Introduction to Video Forgery Detection: Part I

Size: px
Start display at page:

Download "Introduction to Video Forgery Detection: Part I"

Transcription

1 Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 4, DECEMBER 2010

2 Introduction HOW can one be assured of the authenticity of a digital image? For example, when digital photographs are used as testimony in courts of law, how is it possible to distinguish between genuine and falsified evidence? Given the recent progress and development of digital editing techniques that can be used to synthesize realistic images, it is difficult to guarantee the authenticity of digital photographs.

3 In the past, digital watermarking was the main technology used to ensure authenticity (e.g., preventing illegal copying of images from the Internet). However, it is impractical to embed digital watermarks in all images, and therefore, digital watermarking is limited in its ability to ensure authenticity.

4 In response to the limitations of watermarking, a number of forgery detecting techniques have been developed that exploit the correlation and the inconsistencies in forged images: Johnson and Farid used inconsistencies in lighting [1] and chromatic aberration (deviation) [2]. Lin et al. estimated a camera response function (CRF)and verified its uniformity across an image [3].

5 Lukáˇs et al. extracted fixed-pattern noise from an image and compared it with a reference pattern [4]. Fridrich et al. computed the correlation between segments in an image and detected cloned regions [5]. Ye et al. estimated a JPEG quantization table and evaluated its consistency [6].

6 [1] M. K. Johnson and H. Farid, Exposing digital forgeries by detecting inconsistencies in lighting, in Proc. Workshop on Multimedia and Security, 2005, pp [2] M. Johnson and H. Farid, Exposing digital forgeries through chromatic aberration, in Proc. Int. Multimedia Conf., 2006, pp [3] Z. Lin, R.Wang, X. Tang, and H.-Y. Shum, Detecting doctored images using camera response normality and consistency, in Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition, 2005, vol. 1, pp

7 [4] J. Lukáˇs, J. Fridrich, and M. Goljan, Detecting digital image forgeries using sensor pattern noise, in Proc. Society of Photo-Optical Instrumentation Engineers Conf., 2006, vol. 6072, pp [5] J. Fridrich, D. Soukal, and J. Lukáˇs, Detection of copy-move forgery in digital images, in Proc. Digital Forensic Research Workshop, Cleveland, OH, [6] S. Ye, Q. Sun, and E.-C. Chang, Detecting digital image forgeries by measuring inconsistencies of blocking artifact, in Proc. IEEE Int. Conf. Multimedia and Expo, 2007, pp

8 To provide some context, tampering methods for videos containing static scenes recorded on a surveillance camera can be classified into two approaches: 1) Intra-video forgery replacing regions or frames with duplicates from the same video sequence to hide unfavorable objects in a scene by overwriting these with the background from other segments in the same video.

9 2) Inter-video forgery clipping objects from other images or video segments and superimposing them on desired regions in the video.

10 Wang and Farid studied a method for detecting intra-video forgery [7]. Since duplication yields high correlation between original regions and cloned ones, detecting unnaturally high coherence is useful for discovering copy paste tampering. [7] W. Wang and H. Farid, Exposing digital forgeries in video by detecting duplication, in Proc. Workshop on Multimedia & Security Int. Multimedia Conf., New York, NY, 2007, pp

11 However, their proposed method has a serious limitation in that it can only detect copy paste tampering from the same video sequence. That is, it cannot be used to detect superimposition caused by inserting objects from other videos.

12 In contrast, this work proposed a method that can detect superimposition generated from video not contained in the original sequence. Specifically, the method uses noise inconsistencies between the original video and superimposed regions to detect forgeries. The nature of photon shot noise mixed into image signals, is exploited, which depends on the camera model and recording parameters.

13 Photon shot noise results from the quantum nature of photons, where the variance of the number of photons coming into a camera is strongly correlated to the mean following a Poisson distribution. Therefore, this correlation between the variance and the mean (characteristic of photon shot noise) can be used as a powerful clue to detect inconsistencies in forged videos.

14 A CCD camera converts photons into electrons and finally into bits; therefore, the relationship between the variance and the mean of the number of photons is converted into that between the variance and the mean of the observed pixel value.

