Introduction to Video Forgery Detection: Part I
|
|
- Stuart Norris
- 5 years ago
- Views:
Transcription
1 Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 4, DECEMBER 2010
2 Introduction HOW can one be assured of the authenticity of a digital image? For example, when digital photographs are used as testimony in courts of law, how is it possible to distinguish between genuine and falsified evidence? Given the recent progress and development of digital editing techniques that can be used to synthesize realistic images, it is difficult to guarantee the authenticity of digital photographs.
3 In the past, digital watermarking was the main technology used to ensure authenticity (e.g., preventing illegal copying of images from the Internet). However, it is impractical to embed digital watermarks in all images, and therefore, digital watermarking is limited in its ability to ensure authenticity.
4 In response to the limitations of watermarking, a number of forgery detecting techniques have been developed that exploit the correlation and the inconsistencies in forged images: Johnson and Farid used inconsistencies in lighting [1] and chromatic aberration (deviation) [2]. Lin et al. estimated a camera response function (CRF)and verified its uniformity across an image [3].
5 Lukáˇs et al. extracted fixed-pattern noise from an image and compared it with a reference pattern [4]. Fridrich et al. computed the correlation between segments in an image and detected cloned regions [5]. Ye et al. estimated a JPEG quantization table and evaluated its consistency [6].
6 [1] M. K. Johnson and H. Farid, Exposing digital forgeries by detecting inconsistencies in lighting, in Proc. Workshop on Multimedia and Security, 2005, pp [2] M. Johnson and H. Farid, Exposing digital forgeries through chromatic aberration, in Proc. Int. Multimedia Conf., 2006, pp [3] Z. Lin, R.Wang, X. Tang, and H.-Y. Shum, Detecting doctored images using camera response normality and consistency, in Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition, 2005, vol. 1, pp
7 [4] J. Lukáˇs, J. Fridrich, and M. Goljan, Detecting digital image forgeries using sensor pattern noise, in Proc. Society of Photo-Optical Instrumentation Engineers Conf., 2006, vol. 6072, pp [5] J. Fridrich, D. Soukal, and J. Lukáˇs, Detection of copy-move forgery in digital images, in Proc. Digital Forensic Research Workshop, Cleveland, OH, [6] S. Ye, Q. Sun, and E.-C. Chang, Detecting digital image forgeries by measuring inconsistencies of blocking artifact, in Proc. IEEE Int. Conf. Multimedia and Expo, 2007, pp
8 To provide some context, tampering methods for videos containing static scenes recorded on a surveillance camera can be classified into two approaches: 1) Intra-video forgery replacing regions or frames with duplicates from the same video sequence to hide unfavorable objects in a scene by overwriting these with the background from other segments in the same video.
9 2) Inter-video forgery clipping objects from other images or video segments and superimposing them on desired regions in the video.
10 Wang and Farid studied a method for detecting intra-video forgery [7]. Since duplication yields high correlation between original regions and cloned ones, detecting unnaturally high coherence is useful for discovering copy paste tampering. [7] W. Wang and H. Farid, Exposing digital forgeries in video by detecting duplication, in Proc. Workshop on Multimedia & Security Int. Multimedia Conf., New York, NY, 2007, pp
11 However, their proposed method has a serious limitation in that it can only detect copy paste tampering from the same video sequence. That is, it cannot be used to detect superimposition caused by inserting objects from other videos.
12 In contrast, this work proposed a method that can detect superimposition generated from video not contained in the original sequence. Specifically, the method uses noise inconsistencies between the original video and superimposed regions to detect forgeries. The nature of photon shot noise mixed into image signals, is exploited, which depends on the camera model and recording parameters.
13 Photon shot noise results from the quantum nature of photons, where the variance of the number of photons coming into a camera is strongly correlated to the mean following a Poisson distribution. Therefore, this correlation between the variance and the mean (characteristic of photon shot noise) can be used as a powerful clue to detect inconsistencies in forged videos.
14 A CCD camera converts photons into electrons and finally into bits; therefore, the relationship between the variance and the mean of the number of photons is converted into that between the variance and the mean of the observed pixel value.
