Image Tampering Detection Using Bayesian Analytical Methods 04/11/2005 As presented by Jason Kneier ELEN E6886 Spring 2005.

Slides:



Advertisements
Similar presentations
Presentation in Aircraft Satellite Image Identification Using Bayesian Decision Theory And Moment Invariants Feature Extraction Dickson Gichaga Wambaa.
Advertisements

PANKAJ MALVIYA RUCHIRA NASKAR
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
Sheng-Wen Peng  Introduction  WATERMARKING FOR IMAGE AUTHENTICATION  COPY-COVER IMAGE FORGERY DETECTION  PCA Domain Method  EXPERIMENTAL.
Multimedia Security And Forensics Authentication of Digital Images Sarah Summers Sarah Wahl CS525 Semester Project Spring 2006.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Identification of Tamper Detection Techniques for Digital Video Forensics By Susinda Perera Department of Computer Science and Engineering, University.
2 1 Discrete Markov Processes (Markov Chains) 3 1 First-Order Markov Models.
Digital Image Forensics
Chapter 2: Bayesian Decision Theory (Part 2) Minimum-Error-Rate Classification Classifiers, Discriminant Functions and Decision Surfaces The Normal Density.
Pattern Classification, Chapter 2 (Part 2) 0 Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R.
Pattern Classification, Chapter 2 (Part 2) 0 Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R.
Pattern Classification Chapter 2 (Part 2)0 Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O.

CII504 Intelligent Engine © 2005 Irfan Subakti Department of Informatics Institute Technology of Sepuluh Nopember Surabaya - Indonesia.
A Digital Technique for Music Identification Joel R. Martin Columbia University ELENE6886.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Pattern Classification, Chapter 3 Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
Image Forgery Detection by Gamma Correction Differences.
Hidden Markov Model: Extension of Markov Chains
1 How Realistic is Photorealistic?. 2 Yaniv Lefel Hagay Pollak Based on the work of - Siwei Lyu and Hany Farid.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
SE367 Project Final Presentation By: Sujith Thomas Parimi Krishna Chaitanya In charge:- Prof Amitabha Mukerjee.
AbstractAbstract Adjusting Active Basis Model by Regularized Logistic Regression Ruixun Zhang Peking University, Department of Statistics and Probability.
1 Statistical Tools for Multivariate Six Sigma Dr. Neil W. Polhemus CTO & Director of Development StatPoint, Inc.
Identifying Computer Graphics Using HSV Model And Statistical Moments Of Characteristic Functions Xiao Cai, Yuewen Wang.
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
CEN 592 PATTERN RECOGNITION Spring Term CEN 592 PATTERN RECOGNITION Spring Term DEPARTMENT of INFORMATION TECHNOLOGIES Assoc. Prof.
Introduction to Pattern Recognition
Introduction Mohammad Beigi Department of Biomedical Engineering Isfahan University
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
EE 720 Random Variables and Stochastic Processes Instructor: Dr. Ghazi Al Sukkar Dept. of Electrical Engineering The University of Jordan
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
ANNs (Artificial Neural Networks). THE PERCEPTRON.
COMMON EVALUATION FINAL PROJECT Vira Oleksyuk ECE 8110: Introduction to machine Learning and Pattern Recognition.
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio processing methods on marine mammal vocalizations Xanadu Halkias Laboratory for the Recognition and Organization of Speech and Audio
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
1/18 New Feature Presentation of Transition Probability Matrix for Image Tampering Detection Luyi Chen 1 Shilin Wang 2 Shenghong Li 1 Jianhua Li 1 1 Department.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
Machine Learning in CSC 196K
1 Detecting Hidden Messages using higher-order stats and SVMs Siwei Lyu and Hany Farid.
Neural Networks Si Wu Dept. of Informatics PEV III 5c7 Spring 2008.
Machine Learning: A Brief Introduction Fu Chang Institute of Information Science Academia Sinica ext. 1819
Pattern Classification All materials in these slides* were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Pattern Classification Chapter 2(Part 3) 0 Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
Machine Learning Artificial Neural Networks MPλ ∀ Stergiou Theodoros 1.
Support Vector Machine
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Aline Martin ECE738 Project – Spring 2005
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Detecting Digital Forgeries using Blind Noise Estimation
Presentation transcript:

Image Tampering Detection Using Bayesian Analytical Methods 04/11/2005 As presented by Jason Kneier ELEN E6886 Spring 2005

The Problem Common image processing tools are capable of creating forgeries undetectable to the eye Data can also be hidden in regions of an image where it is less likely to perturb the original image

The Solution Develop a statistical method to detect tampering and forgeries of images

Proposal Use a Bayesian framework to determine authenticity of images based on computed feature vectors of image statistics

Methods Feature vectors of interest: Wavelet decomposition Biocoherence

System Diagram Input image Wavelet Decomposition into feature vectors Bayesian analysis of feature vectors Region is authentic Region has been tampered with

Outputs Determine locations of suspected tampering, and degree of confidence in determination

References [1] A. C. Popescu and H. Farid, “Exposing Digital Forgeries by Detecting Traces of Re-sampling, “ IEEE Transactions on Signal Processing, 53(2): , [2] A.C. Popescu and H. Farid, “Statistical Tools for Digital Forensics,” 6th International Workshop on Information Hiding, Toronto, Canada, [3] S. Lyu and H. Farid, “How Realistic is Photorealistic?,” IEEE Transactions on Signal Processing, 53(2): , [4] Tian-Tsong Ng, Shih-Fu Chang, “Blind Detection of Photomontage using Higher Order Statisics,” Online: Columbia University, [5] R. Duda, P. Hart and D. Stork, Pattern Classification. New York, John Wiley & Sons, [6] T. Cover and J. Thomas, Elements of Information Theory. New York, John Wiley & Sons, [7] W. Pratt, Digital Image Processing. New York, John Wiley & Sons, [8] A. Papoulis and S. Pillai, Probability, Random Variables and Stochastic Processes. Boston, McGraw Hill, 2002.