Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Size: px
Start display at page:

Download "Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification"

Transcription

1 Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence Analysis String search? Pattern matching? Data visualization (timeline analysis)? 2 Forensic Framework Attribution Analysis determine data significance and draw conclusion Data mining? cluster analysis discriminant analysis rule mining Forensic source identification Link multimedia content to the acquisition device Presentation Attribution: Who did it? (source) Authentication: synthetic data? forgery? 3 4

2 Authentication Attribution Computer generated images? -3d-images The scientists found that 97% of test subjects were fooled into believing that the digital renderings were real photographs and that real photos were CGI. 5 6 Authentication Fake photo? Tampering detection Multimedia Forensics Application of scientific methods to the investigation and prosecution of a crime Outcomes of a forensic analysis may serve as probative facts in court Detect: source of multimedia data Detect forgeries Copy-move forgery Hide undesired objects/replicate similar objects Copying another region of the same image Cell Phone Camera Standalone Camera 7 8 Scanner Computer Generated

3 Examples 9 A tampered image appeared in press in July Iranian missiles: 3 are real Red/purple: copy-move forgeries Recapturing problem 2007: Fars News Agency, Tehran copy-move forgeries 12

4 Applications Hash function ZvtWA7qGQ 13 An algorithm Input: files (word document, pdf, image, ) Output: a pre-fixed length string Purpose: ensure data integrity Property Hashed result unique One way function Good for authenticating word/pdf documents 14 Hash function Example: d41d8cd98f00b204e ecf8427e 7dbc9f235835a899880f3e9a7ae1f393 Hashing function To see if images are modified Compare hash values Too strict for multimedia data Images: transmitted through sharing platform Compression content / meaning: doesn t change Video: wireless loss 15 16

5 Example Images taken by smart phone send through whatsapp compression Feature-based Image Hashing bitmap JPEG Illustration Feature: invariant under perceptually insignificant distortion corners? (Harris corner detection) For each corner: find average brightness feature 19 rotate Local scale change Resizing Image hash Color Feature extraction Hash Generation

6 original whatsapp original whatsapp Color feature extraction Resize -> 8x8 Average color (mean) If (intensity)> average 1 Otherwise 0 Grayscale Feature-based Image Hashing Features: color features For RGB and YCbCr color spaces: 6 color components For each color component, calculate the statistical information Mean, variance, Moment values x71g3omq1.pdf Concatenate moment values of the six color components to form a feature vector Feature-based Image Hashing Form signature based on the extracted features concatenate all features together Different methods to form the hash Represent them by using certain number of bits Take Fourier Transform, consider the magnitude and the phase as features and represented using certain number of bits

7 Feature-based Image Hashing Evaluation Feature: invariant under perceptually insignificant distortion Hash length Robustness towards different changes Brightness adjustment Contrast adjustment JPEG compression Addition of noise Lowpass filtering Evaluation Large degree of compression? Share through social media Miss detection? 27 28

8 Active approach for data authentication Active approach for data authentication Digital watermark Copyright Active approach for data authentication Active approach Digital watermark Epson PhotoPC 3000Z, 700/750Z, 800/800Z (discontinued) Watermark is invisible Requires optional software to embed and view watermark Kodak DC-200, 260, 290 (discontinued) Watermark is invisible Watermark capabilities built into camera Active approach for data authentication Active approach Kodak DC-200, 260, 290 (discontinued) Watermark is invisible Watermark capabilities built into camera

9 Active vs Passive Active approach Addition of extra data More powerful, end-to-end protocol Not popular Passive approach: Detect intrinsic image regularity or tampering artifacts Wider application, less powerful Forgery detection techniques Three levels of assumption Rules and models of the physics of the scene Inconsistency a basis for forgery detection Size inconsistency, lighting directions, shadow inconsistencies, reflection inconsistencies Inherent characteristics of the acquisition system (camera components, imaging pipeline) Statistics of natural images Demonstration Web platform Python: pymove_forgery_detection_in_images.html Purchase:

10 Example: JPEG Forensics Quantization tables: Transform to frequency domain (Discrete cosine transform), divide each F[u,v] by a constant q[u,v] Eye: more sensitive to low frequencies Most software use standard quantization Some software (Photoshop) Have their own quantization table Camera manufacturers have their own table Clue for manipulation 37 Example: JPEG Forensics Quantization tables: n-files/paperusing_jpeg_quantization_tables_to_identi fy_imagery_processed_by_software.pdf 38 Examples : Quantization Photo1_SamsungA7 Examples: Quantization Photo1_SamsungA7 Standard JPEG table, quality=

11 Examples: Quantization Photo1_SamsungA7_modified (software) Standard JPEG table, quality=90 Examples: Quantization Photo1_SamsungNote Non Standard JPEG table, quality= Examples: Quantization Photo1_Nikkon Standard JPEG table, quality=80 Example: Clone detection Samsung A7 photos: combine 43 44

12 Example: Clone detection Clone: Copied regions in an image Similarity: the similarity between the copied regions and the original Minimal detail: Blocks with less detail are not considered in searching for copied regions Cluster size: how many copied regions need to be found in order for them to show up as results 45 Example: Clone detection Increase Minimum similarity