15 This relationship is formulated as the noise level function (NLF) by Liu et al. [8]. The NLF depends on such parameters as inherent parameters of the camera and recording parameters. Consequently, by comparing the relationships of the pixel values in a video clip, we can detect forged regions clipped from another video. [8] C. Liu, W. Freeman, R. Szeliski, and S. B. Kang, Noise estimation from a single image, in Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition (CVPR), 2006, vol. 1, pp
16 Given an input video that contains some forged regions, we first analyze noise characteristics at each pixel. Fig. 1 shows a diagram of the noise characteristics for the forged region and the un-forged region. The solid (e.g., forged region in the video) and the dashed (e.g., un-forged region) lines are the NLFs of the two distributions.
17
18 Each dot in the figure represents a noise characteristic, i.e., the variance versus the mean of pixel values, computed for each pixel. Once we obtain the per-pixel noise characteristics, the NLFs are fitted to the distribution using maximum a posteriori (MAP) estimation. Likelihood is defined as the chi-square distribution to deal with the fluctuation in the noise characteristics resulting from a limited amount of sampled data.
19 The posterior probability of forgery (at every pixel) and the parameters of the NLF are simultaneously estimated using the expectation maximization (EM) algorithm. And an NLF is represented as a linear combination of its basis functions in a similar manner to Liu et al. [8]; moreover, a number of NLFs corresponding to various CRFs and noise parameters are synthesized and a set of linear basis functions is obtained via the principal components analysis (PCA).
20 II. RELATED WORK A. Forgery Detection in Images Image tampering methods can be classified into two approaches: 1) intra-image forgery replacing regions with others in the same image; 2) inter-image forgery superimposing regions clipped from other images.
21 Fridrich et al. were the first to attempt to detect forgeries in images [5]. This method targets intra-image forgery that usually yields an unnaturally high correlation between duplicated regions. They introduced a detection method based on robust block matching, which was carried out by using discrete cosine transform (DCT) coefficients in order to deal with lossy JPEG compression.
22 Subsequent approaches have targeted interimage forgeries by verifying the uniformity of certain characteristics in an image to detect forgery. Johnson and Farid developed a method based on optical clues [1]. They estimated the distribution of light sources illuminating each object by using observed brightness and calculated surface normals along the object s occluding contours, and then investigated the consistency of the estimated illumination distributions.
23 Johnson and Farid also developed a method for detecting forgeries on the basis of lateral chromatic aberration [2], i.e., a spatial shift of light passing through the optical system due to differing refraction between wavelengths. Global model parameters that determine the displacement of lateral chromatic aberration at each pixel were estimated, and the degree of tampering was evaluated by calculating the average angular error between the displacement vector determined by the global model parameters and the displacement vector computed locally.
24 Lin et al. developed a method to examine the consistency in camera response functions estimated on the basis of intensity change along edges [3]. The brightness of an edge should be a linear combination of those from the surfaces on either side, a nonlinear camera response will skew the linearity of the mixture of brightness (so it is Image content dependent).
25 This approach estimates the nonlinear inverse response functions that convert a nonlinear relationship of observed pixel values on the edge into a linear relationship. If the function estimated from an edge does not conform to the rest of the image, the edge is marked as a sign of tampering.
26 Ye et al. developed a method to detect inconsistencies in an image on the basis of a blocking artifact measure for image compression [6]. If blocks compressed with different quantization tables are combined in an image, the blocking artifact measure of the forged block is much larger than that of an authentic block. They estimated the quantization table from the histogram of DCT coefficients and evaluated the blocking artifact measure of each block.
27 Lukáˇs et al. developed a method to verify the pattern of the noise distribution [4]. Due to the sensor imperfections developed during the manufacturing process, a CCD camera contains pixels with differing sensitivity to light. This spatial variation of sensitivity is temporally fixed and known as fixed pattern noise. Since this non-uniformity is inherent in a camera, one can exploit it as a type of fingerprint.
28 They determined the reference noise pattern of a camera by averaging the noise extracted from several images. Given an image, they extracted fixed pattern noise from the image using a smoothing filter and identified the camera that took the image. They also developed a method for detecting forgeries in an image using the same approach [4].
29 B. Forgery Detection in Videos To detect video forgery, one may think of applying an image forgery detection method to each frame of a given video sequence. However, some types of forgery cannot be detected in this manner due to a lack of consideration of relationship between the frames. For instance, simple duplication is undetectable since each frame appears to be authentic if evaluated independently.
30 Compared to the image forensic techniques mentioned above, only a few techniques have been developed for videos, but this field of research is certainly growing. Similar to those for an image, forgery detection techniques for a video are classified into two types: inter-video and intra-video approaches.