15 This relationship is formulated as the noise level function (NLF) by Liu et al. [8]. The NLF depends on such parameters as inherent parameters of the camera and recording parameters. Consequently, by comparing the relationships of the pixel values in a video clip, we can detect forged regions clipped from another video. [8] C. Liu, W. Freeman, R. Szeliski, and S. B. Kang, Noise estimation from a single image, in Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition (CVPR), 2006, vol. 1, pp

16 Given an input video that contains some forged regions, we first analyze noise characteristics at each pixel. Fig. 1 shows a diagram of the noise characteristics for the forged region and the un-forged region. The solid (e.g., forged region in the video) and the dashed (e.g., un-forged region) lines are the NLFs of the two distributions.

17

18 Each dot in the figure represents a noise characteristic, i.e., the variance versus the mean of pixel values, computed for each pixel. Once we obtain the per-pixel noise characteristics, the NLFs are fitted to the distribution using maximum a posteriori (MAP) estimation. Likelihood is defined as the chi-square distribution to deal with the fluctuation in the noise characteristics resulting from a limited amount of sampled data.

19 The posterior probability of forgery (at every pixel) and the parameters of the NLF are simultaneously estimated using the expectation maximization (EM) algorithm. And an NLF is represented as a linear combination of its basis functions in a similar manner to Liu et al. [8]; moreover, a number of NLFs corresponding to various CRFs and noise parameters are synthesized and a set of linear basis functions is obtained via the principal components analysis (PCA).

20 II. RELATED WORK A. Forgery Detection in Images Image tampering methods can be classified into two approaches: 1) intra-image forgery replacing regions with others in the same image; 2) inter-image forgery superimposing regions clipped from other images.

21 Fridrich et al. were the first to attempt to detect forgeries in images [5]. This method targets intra-image forgery that usually yields an unnaturally high correlation between duplicated regions. They introduced a detection method based on robust block matching, which was carried out by using discrete cosine transform (DCT) coefficients in order to deal with lossy JPEG compression.

22 Subsequent approaches have targeted interimage forgeries by verifying the uniformity of certain characteristics in an image to detect forgery. Johnson and Farid developed a method based on optical clues [1]. They estimated the distribution of light sources illuminating each object by using observed brightness and calculated surface normals along the object s occluding contours, and then investigated the consistency of the estimated illumination distributions.

23 Johnson and Farid also developed a method for detecting forgeries on the basis of lateral chromatic aberration [2], i.e., a spatial shift of light passing through the optical system due to differing refraction between wavelengths. Global model parameters that determine the displacement of lateral chromatic aberration at each pixel were estimated, and the degree of tampering was evaluated by calculating the average angular error between the displacement vector determined by the global model parameters and the displacement vector computed locally.

24 Lin et al. developed a method to examine the consistency in camera response functions estimated on the basis of intensity change along edges [3]. The brightness of an edge should be a linear combination of those from the surfaces on either side, a nonlinear camera response will skew the linearity of the mixture of brightness (so it is Image content dependent).

25 This approach estimates the nonlinear inverse response functions that convert a nonlinear relationship of observed pixel values on the edge into a linear relationship. If the function estimated from an edge does not conform to the rest of the image, the edge is marked as a sign of tampering.

26 Ye et al. developed a method to detect inconsistencies in an image on the basis of a blocking artifact measure for image compression [6]. If blocks compressed with different quantization tables are combined in an image, the blocking artifact measure of the forged block is much larger than that of an authentic block. They estimated the quantization table from the histogram of DCT coefficients and evaluated the blocking artifact measure of each block.

27 Lukáˇs et al. developed a method to verify the pattern of the noise distribution [4]. Due to the sensor imperfections developed during the manufacturing process, a CCD camera contains pixels with differing sensitivity to light. This spatial variation of sensitivity is temporally fixed and known as fixed pattern noise. Since this non-uniformity is inherent in a camera, one can exploit it as a type of fingerprint.

28 They determined the reference noise pattern of a camera by averaging the noise extracted from several images. Given an image, they extracted fixed pattern noise from the image using a smoothing filter and identified the camera that took the image. They also developed a method for detecting forgeries in an image using the same approach [4].

29 B. Forgery Detection in Videos To detect video forgery, one may think of applying an image forgery detection method to each frame of a given video sequence. However, some types of forgery cannot be detected in this manner due to a lack of consideration of relationship between the frames. For instance, simple duplication is undetectable since each frame appears to be authentic if evaluated independently.

