 55-1 image-forensics-pg14.key - October 9, 2014

69 Basic Mirror Geometry 55-2 image-forensics-pg14.key - October 9, 2014

70 Basic Mirror Geometry Mirror-Parallel View Object Point Reflected Point n COP Mirror 56 image-forensics-pg14.key - October 9, 2014

71 Basic Mirror Geometry Mirror-Parallel View Object Reflection Mirror 57 image-forensics-pg14.key - October 9, 2014

72 Basic Mirror Geometry Bundle of parallel lines Mirror-Parallel View Object Reflection In original image they must converge to a common vanishing point.! (Possibly at infinity) Mirror 58 image-forensics-pg14.key - October 9, 2014

73 Reflection Vanishing Point Real Photograph 59 image-forensics-pg14.key - October 9, 2014

74 Reflection Vanishing Point Real Photograph v 60 image-forensics-pg14.key - October 9, 2014

75 Reflection Vanishing Point Altered Photograph 61 image-forensics-pg14.key - October 9, 2014

76 Reflection Vanishing Point Altered Photograph 62 image-forensics-pg14.key - October 9, 2014

77 Reflection Vanishing Point Altered Photograph 63 image-forensics-pg14.key - October 9, 2014

78 Reflection Vanishing Point Altered Photograph 64 image-forensics-pg14.key - October 9, 2014

79 Examples 65 image-forensics-pg14.key - October 9, 2014

80 Examples 66-1 image-forensics-pg14.key - October 9, 2014

81 Examples 66-2 image-forensics-pg14.key - October 9, 2014

82 Examples Composite photo World News, copyright image-forensics-pg14.key - October 9, 2014

83 Examples Composite photo World News, copyright image-forensics-pg14.key - October 9, 2014

84 Examples Composite photo World News, copyright image-forensics-pg14.key - October 9, 2014

85 Examples Photo by Alexi Lubomirski, The Saint and the Sinner, copyright image-forensics-pg14.key - October 9, 2014

86 Examples Photo by Alexi Lubomirski, The Saint and the Sinner, copyright image-forensics-pg14.key - October 9, 2014

87 Examples Photo by Alexi Lubomirski, The Saint and the Sinner, copyright image-forensics-pg14.key - October 9, 2014

88 Center of Projection COP determined by 3 orthogonal vanishing points 71-1 image-forensics-pg14.key - October 9, 2014

89 Center of Projection COP determined by 3 orthogonal vanishing points v 1 v 2 v image-forensics-pg14.key - October 9, 2014

90 Center of Projection COP determined by 3 orthogonal vanishing points v 1 v 2 C v 1 Image Plane v 3 v 2 72 image-forensics-pg14.key - October 9, 2014

91 Center of Projection COP determined by 3 orthogonal vanishing points v 1 v 2 C v 1 Image Plane v 3 v image-forensics-pg14.key - October 9, 2014

92 Center of Projection COP determined by 3 orthogonal vanishing points v 1 v 2 v 1 C Image Plane v 2 v 3 (C V 1 ) (C V 2 )= image-forensics-pg14.key - October 9, 2014

93 Center of Projection COP determined by 3 orthogonal vanishing points v 1 v 2 v 1 C Image Plane v 2 v 3 (C V 1 ) (C V 2 )=0 (C V 2 ) (C V 3 )=0 (C V 3 ) (C V 1 )=0 74 image-forensics-pg14.key - October 9, 2014

94 Center of Projection COP determined by 3 orthogonal vanishing points V 1 V 2 C v 1 Image Plane v 2 C V 3 (C V 1 ) (C V 2 )=0 (C V 2 ) (C V 3 )=0 (C V 3 ) (C V 1 )=0 75 image-forensics-pg14.key - October 9, 2014

95 Center of Projection COP determined by 3 orthogonal vanishing points System of quadratic equations (C V 1 ) (C V 2 )=0 (C V 2 ) (C V 3 )=0 (C V 3 ) (C V 1 )=0 Easy to solve by change of variables 76 image-forensics-pg14.key - October 9, 2014

96 Center of Projection Building and other structures Reflectors with rectangular frames!! Frames: two orthogonal vanishing points Reflected features: third vanishing point Compare COP from separate elements in the image 77 image-forensics-pg14.key - October 9, 2014

97 Center of Projection Computation is unstable Step 1: intersect [nearly parallel] lines Step 2: intersect spheres 78-1 image-forensics-pg14.key - October 9, 2014