31 As mentioned earlier, detection of replacement and duplication in videos has been studied by Wang and Farid [7]. They have also developed an inconsistencybased detection method that checks the consistency of de-interlacing parameters used to convert an interlaced video into a noninterlaced form [9].
32 Since interlaced videos have half the vertical resolution of the original video, the deinterlacing process fully exploits insertion, duplication, and interpolation of frames to create a full-resolution video. [9] W. Wang and H. Farid, Exposing digital forgeries in interlaced and de-interlaced video, IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp , Sep
33 In their method, parameters in the interpolation and the posterior probability of forgery are estimated simultaneously by using the EM algorithm. They also suggested that the motion between fields of a frame is closely related across fields in interlaced videos. Evaluating the interference to this relationship caused by tampering allows their system to detect forgeries in an interlaced video.
34 The correlation of noise in a video has also been explored to detect forgery. Hsu et al. developed a method on the basis of noise characteristics extracted by noise reduction [10]. They exploited block-level correlation of noise residual as the characteristics of a video. [10] C.-C. Hsu, T.-Y. Hung, C.-W. Lin, and C.-T. Hsu, Video forgery detection using correlation of noise residue, in Proc. IEEE 10th Workshop Multimedia Signal Processing, 2008, pp
35 If a region is impainted by another region in the same video, the correlation between the regions takes an unnaturally high value. In contrast, noise residuals of the synthesized textured region from another video exhibit low coherence with the noise residual of other regions.
36 However, this approach greatly depends on the noise reduction method. When the noise intensities of the original and tampered regions are significantly different, it fails to reduce the noise accurately and can miss some forgeries because of the calculation error of noise residual.
37 C. Effective use of Noise in Digital Data Since the early period of digital cameras, various reports have been given on the study of noise in signal processing. The main purpose of this field of research is to remove noise in images and videos. On the other hand, recently some researchers have interestingly attempted to effectively use noise rather than try to remove it from images and videos.
38 Matsushita and Lin exploited the distribution of temporal noise intensity at each pixel to estimate camera response functions (CRFs) [11]. They made use of the fact that the distribution of noise is symmetric about zero in nature, but is skewed by nonlinear CRFs. They estimated the inverse CRF that converts the distribution of the noise calculated from the observed pixel values into symmetric in the irradiance domain.
39 Takamatsu et al. exploited the characteristics of noise to estimate the CRFs as well [12]. They focused on the non-affinity relationship between the observed pixel value and noise variance, not the shape of the distribution of the noise.
40 [11] Y. Matsushita and S. Lin, Radiometric calibration from noise distributions, in Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition (CVPR), 2007, pp [12] J. Takamatsu, Y. Matsushita, and K. Ikeuchi, Estimating radiometric response functions from image noise variance, in Proc. Eur. Conf. Computer Vision, 2008 (ECCV), pp
41 They also developed another method to estimate CRFs on the basis of probabilistic intensity similarity [13]. The probabilistic intensity similarity is the similarity measure of the observed pixel values and represents the likelihood that two pixel values originated from the same scene radiance [14].
42 [13] J. Takamatsu, Y. Matsushita, and K. Ikeuchi, Estimating camera response functions using probabilistic intensity similarity, in Proc. IEEE Conf. Computer Vision and Pattern Recognition, Jun , 2008, (CVPR)pp [14] Y. Matsushita and S. Lin, A probabilistic intensity similarity measure based on noise distributions, in Proc. IEEE Conf. Computer Vision and Pattern Recognition, Jun , 2007 (CVPR), pp. 1 8.
Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table
Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012
A Tailored Anti-Forensic Approach for Digital Image Compression S.Manimurugan, Athira B.Kaimal Abstract- The influence of digital images on modern society is incredible; image processing has now become
More informationExposing Digital Forgeries from JPEG Ghosts
1 Exposing Digital Forgeries from JPEG Ghosts Hany Farid, Member, IEEE Abstract When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person
More informationIMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION
IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.