30 Compared to the image forensic techniques mentioned above, only a few techniques have been developed for videos, but this field of research is certainly growing. Similar to those for an image, forgery detection techniques for a video are classified into two types: inter-video and intra-video approaches.

31 As mentioned earlier, detection of replacement and duplication in videos has been studied by Wang and Farid [7]. They have also developed an inconsistencybased detection method that checks the consistency of de-interlacing parameters used to convert an interlaced video into a noninterlaced form [9].

32 Since interlaced videos have half the vertical resolution of the original video, the deinterlacing process fully exploits insertion, duplication, and interpolation of frames to create a full-resolution video. [9] W. Wang and H. Farid, Exposing digital forgeries in interlaced and de-interlaced video, IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp , Sep

33 In their method, parameters in the interpolation and the posterior probability of forgery are estimated simultaneously by using the EM algorithm. They also suggested that the motion between fields of a frame is closely related across fields in interlaced videos. Evaluating the interference to this relationship caused by tampering allows their system to detect forgeries in an interlaced video.

34 The correlation of noise in a video has also been explored to detect forgery. Hsu et al. developed a method on the basis of noise characteristics extracted by noise reduction [10]. They exploited block-level correlation of noise residual as the characteristics of a video. [10] C.-C. Hsu, T.-Y. Hung, C.-W. Lin, and C.-T. Hsu, Video forgery detection using correlation of noise residue, in Proc. IEEE 10th Workshop Multimedia Signal Processing, 2008, pp

35 If a region is impainted by another region in the same video, the correlation between the regions takes an unnaturally high value. In contrast, noise residuals of the synthesized textured region from another video exhibit low coherence with the noise residual of other regions.

36 However, this approach greatly depends on the noise reduction method. When the noise intensities of the original and tampered regions are significantly different, it fails to reduce the noise accurately and can miss some forgeries because of the calculation error of noise residual.

37 C. Effective use of Noise in Digital Data Since the early period of digital cameras, various reports have been given on the study of noise in signal processing. The main purpose of this field of research is to remove noise in images and videos. On the other hand, recently some researchers have interestingly attempted to effectively use noise rather than try to remove it from images and videos.

38 Matsushita and Lin exploited the distribution of temporal noise intensity at each pixel to estimate camera response functions (CRFs) [11]. They made use of the fact that the distribution of noise is symmetric about zero in nature, but is skewed by nonlinear CRFs. They estimated the inverse CRF that converts the distribution of the noise calculated from the observed pixel values into symmetric in the irradiance domain.

39 Takamatsu et al. exploited the characteristics of noise to estimate the CRFs as well [12]. They focused on the non-affinity relationship between the observed pixel value and noise variance, not the shape of the distribution of the noise.

40 [11] Y. Matsushita and S. Lin, Radiometric calibration from noise distributions, in Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition (CVPR), 2007, pp [12] J. Takamatsu, Y. Matsushita, and K. Ikeuchi, Estimating radiometric response functions from image noise variance, in Proc. Eur. Conf. Computer Vision, 2008 (ECCV), pp

41 They also developed another method to estimate CRFs on the basis of probabilistic intensity similarity [13]. The probabilistic intensity similarity is the similarity measure of the observed pixel values and represents the likelihood that two pixel values originated from the same scene radiance [14].

42 [13] J. Takamatsu, Y. Matsushita, and K. Ikeuchi, Estimating camera response functions using probabilistic intensity similarity, in Proc. IEEE Conf. Computer Vision and Pattern Recognition, Jun , 2008, (CVPR)pp [14] Y. Matsushita and S. Lin, A probabilistic intensity similarity measure based on noise distributions, in Proc. IEEE Conf. Computer Vision and Pattern Recognition, Jun , 2007 (CVPR), pp. 1 8.

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012 A Tailored Anti-Forensic Approach for Digital Image Compression S.Manimurugan, Athira B.Kaimal Abstract- The influence of digital images on modern society is incredible; image processing has now become

More information

Exposing Digital Forgeries from JPEG Ghosts

Exposing Digital Forgeries from JPEG Ghosts 1 Exposing Digital Forgeries from JPEG Ghosts Hany Farid, Member, IEEE Abstract When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person

More information

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.

