1 How Realistic is Photorealistic?. 2 Yaniv Lefel Hagay Pollak Based on the work of - Siwei Lyu and Hany Farid.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Face Recognition Sumitha Balasuriya.
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 4 – Digital Image Representation Klara Nahrstedt Spring 2009.
University of Ioannina - Department of Computer Science Wavelets and Multiresolution Processing (Background) Christophoros Nikou Digital.
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
COLORCOLOR A SET OF CODES GENERATED BY THE BRAİN How do you quantify? How do you use?
The Global Digital Elevation Model (GTOPO30) of Great Basin Location: latitude 38  15’ to 42  N, longitude 118  30’ to 115  30’ W Grid size: 925 m.
Facial feature localization Presented by: Harvest Jang Spring 2002.
IMAGE RESTORATION AND REALISM MILLIONS OF IMAGES SEMINAR YUVAL RADO.
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
ECE643 DIGITAL IMAGE PROCESSING Steganalysis versus Splicing detection Paper by: Yun Q. Shi, Chunhua Chen, Guorong Xuan and Wei Su By: Nehal Patel Siddharth.
Morris LeBlanc.  Why Image Retrieval is Hard?  Problems with Image Retrieval  Support Vector Machines  Active Learning  Image Processing ◦ Texture.
Robust Real-time Object Detection by Paul Viola and Michael Jones ICCV 2001 Workshop on Statistical and Computation Theories of Vision Presentation by.
Ensemble Tracking Shai Avidan IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE February 2007.
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Wavelet Transform A very brief look.
Image Forgery Detection by Gamma Correction Differences.
CS292 Computational Vision and Language Visual Features - Colour and Texture.
A Novel 2D To 3D Image Technique Based On Object- Oriented Conversion.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
Image Processing David Kauchak cs458 Fall 2012 Empirical Evaluation of Dissimilarity Measures for Color and Texture Jan Puzicha, Joachim M. Buhmann, Yossi.
ENG4BF3 Medical Image Processing
Image Representation Gaussian pyramids Laplacian Pyramids
Multiclass object recognition
Identifying Computer Graphics Using HSV Model And Statistical Moments Of Characteristic Functions Xiao Cai, Yuewen Wang.
Applications of Image Filters Computer Vision CS 543 / ECE 549 University of Illinois Derek Hoiem 02/04/10.
IIS for Image Processing Michael J. Watts
Machine Vision ENT 273 Image Filters Hema C.R. Lecture 5.
Person-Specific Domain Adaptation with Applications to Heterogeneous Face Recognition (HFR) Presenter: Yao-Hung Tsai Dept. of Electrical Engineering, NTU.
Technology and Historical Overview. Introduction to 3d Computer Graphics  3D computer graphics is the science, study, and method of projecting a mathematical.
A Survey of Wavelet Algorithms and Applications, Part 2 M. Victor Wickerhauser Department of Mathematics Washington University St. Louis, Missouri
Digital Cameras And Digital Information. How a Camera works Light passes through the lens Shutter opens for an instant Film is exposed to light Film is.
Steganalysis of audio: attacking the Steghide
1 Digital Image Processing Dr. Saad M. Saad Darwish Associate Prof. of computer science.
Object Recognition in Images Slides originally created by Bernd Heisele.
Graphics. Graphic is the important media used to show the appearance of integrative media applications. According to DBP dictionary, graphics mean drawing.
Image Compression – Fundamentals and Lossless Compression Techniques
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines Siwei Lyu and Hany Farid Department of Computer Science, Dartmouth.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Lecture 7: Intro to Computer Graphics. Remember…… DIGITAL - Digital means discrete. DIGITAL - Digital means discrete. Digital representation is comprised.
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
Autonomous Robots Vision © Manfred Huber 2014.
Digital Image Processing
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
1 Detecting Hidden Messages using higher-order stats and SVMs Siwei Lyu and Hany Farid.
Content-Based Image Retrieval Using Color Space Transformation and Wavelet Transform Presented by Tienwei Tsai Department of Information Management Chihlee.
An Introduction to Digital Image Processing Dr.Amnach Khawne Department of Computer Engineering, KMITL.
Martina Uray Heinz Mayer Joanneum Research Graz Institute of Digital Image Processing Horst Bischof Graz University of Technology Institute for Computer.
Wavelets Chapter 7 Serkan ERGUN. 1.Introduction Wavelets are mathematical tools for hierarchically decomposing functions. Regardless of whether the function.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
Graphics Basic Concepts 1.  A graphic is an image or visual representation of an object.  A visual representation such as a photo, illustration or diagram.
IMAGE PROCESSING is the use of computer algorithms to perform image process on digital images   It is used for filtering the image and editing the digital.
Cascade for Fast Detection
Color Image Processing
Face Detection EE368 Final Project Group 14 Ping Hsin Lee
Color Image Processing
Wavelets : Introduction and Examples
Lit part of blue dress and shadowed part of white dress are the same color
3D Graphics Rendering PPT By Ricardo Veguilla.
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Image Segmentation Techniques
Deep Learning Hierarchical Representations for Image Steganalysis
Josh H. McDermott, Eero P. Simoncelli  Neuron 
Color Image Processing
© 2010 Cengage Learning Engineering. All Rights Reserved.
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
Presentation transcript:

1 How Realistic is Photorealistic?

2 Yaniv Lefel Hagay Pollak Based on the work of - Siwei Lyu and Hany Farid

3 Introduction Among the set of all possible images, natural images only occupy a tiny subspace. For instance, there are totally 256^(n^2) d ifferent 8 -bit grayscale images of size nxn pixels. Natural images are sparsely distributed in the space of all possible images.