13 Forgery detection techniques General two classes of techniques Non-source identification related Lighting direction, shape of the light source specific tampering anomalies Source identification related Features: sensor noise pattern, dust patterns, demosaicing regularity, statistical regularities, chromatic aberration Non-source identification methods Tampering characteristics Different tampering methods different characteristics Copy-move forgery Highly correlated regions Splicing Sharp discontinuity boundary Double JPEG compression Periodicity in DCT coefficient histogram 49 Uneven JPEG blocking artifacts 50 Copy-move Forgery Copying regions of the original image and pasting into other areas. The yellow area has been copied and moved to conceal the truck. 2 types of techniques Block-based Keypoint-based 51 52

14 Detection of Copy-move Forgery Blockbased B Feature extraction B B B N N Find Similar blocks Generate (N-B+1)(N-B+1) Blocks Detection of Copy-move Forgery: Features: DCT Block size : Original image Detection of Copy-move Forgery: DCT Detection of Copy-move Forgery Discrete cosine transform From spatial domain to frequency domain Blockbased Feature extraction Find Similar blocks Original block DCT Transform DCT coefficient block Features: coefficients or histogram 55 [05, 0.6, ] [08, 0.7, ] Similar condition : 4 k k 2 m_ match( Ai, Ai j ) ( vi vi j ) Dsimilar k dvv (, ) x x y y N i i j i i j i i j d

15 Results Detection of Copy-move Forgery: Block-based Detection of Copy-move Forgery: keypoints High computational complexity Lots of blocks compute features, find matching blocks Geometric manipulation Scaling, rotation Keypointbased Descriptors for each keypoint Associate similar keypoints [05, 0.6, ] [08, 0.7, ]

16 Review of SIFT-based approach Steps: Scale-space extreme detection Search over multiple scales DoG: difference of Gaussian Gaussian filtering Downsampling & Gaussian filtering Downsampling & Gaussian filtering Difference Difference Review of SIFT-based approach Steps: Scale-space extreme detection Keypoint localization Local extrema in the DoG pyramid Cleaning: remove low contrast points Orientation assignment Compute best orientation for each keypoint Achieve rotation invariance Steps: Review of SIFT-based approach Scale-space extreme detection Keypoint localization Orientation assignment Find orientation of intensity gradients,,,,, L x y G x y I x y 36 bins (10 degrees) histogram Keypoint orientation = histogram peak 1 L x, y 1 L( x, y 1) xy, tan Lx ( 1, y) Lx ( 1, y) Steps: Review of SIFT-based approach keypoint descriptors 16x16 image patch descriptors Center: keypoint, origin axis: orientation Form 4x4 sub-patches Sub-patch: histogram (8 bin) of gradient orientation Local image gradients: 4x4x8 = 128 values

17 Copy-move Forgery Detection similar objects matching Keypoint matching j D x, X xj x1 xj x2 xj xm,,,, F F F F F F d d d j,1 j,2 j, n Small distance: similarity of keypoints Forgery detection techniques Forensic work flow General two classes of techniques Non-source identification related Lighting direction, specific tampering anomalies Source identification related Legal system: Accepts the forensic analysis of digital image evidence if the attribution techniques are unbiased, reliable, non-destructive and widely accepted by experts in the field Features: Hardware defects (lens distortion) Sensor defects (sensor noise pattern, dust patterns) Processing regularities (CFA, JPEG) 67 68

18 Image authentication Two-step process Exam for the reliability of the evidence (image tampering and forgery detection) Analysis to determine its probative value regarding to source camera and image metadata 69 Example Prosecuting attorneys claim: Series of images discovered on a suspect s computer are potentially an evidence of a crime Possible that a third party has access to the suspect s computer, but no evidence of such access Desirable if forensic evidence examiner provides info about: The consistency of these images with a specific digital camera discovered in the suspect s house 70 Digital Image Generation Example: Image Acquisition 71 72

19 Example: Image Acquisition CFA / Demosaicing Lens: focus the light of scene on sensor Filters: filter out invisible part of light (infra-red, ultraviolet) CFA: color filter array (on top of the sensor) Common: only one sensor for detecting all three colors (red, green blue) Example: Image Acquisition Sensor: CCD/CMOS Photosensitive pixels capture photons and convert them into charge CFA interpolation To generate image with full resolution for all colors At each sensor pixel, only one color is measured The other two colors have to be estimated from neighboring pixels 75 Example: Image Acquisition Post processing: Apply enhancement technique to eliminate unwanted artifacts, degradations or noise Color-artifact removal (introduced during CFA interpolation), edge enhancement Storing EXIF JPEG format 76

20 Source-based forgery detection or model identification Discover traces left by hardware component or software process during image generation process Image artifacts: 2 types Hardware-related Caused by lens, sensor imperfections (noise) software-related Introduced through camera processing 77 hardware software Image artifacts Optical aberrations Sensor Processing statistics Processing regularities Lens radial distortion Chromatic aberration Sensor noise Sensor dust pattern Model statistics High order statistics CFA array JPEG compression 78 Hardware: Optical defects Optical aberrations Radial lens distortion Straight lines appear curved in an image Serious in low-cost wide-angle lenses The degree of distortion changes with focal length Hardware: Optical defects Order-2 model (xd,yd): distorted image coordinate (x,y): undistorted coordinate (a,b): optical centre r = sqrt((x-a)^2 + (y-b)^2) x ( xd a)(1 k r k r ) a y ( yd b)(1 kr kr) b Find distorted lines to estimate k 1 and k 2 80