More informationInformation Forensics: An Overview of the First Decade
Received March 8, 2013, accepted April 6, 2013, published May 10, 2013. Digital Object Identifier 10.1109/ACCESS.2013.2260814 Information Forensics: An Overview of the First Decade MATTHEW C. STAMM (MEMBER,
More informationPRIOR IMAGE JPEG-COMPRESSION DETECTION
Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION
More informationMultimedia Forensics
Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationSurvey On Passive-Blind Image Forensics
Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal
More informationLiterature Survey on Image Manipulation Detection
Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,
More informationIDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION
Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models
More informationIMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot
24 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY Khosro Bahrami and Alex C. Kot School of Electrical and
More informationPassive Image Forensic Method to detect Copy Move Forgery in Digital Images
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in
More informationCountering Anti-Forensics of Lateral Chromatic Aberration
IH&MMSec 7, June -, 7, Philadelphia, PA, USA Countering Anti-Forensics of Lateral Chromatic Aberration Owen Mayer Drexel University Department of Electrical and Computer Engineering Philadelphia, PA, USA
More informationCamera identification from sensor fingerprints: why noise matters
Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS
More informationDetecting Resized Double JPEG Compressed Images Using Support Vector Machine
Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de
More informationImage Forgery Detection: Developing a Holistic Detection Tool
Image Forgery Detection: Developing a Holistic Detection Tool Andrew Levandoski and Jonathan Lobo I. INTRODUCTION In a media environment saturated with deceiving news, the threat of fake and altered images
More informationForensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification
Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence
More informationLinear Gaussian Method to Detect Blurry Digital Images using SIFT
IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org
More informationAn Automatic JPEG Ghost Detection Approach for Digital Image Forensics
An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif
More informationity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li
ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick
More informationSOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS
SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationAutomation of JPEG Ghost Detection using Graph Based Segmentation
International Journal Of Computational Engineering Research (ijceronline.com) Vol. Issue. 2 Automation of JPEG Ghost Detection using Graph Based Segmentation Archana V Mire, Dr S B Dhok 2, Dr P D Porey,
More informationRetrieval of Large Scale Images and Camera Identification via Random Projections
Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management
More informationImage Forgery Identification Using JPEG Intrinsic Fingerprints
1 Image Forgery Identification Using JPEG Intrinsic Fingerprints A. Garg, A. Hailu, and R. Sridharan Abstract In this paper a novel method for image forgery detection is presented. he method exploits the
More informationA JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid
A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu
More informationForgery Detection using Noise Inconsistency: A Review
Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by
More informationImage Tampering Localization via Estimating the Non-Aligned Double JPEG compression
Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian
More informationLossless Image Watermarking for HDR Images Using Tone Mapping
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar
More informationImaging Sensor Noise as Digital X-Ray for Revealing Forgeries
Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Mo Chen, Jessica Fridrich, Jan Lukáš, and Miroslav Goljan Dept. of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000,
More informationDIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES
International Journal of Advanced Technology & Engineering Research (IJATER) 3 rd International e-conference on Emerging Trends in Technology DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES Govindraj
More informationWatermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008
Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright
More informationDetection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery
Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX 77341,
More informationIJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):
IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): 2321-0613 High-Quality Jpeg Compression using LDN Comparison and Quantization Noise Analysis S.Sasikumar
More informationA STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.
A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS Yu Chen and Vrizlynn L. L. Thing Institute for Infocomm Research, 1 Fusionopolis Way, 138632,
More informationImpeding Forgers at Photo Inception
Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth
More informationAN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM
AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,
More informationIMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZED Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad ssm@iiita.ac.in rctripathi@iiita.ac.in ABSTRACT The multimedia applications
More informationREVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING
REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT
More informationForensic Hash for Multimedia Information
Forensic Hash for Multimedia Information Wenjun Lu, Avinash L. Varna and Min Wu Department of Electrical and Computer Engineering, University of Maryland, College Park, U.S.A email: {wenjunlu, varna, minwu}@eng.umd.edu
More informationA Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications
A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications IEEE Transactions on Image Processing, Vol. 21, No. 2, 2012 Eric Dedrick and Daniel Lau, Presented by Ran Shu School
More informationSapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³
A REVIEW OF TRENDS IN DIGITAL IMAGE PROCESSING FOR FORENSIC CONSIDERATION Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ Department of Forensic Science Sam Higginbottom Institute of agriculture Technology
More informationSplicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies
International Journal of Computer and Communication Engineering, Vol. 4, No., January 25 Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies Bo Liu and Chi-Man Pun Noise patterns
More informationSuper resolution with Epitomes
Super resolution with Epitomes Aaron Brown University of Wisconsin Madison, WI Abstract Techniques exist for aligning and stitching photos of a scene and for interpolating image data to generate higher
More informationIMAGE FORMATION. Light source properties. Sensor characteristics Surface. Surface reflectance properties. Optics
IMAGE FORMATION Light source properties Sensor characteristics Surface Exposure shape Optics Surface reflectance properties ANALOG IMAGES An image can be understood as a 2D light intensity function f(x,y)
More informationEffective Pixel Interpolation for Image Super Resolution
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-iss: 2278-2834,p- ISS: 2278-8735. Volume 6, Issue 2 (May. - Jun. 2013), PP 15-20 Effective Pixel Interpolation for Image Super Resolution
More informationImproving Image Quality by Camera Signal Adaptation to Lighting Conditions
Improving Image Quality by Camera Signal Adaptation to Lighting Conditions Mihai Negru and Sergiu Nedevschi Technical University of Cluj-Napoca, Computer Science Department Mihai.Negru@cs.utcluj.ro, Sergiu.Nedevschi@cs.utcluj.ro
More informationColour correction for panoramic imaging
Colour correction for panoramic imaging Gui Yun Tian Duke Gledhill Dave Taylor The University of Huddersfield David Clarke Rotography Ltd Abstract: This paper reports the problem of colour distortion in
More informationCamera Resolution and Distortion: Advanced Edge Fitting
28, Society for Imaging Science and Technology Camera Resolution and Distortion: Advanced Edge Fitting Peter D. Burns; Burns Digital Imaging and Don Williams; Image Science Associates Abstract A frequently
More informationChapter 9 Image Compression Standards
Chapter 9 Image Compression Standards 9.1 The JPEG Standard 9.2 The JPEG2000 Standard 9.3 The JPEG-LS Standard 1IT342 Image Compression Standards The image standard specifies the codec, which defines how
More informationExposing Image Splicing with Inconsistent Local Noise Variances
Exposing Image Splicing with Inconsistent Local Noise Variances Xunyu Pan Xing Zhang Siwei Lyu Computer Science Department University at Albany, State University of New York {xzhang5,xypan,slyu@albany.edu
More informationCS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee
CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area
More informationMain Subject Detection of Image by Cropping Specific Sharp Area
Main Subject Detection of Image by Cropping Specific Sharp Area FOTIOS C. VAIOULIS 1, MARIOS S. POULOS 1, GEORGE D. BOKOS 1 and NIKOLAOS ALEXANDRIS 2 Department of Archives and Library Science Ionian University
More informationAn Efficient Nonlinear Filter for Removal of Impulse Noise in Color Video Sequences
An Efficient Nonlinear Filter for Removal of Impulse Noise in Color Video Sequences D.Lincy Merlin, K.Ramesh Babu M.E Student [Applied Electronics], Dept. of ECE, Kingston Engineering College, Vellore,
More informationIMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES
IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES Shrishail Math 1 and R.C.Tripathi Indian Institute of Information Technology, Allahabad, India,1101 1 ssm@iiita.ac.in rctripathi@iiita.ac.in
More informationDr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Feature Based Analysis of Copy-Paste Image Tampering
More informationSequential Algorithm for Robust Radiometric Calibration and Vignetting Correction
Sequential Algorithm for Robust Radiometric Calibration and Vignetting Correction Seon Joo Kim and Marc Pollefeys Department of Computer Science University of North Carolina Chapel Hill, NC 27599 {sjkim,
More informationA Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches
A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches Dhara Anandpara 1, Rohit Srivastava 2 1, 2 Computer Engineering Department, Parul
More informationComparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression
Comparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression Muhammad SAFDAR, 1 Ming Ronnier LUO, 1,2 Xiaoyu LIU 1, 3 1 State Key Laboratory of Modern Optical Instrumentation, Zhejiang