98 Center of Projection Computation is unstable Step 1: intersect [nearly parallel] lines Step 2: intersect spheres 78-2 image-forensics-pg14.key - October 9, 2014

99 Center of Projection Computation is unstable Step 1: intersect [nearly parallel] lines Step 2: intersect spheres 79-1 image-forensics-pg14.key - October 9, 2014

100 Center of Projection Computation is unstable Step 1: intersect [nearly parallel] lines Step 2: intersect spheres 79-2 image-forensics-pg14.key - October 9, 2014

101 Center of Projection Computation is unstable Step 1: intersect [nearly parallel] lines Step 2: intersect spheres Instability squared 79-3 image-forensics-pg14.key - October 9, 2014

102 Center of Projection Error sources: Image resolution User pointing accuracy Features from different perspectives COP calculation magnifies error Structure in instability 80-1 image-forensics-pg14.key - October 9, 2014

103 Center of Projection Error sources: Image resolution User pointing accuracy Features from different perspectives COP calculation magnifies error Structure in instability Specify regions, not points 80-2 image-forensics-pg14.key - October 9, 2014

104 Center of Projection Error sources: Image resolution User pointing accuracy Features from different perspectives COP calculation magnifies error Structure in instability Specify regions, not points *This diagram not to scale 80-3 image-forensics-pg14.key - October 9, 2014

105 Center of Projection Real Photograph 81-1 image-forensics-pg14.key - October 9, 2014

106 Center of Projection Real Photograph 81-2 image-forensics-pg14.key - October 9, 2014

107 Center of Projection Real Photograph 81-3 image-forensics-pg14.key - October 9, 2014

108 Center of Projection Altered Photograph 82-1 image-forensics-pg14.key - October 9, 2014

109 Center of Projection Altered Photograph 82-2 image-forensics-pg14.key - October 9, 2014

110 Center of Projection Altered Photograph 82-3 image-forensics-pg14.key - October 9, 2014

111 Center of Projection 83-1 image-forensics-pg14.key - October 9, 2014

112 Center of Projection 83-2 image-forensics-pg14.key - October 9, 2014

113 Center of Projection Real Photograph Altered Photograph 83-3 image-forensics-pg14.key - October 9, 2014

114 CoP from Faces Work in progress 84 image-forensics-pg14.key - October 9, 2014

115 CoP from Faces Work in progress 85 image-forensics-pg14.key - October 9, 2014

116 CoP from Faces Work in progress 86 image-forensics-pg14.key - October 9, 2014

117 CoP from Faces Work in progress 87 image-forensics-pg14.key - October 9, 2014

118 Summary Geometric Image Forensics Human annotation Computer analysis Part of analysis toolbox Not always applicable Together make forgery more difficult Constrain image content 88 image-forensics-pg14.key - October 9, 2014

119 Relevant Papers Eric Kee, James F. O'Brien, and Hany Farid. Exposing Photo Manipulation from Shadows and Shading. ACM Transactions on Graphics, too appear. Presented at SIGGRAPH Eric Kee, James F. O'Brien, and Hany Farid. Exposing Photo Manipulation with Inconsistent Shadows. ACM Transactions on Graphics, 32(4):28:1 12, September Presented at SIGGRAPH Valentina Conotter, James F. O'Brien, and Hany Farid. Exposing Digital Forgeries in Ballistic Motion. IEEE Transactions on Information Forensics and Security, 7(1): , February James F. O'Brien and Hany Farid. Exposing Photo Manipulation with Inconsistent Reflections. ACM Transactions on Graphics, 31(1):4:1 11, January Presented at SIGGRAPH image-forensics-pg14.key - October 9, 2014

120 Thank You 90 image-forensics-pg14.key - October 9, 2014

Impeding Forgers at Photo Inception

Impeding Forgers at Photo Inception Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth

More information

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department

More information

Exposing Digital Forgeries from JPEG Ghosts

Exposing Digital Forgeries from JPEG Ghosts 1 Exposing Digital Forgeries from JPEG Ghosts Hany Farid, Member, IEEE Abstract When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ A REVIEW OF TRENDS IN DIGITAL IMAGE PROCESSING FOR FORENSIC CONSIDERATION Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ Department of Forensic Science Sam Higginbottom Institute of agriculture Technology

More information

The Lee Harvey Oswald backyard photos: real or fake?