21 Hardware: Optical defects More likely to be used for forgery detection Less likely to be used for source camera attribution Built with the same/similar lenses similar characteristics Scene content dependency: difficult to estimate distortion in images with flat scene content 81 Hardware: Optical defects Less likely to be used for source camera attribution Camera setting dependency Change with focal length, focal distance, aperture size, illumination, etc Images captured with one device but different zooming different distortions 82 Hardware: sensor defects Sensor imperfections: Sensor defects, sensor pattern noise, sensor dust Sensor defects / pixel defects Dead pixels: not responding to light, appear as a black spot Rarely exist in new manufactured camera or be removed during post-processing Hardware: sensor defects Sensor pattern noise Most sever type of sensor artifacts Photo-response non-uniformity: generated based upon the sensitivity of pixels Sensitivity: measured by determining the light intensity Effect of inhomogeneity of silicon wafer and the imperfection of the sensor manufacturing process 83 84

22 Hardware: sensor defects Photo response non-uniformity noise (PRNU) Output image Original image PRNU = + + This pattern noise will survive for every image that taken by the same camera. Noisy Output Noise free input PRNU Noise Other Noise 85 Device 1 Device 2 Unique for each individual device 86 Hardware: sensor defects PRNU: Can be used to identify individual device used for taking the image Is able to distinguish cameras from same model and brand Has been used to solve court cases when the query image was tested to verify the claimed camera device Device linking 87 Hardware: sensor defects Dust pattern on lens Cameras with interchangeable lens Dust particles remain in front of the imaging sensor Produce a constant pattern in all captured images Results: High classification accuracy Problem: user cleaned the lens? Positive result is conclusive, but negative result is inconclusive 88

23 Software: processing statistics Identify statistical artifacts left by different cameras mpare.asp Color characteristics Color reproduction of the camera with respect to each color band image quality Measure quality of the scene reproduction by the optical system Software: processing statistics Example statistical features Average pixel value per RGB and RGB pairs correlation Pixel difference Use filters to decompose RGB band to three sub-bands determine mean, variance etc Discrete cosine transform, wavelet transform, ridgelet, contourlet, Software: processing statistics Challenges Difficult to achieve large inter-model similarity for devices of the same brand sharing similar hardware and processing components Camera setting dependency: focal length, indoor/outdoor illumination/flash Scene content dependency: Images captured by 2 cameras in different environments 91 92

24 Software: processing regularities Examine processing artifacts CFA configuration: specific arrangement of color filters across the sensor plane Software: processing regularities Examine processing artifacts CFA interpolation algorithms Used to estimate missing color from surrounding samples of the raw pixel Use different size for interpolation (number of surrounding samples) Adopt different methods to estimate the missing color Simple averaging, weighted averaging, image content dependent averaging 95 96

25 Software: processing regularities Bilinear interpolation Software: processing regularities Bilinear interpolation G A G L G R G I G B G I 1 ( G 4 L G R G B G A ) original interpolated

26 artifacts Appear at edges / regions with high freq Features: Study the relationship among neighboring pixels Image artifacts + machine learning Machine learning approach hardware Optical aberrations Sensor Lens radial distortion Chromatic aberration Sensor noise Sensor dust pattern Used to analyze large amounts of data Black Box Approach: Collect all features from a large number of multimedia data software Processing statistics Model statistics High order statistics Use the machine learning approach for grouping / classifying these features Processing regularities CFA array JPEG compression

27 Machine learning approach 2 types Supervised Make predictions based on a given set of features Unsupervised Learn the data and organize the data by the algorithm Machine learning approach Examples: Support vector machine clustering algorithm artificial neural networks nearest neighbors Deep learning algorithm Example: Tampering detection using demosaicing regularity

28 Tools for source camera attribution Amped software: authenticate Qualified government/law enforcement agencies Software package for forensic image authentication and tamper detection on digital photos Error level analysis Multiple JPEG compression PRNU identification Create PRNU PRNU tampering Find inconsistencies in PRNU noise 109 Clone Blocks 110 Inconsistence of sensor noise Multiple compression

29 Applications Insurance companies Use forensics to cut fraud and abuse (save time) Car crash: minor dents and scratches Upload a picture/video to the insurance company to save time Findings: use photo editing software to create fake photo evidence Multiple compression Applications: insurance Forensic Image analyser c-image-analyser/ Identifies if the image was taken by a suspected device identifies which images in a set were taken by the same device and which were taken by other devices 116

30 Other approaches Read about the real court case in the web site Other tools: Fourandsix Technologies Photos: mostly come with EXIF header Consistency between information (ISO Speed rating, exposure time, focal length) with the image content? Estimate camera setting from the image content and compare with the data found in the EXIF header 118 Consistency checking 119

Multimedia Forensics

Multimedia Forensics Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

Survey On Passive-Blind Image Forensics

Survey On Passive-Blind Image Forensics Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal

More information

TECHNICAL DOCUMENTATION

TECHNICAL DOCUMENTATION TECHNICAL DOCUMENTATION NEED HELP? Call us on +44 (0) 121 231 3215 TABLE OF CONTENTS Document Control and Authority...3 Introduction...4 Camera Image Creation Pipeline...5 Photo Metadata...6 Sensor Identification

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

Midterm Examination CS 534: Computational Photography

Midterm Examination CS 534: Computational Photography Midterm Examination CS 534: Computational Photography November 3, 2015 NAME: SOLUTIONS Problem Score Max Score 1 8 2 8 3 9 4 4 5 3 6 4 7 6 8 13 9 7 10 4 11 7 12 10 13 9 14 8 Total 100 1 1. [8] What are

More information

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,

More information

Forgery Detection using Noise Inconsistency: A Review

Forgery Detection using Noise Inconsistency: A Review Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by

More information

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick

More information

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.

