Statistical Tools for Digital Forensics. Information Technologies for IPR Protection

Similar documents
行政院國家科學委員會補助專題研究計畫 成果報告 期中進度報告 六子棋與 K 子棋之研究

Introduction to Video Forgery Detection: Part I

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Virtual Reality 虛擬實境

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Exposing Digital Forgeries from JPEG Ghosts

Journal of Commercial Modernization, 6(2), 作者 /Author: 張瑞當 (Ruey-Dang Chang); 曾玉琦 (Yee-Chy Tseng); 廖浩雲 (Hao-Yun Liao)

#5802 使用者研究 Design and Research on User Experience

6. Material Description and RoHS Test Report / Page 9 ~ end

Camera identification from sensor fingerprints: why noise matters

聽力內容與圖片不符, 因此選 (B) 例題 Amy: Who s that man? Mike: 答案是 (C) (A) He s a cook. (B) Yes, he s my classmate. (C) He s our coach.

Academic Year

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

國家同步輻射研究中心出國報告書 出國人姓名 : 王端正 出國日期 :105 年 4 月 25 日至 29 日 目的地 ( 國家 城市 ): 中國, 蘇州

Big Data and High Performance Computing

工程圖學 (1) Engineering Drawing (I)

微奈米光電製程 管傑雄 國立台灣大學電機系

一個可以創造奇蹟的行業 儒鴻企業股份有限公司 成衣事業部陳總經理坤鎕

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

初探設計類比思考之三種現象 - 傳統媒材與數位媒材

國立交通大學 電信工程學系 碩士論文 連續時間轉導電容式三角積分調變器之實現. Implementation of the continuous-time transconductor-capacitor Delta-Sigma modulator 研究生 : 吳國璽 指導教授 : 洪崇智博士

行政院國家科學委員會專題研究計畫成果報告

國立交通大學 電信工程研究所 博士論文 新穎交錯耦合濾波器之開發設計與寬頻高階馬迅平衡非平衡轉換器合成設計

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

STS & 社會學 課程介紹 課程大綱. 定稿 (6/Feb. 2015) 陽明大學 STS 所傅大為 ex: 7902 星期四 10am-1pm

行政院國家科學委員會專題研究計畫成果報告

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

The Electronic Design Automation (EDA) Lab

第壹部分 : 選擇題 (60 分 ) 一 綜合測驗 ( 第 1-15 題, 每題 2 分, 共 30 分 )

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

測試報告 TestReport 號碼 (No.) : CE/2017/B1020 日期 (Date) : 2017/11/13 明輝化工實業有限公司 MIN FEI CHEMICALS INDUSTRIES CO., LTD. 新北市土城區大安路 138 巷 32 號 NO. 32, LANE 13

國立交通大學 電子研究所 碩士論文 多電荷幫浦系統及可切換級數負電壓產生器之設計及生醫晶片應用

國立交通大學 電子工程學系 碩士論文. 移動性 WiMAX 系統 : 跨層設計方法與軟體架構之系統觀點

30 個創意思考技巧. Checklists Brainstorming Forced Relationships/Analogy Attribute Listing Morphological Analysis Imitation Mindmapping

Forgery Detection using Noise Inconsistency: A Review

Survey On Passive-Blind Image Forensics

teachers guide

A Review of Image Forgery Techniques

國立交通大學 工業工程與管理學系 博士論文 利用電腦輔助設計資料防止錯打線的視覺偵測系統之設計與開發

S SNR 10log. peak peak MSE. 1 MSE I i j

課程名稱 : 電子學 (2) 授課教師 : 楊武智 期 :96 學年度第 2 學期

國立宜蘭大學電子工程學系 ( 研究所 ) 碩士論文. Department of Electronic Engineering. National Ilan University. Master Thesis

Tampering Detection Algorithms: A Comparative Study

海象觀測同調性都卜勒微波雷達的開發 林昭暉 國立中央大學水文與海洋科學研究所助理教授 2 國立中央大學水文與海洋科學研究所博士班研究生 2 國立中央大學水文與海洋科學研究所研究助理 國家實驗研究院台灣海洋科技研究中心助理研究員

BOARD OF DIRECTORS AND COMMITTEES 董事局及委員會

第壹部分 : 選擇題 (60 分 ) 一 綜合測驗 ( 第 1-15 題, 每題 2 分, 共 30 分 )

國立臺北教育大學 105 學年度碩士班招生入學考試兒童英語教育學系英語教育碩士班英文閱讀與寫作科試題

Production bias, but not parsing complexity, predicts wh-scope comprehension preferences

Long-Awaited Film 期待已久的影片

Automation of JPEG Ghost Detection using Graph Based Segmentation

Image Forgery Detection Using Svm Classifier

GENERAL EDUCATION COURSE INFORMATION 2015/16

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

國立交通大學 資訊科學與工程研究所碩士論文 多天線傳送系統干擾抑制及路徑衰減補償之可適性封包檢測. Adaptive Packet Acquisition with Interference and Time-Variant Path Loss in MIMO-OFDM Systems

