Digital Image Forensics

Slides:



Advertisements
Similar presentations
PANKAJ MALVIYA RUCHIRA NASKAR
Advertisements

1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
Sheng-Wen Peng  Introduction  WATERMARKING FOR IMAGE AUTHENTICATION  COPY-COVER IMAGE FORGERY DETECTION  PCA Domain Method  EXPERIMENTAL.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Identification of Tamper Detection Techniques for Digital Video Forensics By Susinda Perera Department of Computer Science and Engineering, University.
Camera Model Identification Based on the Characteristics of CFA and Interpolation Shang Gao 1, Guanshuo Xu 2, Rui-Min Hu 1,*
X. X September Mo Tu We Th Fr Sa Su
Chubaka Producciones Presenta :.
1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye.
Detecting Digital Image Forgeries Using Sensor Pattern Noise presented by: Lior Paz Jan Lukas, jessica Fridrich and Miroslav Goljan.
2012 JANUARY Sun Mon Tue Wed Thu Fri Sat
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Tampering Detection Using Bayesian Analytical Methods 04/11/2005 As presented by Jason Kneier ELEN E6886 Spring 2005.
P Pathophysiology Calendar. SundayMondayTuesdayWednesdayThursdayFridaySaturday January 2012.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
MONDAYTUESDAYWEDNESDAYTHURSDAYFRIDAYSAT/SUN Note: You can print this template to use as a wall calendar. You can also copy the slide for any month to add.
Intelligent Speed Adaptation in vehicles Date: 01/08/09 Tamil Eniyan. M 08MEA026 M.Tech-Automotive Electronics Review - 0.
You can print this template to use it as a wall calendar, or you can copy the page for any month to add it to your own presentation. If you’d like to change.
School Year Calendar You can print this template to use it as a wall calendar, or you can copy the page for any month to add it to your own presentation.
School Year Calendar You can print this template to use it as a wall calendar, or you can copy the page for any month to add it to your own presentation.
2007 Monthly Calendar You can print this template to use it as a wall calendar, or you can copy the page for any month to add it to your own presentation.
You can print this template to use it as a wall calendar, or you can copy the page for any month to add it to your own presentation. If you’d like to change.
By Meidika Wardana Kristi, NRP  Digital cameras used to take picture of an object requires three sensors to store the red, blue and green color.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
EE 7700 Demosaicking Problem in Digital Cameras. Bahadir K. Gunturk2 Multi-Chip Digital Camera Lens Scene Spectral filters Beam- splitters Sensors To.
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
WORD JUMBLE. Months of the year Word in jumbled form e r r f b u y a Word in jumbled form e r r f b u y a february Click for the answer Next Question.
September 2008 SundayMondayTuesdayWednesdayThursdayFridaySaturday
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
DATE POWER 2 INCOME JANUARY 100member X 25.00P2, FEBRUARY 200member X 25.00P5, MARCH 400member X 25.00P10, APRIL 800member.
Jack Pinches INFO410 & INFO350 S INFORMATION SCIENCE Computer Vision I.
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
2011 Calendar Important Dates/Events/Homework. SunSatFriThursWedTuesMon January
Advanced Hardware/Software Optimization Techniques for Application Specific MCSoC m Yumiko Kimezawa Supervised by Prof. Ben Abderazek Adapted Systems.
Demosaicking for Multispectral Filter Array (MSFA)
Analysis on CFA Image Compression Methods Sung Hee Park Albert No EE398A Final Project 1.
DIGITAL VIDEO AUTHENTICATION. Contents  What is Quantization ?  What is Double MPEG/JPEG Compression?  Video Compression/Decompression  What is JPEG/Frame.
Inside the Digital Camera. Digital Camera Cross Section The digital camera is a complex device The only part that is the same as film cameras is the lens.
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
TEMPORAL VISUALIZATION OF DATA FROM THE FRENCH SENTINEL NETWORK.
July 2007 SundayMondayTuesdayWednesdayThursdayFridaySaturday
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DIGITAL IMAGE FORGERY Name: Reshma P.D Roll No:19.
Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification Irene Amerini, Roberto Caldelli, Vito.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
Bayer Color Filter Array Demosaicing
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Dictation practice 2nd Form Ms. Micaela-Ms. Verónica.
TIMELINES PHOTOS This is an example text
TIMELINES PHOTOS This is an example text
McDonald’s Kalender 2009.
McDonald’s Kalender 2009.
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
13-block rotation schedule
IMAGE FORGERY DETECTION
McDonald’s Kalender 2009.
How to Digitize the Natural Color
2300 (11PM) September 21 Blue line is meridian..
McDonald’s calendar 2007.
Proud As A Peacock! We are very proud of__________________
McDonald’s calendar 2007.
Demosaicking Problem in Digital Cameras
Detecting Digital Forgeries using Blind Noise Estimation
Habitat Changes and Fish Migration
Introduction to Multimedia Security Topics Covered in this Course
2015 January February March April May June July August September
Habitat Changes and Fish Migration
Presentation transcript:

Digital Image Forensics Mohamed Akhil Supervisor: Dr. Jimmy Li Good afternoon; my name is Mohamed, I am doing master of Electronic engineering, today I will present my proposal of 18 unit, the title of my thesis is a Digital Image Forensics. It will be supervised by Dr. Jimmy Li.