More information

Information Forensics: An Overview of the First Decade

Information Forensics: An Overview of the First Decade Received March 8, 2013, accepted April 6, 2013, published May 10, 2013. Digital Object Identifier 10.1109/ACCESS.2013.2260814 Information Forensics: An Overview of the First Decade MATTHEW C. STAMM (MEMBER,

More information

ECC419 IMAGE PROCESSING

ECC419 IMAGE PROCESSING ECC419 IMAGE PROCESSING INTRODUCTION Image Processing Image processing is a subclass of signal processing concerned specifically with pictures. Digital Image Processing, process digital images by means

More information

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in

More information

EC-433 Digital Image Processing

EC-433 Digital Image Processing EC-433 Digital Image Processing Lecture 2 Digital Image Fundamentals Dr. Arslan Shaukat 1 Fundamental Steps in DIP Image Acquisition An image is captured by a sensor (such as a monochrome or color TV camera)

More information

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008 Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright

More information

Tampering and Copy-Move Forgery Detection Using Sift Feature

Tampering and Copy-Move Forgery Detection Using Sift Feature Tampering and Copy-Move Forgery Detection Using Sift Feature N.Anantharaj 1 M-TECH (IT) Final Year, Department of IT, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India 1 ABSTRACT:

More information

Computer Graphics. Si Lu. Fall er_graphics.htm 10/02/2015

Computer Graphics. Si Lu. Fall er_graphics.htm 10/02/2015 Computer Graphics Si Lu Fall 2017 http://www.cs.pdx.edu/~lusi/cs447/cs447_547_comput er_graphics.htm 10/02/2015 1 Announcements Free Textbook: Linear Algebra By Jim Hefferon http://joshua.smcvt.edu/linalg.html/

More information

Digital Image Forgery Identification Using Motion Blur Variations as Clue

Digital Image Forgery Identification Using Motion Blur Variations as Clue Digital Image Forgery Identification Using Motion Blur Variations as Clue P. M. Birajdar*, N. G. Dharashive** Abstract: Fake images have become common in society today. In all forms of media one can easily

More information

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models

More information

Vision Review: Image Processing. Course web page:

Vision Review: Image Processing. Course web page: Vision Review: Image Processing Course web page: www.cis.udel.edu/~cer/arv September 7, Announcements Homework and paper presentation guidelines are up on web page Readings for next Tuesday: Chapters 6,.,

More information

STANDARDS? We don t need no stinkin standards! David Ski Witzke Vice President, Program Management FORAY Technologies

STANDARDS? We don t need no stinkin standards! David Ski Witzke Vice President, Program Management FORAY Technologies STANDARDS? We don t need no stinkin standards! David Ski Witzke Vice President, Program Management FORAY Technologies www.foray.com 1.888.849.6688 2005, FORAY Technologies. All rights reserved. What s

More information

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department

More information

Compression and Image Formats

Compression and Image Formats Compression Compression and Image Formats Reduce amount of data used to represent an image/video Bit rate and quality requirements Necessary to facilitate transmission and storage Required quality is application

More information

Noise Reduction in Raw Data Domain

Noise Reduction in Raw Data Domain Noise Reduction in Raw Data Domain Wen-Han Chen( 陳文漢 ), Chiou-Shann Fuh( 傅楸善 ) Graduate Institute of Networing and Multimedia, National Taiwan University, Taipei, Taiwan E-mail: r98944034@ntu.edu.tw Abstract

More information

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic

More information

Camera identification from sensor fingerprints: why noise matters

Camera identification from sensor fingerprints: why noise matters Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS

More information

Automatic source camera identification using the intrinsic lens radial distortion

Automatic source camera identification using the intrinsic lens radial distortion Automatic source camera identification using the intrinsic lens radial distortion Kai San Choi, Edmund Y. Lam, and Kenneth K. Y. Wong Department of Electrical and Electronic Engineering, University of

More information

Impeding Forgers at Photo Inception

Impeding Forgers at Photo Inception Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth

More information

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005 Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.

More information

Prof. Feng Liu. Fall /02/2018

Prof. Feng Liu. Fall /02/2018 Prof. Feng Liu Fall 2018 http://www.cs.pdx.edu/~fliu/courses/cs447/ 10/02/2018 1 Announcements Free Textbook: Linear Algebra By Jim Hefferon http://joshua.smcvt.edu/linalg.html/ Homework 1 due in class

More information

Chapter 9 Image Compression Standards

Chapter 9 Image Compression Standards Chapter 9 Image Compression Standards 9.1 The JPEG Standard 9.2 The JPEG2000 Standard 9.3 The JPEG-LS Standard 1IT342 Image Compression Standards The image standard specifies the codec, which defines how

More information

This work is protected by copyright and other intellectual property rights and duplication or sale of all or part is not permitted, except that