More information

Information Forensics: An Overview of the First Decade

Information Forensics: An Overview of the First Decade Received March 8, 2013, accepted April 6, 2013, published May 10, 2013. Digital Object Identifier 10.1109/ACCESS.2013.2260814 Information Forensics: An Overview of the First Decade MATTHEW C. STAMM (MEMBER,

More information

PRIOR IMAGE JPEG-COMPRESSION DETECTION

PRIOR IMAGE JPEG-COMPRESSION DETECTION Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION

More information

Multimedia Forensics

Multimedia Forensics Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

Survey On Passive-Blind Image Forensics

Survey On Passive-Blind Image Forensics Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal

More information

Literature Survey on Image Manipulation Detection

Literature Survey on Image Manipulation Detection Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,

More information

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models

More information

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot 24 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY Khosro Bahrami and Alex C. Kot School of Electrical and

More information

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in

More information

Countering Anti-Forensics of Lateral Chromatic Aberration

Countering Anti-Forensics of Lateral Chromatic Aberration IH&MMSec 7, June -, 7, Philadelphia, PA, USA Countering Anti-Forensics of Lateral Chromatic Aberration Owen Mayer Drexel University Department of Electrical and Computer Engineering Philadelphia, PA, USA

More information

Camera identification from sensor fingerprints: why noise matters

Camera identification from sensor fingerprints: why noise matters Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS

More information

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

Image Forgery Detection: Developing a Holistic Detection Tool

Image Forgery Detection: Developing a Holistic Detection Tool Image Forgery Detection: Developing a Holistic Detection Tool Andrew Levandoski and Jonathan Lobo I. INTRODUCTION In a media environment saturated with deceiving news, the threat of fake and altered images

More information

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence

More information

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Linear Gaussian Method to Detect Blurry Digital Images using SIFT IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org

More information

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif

More information

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick

More information

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

Automation of JPEG Ghost Detection using Graph Based Segmentation

Automation of JPEG Ghost Detection using Graph Based Segmentation International Journal Of Computational Engineering Research (ijceronline.com) Vol. Issue. 2 Automation of JPEG Ghost Detection using Graph Based Segmentation Archana V Mire, Dr S B Dhok 2, Dr P D Porey,

More information

Retrieval of Large Scale Images and Camera Identification via Random Projections

Retrieval of Large Scale Images and Camera Identification via Random Projections Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management

More information

Image Forgery Identification Using JPEG Intrinsic Fingerprints

Image Forgery Identification Using JPEG Intrinsic Fingerprints 1 Image Forgery Identification Using JPEG Intrinsic Fingerprints A. Garg, A. Hailu, and R. Sridharan Abstract In this paper a novel method for image forgery detection is presented. he method exploits the

More information

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu

More information

Forgery Detection using Noise Inconsistency: A Review

Forgery Detection using Noise Inconsistency: A Review Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by

More information

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian

More information

Lossless Image Watermarking for HDR Images Using Tone Mapping

Lossless Image Watermarking for HDR Images Using Tone Mapping IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar

More information

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Mo Chen, Jessica Fridrich, Jan Lukáš, and Miroslav Goljan Dept. of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000,

More information

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES International Journal of Advanced Technology & Engineering Research (IJATER) 3 rd International e-conference on Emerging Trends in Technology DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES Govindraj

More information

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008 Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright

More information

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX 77341,

More information

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): 2321-0613 High-Quality Jpeg Compression using LDN Comparison and Quantization Noise Analysis S.Sasikumar

More information

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L. A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS Yu Chen and Vrizlynn L. L. Thing Institute for Infocomm Research, 1 Fusionopolis Way, 138632,

More information

Impeding Forgers at Photo Inception

Impeding Forgers at Photo Inception Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth

More information

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,

More information

IMAGE COMPOSITE DETECTION USING CUSTOMIZED

IMAGE COMPOSITE DETECTION USING CUSTOMIZED IMAGE COMPOSITE DETECTION USING CUSTOMIZED Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad ssm@iiita.ac.in rctripathi@iiita.ac.in ABSTRACT The multimedia applications

