Summary Marie Yarbrough. Introduction History of Image Forgery Method Segmentation Classification Common-Sense Reasoning Conclusion.

Slides:



Advertisements
Similar presentations
Designing Experiments Using the Scientific Method
Advertisements

Access 2007 ® Use Databases How can Microsoft Access 2007 help you structure your database?
MODULE 5: CONTENT Content A variety of VERBAL formats contribute to storytelling content. THERE ARE DEFINITELY TIMES WHEN WORDS TELL A STORY BEST.
V-1 Part V: Collaborative Signal Processing Akbar Sayeed.
Pictorial Query by Example PQBE Vida Movahedi Mar
Digital Storytelling Photo Story 3 from Microsoft and Movie Maker.
Telling compelling visual stories. Compelling visual stories are the foundation of any great yearbook. The challenge for the photographers who make the.
Evaluating Search Engine
 Introduction  Principles of context – aware saliency  Detection of context – aware saliency  Result  Application  Conclusion.
ICME 2008 Huiying Liu, Shuqiang Jiang, Qingming Huang, Changsheng Xu.
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
3. Introduction to Digital Image Analysis
Petrophase 2008 Poster Presentation Title
Multiple Human Objects Tracking in Crowded Scenes Yao-Te Tsai, Huang-Chia Shih, and Chung-Lin Huang Dept. of EE, NTHU International Conference on Pattern.
Chapter 9 Multimedia, Web Authoring, and More. Multimedia Multimedia integrates all kinds of information. Pages are linked by buttons. Story boards show.
Access 2007 ® Use Databases How can Microsoft Access 2007 help you to enter and organize information?
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Intelligent Digital Forensics September 30, 2009.
Design Principles 3.02 Understand business publications Slide 1.
Advanced Tables Lesson 9. Objectives Creating a Custom Table When a table template doesn’t suit your needs, you can create a custom table in Design view.
Introduction to Cartography Nazrulo Toirbekov Assistant lecturer TSPU, Hungary, 2012.
Preparing for Science Introduction Chapter.
AdvisorStudent Dr. Jia Li Shaojun Liu Dept. of Computer Science and Engineering, Oakland University 3D Shape Classification Using Conformal Mapping In.
Supporting Beyond-Surface Interaction for Tabletop Display Systems by Integrating IR Projections Hui-Shan Kao Advisor : Dr. Yi-Ping Hung.
Multimedia Databases (MMDB)
Literacy Test Reading Selections
INTRODUCTION TO SCIENCE & THE
CSCE 5013 Computer Vision Fall 2011 Prof. John Gauch
Lecture 6-1CS251: Intro to AI/Lisp II I can see clearly now May 4th, 1999.
Please put the title here
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Artificial intelligence systems form a broad and diverse set of.
1 Lecture 1: Introduction to Artificial Intelligence.
(Spring 2015) Instructor: Craig Duckett Lecture 10: Tuesday, May 12, 2015 Mere Mortals Chap. 7 Summary, Team Work Time 1.
Combining geometry and domain knowledge to interpret hand-drawn diagrams As Presented By: Andrew Campbell Christopher Dahlberg.
80 million tiny images: a large dataset for non-parametric object and scene recognition CS 4763 Multimedia Systems Spring 2008.
Stylization and Abstraction of Photographs Doug Decarlo and Anthony Santella.
Automatic Image Annotation by Using Concept-Sensitive Salient Objects for Image Content Representation Jianping Fan, Yuli Gao, Hangzai Luo, Guangyou Xu.
Color Image Segmentation Speaker: Deng Huipeng 25th Oct , 2007.
Lecture 3 The Digital Image – Part I - Single Channel Data 12 September
WHAT IS THE NATURE OF SCIENCE?. SCIENTIFIC WORLD VIEW 1.The Universe Is Understandable. 2.The Universe Is a Vast Single System In Which the Basic Rules.
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
PSEUDO-RELEVANCE FEEDBACK FOR MULTIMEDIA RETRIEVAL Seo Seok Jun.
1 Artificial Intelligence: Vision Stages of analysis Low level vision Surfaces and distance Object Matching.