This work is protected by copyright and other intellectual property rights and duplication or sale of all or part is not permitted, except that This work is protected by copyright and other intellectual property rights and duplication or sale of all or part is not permitted, except that material may be duplicated by you for research, private study,

More information

Analysis on Color Filter Array Image Compression Methods

Analysis on Color Filter Array Image Compression Methods Analysis on Color Filter Array Image Compression Methods Sung Hee Park Electrical Engineering Stanford University Email: shpark7@stanford.edu Albert No Electrical Engineering Stanford University Email:

More information

Camera Resolution and Distortion: Advanced Edge Fitting

Camera Resolution and Distortion: Advanced Edge Fitting 28, Society for Imaging Science and Technology Camera Resolution and Distortion: Advanced Edge Fitting Peter D. Burns; Burns Digital Imaging and Don Williams; Image Science Associates Abstract A frequently

More information

Image Manipulation Detection using Convolutional Neural Network

Image Manipulation Detection using Convolutional Neural Network Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

Overview. Pinhole camera model Projective geometry Vanishing points and lines Projection matrix Cameras with Lenses Color Digital image

Overview. Pinhole camera model Projective geometry Vanishing points and lines Projection matrix Cameras with Lenses Color Digital image Camera & Color Overview Pinhole camera model Projective geometry Vanishing points and lines Projection matrix Cameras with Lenses Color Digital image Book: Hartley 6.1, Szeliski 2.1.5, 2.2, 2.3 The trip

More information

Goal of this Section. Capturing Reflectance From Theory to Practice. Acquisition Basics. How can we measure material properties? Special Purpose Tools

Goal of this Section. Capturing Reflectance From Theory to Practice. Acquisition Basics. How can we measure material properties? Special Purpose Tools Capturing Reflectance From Theory to Practice Acquisition Basics GRIS, TU Darmstadt (formerly University of Washington, Seattle Goal of this Section practical, hands-on description of acquisition basics

More information

Acquisition Basics. How can we measure material properties? Goal of this Section. Special Purpose Tools. General Purpose Tools

Acquisition Basics. How can we measure material properties? Goal of this Section. Special Purpose Tools. General Purpose Tools Course 10 Realistic Materials in Computer Graphics Acquisition Basics MPI Informatik (moving to the University of Washington Goal of this Section practical, hands-on description of acquisition basics general

More information

Lenses, exposure, and (de)focus

Lenses, exposure, and (de)focus Lenses, exposure, and (de)focus http://graphics.cs.cmu.edu/courses/15-463 15-463, 15-663, 15-862 Computational Photography Fall 2017, Lecture 15 Course announcements Homework 4 is out. - Due October 26

More information

Contents Foreword 1 Feedback 2 Legal information 3 Getting started 4 Installing the correct Capture One version 4 Changing the version type 5 Getting

Contents Foreword 1 Feedback 2 Legal information 3 Getting started 4 Installing the correct Capture One version 4 Changing the version type 5 Getting Contents Foreword 1 Feedback 2 Legal information 3 Getting started 4 Installing the correct Capture One version 4 Changing the version type 5 Getting to know Capture One Pro 6 The Grand Overview 6 The

More information

Digital Image Processing Introduction

Digital Image Processing Introduction Digital Processing Introduction Dr. Hatem Elaydi Electrical Engineering Department Islamic University of Gaza Fall 2015 Sep. 7, 2015 Digital Processing manipulation data might experience none-ideal acquisition,

More information

CS 89.15/189.5, Fall 2015 ASPECTS OF DIGITAL PHOTOGRAPHY COMPUTATIONAL. Image Processing Basics. Wojciech Jarosz

CS 89.15/189.5, Fall 2015 ASPECTS OF DIGITAL PHOTOGRAPHY COMPUTATIONAL. Image Processing Basics. Wojciech Jarosz CS 89.15/189.5, Fall 2015 COMPUTATIONAL ASPECTS OF DIGITAL PHOTOGRAPHY Image Processing Basics Wojciech Jarosz wojciech.k.jarosz@dartmouth.edu Domain, range Domain vs. range 2D plane: domain of images

More information

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Linear Gaussian Method to Detect Blurry Digital Images using SIFT IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org

More information

PHOTOGRAPHY: MINI-SYMPOSIUM

PHOTOGRAPHY: MINI-SYMPOSIUM PHOTOGRAPHY: MINI-SYMPOSIUM In Adobe Lightroom Loren Nelson www.naturalphotographyjackson.com Welcome and introductions Overview of general problems in photography Avoiding image blahs Focus / sharpness

More information

Camera Image Processing Pipeline: Part II

Camera Image Processing Pipeline: Part II Lecture 14: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements

More information

Image Processing for feature extraction

Image Processing for feature extraction Image Processing for feature extraction 1 Outline Rationale for image pre-processing Gray-scale transformations Geometric transformations Local preprocessing Reading: Sonka et al 5.1, 5.2, 5.3 2 Image

More information

SYLLABUS CHAPTER - 2 : INTENSITY TRANSFORMATIONS. Some Basic Intensity Transformation Functions, Histogram Processing.