More information

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT

More information

Forensic Hash for Multimedia Information

Forensic Hash for Multimedia Information Forensic Hash for Multimedia Information Wenjun Lu, Avinash L. Varna and Min Wu Department of Electrical and Computer Engineering, University of Maryland, College Park, U.S.A email: {wenjunlu, varna, minwu}@eng.umd.edu

More information

A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications

A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications IEEE Transactions on Image Processing, Vol. 21, No. 2, 2012 Eric Dedrick and Daniel Lau, Presented by Ran Shu School

More information

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ A REVIEW OF TRENDS IN DIGITAL IMAGE PROCESSING FOR FORENSIC CONSIDERATION Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ Department of Forensic Science Sam Higginbottom Institute of agriculture Technology

More information

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies International Journal of Computer and Communication Engineering, Vol. 4, No., January 25 Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies Bo Liu and Chi-Man Pun Noise patterns

More information

Super resolution with Epitomes

Super resolution with Epitomes Super resolution with Epitomes Aaron Brown University of Wisconsin Madison, WI Abstract Techniques exist for aligning and stitching photos of a scene and for interpolating image data to generate higher

More information

IMAGE FORMATION. Light source properties. Sensor characteristics Surface. Surface reflectance properties. Optics

IMAGE FORMATION. Light source properties. Sensor characteristics Surface. Surface reflectance properties. Optics IMAGE FORMATION Light source properties Sensor characteristics Surface Exposure shape Optics Surface reflectance properties ANALOG IMAGES An image can be understood as a 2D light intensity function f(x,y)

More information

Effective Pixel Interpolation for Image Super Resolution

Effective Pixel Interpolation for Image Super Resolution IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-iss: 2278-2834,p- ISS: 2278-8735. Volume 6, Issue 2 (May. - Jun. 2013), PP 15-20 Effective Pixel Interpolation for Image Super Resolution

More information

Improving Image Quality by Camera Signal Adaptation to Lighting Conditions

Improving Image Quality by Camera Signal Adaptation to Lighting Conditions Improving Image Quality by Camera Signal Adaptation to Lighting Conditions Mihai Negru and Sergiu Nedevschi Technical University of Cluj-Napoca, Computer Science Department Mihai.Negru@cs.utcluj.ro, Sergiu.Nedevschi@cs.utcluj.ro

More information

Colour correction for panoramic imaging

Colour correction for panoramic imaging Colour correction for panoramic imaging Gui Yun Tian Duke Gledhill Dave Taylor The University of Huddersfield David Clarke Rotography Ltd Abstract: This paper reports the problem of colour distortion in

More information

Camera Resolution and Distortion: Advanced Edge Fitting

Camera Resolution and Distortion: Advanced Edge Fitting 28, Society for Imaging Science and Technology Camera Resolution and Distortion: Advanced Edge Fitting Peter D. Burns; Burns Digital Imaging and Don Williams; Image Science Associates Abstract A frequently

More information

Chapter 9 Image Compression Standards

Chapter 9 Image Compression Standards Chapter 9 Image Compression Standards 9.1 The JPEG Standard 9.2 The JPEG2000 Standard 9.3 The JPEG-LS Standard 1IT342 Image Compression Standards The image standard specifies the codec, which defines how

More information

Exposing Image Splicing with Inconsistent Local Noise Variances

Exposing Image Splicing with Inconsistent Local Noise Variances Exposing Image Splicing with Inconsistent Local Noise Variances Xunyu Pan Xing Zhang Siwei Lyu Computer Science Department University at Albany, State University of New York {xzhang5,xypan,slyu@albany.edu

More information

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area

More information

Main Subject Detection of Image by Cropping Specific Sharp Area

Main Subject Detection of Image by Cropping Specific Sharp Area Main Subject Detection of Image by Cropping Specific Sharp Area FOTIOS C. VAIOULIS 1, MARIOS S. POULOS 1, GEORGE D. BOKOS 1 and NIKOLAOS ALEXANDRIS 2 Department of Archives and Library Science Ionian University

More information

An Efficient Nonlinear Filter for Removal of Impulse Noise in Color Video Sequences