Project aim: To develop technique in automatic identification of fake digital photos. Implement environment for simulation and application of technique. The aim of the project is to develop technique to identify tampered digital images, and to simulate the technique for different scenarios.

Digital Image Forensics: is a method to investigate if the image is tampered or not. Which photo is authentic (A or B)? Digital image forensics is a method to identify if the image is an authentic or not. How many of you think that the image A is a tempered image?   Actually, an image A is an Authentic image, where Bush holds the book upside down, but the photographer temper the image , so the position of the book modified to be in the correct position. As it appears in the image B. A B Images from <http://bpastudio.csudh.edu/FAC/LPRESS/471/readings/fakephotoskerrybush.htm>

Other example of fake image: This fake image attacked John Kerry in the election on 2004, in this fake image, there are two images splicing together to create the tempered image. Images from <http://bpastudio.csudh.edu/FAC/LPRESS/471/readings/fakephotoskerrybush.htm>

Existing problems : Many programs are readily available such Adobe Photoshop to make fake photos. It is very difficult to recognize some altered images visually. There are many programs available to make fake images, for instance, Adobe Photoshop, the performance of these programs are improved in editing images. So some fake images become difficult to be recognise visually.

Detection Techniques: A technique to distinguish digitally altered images from authentic images. Different scenarios to produce different type of fake image need different techniques to detect. There are many techniques used to identify different scenarios of forgery.

Re-sampled Images: To create a convincing match, it is often necessary to re-size, rotate, or stretch the original images (or portions of them). Introduces specific correlations between neighbouring image pixels. If there are two different images splicing together , they may have different size and rotation ,so, they should be modified to generate a fake image.

2. Detection of Duplicated Image Regions: Tampered image with copying and pasting portions of the image to conceal a person or object in the scene. There are two portions in this image have very strong correlation. A B C Image from “Statistical Tools for Digital Image Forensics”, Popescu, A. 2004.

3. Blind Estimation of Background Noise: Two different images from two different cameras will have different signal to noise ratio. If these two images are splicing together, the signal to noise ratio can be an aspect to investigate. Each image has its signal to noise ratio which is different with other images, so When two images are splicing together to produce a fake image, the signal to noise ratio can be used to determine if the image is authentic or fake.

4. Manipulated Colour Filter Array (CFA) Interpolated Images: Most the digital cameras are provided by single CCD or CMOS sensor which records single colour sample and the other two colour samples have to be interpolated from the neighbouring samples . Most modern digital cameras acquire images using a single image sensor overlaid with a Colour Filter Array (CFA). The most common configuration used to generate CFA is Bayer filter. Nowadays, most the digital cameras are equipped by a single charge coupled device [CDD] or complementary metal oxide semiconductor [CMOS] sensor overlaid with Colour Filter Array (CFA) to record single samples while the other two samples will be interpolated from the neighbouring samples. The most common filter used to generate CFA is Bayer filter.

CFA Demosaicking: A digital image process used to reconstruct a full colour image from the incomplete colour samples output from an image sensor overlaid with a colour filter array (CFA) is called a demosaicking algorithm. the principal key of the CFA interpolation produces a periodic correlations. Possible Detection method if the CFA interpolation correlations are missing in any portion of an image or if any part of the image is repeated. CFA Demosaicking is a process to reconstruct the single samples of CFA to a full colour images. CFA Demosaicking produces a periodic correlation. Any missing of the specified correlation means that the image is altered.

One possible Method: Expectation-Maximization Algorithm can be used for missing periodic correlations. A B One of the possible techniques can be used to determine missing periodic correlations is Expectation-Maximization Algorithm. In this image, these portions of the image are maintained to be covered, in this case the periodic correlation is destroyed so the forgery can be determine by using Manipulated Colour Filter Array (CFA). Image from “Statistical Tools for Digital Image Forensics”, Popescu, A. 2004.

Applications: The media, newspapers, and magazines. The media, newspapers, and magazines are legally responsible for what they publish. Private use.

Proposed Schedule: Month Action August and September (2013) Project Planning and Literature Review October , November, and December (2013) Implementation and technique’s development January, and February (2014) Technique Testing – real world applications March and April (2014) Thesis, Result Presentation

Conclusion: Improve the chosen technique to identify the tampered images. Simulate different scenarios of fake images for testing. This project is to imp

Literature review References: Farid, H. 2008. A Survey of Image Forgery Detection, Viewed 9 Sep 2013, <http://www.cs.albany.edu/~lsw/homepage/DIF-S10_files/spm09.pdf>. Popescu, A. 2004, Statistical Tools for Digital Image Forensics , viewed 20 Aug 2013, <http://www.cs.dartmouth.edu/farid/downloads/publications/ih04.pdf>. Popescu, A., Farid, H, 2005, Exposing Digital Forgeries in Color Filter Array Interpolated Images, viewed 10 Sep 2013, <http://www.ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1511009&tag=1>. John Kerr and Jane Fonda, viewed 17 Sep 2013, <http://www.bpastudio.csudh.edu/FAC/LPRESS/471/readings/fakephotoskerrybush.htm> Ghatol, N., Paigude, R. , shirke, A. 2013, Image Morphing Detection by Locating Tampered Pixels with Demosaicing Algorithms , International Journal of Computer Applications , viewed 20 Sep 2013. Borman, S. 2009, The Expectation Maximization Algorithm A short tutorial, 9 Jan, viewed 23 Sep 2013.