4 Image space e.g. when n = 10 pixels, it results in 1.3x10^154 different images !!!

5 Introduction (cont’) The regularities within natural images can be modeled statistically. Image statistical models are already in use by applications such as: Compression, de-noising, segmentation, texture synthesis, content-based retrieval and object/scene categorization.

6 Motivation 1 Identify Computer Graphics Sophisticated computer graphics software can generate highly convincing photorealistic images able to deceive the human eye. Differentiating these two types of images is an important task to ensure the authenticity and integrity of photographs.

7 Computer graphics example

8 Motivation 2 Identify Steg Images Image steganography hides messages in digital images in a non-intrusive way that is hard to detect visually. The task of generic steganalysis is to detect the presence of such hidden messages without the detailed knowledge of the embedding methods.

9 Steganography example Steg is the message image embedded into the original image. The rightmost image is the absolute value of the difference between the original and steg image, normalized into 8 bit for display purposes. Original message Steg |Original-Stego|

10 How ? Example

11 Motivation 3 Identify Re-broadcasting Biometrics-based (e.g., face, iris, or voice) authentication and identification systems are vulnerable to the “rebroadcast” attacks. (e.g. using a high-resolution photograph of a human face). We need to differentiate a “live” image (captured in real time by a camera) and a “rebroadcast” one (a photograph).

12 How to distinuish images ? Image properties ? –Image intensity histogram –Image frequency Other method ?

13 Using known methods

14 Why wavelets Image representations based on multi-scale image decomposition (e.g., wavelets) decompose an image with basis functions partially localized in both space and frequency - a compromise between these representations.

15 Quadrature Mirror Filter (QMF) Within the general framework of multi-scale image decomposition, there exist many different implementations, each having its own advantage and effective in different problems. In this work, two such decompositions, namely the quadrature mirror filter (QMF) pyramid decomposition and the local harmonic angular decomposition (LAHD), are employed for collecting image statistics characterizing natural images.

16 Wavelet (for example)

17 QMF - Quadrature Mirror Filter The QMF pyramid decomposition splits the image frequency space into three different scales, and within each scale, into three orientation subbands (Vertical, Horizontal and Diagonal).

18 QMF diagram

19 QMF The vertical, horizontal and diagonal subbands at scale i are denoted by Vi(x; y), Hi(x; y), and Di(x; y), respectively. Can be generated by convolving the image, I(x, y), with low-pass and high-pass filters.

20 Calculating the sub-bands The vertical subband is generated by convolving the image, I(x, y), with the low-pass filter in the vertical direction and the high-pass filter in the horizontal direction as: h(x)= High Pass Filter, l(x)= Low Pass Filter

21 Filters

22 The same for next levels (scales)

23 QMF decomposition – Example 1

24 QMF decomposition – Example 2

25 Example – QMF statistics

26 Example – Error Statistics

27 Is QMF enough ?

28 Add some magic … QMF coefficients Magic Box Error coefficients Simple but long (and out of scope) mathematical procedure

29 A Linear Predictor

30 Browsing Through

31 The same for all sub-bands

32 Technique Diagram Feature vector 

33 Computing the Feature Vector 3 – Sub-bands (vertical, horizontal, diagonal). 3 – Scales (levels of decompositions). 4 – First order statistics (mean, variance, skewness – asymmetry measure, kurtosis). 3 – Colors (RGB) 2 – marginal statistics (wavelet coefficients), error statistics. 216 = 3*3*4*3*2

34 Image examples

35 Feature vectors projected on 3D space Natural image – Blue. Synthetic images - noise (Green), fractal (Black), and discs (Red)

36 Learning and Testing CG\Steg\rebroadcast CG\steg\rebroadcast images are prepared. Statistics is collected over natural images and CG\steg\rebroadcast images (not using color). A Machine learning system (e.g. FLD, LDA, SVM) is then trained on some of the natural and some of the CG\steg\rebroadcast images. The remaining natural and CG\steg\rebroadcast images are used for testing.

37 Natural vs. CG results (SVM) All images TrainSucc [%] TestSucc [%] Natural CG

38 Training the system

39 Photorealistic (CG) images

40 Natural vs. CG results LDA - linear discrimination analysis SVM - Support vector machines

41 The Impact of Color

42 Correctly Classified Photorealistic

43 Incorrectly Classified Photographic

44 Natural vs. Steganography images A message consists of a 64x64 pixel region of a random image chosen from the same image database.

45 Natural vs. Steganography results All images TrainSucc [%] TestSucc [%] Natural Steg

46 Live vs. rebroadcast We collect statistics from natural images and the same images after having been printed on a laser printer and re-scanned with a scanner (printing and scanning are done at 72 dpi).

47 Live vs. rebroadcast results All images TrainSucc [%] TestSucc [%] Natural rebroad cast

48 Live vs. rebroadcast (cont’) Remark: It is not surprising that printing significantly disturbs the image statistics. Detecting a rebroadcast image will become more difficult with printers improvement.

49 Rebroadcasting example Shown is the original iris images (top row) and the images after being printed and scanned (bottom row).

50 Feature vectors projected on 3D space Results from a four-way classifier of 1000 natural, 1000 steg, 500 graphic, and 200 rebroadcast images.

51 More Applications how many different artists ?

52 More Applications Forgery detection.

53 What Next ? Can this technique be wrong - This model will not be immediately vulnerable to counter-attacks.

54 Finally Statistical model. capture regularities that are inherent to photographic images. Distinguish tampered \ CG images and natural images.