An Efficient Nonlinear Filter for Removal of Impulse Noise in Color Video Sequences An Efficient Nonlinear Filter for Removal of Impulse Noise in Color Video Sequences D.Lincy Merlin, K.Ramesh Babu M.E Student [Applied Electronics], Dept. of ECE, Kingston Engineering College, Vellore,

More information

IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES

IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES Shrishail Math 1 and R.C.Tripathi Indian Institute of Information Technology, Allahabad, India,1101 1 ssm@iiita.ac.in rctripathi@iiita.ac.in

More information

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Feature Based Analysis of Copy-Paste Image Tampering

More information

Sequential Algorithm for Robust Radiometric Calibration and Vignetting Correction

Sequential Algorithm for Robust Radiometric Calibration and Vignetting Correction Sequential Algorithm for Robust Radiometric Calibration and Vignetting Correction Seon Joo Kim and Marc Pollefeys Department of Computer Science University of North Carolina Chapel Hill, NC 27599 {sjkim,

More information

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches Dhara Anandpara 1, Rohit Srivastava 2 1, 2 Computer Engineering Department, Parul

More information

Comparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression

Comparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression Comparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression Muhammad SAFDAR, 1 Ming Ronnier LUO, 1,2 Xiaoyu LIU 1, 3 1 State Key Laboratory of Modern Optical Instrumentation, Zhejiang

More information

Efficient Target Detection from Hyperspectral Images Based On Removal of Signal Independent and Signal Dependent Noise

Efficient Target Detection from Hyperspectral Images Based On Removal of Signal Independent and Signal Dependent Noise IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 6, Ver. III (Nov - Dec. 2014), PP 45-49 Efficient Target Detection from Hyperspectral

More information

A Single Image Haze Removal Algorithm Using Color Attenuation Prior

A Single Image Haze Removal Algorithm Using Color Attenuation Prior International Journal of Scientific and Research Publications, Volume 6, Issue 6, June 2016 291 A Single Image Haze Removal Algorithm Using Color Attenuation Prior Manjunath.V *, Revanasiddappa Phatate

More information

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering

More information

Bogdan Smolka. Polish-Japanese Institute of Information Technology Koszykowa 86, , Warsaw

Bogdan Smolka. Polish-Japanese Institute of Information Technology Koszykowa 86, , Warsaw appeared in 10. Workshop Farbbildverarbeitung 2004, Koblenz, Online-Proceedings http://www.uni-koblenz.de/icv/fws2004/ Robust Color Image Retrieval for the WWW Bogdan Smolka Polish-Japanese Institute of

More information

Introduction. Prof. Lina Karam School of Electrical, Computer, & Energy Engineering Arizona State University

Introduction. Prof. Lina Karam School of Electrical, Computer, & Energy Engineering Arizona State University EEE 508 - Digital Image & Video Processing and Compression http://lina.faculty.asu.edu/eee508/ Introduction Prof. Lina Karam School of Electrical, Computer, & Energy Engineering Arizona State University

More information

ABC: Enabling Smartphone Authentication with Built-in Camera

ABC: Enabling Smartphone Authentication with Built-in Camera ABC: Enabling Smartphone Authentication with Built-in Camera Zhongjie Ba, Sixu Piao, Xinwen Fu f, Dimitrios Koutsonikolas, Aziz Mohaisen f and Kui Ren f 1 Camera Identification: Hardware Distortion Manufacturing

More information

Real Time Video Analysis using Smart Phone Camera for Stroboscopic Image

Real Time Video Analysis using Smart Phone Camera for Stroboscopic Image Real Time Video Analysis using Smart Phone Camera for Stroboscopic Image Somnath Mukherjee, Kritikal Solutions Pvt. Ltd. (India); Soumyajit Ganguly, International Institute of Information Technology (India)

More information

Compression and Image Formats

Compression and Image Formats Compression Compression and Image Formats Reduce amount of data used to represent an image/video Bit rate and quality requirements Necessary to facilitate transmission and storage Required quality is application

More information

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Chiew K.T., et al. (Eds.): PGRES 2017, Kuala Lumpur: Eastin Hotel, FCSIT, 2017: pp 35-42 IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Thamarai Subramaniam and Hamid