More informationEfficient Target Detection from Hyperspectral Images Based On Removal of Signal Independent and Signal Dependent Noise
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 6, Ver. III (Nov - Dec. 2014), PP 45-49 Efficient Target Detection from Hyperspectral
More informationA Single Image Haze Removal Algorithm Using Color Attenuation Prior
International Journal of Scientific and Research Publications, Volume 6, Issue 6, June 2016 291 A Single Image Haze Removal Algorithm Using Color Attenuation Prior Manjunath.V *, Revanasiddappa Phatate
More informationA Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor
A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering
More informationBogdan Smolka. Polish-Japanese Institute of Information Technology Koszykowa 86, , Warsaw
appeared in 10. Workshop Farbbildverarbeitung 2004, Koblenz, Online-Proceedings http://www.uni-koblenz.de/icv/fws2004/ Robust Color Image Retrieval for the WWW Bogdan Smolka Polish-Japanese Institute of
More informationIntroduction. Prof. Lina Karam School of Electrical, Computer, & Energy Engineering Arizona State University
EEE 508 - Digital Image & Video Processing and Compression http://lina.faculty.asu.edu/eee508/ Introduction Prof. Lina Karam School of Electrical, Computer, & Energy Engineering Arizona State University
More informationABC: Enabling Smartphone Authentication with Built-in Camera
ABC: Enabling Smartphone Authentication with Built-in Camera Zhongjie Ba, Sixu Piao, Xinwen Fu f, Dimitrios Koutsonikolas, Aziz Mohaisen f and Kui Ren f 1 Camera Identification: Hardware Distortion Manufacturing
More informationReal Time Video Analysis using Smart Phone Camera for Stroboscopic Image
Real Time Video Analysis using Smart Phone Camera for Stroboscopic Image Somnath Mukherjee, Kritikal Solutions Pvt. Ltd. (India); Soumyajit Ganguly, International Institute of Information Technology (India)
More informationCompression and Image Formats
Compression Compression and Image Formats Reduce amount of data used to represent an image/video Bit rate and quality requirements Necessary to facilitate transmission and storage Required quality is application
More informationIMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES
Chiew K.T., et al. (Eds.): PGRES 2017, Kuala Lumpur: Eastin Hotel, FCSIT, 2017: pp 35-42 IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Thamarai Subramaniam and Hamid
More informationWhite paper. Wide dynamic range. WDR solutions for forensic value. October 2017
White paper Wide dynamic range WDR solutions for forensic value October 2017 Table of contents 1. Summary 4 2. Introduction 5 3. Wide dynamic range scenes 5 4. Physical limitations of a camera s dynamic
More informationDigital photography , , Computational Photography Fall 2017, Lecture 2
Digital photography http://graphics.cs.cmu.edu/courses/15-463 15-463, 15-663, 15-862 Computational Photography Fall 2017, Lecture 2 Course announcements To the 14 students who took the course survey on
More informationWITH the rapid development of image processing technology,
480 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 JPEG Error Analysis and Its Applications to Digital Image Forensics Weiqi Luo, Member, IEEE, Jiwu Huang, Senior
More informationTampering Detection Algorithms: A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationFORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING
Chapter 21 FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING Gilbert Peterson Abstract The use of digital photography has increased over the past few years, a trend which opens the door for new and creative
More informationRefined Slanted-Edge Measurement for Practical Camera and Scanner Testing
Refined Slanted-Edge Measurement for Practical Camera and Scanner Testing Peter D. Burns and Don Williams Eastman Kodak Company Rochester, NY USA Abstract It has been almost five years since the ISO adopted
More informationIMAGE SPLICING FORGERY DETECTION
IMAGE SPLICING FORGERY DETECTION 1 SIDDHI GAUR, 2 SHAMIK TIWARI 1 M.Tech, 2 Assistant Professor, Dept of CSE, Mody University of Science and Technology, Sikar,India E-mail: 1 siddhi.gaur14@gmail.com, 2
More informationNO-REFERENCE IMAGE BLUR ASSESSMENT USING MULTISCALE GRADIENT. Ming-Jun Chen and Alan C. Bovik
NO-REFERENCE IMAGE BLUR ASSESSMENT USING MULTISCALE GRADIENT Ming-Jun Chen and Alan C. Bovik Laboratory for Image and Video Engineering (LIVE), Department of Electrical & Computer Engineering, The University
More informationInternational Journal of Innovative Research in Engineering Science and Technology APRIL 2018 ISSN X
HIGH DYNAMIC RANGE OF MULTISPECTRAL ACQUISITION USING SPATIAL IMAGES 1 M.Kavitha, M.Tech., 2 N.Kannan, M.E., and 3 S.Dharanya, M.E., 1 Assistant Professor/ CSE, Dhirajlal Gandhi College of Technology,
More informationEC-433 Digital Image Processing
EC-433 Digital Image Processing Lecture 2 Digital Image Fundamentals Dr. Arslan Shaukat 1 Fundamental Steps in DIP Image Acquisition An image is captured by a sensor (such as a monochrome or color TV camera)
More informationA Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA)
A Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA) Suma Chappidi 1, Sandeep Kumar Mekapothula 2 1 PG Scholar, Department of ECE, RISE Krishna
More informationA Review of Image Forgery Techniques
A Review of Image Forgery Techniques Hardish Kaur, Geetanjali Babbar Assistant professor, CGC Landran, India. ABSTRACT: Image forgery refer to copying and pasting contents from one image into another image.