The Lee Harvey Oswald backyard photos: real or fake? Perception, 2009, volume 38, pages 1731 ^ 1734 doi:10.1068/p6580 LAST BUT NOT LEAST The Lee Harvey Oswald backyard photos: real or fake? Hany Farid Department of Computer Science, Dartmouth College, Hanover,

More information

IMAGE SPLICING FORGERY DETECTION

IMAGE SPLICING FORGERY DETECTION IMAGE SPLICING FORGERY DETECTION 1 SIDDHI GAUR, 2 SHAMIK TIWARI 1 M.Tech, 2 Assistant Professor, Dept of CSE, Mody University of Science and Technology, Sikar,India E-mail: 1 siddhi.gaur14@gmail.com, 2

More information

Tampering and Copy-Move Forgery Detection Using Sift Feature

Tampering and Copy-Move Forgery Detection Using Sift Feature Tampering and Copy-Move Forgery Detection Using Sift Feature N.Anantharaj 1 M-TECH (IT) Final Year, Department of IT, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India 1 ABSTRACT:

More information

Survey On Passive-Blind Image Forensics

Survey On Passive-Blind Image Forensics Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal

More information

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES International Journal of Advanced Technology & Engineering Research (IJATER) 3 rd International e-conference on Emerging Trends in Technology DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES Govindraj

More information

Neuro-Fuzzy based First Responder for Image forgery Identification

Neuro-Fuzzy based First Responder for Image forgery Identification ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian

More information

Astronomy 80 B: Light. Lecture 9: curved mirrors, lenses, aberrations 29 April 2003 Jerry Nelson

Astronomy 80 B: Light. Lecture 9: curved mirrors, lenses, aberrations 29 April 2003 Jerry Nelson Astronomy 80 B: Light Lecture 9: curved mirrors, lenses, aberrations 29 April 2003 Jerry Nelson Sensitive Countries LLNL field trip 2003 April 29 80B-Light 2 Topics for Today Optical illusion Reflections

More information

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic

More information

Chapter 23. Light Geometric Optics

Chapter 23. Light Geometric Optics Chapter 23. Light Geometric Optics There are 3 basic ways to gather light and focus it to make an image. Pinhole - Simple geometry Mirror - Reflection Lens - Refraction Pinhole Camera Image Formation (the

More information

Chapter 34 Geometric Optics (also known as Ray Optics) by C.-R. Hu

Chapter 34 Geometric Optics (also known as Ray Optics) by C.-R. Hu Chapter 34 Geometric Optics (also known as Ray Optics) by C.-R. Hu 1. Principles of image formation by mirrors (1a) When all length scales of objects, gaps, and holes are much larger than the wavelength

More information

Automatic Selection of Brackets for HDR Image Creation

Automatic Selection of Brackets for HDR Image Creation Automatic Selection of Brackets for HDR Image Creation Michel VIDAL-NAQUET, Wei MING Abstract High Dynamic Range imaging (HDR) is now readily available on mobile devices such as smart phones and compact

More information

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence

More information

Format Based Photo Forgery Image Detection S. Murali

Format Based Photo Forgery Image Detection S. Murali Format Based Photo Forgery Image Detection S. Murali Govindraj B. Chittapur H. S. Prabhakara Maharaja Research Foundation MIT, Mysore, INDIA Basaveshwar Engineering College Bagalkot, INDIA Maharaja Research

More information

Digital Image Authentication from Thumbnails

Digital Image Authentication from Thumbnails Digital Image Authentication from Thumbnails Eric Kee and Hany Farid Department of Computer Science, Dartmouth College, Hanover NH 3755, USA ABSTRACT We describe how to exploit the formation and storage

More information

Notation for Mirrors and Lenses. Chapter 23. Types of Images for Mirrors and Lenses. More About Images

Notation for Mirrors and Lenses. Chapter 23. Types of Images for Mirrors and Lenses. More About Images Notation for Mirrors and Lenses Chapter 23 Mirrors and Lenses Sections: 4, 6 Problems:, 8, 2, 25, 27, 32 The object distance is the distance from the object to the mirror or lens Denoted by p The image

More information

Main Subject Detection of Image by Cropping Specific Sharp Area

Main Subject Detection of Image by Cropping Specific Sharp Area Main Subject Detection of Image by Cropping Specific Sharp Area FOTIOS C. VAIOULIS 1, MARIOS S. POULOS 1, GEORGE D. BOKOS 1 and NIKOLAOS ALEXANDRIS 2 Department of Archives and Library Science Ionian University

More information

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008 Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright

More information

LENSES. INEL 6088 Computer Vision

LENSES. INEL 6088 Computer Vision LENSES INEL 6088 Computer Vision Digital camera A digital camera replaces film with a sensor array Each cell in the array is a Charge Coupled Device light-sensitive diode that converts photons to electrons

More information

Chapters 1 & 2. Definitions and applications Conceptual basis of photogrammetric processing

Chapters 1 & 2. Definitions and applications Conceptual basis of photogrammetric processing Chapters 1 & 2 Chapter 1: Photogrammetry Definitions and applications Conceptual basis of photogrammetric processing Transition from two-dimensional imagery to three-dimensional information Automation

More information

Digital Image Forgery Identification Using Motion Blur Variations as Clue

Digital Image Forgery Identification Using Motion Blur Variations as Clue Digital Image Forgery Identification Using Motion Blur Variations as Clue P. M. Birajdar*, N. G. Dharashive** Abstract: Fake images have become common in society today. In all forms of media one can easily

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif

More information

Consider two lines and. Then we could know. where. By letting L and M be orthogonal and using the fact that become

Consider two lines and. Then we could know. where. By letting L and M be orthogonal and using the fact that become ECE661 Computer Vision - Fall 2014 - HW3 Fu-Chen Chen chen1623@purdue.edu 2.1.1 Remove projective distortion To remove the projective distortion we have to take back the vanishing line in the image to

More information

Ch 24. Geometric Optics

Ch 24. Geometric Optics text concept Ch 24. Geometric Optics Fig. 24 3 A point source of light P and its image P, in a plane mirror. Angle of incidence =angle of reflection. text. Fig. 24 4 The blue dashed line through object

More information

CS 443: Imaging and Multimedia Cameras and Lenses

CS 443: Imaging and Multimedia Cameras and Lenses CS 443: Imaging and Multimedia Cameras and Lenses Spring 2008 Ahmed Elgammal Dept of Computer Science Rutgers University Outlines Cameras and lenses! 1 They are formed by the projection of 3D objects.

More information

Chapter 23. Mirrors and Lenses

Chapter 23. Mirrors and Lenses Chapter 23 Mirrors and Lenses Notation for Mirrors and Lenses The object distance is the distance from the object to the mirror or lens Denoted by p The image distance is the distance from the image to

More information

Image Formation: Camera Model

Image Formation: Camera Model Image Formation: Camera Model Ruigang Yang COMP 684 Fall 2005, CS684-IBMR Outline Camera Models Pinhole Perspective Projection Affine Projection Camera with Lenses Digital Image Formation The Human Eye

More information

Chapter 23. Mirrors and Lenses

Chapter 23. Mirrors and Lenses Chapter 23 Mirrors and Lenses Mirrors and Lenses The development of mirrors and lenses aided the progress of science. It led to the microscopes and telescopes. Allowed the study of objects from microbes

More information

Countering Anti-Forensics of Lateral Chromatic Aberration

Countering Anti-Forensics of Lateral Chromatic Aberration IH&MMSec 7, June -, 7, Philadelphia, PA, USA Countering Anti-Forensics of Lateral Chromatic Aberration Owen Mayer Drexel University Department of Electrical and Computer Engineering Philadelphia, PA, USA

More information

Image Processing & Projective geometry

Image Processing & Projective geometry Image Processing & Projective geometry Arunkumar Byravan Partial slides borrowed from Jianbo Shi & Steve Seitz Color spaces RGB Red, Green, Blue HSV Hue, Saturation, Value Why HSV? HSV separates luma,

More information

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies International Journal of Computer and Communication Engineering, Vol. 4, No., January 25 Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies Bo Liu and Chi-Man Pun Noise patterns

More information

Cameras. CSE 455, Winter 2010 January 25, 2010

Cameras. CSE 455, Winter 2010 January 25, 2010 Cameras CSE 455, Winter 2010 January 25, 2010 Announcements New Lecturer! Neel Joshi, Ph.D. Post-Doctoral Researcher Microsoft Research neel@cs Project 1b (seam carving) was due on Friday the 22 nd Project

More information

Applications of Optics

Applications of Optics Nicholas J. Giordano www.cengage.com/physics/giordano Chapter 26 Applications of Optics Marilyn Akins, PhD Broome Community College Applications of Optics Many devices are based on the principles of optics

More information

Chapter 18 Optical Elements

Chapter 18 Optical Elements Chapter 18 Optical Elements GOALS When you have mastered the content of this chapter, you will be able to achieve the following goals: Definitions Define each of the following terms and use it in an operational