SYLLABUS CHAPTER - 2 : INTENSITY TRANSFORMATIONS. Some Basic Intensity Transformation Functions, Histogram Processing. Contents i SYLLABUS UNIT - I CHAPTER - 1 : INTRODUCTION TO DIGITAL IMAGE PROCESSING Introduction, Origins of Digital Image Processing, Applications of Digital Image Processing, Fundamental Steps, Components,

More information

LENSES. INEL 6088 Computer Vision

LENSES. INEL 6088 Computer Vision LENSES INEL 6088 Computer Vision Digital camera A digital camera replaces film with a sensor array Each cell in the array is a Charge Coupled Device light-sensitive diode that converts photons to electrons

More information

DodgeCmd Image Dodging Algorithm A Technical White Paper

DodgeCmd Image Dodging Algorithm A Technical White Paper DodgeCmd Image Dodging Algorithm A Technical White Paper July 2008 Intergraph ZI Imaging 170 Graphics Drive Madison, AL 35758 USA www.intergraph.com Table of Contents ABSTRACT...1 1. INTRODUCTION...2 2.

More information

Neuro-Fuzzy based First Responder for Image forgery Identification

Neuro-Fuzzy based First Responder for Image forgery Identification ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Cameras. CSE 455, Winter 2010 January 25, 2010

Cameras. CSE 455, Winter 2010 January 25, 2010 Cameras CSE 455, Winter 2010 January 25, 2010 Announcements New Lecturer! Neel Joshi, Ph.D. Post-Doctoral Researcher Microsoft Research neel@cs Project 1b (seam carving) was due on Friday the 22 nd Project

More information

Image Forgery. Forgery Detection Using Wavelets

Image Forgery. Forgery Detection Using Wavelets Image Forgery Forgery Detection Using Wavelets Introduction Let's start with a little quiz... Let's start with a little quiz... Can you spot the forgery the below image? Let's start with a little quiz...

More information

Lecture Notes 11 Introduction to Color Imaging

Lecture Notes 11 Introduction to Color Imaging Lecture Notes 11 Introduction to Color Imaging Color filter options Color processing Color interpolation (demozaicing) White balancing Color correction EE 392B: Color Imaging 11-1 Preliminaries Up till

More information

Images and Graphics. 4. Images and Graphics - Copyright Denis Hamelin - Ryerson University

Images and Graphics. 4. Images and Graphics - Copyright Denis Hamelin - Ryerson University Images and Graphics Images and Graphics Graphics and images are non-textual information that can be displayed and printed. Graphics (vector graphics) are an assemblage of lines, curves or circles with

More information

PRACTICAL IMAGE AND VIDEO PROCESSING USING MATLAB

PRACTICAL IMAGE AND VIDEO PROCESSING USING MATLAB PRACTICAL IMAGE AND VIDEO PROCESSING USING MATLAB OGE MARQUES Florida Atlantic University *IEEE IEEE PRESS WWILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS LIST OF FIGURES LIST OF TABLES FOREWORD

More information

Camera Image Processing Pipeline

Camera Image Processing Pipeline Lecture 13: Camera Image Processing Pipeline Visual Computing Systems Today (actually all week) Operations that take photons hitting a sensor to a high-quality image Processing systems used to efficiently

More information

Correlation Based Image Tampering Detection

Correlation Based Image Tampering Detection Correlation Based Image Tampering Detection Priya Singh M. Tech. Scholar CSE Dept. MIET Meerut, India Abstract-The current era of digitization has made it easy to manipulate the contents of an image. Easy

More information

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Camera Model Identification Framework Using An Ensemble of Demosaicing Features Camera Model Identification Framework Using An Ensemble of Demosaicing Features Chen Chen Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: chen.chen3359@drexel.edu

More information

IMAGE COMPOSITE DETECTION USING CUSTOMIZED

IMAGE COMPOSITE DETECTION USING CUSTOMIZED IMAGE COMPOSITE DETECTION USING CUSTOMIZED Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad ssm@iiita.ac.in rctripathi@iiita.ac.in ABSTRACT The multimedia applications

More information

Refined Slanted-Edge Measurement for Practical Camera and Scanner Testing

Refined Slanted-Edge Measurement for Practical Camera and Scanner Testing Refined Slanted-Edge Measurement for Practical Camera and Scanner Testing Peter D. Burns and Don Williams Eastman Kodak Company Rochester, NY USA Abstract It has been almost five years since the ISO adopted

More information

Exposing Image Forgery with Blind Noise Estimation

Exposing Image Forgery with Blind Noise Estimation Exposing Image Forgery with Blind Noise Estimation Xunyu Pan Computer Science Department University at Albany, SUNY Albany, NY 12222, USA xypan@cs.albany.edu Xing Zhang Computer Science Department University

More information

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

PHOTO 11: INTRODUCTION TO DIGITAL IMAGING

PHOTO 11: INTRODUCTION TO DIGITAL IMAGING 1 PHOTO 11: INTRODUCTION TO DIGITAL IMAGING Instructor: Sue Leith, sleith@csus.edu EXAM REVIEW Computer Components: Hardware - the term used to describe computer equipment -- hard drives, printers, scanners.