More informationDIGITAL IMAGING. Handbook of. Wiley VOL 1: IMAGE CAPTURE AND STORAGE. Editor-in- Chief
Handbook of DIGITAL IMAGING VOL 1: IMAGE CAPTURE AND STORAGE Editor-in- Chief Adjunct Professor of Physics at the Portland State University, Oregon, USA Previously with Eastman Kodak; University of Rochester,
More informationFast and High-Quality Image Blending on Mobile Phones
Fast and High-Quality Image Blending on Mobile Phones Yingen Xiong and Kari Pulli Nokia Research Center 955 Page Mill Road Palo Alto, CA 94304 USA Email: {yingenxiong, karipulli}@nokiacom Abstract We present
More informationABSTRACT 1. INTRODUCTION
Preprint Proc. SPIE Vol. 5076-10, Infrared Imaging Systems: Design, Analysis, Modeling, and Testing XIV, Apr. 2003 1! " " #$ %& ' & ( # ") Klamer Schutte, Dirk-Jan de Lange, and Sebastian P. van den Broek
More informationTampering and Copy-Move Forgery Detection Using Sift Feature
Tampering and Copy-Move Forgery Detection Using Sift Feature N.Anantharaj 1 M-TECH (IT) Final Year, Department of IT, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India 1 ABSTRACT:
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationCS6670: Computer Vision
CS6670: Computer Vision Noah Snavely Lecture 22: Computational photography photomatix.com Announcements Final project midterm reports due on Tuesday to CMS by 11:59pm BRDF s can be incredibly complicated
More informationNeuro-Fuzzy based First Responder for Image forgery Identification
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationInterpolation of CFA Color Images with Hybrid Image Denoising
2014 Sixth International Conference on Computational Intelligence and Communication Networks Interpolation of CFA Color Images with Hybrid Image Denoising Sasikala S Computer Science and Engineering, Vasireddy
More informationA New Steganographic Method for Palette-Based Images
A New Steganographic Method for Palette-Based Images Jiri Fridrich Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000 Abstract In this paper, we present a new steganographic technique
More informationDWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationDigital Image Forgery Detection by Contrast Enhancement
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. IX (Sep-Oct. 2014), PP 01-07 Digital Image Forgery Detection by Contrast Enhancement Remya
More informationSYSTEMATIC NOISE CHARACTERIZATION OF A CCD CAMERA: APPLICATION TO A MULTISPECTRAL IMAGING SYSTEM
SYSTEMATIC NOISE CHARACTERIZATION OF A CCD CAMERA: APPLICATION TO A MULTISPECTRAL IMAGING SYSTEM A. Mansouri, F. S. Marzani, P. Gouton LE2I. UMR CNRS-5158, UFR Sc. & Tech., University of Burgundy, BP 47870,
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationCERIAS Tech Report
CERIAS Tech Report 2001-74 A Review of Fragile Image Watermarks by Eugene T. Lin and Edward J. Delp Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette,
More informationDifferent-quality Re-demosaicing in Digital Image Forensics
Different-quality Re-demosaicing in Digital Image Forensics 1 Bo Wang, 2 Xiangwei Kong, 3 Lanying Wu *1,2,3 School of Information and Communication Engineering, Dalian University of Technology E-mail:
More informationRecent Advances in Image Deblurring. Seungyong Lee (Collaboration w/ Sunghyun Cho)
Recent Advances in Image Deblurring Seungyong Lee (Collaboration w/ Sunghyun Cho) Disclaimer Many images and figures in this course note have been copied from the papers and presentation materials of previous
More informationLaser Printer Source Forensics for Arbitrary Chinese Characters
Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,
More informationHDR images acquisition
HDR images acquisition dr. Francesco Banterle francesco.banterle@isti.cnr.it Current sensors No sensors available to consumer for capturing HDR content in a single shot Some native HDR sensors exist, HDRc
More information