More information

White paper. Wide dynamic range. WDR solutions for forensic value. October 2017

White paper. Wide dynamic range. WDR solutions for forensic value. October 2017 White paper Wide dynamic range WDR solutions for forensic value October 2017 Table of contents 1. Summary 4 2. Introduction 5 3. Wide dynamic range scenes 5 4. Physical limitations of a camera s dynamic

More information

Digital photography , , Computational Photography Fall 2017, Lecture 2

Digital photography , , Computational Photography Fall 2017, Lecture 2 Digital photography http://graphics.cs.cmu.edu/courses/15-463 15-463, 15-663, 15-862 Computational Photography Fall 2017, Lecture 2 Course announcements To the 14 students who took the course survey on

More information

WITH the rapid development of image processing technology,

WITH the rapid development of image processing technology, 480 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 JPEG Error Analysis and Its Applications to Digital Image Forensics Weiqi Luo, Member, IEEE, Jiwu Huang, Senior

More information

Tampering Detection Algorithms: A Comparative Study

Tampering Detection Algorithms: A Comparative Study International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING Chapter 21 FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING Gilbert Peterson Abstract The use of digital photography has increased over the past few years, a trend which opens the door for new and creative

More information

Refined Slanted-Edge Measurement for Practical Camera and Scanner Testing

Refined Slanted-Edge Measurement for Practical Camera and Scanner Testing Refined Slanted-Edge Measurement for Practical Camera and Scanner Testing Peter D. Burns and Don Williams Eastman Kodak Company Rochester, NY USA Abstract It has been almost five years since the ISO adopted

More information

IMAGE SPLICING FORGERY DETECTION

IMAGE SPLICING FORGERY DETECTION IMAGE SPLICING FORGERY DETECTION 1 SIDDHI GAUR, 2 SHAMIK TIWARI 1 M.Tech, 2 Assistant Professor, Dept of CSE, Mody University of Science and Technology, Sikar,India E-mail: 1 siddhi.gaur14@gmail.com, 2

More information

NO-REFERENCE IMAGE BLUR ASSESSMENT USING MULTISCALE GRADIENT. Ming-Jun Chen and Alan C. Bovik

NO-REFERENCE IMAGE BLUR ASSESSMENT USING MULTISCALE GRADIENT. Ming-Jun Chen and Alan C. Bovik NO-REFERENCE IMAGE BLUR ASSESSMENT USING MULTISCALE GRADIENT Ming-Jun Chen and Alan C. Bovik Laboratory for Image and Video Engineering (LIVE), Department of Electrical & Computer Engineering, The University

More information

International Journal of Innovative Research in Engineering Science and Technology APRIL 2018 ISSN X

International Journal of Innovative Research in Engineering Science and Technology APRIL 2018 ISSN X HIGH DYNAMIC RANGE OF MULTISPECTRAL ACQUISITION USING SPATIAL IMAGES 1 M.Kavitha, M.Tech., 2 N.Kannan, M.E., and 3 S.Dharanya, M.E., 1 Assistant Professor/ CSE, Dhirajlal Gandhi College of Technology,

More information

EC-433 Digital Image Processing

EC-433 Digital Image Processing EC-433 Digital Image Processing Lecture 2 Digital Image Fundamentals Dr. Arslan Shaukat 1 Fundamental Steps in DIP Image Acquisition An image is captured by a sensor (such as a monochrome or color TV camera)

More information

A Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA)

A Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA) A Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA) Suma Chappidi 1, Sandeep Kumar Mekapothula 2 1 PG Scholar, Department of ECE, RISE Krishna

More information

A Review of Image Forgery Techniques

A Review of Image Forgery Techniques A Review of Image Forgery Techniques Hardish Kaur, Geetanjali Babbar Assistant professor, CGC Landran, India. ABSTRACT: Image forgery refer to copying and pasting contents from one image into another image.