Countering Anti-Forensics of Lateral Chromatic Aberration

Impeding Forgers at Photo Inception

國立交通大學 經營管理研究所 碩士論文 上游獨占下之外部授權者的最適授權策略. The Optimal Licensing Strategy of an Outsider Patentee under. the Single Upstream Supplier 研究生 : 林錦宏

Unit 6: Movies. Film Genre ( 可加 film 或 movie) Adjectives. Vocabulary. animation. action. drama. comedy. crime. romance. horror

1995 年間, 彼擔任香港期貨交易所主席,1989 至 2000 年同時為香港期貨交易所及香港期貨結算有限公司董事 彼曾任香港證券及期貨事務監察委員會諮詢委員會成員, 及股東權益小組成員 梁肩負培育金融專才的使命 彼曾任香港

Nineteen Eighty-Four and Utopian Thought 一九八四 與烏托邦思想

Musical Genre Classification

ジェスチャ併用型 Voice-to-MIDI システムの提案 第五回知識創造支援システムシンポジウム報告書 : 本著作物の著作権は著者に帰属します

Can We Trust Digital Image Forensics?

計畫編號 : NSC E 執行時程 : 93 年 8 月 1 日至 94 年 7 月 31 日 計畫主持人 : 連豊力 國立台灣大學電機系助理教授 共同主持人 : 呂良鴻 國立台灣大學電子所助理教授 計畫參與人員 : 許瑋豪 方文杰 林雍倫 馮天俊 魏嘉樑 麥肇元

A Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA)

英文考科 考試順利 考試時間 :80 分鐘 作答方式 : 選擇題用 2B 鉛筆在 答案卡 作答, 修正時應以橡皮擦拭, 切勿使用修正液 非選擇題用黑色或藍色筆, 在 答案卷 作答

團 istingui. 2 HKUST in Action. 8 News in Chinese. Hl<UST Establishes Hainan Institute. :,m E 祖祖嘿, 開帽 fflrii. An Internal Communication.

可程式計數陣列 (PCA) 功能使用方法. 可程式計數陣列功能使用方法 Application Note 1 適用產品 :SM59D04G2,SM59D03G2

Local prediction based reversible watermarking framework for digital videos

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

Milton Group Newsletter Season 1, 2015

英文考科 大學入學考試中心 100 學年度指定科目考試試題 - 作答注意事項 - 祝考試順利 考試時間 :80 分鐘 作答方式 : 選擇題用 2B 鉛筆在 答案卡 上作答, 修正時應以橡皮擦拭, 切勿使用修正液 ( 帶 )

Correlation Based Image Tampering Detection

FPGA-based Stepping Motor Drive System Design

35. GIScience & Remote Sensing 36. GPS Solutions 37. Hydrological Processes 38. IEEE Geoscience and Remote Sensing Letters 39.

Using the Keyboard (VGP-WKB11)

Alien invasion: Is There Really Such a Thing?

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Created by Po fortunecookiemom.com

TRANSPORTATION DESIGN AUTO DESIGN MOTOR DESIGN

國立交通大學 碩士論文. Design and Realization of Capacitive Sensor Readout Circuit in LTPS Technology 研究生 : 林佑達. (Yu-Ta Lin) 指導教授 : 柯明道教授 (Prof.

Master of Collecting and Using Useful Information 財經資料達人

BIOGRAPHICAL DETAILS OF DIRECTORS, COMPANY SECRETARY AND CHIEF FINANCIAL OFFICER

大學入學考試中心 106 學年度指定科目考試試題 英文考科 - 作答注意事項 - 非選擇題用筆尖較粗之黑色墨水的筆在 答案卷 上作答 ; 更正時, 可以使用修正液 ( 帶 )

電子工程學系電子研究所碩士班 碩士論文. 高功率元件 -CoolMOS TM 的元件模擬與電性研究. A Study of Device Simulation and Electrical Properties for. High Power Device-CoolMOS TM 研究生 : 李家明

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

書報討論報告 應用雙感測觸覺感測器於手術系統 之接觸力感測

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

IMAGE SPLICING FORGERY DETECTION

Neuro-Fuzzy based First Responder for Image forgery Identification

允許學生個人 非營利性的圖書館或公立學校合理使用本基金會網站所提供之各項試題及其解答 可直接下載而不須申請. 重版 系統地複製或大量重製這些資料的任何部分, 必須獲得財團法人臺北市九章數學教育基金會的授權許可 申請此項授權請電郵

Multimeter 3 1/2經濟款數位電錶 MT User s Manual 2nd Edition, Copyright by Prokit s Industries Co., Ltd.