More information

E X P E R I M E N T 12

E X P E R I M E N T 12 E X P E R I M E N T 12 Mirrors and Lenses Produced by the Physics Staff at Collin College Copyright Collin College Physics Department. All Rights Reserved. University Physics II, Exp 12: Mirrors and Lenses

More information

Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography

Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography Xi Luo Stanford University 450 Serra Mall, Stanford, CA 94305 xluo2@stanford.edu Abstract The project explores various application

More information

Computer Aided Design Parametric Modelling

Computer Aided Design Parametric Modelling Level: 2 Credit value: 10 Unit aim The use of computer aide design (CAD) systems in industry has become an essential part of the modern working environment. It is used at all stages of the design period,

More information

CS 465 Prelim 1. Tuesday 4 October hours. Problem 1: Image formats (18 pts)

CS 465 Prelim 1. Tuesday 4 October hours. Problem 1: Image formats (18 pts) CS 465 Prelim 1 Tuesday 4 October 2005 1.5 hours Problem 1: Image formats (18 pts) 1. Give a common pixel data format that uses up the following numbers of bits per pixel: 8, 16, 32, 36. For instance,

More information

Different-quality Re-demosaicing in Digital Image Forensics

Different-quality Re-demosaicing in Digital Image Forensics Different-quality Re-demosaicing in Digital Image Forensics 1 Bo Wang, 2 Xiangwei Kong, 3 Lanying Wu *1,2,3 School of Information and Communication Engineering, Dalian University of Technology E-mail:

More information

Tampering Detection Algorithms: A Comparative Study

Tampering Detection Algorithms: A Comparative Study International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study

More information

3D Viewing. Introduction to Computer Graphics Torsten Möller / Manfred Klaffenböck. Machiraju/Zhang/Möller

3D Viewing. Introduction to Computer Graphics Torsten Möller / Manfred Klaffenböck. Machiraju/Zhang/Möller 3D Viewing Introduction to Computer Graphics Torsten Möller / Manfred Klaffenböck Machiraju/Zhang/Möller Reading Chapter 5 of Angel Chapter 13 of Hughes, van Dam, Chapter 7 of Shirley+Marschner Machiraju/Zhang/Möller

More information

IMAGE COMPOSITE DETECTION USING CUSTOMIZED

IMAGE COMPOSITE DETECTION USING CUSTOMIZED IMAGE COMPOSITE DETECTION USING CUSTOMIZED Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad ssm@iiita.ac.in rctripathi@iiita.ac.in ABSTRACT The multimedia applications

More information

Inventor 2016 Essentials Plus

Inventor 2016 Essentials Plus Autodesk NEW Features a chapter on sheet metal design Inventor 2016 Essentials Plus Daniel T. Banach & Travis Jones SDC PUBLICATIONS Better Textbooks. Lower Prices. www.sdcpublications.com Powered by TCPDF

More information

VHT New Photographer Training

VHT New Photographer Training VHT New Photographer Training VHT Photography General Requirements Apply to Signature and Premium Keep aperture between f8-f11 always ISO of 200 Shoot as jpg, Size Large and Quality Fine Always take additional

More information

A Mathematical model for the determination of distance of an object in a 2D image

A Mathematical model for the determination of distance of an object in a 2D image A Mathematical model for the determination of distance of an object in a 2D image Deepu R 1, Murali S 2,Vikram Raju 3 Maharaja Institute of Technology Mysore, Karnataka, India rdeepusingh@mitmysore.in

More information

COPYRIGHTED MATERIAL. Overview

COPYRIGHTED MATERIAL. Overview In normal experience, our eyes are constantly in motion, roving over and around objects and through ever-changing environments. Through this constant scanning, we build up experience data, which is manipulated

More information

Multimedia Forensics

Multimedia Forensics Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer

More information

CS354 Computer Graphics Viewing and Projections

CS354 Computer Graphics Viewing and Projections Slide Credit: Donald S. Fussell CS354 Computer Graphics Viewing and Projections Qixing Huang February 19th 2018 Eye Coordinates (not NDC) Planar Geometric Projections Standard projections project onto

More information

COPYRIGHTED MATERIAL OVERVIEW 1

COPYRIGHTED MATERIAL OVERVIEW 1 OVERVIEW 1 In normal experience, our eyes are constantly in motion, roving over and around objects and through ever-changing environments. Through this constant scanning, we build up experiential data,

More information

Implementation of Adaptive Coded Aperture Imaging using a Digital Micro-Mirror Device for Defocus Deblurring