More information

DIGITAL IMAGING. Handbook of. Wiley VOL 1: IMAGE CAPTURE AND STORAGE. Editor-in- Chief

DIGITAL IMAGING. Handbook of. Wiley VOL 1: IMAGE CAPTURE AND STORAGE. Editor-in- Chief Handbook of DIGITAL IMAGING VOL 1: IMAGE CAPTURE AND STORAGE Editor-in- Chief Adjunct Professor of Physics at the Portland State University, Oregon, USA Previously with Eastman Kodak; University of Rochester,

More information

Fast and High-Quality Image Blending on Mobile Phones

Fast and High-Quality Image Blending on Mobile Phones Fast and High-Quality Image Blending on Mobile Phones Yingen Xiong and Kari Pulli Nokia Research Center 955 Page Mill Road Palo Alto, CA 94304 USA Email: {yingenxiong, karipulli}@nokiacom Abstract We present

More information

ABSTRACT 1. INTRODUCTION

ABSTRACT 1. INTRODUCTION Preprint Proc. SPIE Vol. 5076-10, Infrared Imaging Systems: Design, Analysis, Modeling, and Testing XIV, Apr. 2003 1! " " #$ %& ' & ( # ") Klamer Schutte, Dirk-Jan de Lange, and Sebastian P. van den Broek

More information

Tampering and Copy-Move Forgery Detection Using Sift Feature

Tampering and Copy-Move Forgery Detection Using Sift Feature Tampering and Copy-Move Forgery Detection Using Sift Feature N.Anantharaj 1 M-TECH (IT) Final Year, Department of IT, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India 1 ABSTRACT:

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

CS6670: Computer Vision

CS6670: Computer Vision CS6670: Computer Vision Noah Snavely Lecture 22: Computational photography photomatix.com Announcements Final project midterm reports due on Tuesday to CMS by 11:59pm BRDF s can be incredibly complicated

More information

Neuro-Fuzzy based First Responder for Image forgery Identification

Neuro-Fuzzy based First Responder for Image forgery Identification ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Interpolation of CFA Color Images with Hybrid Image Denoising

Interpolation of CFA Color Images with Hybrid Image Denoising 2014 Sixth International Conference on Computational Intelligence and Communication Networks Interpolation of CFA Color Images with Hybrid Image Denoising Sasikala S Computer Science and Engineering, Vasireddy

More information

A New Steganographic Method for Palette-Based Images

A New Steganographic Method for Palette-Based Images A New Steganographic Method for Palette-Based Images Jiri Fridrich Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000 Abstract In this paper, we present a new steganographic technique

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

Digital Image Forgery Detection by Contrast Enhancement

Digital Image Forgery Detection by Contrast Enhancement IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. IX (Sep-Oct. 2014), PP 01-07 Digital Image Forgery Detection by Contrast Enhancement Remya

More information

SYSTEMATIC NOISE CHARACTERIZATION OF A CCD CAMERA: APPLICATION TO A MULTISPECTRAL IMAGING SYSTEM

SYSTEMATIC NOISE CHARACTERIZATION OF A CCD CAMERA: APPLICATION TO A MULTISPECTRAL IMAGING SYSTEM SYSTEMATIC NOISE CHARACTERIZATION OF A CCD CAMERA: APPLICATION TO A MULTISPECTRAL IMAGING SYSTEM A. Mansouri, F. S. Marzani, P. Gouton LE2I. UMR CNRS-5158, UFR Sc. & Tech., University of Burgundy, BP 47870,

More information

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect

More information

CERIAS Tech Report

CERIAS Tech Report CERIAS Tech Report 2001-74 A Review of Fragile Image Watermarks by Eugene T. Lin and Edward J. Delp Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette,

More information

Different-quality Re-demosaicing in Digital Image Forensics

Different-quality Re-demosaicing in Digital Image Forensics Different-quality Re-demosaicing in Digital Image Forensics 1 Bo Wang, 2 Xiangwei Kong, 3 Lanying Wu *1,2,3 School of Information and Communication Engineering, Dalian University of Technology E-mail:

More information

Recent Advances in Image Deblurring. Seungyong Lee (Collaboration w/ Sunghyun Cho)

Recent Advances in Image Deblurring. Seungyong Lee (Collaboration w/ Sunghyun Cho) Recent Advances in Image Deblurring Seungyong Lee (Collaboration w/ Sunghyun Cho) Disclaimer Many images and figures in this course note have been copied from the papers and presentation materials of previous

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

HDR images acquisition

HDR images acquisition HDR images acquisition dr. Francesco Banterle francesco.banterle@isti.cnr.it Current sensors No sensors available to consumer for capturing HDR content in a single shot Some native HDR sensors exist, HDRc

More information