Wireless Communications

SPECIFICATION FOR APPROVAL

Exposing Photo Manipulation with Geometric Inconsistencies

EAST ASIA THIRD-SECTOR RESEARCHERS NETWORK NEWSLETTER NEWS 最新消息

2008/12/17. RST invariant digital image watermarking & digital watermarking based audiovisual quality evaluation. Outline

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

Locating Steganographic Payload via WS Residuals

Transcription:

Statistical Tools for Digital Forensics Information Technologies for IPR Protection

Henry Chang-Yu Lee One of the world s foremost forensic scientists. Chief Emeritus for Scientific Services for the State of Connecticut. Full professor of forensic science at the University of New Haven, where he has helped to set up the Henry C. Lee Forensic Institute.

Forensics Forensic science, the application of a broad spectrum of sciences to answer questions of interest to the legal system. Criminal investigations. Other forensics disciplines: Forensic accounting. Forensic economics. Forensic engineering. Forensic linguistics. Forensic toxicology.

Digital Forensics Application of the scientific method to digital media in order to establish factual information for judicial review. What is digital forensics associate with DRM? Authorized images have been tampered. How to declare the image is neither authentic, nor authorized.

Image Tampering Tampering with images is neither new, nor recent. Tampering of film photographs: Airbrushing. Re-touching. Dodging and burning. Contrast and color adjustment. Outside the reach of the average user.

Image Tampering Digital Tampering: Compositing. Morphing. Re-touching. Enhancing. Computer graphics. Painted.

Image Tampering Tampering is not a well defined notion, and is often application dependent. Image manipulations may be legitimate in some cases, ex. use a composite image for a magazine cover. But illegitimate in others, ex. evidence in a court of law.

Watermarking-Based Forensics Digital watermarking has been proposed as a means by which a content can be authenticated. Exact authentication schemes: Change even a single bit is unacceptable. Fragile watermarks. Watermarks will be undetectable when the content is changed in any way. Embedded signatures. Embed at the time of recording an authentication signature in the content. Erasable watermarks. aka invertible watermarks, are employed in applications that do not tolerate the slight content changes.

Watermarking-Based Forensics Selective authentication schemes: Verify if a content has been modified by any illegitimate distortions. Semi-fragile watermarks. Watermark will survive only under legitimate distortion. Tell-tale watermarks. Robust watermarks that survive tampering, but are distorted in the process. The major drawback is that a watermark must be inserted at the time of recording, which would limit this approach to specially equipped digital cameras.

Assumption: Statistical Techniques for Detecting Traces Digital forgeries may be visually imperceptible, nevertheless, they may alter the underlying statistics of an image. Techniques: Copy-move forgery. Duplicated image regions. Re-sampled images. Inconsistencies in lighting. Chromatic Aberration. Inconsistent sensor pattern noise. Color filter array interpolation.

Detecting Inconsistencies in Lighting L: direction of the light source. A: constant ambient light term.

Detecting Inconsistent ( ) ( ) ( ) Sensor Pattern Noise ( ) k k k n = p F p ( k ) Pc = ( n ) N p p: series of images. F: denoising filter. n: noise residuals. P c : camera reference pattern.

Detecting Inconsistent Sensor Pattern Noise Calculate ρ( n( Qk ), Pc ( R) ) for regions Q k of the same size and shape coming from other cameras or different locations. Decide R was tampered if p > th = 10-3 and not tapered otherwise. R

Detecting Color Filter Array Interpolation Most digital cameras have the CFA algorithm, by each pixel only detecting one color. Detecting image forgeries by determining the CFA matrix and calculating the correlation.

Reference H. Farid, Exposing Digital Forgeries in Scientific Images, in ACM MMSec, 2006 J. Fridrich, D. Soukal, J. Lukas, Detection of Copy-Move Forgery in Digital Images, in Proceedings of Digital Forensic Research Workshop, Aug. 2003 A. C. Popescu, H. Farid, Exposing Digital Forgeries by Detecting Duplicated Image Regions, in Technical Report, 2004 A. C. Popescu, H. Farid, Exposing Digital Forgeries by Detecting Traces of Resampling, in IEEE TSP, vol.53, no.2, Feb. 2005

Reference M. K. Johnson, H. Farid, Exposing Digital Forgeries by Detecting Inconsistencies in Lighting, in ACM MMSec, 2005 M. K. Johnson, H. Farid, Exposing Digital Forgeries Through Chromatic Aberration, in ACM MMSec, 2006 J. Lukas, J. Fridrich, M. Goljan, Detecting Digital Image Forgeries Using Sensor Pattern Noise, in SPIE, Feb. 2006 A. C. Popescu, H. Farid, Exposing Digital Forgeries in Color Filter Array Interpolated Images, in IEEE TSP, vol.53, no.10, Oct. 2005

Discussion The problem of detecting digital forgeries is a complex one with no universally applicable solution. Reliable forgery detection should be approached from multiple directions. Forensics is done in a fashion that adheres to the standards of evidence admissible in a court of law. Thus, digital forensics must be techno-legal in nature rather than purely technical or purely legal.