More information

Evaluating the stability of SIFT keypoints across cameras

Evaluating the stability of SIFT keypoints across cameras Evaluating the stability of SIFT keypoints across cameras Max Van Kleek Agent-based Intelligent Reactive Environments MIT CSAIL emax@csail.mit.edu ABSTRACT Object identification using Scale-Invariant Feature

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge 2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge This competition is sponsored by the IEEE Signal Processing Society Introduction The IEEE Signal Processing Society s 2018

More information

Image Enhancement. DD2423 Image Analysis and Computer Vision. Computational Vision and Active Perception School of Computer Science and Communication

Image Enhancement. DD2423 Image Analysis and Computer Vision. Computational Vision and Active Perception School of Computer Science and Communication Image Enhancement DD2423 Image Analysis and Computer Vision Mårten Björkman Computational Vision and Active Perception School of Computer Science and Communication November 15, 2013 Mårten Björkman (CVAP)

More information

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies International Journal of Computer and Communication Engineering, Vol. 4, No., January 25 Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies Bo Liu and Chi-Man Pun Noise patterns

More information

SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS

SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS RADT 3463 - COMPUTERIZED IMAGING Section I: Chapter 2 RADT 3463 Computerized Imaging 1 SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS RADT 3463 COMPUTERIZED IMAGING Section I: Chapter 2 RADT

More information

Anna University, Chennai B.E./B.TECH DEGREE EXAMINATION, MAY/JUNE 2013 Seventh Semester

Anna University, Chennai B.E./B.TECH DEGREE EXAMINATION, MAY/JUNE 2013 Seventh Semester www.vidyarthiplus.com Anna University, Chennai B.E./B.TECH DEGREE EXAMINATION, MAY/JUNE 2013 Seventh Semester Electronics and Communication Engineering EC 2029 / EC 708 DIGITAL IMAGE PROCESSING (Regulation

More information

Megapixels and more. The basics of image processing in digital cameras. Construction of a digital camera

Megapixels and more. The basics of image processing in digital cameras. Construction of a digital camera Megapixels and more The basics of image processing in digital cameras Photography is a technique of preserving pictures with the help of light. The first durable photograph was made by Nicephor Niepce

More information

Basic Digital Image Processing. The Structure of Digital Images. An Overview of Image Processing. Image Restoration: Line Drop-outs

Basic Digital Image Processing. The Structure of Digital Images. An Overview of Image Processing. Image Restoration: Line Drop-outs Basic Digital Image Processing A Basic Introduction to Digital Image Processing ~~~~~~~~~~ Rev. Ronald J. Wasowski, C.S.C. Associate Professor of Environmental Science University of Portland Portland,

More information

MULTIPLE SENSORS LENSLETS FOR SECURE DOCUMENT SCANNERS

MULTIPLE SENSORS LENSLETS FOR SECURE DOCUMENT SCANNERS INFOTEH-JAHORINA Vol. 10, Ref. E-VI-11, p. 892-896, March 2011. MULTIPLE SENSORS LENSLETS FOR SECURE DOCUMENT SCANNERS Jelena Cvetković, Aleksej Makarov, Sasa Vujić, Vlatacom d.o.o. Beograd Abstract -

More information

DIGITAL IMAGING. Handbook of. Wiley VOL 1: IMAGE CAPTURE AND STORAGE. Editor-in- Chief

DIGITAL IMAGING. Handbook of. Wiley VOL 1: IMAGE CAPTURE AND STORAGE. Editor-in- Chief Handbook of DIGITAL IMAGING VOL 1: IMAGE CAPTURE AND STORAGE Editor-in- Chief Adjunct Professor of Physics at the Portland State University, Oregon, USA Previously with Eastman Kodak; University of Rochester,

More information

The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.

The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D. The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D. Home The Book by Chapters About the Book Steven W. Smith Blog Contact Book Search Download this chapter in PDF

More information

8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and

8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and 8.1 INTRODUCTION In this chapter, we will study and discuss some fundamental techniques for image processing and image analysis, with a few examples of routines developed for certain purposes. 8.2 IMAGE

More information

Literature Survey on Image Manipulation Detection

Literature Survey on Image Manipulation Detection Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,

More information

Lecture 2 Digital Image Fundamentals. Lin ZHANG, PhD School of Software Engineering Tongji University Fall 2016

Lecture 2 Digital Image Fundamentals. Lin ZHANG, PhD School of Software Engineering Tongji University Fall 2016 Lecture 2 Digital Image Fundamentals Lin ZHANG, PhD School of Software Engineering Tongji University Fall 2016 Contents Elements of visual perception Light and the electromagnetic spectrum Image sensing

More information

Camera Image Processing Pipeline: Part II

Camera Image Processing Pipeline: Part II Lecture 13: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements

More information

VISUAL sensor technologies have experienced tremendous

VISUAL sensor technologies have experienced tremendous IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 1, MARCH 2007 91 Nonintrusive Component Forensics of Visual Sensors Using Output Images Ashwin Swaminathan, Student Member, IEEE, Min

More information

Reference Free Image Quality Evaluation

Reference Free Image Quality Evaluation Reference Free Image Quality Evaluation for Photos and Digital Film Restoration Majed CHAMBAH Université de Reims Champagne-Ardenne, France 1 Overview Introduction Defects affecting films and Digital film

More information

CoE4TN4 Image Processing. Chapter 3: Intensity Transformation and Spatial Filtering

CoE4TN4 Image Processing. Chapter 3: Intensity Transformation and Spatial Filtering CoE4TN4 Image Processing Chapter 3: Intensity Transformation and Spatial Filtering Image Enhancement Enhancement techniques: to process an image so that the result is more suitable than the original image