Implementation of Adaptive Coded Aperture Imaging using a Digital Micro-Mirror Device for Defocus Deblurring Implementation of Adaptive Coded Aperture Imaging using a Digital Micro-Mirror Device for Defocus Deblurring Ashill Chiranjan and Bernardt Duvenhage Defence, Peace, Safety and Security Council for Scientific

More information

Fake Impressionist Paintings for Images and Video

Fake Impressionist Paintings for Images and Video Fake Impressionist Paintings for Images and Video Patrick Gregory Callahan pgcallah@andrew.cmu.edu Department of Materials Science and Engineering Carnegie Mellon University May 7, 2010 1 Abstract A technique

More information

Virtual Reality I. Visual Imaging in the Electronic Age. Donald P. Greenberg November 9, 2017 Lecture #21

Virtual Reality I. Visual Imaging in the Electronic Age. Donald P. Greenberg November 9, 2017 Lecture #21 Virtual Reality I Visual Imaging in the Electronic Age Donald P. Greenberg November 9, 2017 Lecture #21 1968: Ivan Sutherland 1990s: HMDs, Henry Fuchs 2013: Google Glass History of Virtual Reality 2016:

More information

Automation of JPEG Ghost Detection using Graph Based Segmentation

Automation of JPEG Ghost Detection using Graph Based Segmentation International Journal Of Computational Engineering Research (ijceronline.com) Vol. Issue. 2 Automation of JPEG Ghost Detection using Graph Based Segmentation Archana V Mire, Dr S B Dhok 2, Dr P D Porey,

More information

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in

More information

Demosaicing and Denoising on Simulated Light Field Images

Demosaicing and Denoising on Simulated Light Field Images Demosaicing and Denoising on Simulated Light Field Images Trisha Lian Stanford University tlian@stanford.edu Kyle Chiang Stanford University kchiang@stanford.edu Abstract Light field cameras use an array

More information

Computer Assisted Drafting (CAD) Level I & II

Computer Assisted Drafting (CAD) Level I & II Computer Assisted Drafting (CAD) Level I & II Program Description: Level I The Computer Assisted Drafting program prepares students for successful careers beginning as entry level design drafters in Architectural,

More information

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,

More information

Forgery Detection using Noise Inconsistency: A Review

Forgery Detection using Noise Inconsistency: A Review Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by

More information

CH. 23 Mirrors and Lenses HW# 6, 7, 9, 11, 13, 21, 25, 31, 33, 35

CH. 23 Mirrors and Lenses HW# 6, 7, 9, 11, 13, 21, 25, 31, 33, 35 CH. 23 Mirrors and Lenses HW# 6, 7, 9, 11, 13, 21, 25, 31, 33, 35 Mirrors Rays of light reflect off of mirrors, and where the reflected rays either intersect or appear to originate from, will be the location

More information

Unit 1: Image Formation

Unit 1: Image Formation Unit 1: Image Formation 1. Geometry 2. Optics 3. Photometry 4. Sensor Readings Szeliski 2.1-2.3 & 6.3.5 1 Physical parameters of image formation Geometric Type of projection Camera pose Optical Sensor

More information

Building a Real Camera. Slides Credit: Svetlana Lazebnik

Building a Real Camera. Slides Credit: Svetlana Lazebnik Building a Real Camera Slides Credit: Svetlana Lazebnik Home-made pinhole camera Slide by A. Efros http://www.debevec.org/pinhole/ Shrinking the aperture Why not make the aperture as small as possible?

More information

A Watermark for Image Integrity and Ownership Verification

A Watermark for Image Integrity and Ownership Verification A Watermark for Image Integrity and Ownership Verification Ping Wah Wong Hewlett Packard Company, 11000 Wolfe Road, Cupertino, CA 95014 Abstract We describe in this paper a ing scheme for ownership verification

More information

S SNR 10log. peak peak MSE. 1 MSE I i j

S SNR 10log. peak peak MSE. 1 MSE I i j Noise Estimation Using Filtering and SVD for Image Tampering Detection U. M. Gokhale, Y.V.Joshi G.H.Raisoni Institute of Engineering and Technology for women, Nagpur Walchand College of Engineering, Sangli

More information

2017 OCALA CAMERA CLUB COMPETITION THEMES

2017 OCALA CAMERA CLUB COMPETITION THEMES 2017 OCALA CAMERA CLUB COMPETITION THEMES MONTH COMPETITION THEME January Single Vanishing Point February Repetition March Balance April Water May Animals sans Humans June Architecture July Motion Blur