Exposing Digital Forgeries in Scientific Images Hany Farid, ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep. 2006

Outline Introduction Image Manipulation Image Segmentation Automatic Detection Discussion

Introduction 南韓黃禹錫幹細胞研究造假 2005/06/17 黃禹錫宣布成功的建立 11 個病人身上體細胞所衍生的幹細胞株, 論文並於國際知名的 科學 期刊發表 2005/11/11 共同作者夏騰指控黃禹錫對他隱瞞卵子取得來源的事實, 並認為其與黃禹錫所發表的論文數據有瑕疵 2005/11/21 南韓首爾國立大學應黃禹錫自己要求也展開調查其實驗結果

Introduction 南韓黃禹錫幹細胞研究造假 2005/12/23 初步報告顯示, 黃禹錫在 2005 年發表在 科學 期刊的論文, 數據絕大部份都是子虛烏有 : 由 11 個病人身上體細胞所衍生的幹細胞株, 實際存在的只有兩個, 這項結果也顯示黃禹錫的人為疏失並不是無意造成地, 而是刻意欺騙 2005/12/29 調查委員會再公佈所謂的實際存在的兩個病人幹細胞株其 DNA 也不符合原來的體細胞 2006/1/13 科學 期刊正式宣佈撤回黃禹錫在 2005 年和 2004 年的兩篇論文

Outline Introduction Image Manipulation Image Segmentation Automatic Detection Discussion

Image Manipulation Action of each manipulation scheme: Deletion, (a). A band was erased. Healing, (b). Several bands were removing using Photoshop s healing brush. Duplication, (c). A band was copied and pasted into a new location.

Image Manipulation Effect of each manipulation scheme: Deletion. Remove small amounts of noise that are present through the dark background of the image. Healing. Disturb the underlying spatial frequency (texture). Duplication. Leave behind an obvious statistical pattern two regions in the image are identical. Formulate the problem of detecting each of these statistical patterns as an image segmentation problem.

Outline Introduction Image Manipulation Image Segmentation Automatic Detection Discussion

Image Segmentation: Graph Cut Consider a weighted graph G = (V, E). A graph can be partitioned into A and B such that A B = φ and A B = V. To remove the bias which is a natural tendency to cut a small number of low-cost edges:

Image Segmentation: Graph Cut Define W a n n matrix such that W i,j = w (i, j) is the weight between vertices i and j. Define D a n n diagonal matrix whose i th element on the diagonal is. Solve the eigenvector problem with the second smallest eigenvalue λ. Let the sign of each component of e define the membership of the vertex.

Image Segmentation: Intensity For deletion. I (.): gray value at a given pixel. Δ i,j : Euclidean distance.

Image Segmentation: Intensity First Iteration: Group into regions corresponding to the bands (gray pixels) and the background. Second Iteration: The background is grouped into two regions (black and white pixels.)

Image Segmentation: Texture For healing. I g (.): the magnitude of the image gradient at a given pixel.

Image Segmentation: Texture s d (.): 1D deravative filter. [0.0187 0.1253 0.1930 0.0 0.1930 0.1253 0.0187] p (.): low-pass filter. [0.0047 0.0693 0.2454 0.3611 0.2454 0.0693 0.0047] [ ] = 1 0 1 2 0 2 1 0 1 1 0 1 1 2 1

Image Segmentation: Texture First Iteration: Using intensity-based segmentation. Group into regions corresponding to the bands (gray pixels) and the background. Second Iteration: Using texture-based segmentation. The background is grouped into two regions (black and white pixels.)

Image Segmentation: Duplication For duplication. One iteration.

Outline Introduction Image Manipulation Image Segmentation Automatic Detection Discussion

Automatic Detection Denote the segmentation map as S (x, y). Consider all pixels x, y with value S (x, y) = 0 such that all 8 spatial neighbors also have value 0. The mean of all of the edge weights between such vertices is computed across the entire segmentation map. This process is repeated for all pixels x, y with value S (x, y) = 1. Values near 1 are indicative of tampering because of significant similarity in the underlying measures of intensity, texture, or duplication.

Automatic Detection S0 = 0.19 S0 = 0.99 S0 = 0.30 S0 = 0.98 S0 = 0.50 S0 = 0.97

Outline Introduction Image Manipulation Image Segmentation Automatic Detection Discussion

Discussion These techniques are specifically designed for scientific images, and for common manipulations that may be applied to them. As usual, these techniques are vulnerable to a host of counter-measures that can hide traces of tampering. As continuing to develop new techniques, it will become increasingly difficult to evade all approaches.