More information

A Study of Slanted-Edge MTF Stability and Repeatability

A Study of Slanted-Edge MTF Stability and Repeatability A Study of Slanted-Edge MTF Stability and Repeatability Jackson K.M. Roland Imatest LLC, 2995 Wilderness Place Suite 103, Boulder, CO, USA ABSTRACT The slanted-edge method of measuring the spatial frequency

More information

One Week to Better Photography

One Week to Better Photography One Week to Better Photography Glossary Adobe Bridge Useful application packaged with Adobe Photoshop that previews, organizes and renames digital image files and creates digital contact sheets Adobe Photoshop

More information

According to the proposed AWB methods as described in Chapter 3, the following

According to the proposed AWB methods as described in Chapter 3, the following Chapter 4 Experiment 4.1 Introduction According to the proposed AWB methods as described in Chapter 3, the following experiments were designed to evaluate the feasibility and robustness of the algorithms.

More information

Image acquisition. Midterm Review. Digitization, line of image. Digitization, whole image. Geometric transformations. Interpolation 10/26/2016

Image acquisition. Midterm Review. Digitization, line of image. Digitization, whole image. Geometric transformations. Interpolation 10/26/2016 Image acquisition Midterm Review Image Processing CSE 166 Lecture 10 2 Digitization, line of image Digitization, whole image 3 4 Geometric transformations Interpolation CSE 166 Transpose these matrices

More information

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot 24 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY Khosro Bahrami and Alex C. Kot School of Electrical and

More information

What is a "Good Image"?

What is a Good Image? What is a "Good Image"? Norman Koren, Imatest Founder and CTO, Imatest LLC, Boulder, Colorado Image quality is a term widely used by industries that put cameras in their products, but what is image quality?

More information

Image Processing Computer Graphics I Lecture 20. Display Color Models Filters Dithering Image Compression

Image Processing Computer Graphics I Lecture 20. Display Color Models Filters Dithering Image Compression 15-462 Computer Graphics I Lecture 2 Image Processing April 18, 22 Frank Pfenning Carnegie Mellon University http://www.cs.cmu.edu/~fp/courses/graphics/ Display Color Models Filters Dithering Image Compression

More information

Multi-sensor Panoramic Network Camera

Multi-sensor Panoramic Network Camera Multi-sensor Panoramic Network Camera White Paper by Dahua Technology Release 1.0 Table of contents 1 Preface... 2 2 Overview... 3 3 Technical Background... 3 4 Key Technologies... 5 4.1 Feature Points

More information

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods 19 An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods T.Arunachalam* Post Graduate Student, P.G. Dept. of Computer Science, Govt Arts College, Melur - 625 106 Email-Arunac682@gmail.com

More information

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of

More information

University of Amsterdam System & Network Engineering. Research Project 1. Ranking of manipulated images in a large set using Error Level Analysis

University of Amsterdam System & Network Engineering. Research Project 1. Ranking of manipulated images in a large set using Error Level Analysis University of Amsterdam System & Network Engineering Research Project 1 Ranking of manipulated images in a large set using Error Level Analysis Authors: Daan Wagenaar daan.wagenaar@os3.nl Jeffrey Bosma

More information

ROBUST HASHING FOR IMAGE AUTHENTICATION USING ZERNIKE MOMENTS, GABOR WAVELETS AND HISTOGRAM FEATURES

ROBUST HASHING FOR IMAGE AUTHENTICATION USING ZERNIKE MOMENTS, GABOR WAVELETS AND HISTOGRAM FEATURES ROBUST HASHING FOR IMAGE AUTHENTICATION USING ZERNIKE MOMENTS, GABOR WAVELETS AND HISTOGRAM FEATURES Bini Babu 1, Keerthi A. S. Pillai 2 1,2 Computer Science & Engineering, Kerala University, (India) ABSTRACT

More information

WHITE PAPER. Methods for Measuring Flat Panel Display Defects and Mura as Correlated to Human Visual Perception

WHITE PAPER. Methods for Measuring Flat Panel Display Defects and Mura as Correlated to Human Visual Perception Methods for Measuring Flat Panel Display Defects and Mura as Correlated to Human Visual Perception Methods for Measuring Flat Panel Display Defects and Mura as Correlated to Human Visual Perception Abstract

More information

Teton Photography Group

Teton Photography Group Overview general post-processing (editing) workflow for serious photographers Focus on processes more than software Examples using Adobe Lightroom and Photoshop Teton Photography Group January 2016 Emphasis

More information

APPLICATION OF COMPUTER VISION FOR DETERMINATION OF SYMMETRICAL OBJECT POSITION IN THREE DIMENSIONAL SPACE

APPLICATION OF COMPUTER VISION FOR DETERMINATION OF SYMMETRICAL OBJECT POSITION IN THREE DIMENSIONAL SPACE APPLICATION OF COMPUTER VISION FOR DETERMINATION OF SYMMETRICAL OBJECT POSITION IN THREE DIMENSIONAL SPACE Najirah Umar 1 1 Jurusan Teknik Informatika, STMIK Handayani Makassar Email : najirah_stmikh@yahoo.com

More information

image Scanner, digital camera, media, brushes,

image Scanner, digital camera, media, brushes, 118 Also known as rasterr graphics Record a value for every pixel in the image Often created from an external source Scanner, digital camera, Painting P i programs allow direct creation of images with

More information