More information

Image Formation and Capture

Image Formation and Capture Figure credits: B. Curless, E. Hecht, W.J. Smith, B.K.P. Horn, A. Theuwissen, and J. Malik Image Formation and Capture COS 429: Computer Vision Image Formation and Capture Real world Optics Sensor Devices

More information

A Saturation-based Image Fusion Method for Static Scenes

A Saturation-based Image Fusion Method for Static Scenes 2015 6th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES) A Saturation-based Image Fusion Method for Static Scenes Geley Peljor and Toshiaki Kondo Sirindhorn

More information

Image stitching. Image stitching. Video summarization. Applications of image stitching. Stitching = alignment + blending. geometrical registration

Image stitching. Image stitching. Video summarization. Applications of image stitching. Stitching = alignment + blending. geometrical registration Image stitching Stitching = alignment + blending Image stitching geometrical registration photometric registration Digital Visual Effects, Spring 2006 Yung-Yu Chuang 2005/3/22 with slides by Richard Szeliski,

More information

Image Processing by Bilateral Filtering Method

Image Processing by Bilateral Filtering Method ABHIYANTRIKI An International Journal of Engineering & Technology (A Peer Reviewed & Indexed Journal) Vol. 3, No. 4 (April, 2016) http://www.aijet.in/ eissn: 2394-627X Image Processing by Bilateral Image

More information

Digital Image Processing Introduction

Digital Image Processing Introduction Digital Processing Introduction Dr. Hatem Elaydi Electrical Engineering Department Islamic University of Gaza Fall 2015 Sep. 7, 2015 Digital Processing manipulation data might experience none-ideal acquisition,

More information

Part Design. Sketcher - Basic 1 13,0600,1488,1586(SP6)

Part Design. Sketcher - Basic 1 13,0600,1488,1586(SP6) Part Design Sketcher - Basic 1 13,0600,1488,1586(SP6) In this exercise, we will learn the foundation of the Sketcher and its basic functions. The Sketcher is a tool used to create two-dimensional (2D)

More information

A Copyright Information Embedding System

A Copyright Information Embedding System IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 11 April 2015 ISSN (online): 2349-6010 A Copyright Information Embedding System Sreeresmi T.S Assistant Professor

More information

Fragile Sensor Fingerprint Camera Identification

Fragile Sensor Fingerprint Camera Identification Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera

More information

Year 9 Summer Photography Assignment.

Year 9 Summer Photography Assignment. Year 9 Summer Photography Assignment. Year 9 GCSE Photography Summer assignment 2018: Task 1. Learning Objective: Writing about photographers in the context of their work related to your own project themes

More information

Fake Photos Dan Hyde at Lewisburg Photography Club. Class Exercise. History of Fake Photos. Famous Photo of Abe Lincoln.

Fake Photos Dan Hyde at Lewisburg Photography Club. Class Exercise. History of Fake Photos. Famous Photo of Abe Lincoln. Fake Photos Dan Hyde at Lewisburg Photography Club Class Exercise Write a good but useful definition of a fake photo. Share your definition with a pair and discuss. A fake photo is July 19, 2018 Fake Photos

More information

The Human Visual System!

The Human Visual System! an engineering-focused introduction to! The Human Visual System! EE367/CS448I: Computational Imaging and Display! stanford.edu/class/ee367! Lecture 2! Gordon Wetzstein! Stanford University! nautilus eye,

More information

Autodesk Inventor Introduction to Solid Modeling

Autodesk Inventor Introduction to Solid Modeling Autodesk Inventor Introduction to Solid Modeling Course Length: 5 days The Autodesk Inventor Introduction to Solid Modeling training course provides you with an understanding of the parametric design philosophy

More information

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING Chapter 21 FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING Gilbert Peterson Abstract The use of digital photography has increased over the past few years, a trend which opens the door for new and creative

More information

Dr. Reham Karam. Perspective Drawing. For Artists & Designers. By : Dr.Reham Karam

Dr. Reham Karam. Perspective Drawing. For Artists & Designers. By : Dr.Reham Karam Perspective Drawing For Artists & Designers By : Dr.Reham Karam Geometry and Art : What is perspective? Perspective, in the vision and visual perception, is : the way that objects appear to the eye based

More information

Lenses, exposure, and (de)focus

Lenses, exposure, and (de)focus Lenses, exposure, and (de)focus http://graphics.cs.cmu.edu/courses/15-463 15-463, 15-663, 15-862 Computational Photography Fall 2017, Lecture 15 Course announcements Homework 4 is out. - Due October 26

More information

Multi Viewpoint Panoramas

Multi Viewpoint Panoramas 27. November 2007 1 Motivation 2 Methods Slit-Scan "The System" 3 "The System" Approach Preprocessing Surface Selection Panorama Creation Interactive Renement 4 Sources Motivation image showing long continous

More information

Computational Photography

Computational Photography Computational photography Computational Photography Digital Visual Effects Yung-Yu Chuang wikipedia: Computational photography h refers broadly to computational imaging techniques that enhance or extend

More information

Information Forensics: An Overview of the First Decade

Information Forensics: An Overview of the First Decade Received March 8, 2013, accepted April 6, 2013, published May 10, 2013. Digital Object Identifier 10.1109/ACCESS.2013.2260814 Information Forensics: An Overview of the First Decade MATTHEW C. STAMM (MEMBER,

More information

Continuous Flash. October 1, Technical Report MSR-TR Microsoft Research Microsoft Corporation One Microsoft Way Redmond, WA 98052

Continuous Flash. October 1, Technical Report MSR-TR Microsoft Research Microsoft Corporation One Microsoft Way Redmond, WA 98052 Continuous Flash Hugues Hoppe Kentaro Toyama October 1, 2003 Technical Report MSR-TR-2003-63 Microsoft Research Microsoft Corporation One Microsoft Way Redmond, WA 98052 Page 1 of 7 Abstract To take a

More information

Adding Realistic Camera Effects to the Computer Graphics Camera Model

Adding Realistic Camera Effects to the Computer Graphics Camera Model Adding Realistic Camera Effects to the Computer Graphics Camera Model Ryan Baltazar May 4, 2012 1 Introduction The camera model traditionally used in computer graphics is based on the camera obscura or

More information

ECC419 IMAGE PROCESSING

ECC419 IMAGE PROCESSING ECC419 IMAGE PROCESSING INTRODUCTION Image Processing Image processing is a subclass of signal processing concerned specifically with pictures. Digital Image Processing, process digital images by means

More information

CS6670: Computer Vision

CS6670: Computer Vision CS6670: Computer Vision Noah Snavely Lecture 22: Computational photography photomatix.com Announcements Final project midterm reports due on Tuesday to CMS by 11:59pm BRDF s can be incredibly complicated

More information

Techniques. Introduction to Drawing Final Exam Study Guide

Techniques. Introduction to Drawing Final Exam Study Guide Introduction to Drawing Final Exam Study Guide There are many ways to draw: line-based, value-based, reverse drawing these are just a few. This studyguide will break down your drawing study by techniques

More information

Measure of image enhancement by parameter controlled histogram distribution using color image

Measure of image enhancement by parameter controlled histogram distribution using color image Measure of image enhancement by parameter controlled histogram distribution using color image P.Senthil kumar 1, M.Chitty babu 2, K.Selvaraj 3 1 PSNA College of Engineering & Technology 2 PSNA College

More information

Lens Design I. Lecture 3: Properties of optical systems II Herbert Gross. Summer term

Lens Design I. Lecture 3: Properties of optical systems II Herbert Gross. Summer term Lens Design I Lecture 3: Properties of optical systems II 205-04-8 Herbert Gross Summer term 206 www.iap.uni-jena.de 2 Preliminary Schedule 04.04. Basics 2.04. Properties of optical systrems I 3 8.04.

More information

Geometrical Optics. Have you ever entered an unfamiliar room in which one wall was covered with a

Geometrical Optics. Have you ever entered an unfamiliar room in which one wall was covered with a Return to Table of Contents HAPTER24 C. Geometrical Optics A mirror now used in the Hubble space telescope Have you ever entered an unfamiliar room in which one wall was covered with a mirror and thought

More information

IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE

IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE Second Asian Conference on Computer Vision (ACCV9), Singapore, -8 December, Vol. III, pp. 6-1 (invited) IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE Jia Hong Yin, Sergio

More information

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu

More information

Camera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques

Camera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques Camera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques Brian A. Barsky 1,2,3,DanielR.Horn 1, Stanley A. Klein 2,3,JeffreyA.Pang 1, and Meng Yu 1 1 Computer Science

More information

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Chiew K.T., et al. (Eds.): PGRES 2017, Kuala Lumpur: Eastin Hotel, FCSIT, 2017: pp 35-42 IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Thamarai Subramaniam and Hamid

More information