Scene Completion Using Millions of Photographs James Hays, Alexei A. Efros Carnegie Mellon University ACM SIGGRAPH 2007.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture 23 Intelligent Digital Forensics October 22, 2007.
October Andrew C. Gallagher, Jiebo Luo, Wei Hao Improved Blue Sky Detection Using Polynomial Model Fit Andrew C. Gallagher, Jiebo Luo, Wei Hao Presented.
Building the digital world from local to universal Adolf Knoll National Library of the Czech Republic
By Naveen kumar Badam. Contents INTRODUCTION ARCHITECTURE OF THE PROPOSED MODEL MODULES INVOLVED IN THE MODEL FUTURE WORKS CONCLUSION.
Stas Goferman Lihi Zelnik-Manor Ayellet Tal Technion.
Design Principles 5.01 Understand business publications Slide 1.
Detecting False Captioning Using Common Sense Reasoning James Byrd.
To think like a Scientist… You must observe; using all 5 senses to describe the problem. Tools you can use are: microscopes, night vision goggles, telescopes,
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 2005.ACM GECCO.8.Discriminating and visualizing anomalies.
By Prof. Stelmark. Digital Imaging In digital imaging, the latent image is stored as digital data and must be processed by the computer for viewing on.
An Introduction to Digital Image Processing Dr.Amnach Khawne Department of Computer Engineering, KMITL.
DIGITAL IMAGE FORGERY Name: Reshma P.D Roll No:19.
Learning and Removing Cast Shadows through a Multidistribution Approach Nicolas Martel-Brisson, Andre Zaccarin IEEE TRANSACTIONS ON PATTERN ANALYSIS AND.
Shadow Detection in Remotely Sensed Images Based on Self-Adaptive Feature Selection Jiahang Liu, Tao Fang, and Deren Li IEEE TRANSACTIONS ON GEOSCIENCE.
Introduction to Cartography Nazrulo Toirbekov Assistant lecturer TSPU, Hungary, 2012.
3D Perception and Environment Map Generation for Humanoid Robot Navigation A DISCUSSION OF: -BY ANGELA FILLEY.
Student Gesture Recognition System in Classroom 2.0 Chiung-Yao Fang, Min-Han Kuo, Greg-C Lee, and Sei-Wang Chen Department of Computer Science and Information.
Visual Information Processing. Human Perception V.S. Machine Perception  Human perception: pictorial information improvement for human interpretation.
WHAT IS THE NATURE OF SCIENCE?
Machine Vision ENT 273 Lecture 4 Hema C.R.
Deeply learned face representations are sparse, selective, and robust
Incorporating Ancillary Data for Classification
Image Segmentation Techniques
ICT Spreadsheets Lesson 1: Introduction to Spreadsheets
Attentional Modulations Related to Spatial Gating but Not to Allocation of Limited Resources in Primate V1  Yuzhi Chen, Eyal Seidemann  Neuron  Volume.
Detecting Digital Forgeries using Blind Noise Estimation
Presentation transcript:

Summary Marie Yarbrough

Introduction History of Image Forgery Method Segmentation Classification Common-Sense Reasoning Conclusion

Images have been a powerful media of delivering and communicating information ever since their inception. The act of distorting and changing images has been around for the same amount of time. Detecting these image manipulations images has become and important problem. Even more so now that we have entered the digital age. This paper produces a way of detecting these falsified images.

People have been doing image manipulation since the beginning and these forgeries have been put to many uses. Such as Journalists who want to make up their own stories Photojournalists who want dramatic scenes Scientists who forge or repeat images in academic papers Politian's who try to direct public opinion by exaggerating or falsifying political events

There are 4 manipulation techniques that are used on images. Deletion of details: removing scene elements Insertion of detail: adding scene elements Photomontage: combining multiple images False Captioning: misrepresenting image content.

A series of photos of the “Devil’s Den” sniper photographed after the battle of Gettysburg. The first three photos show the soldier where he fell in battle. The fourth shows him “Posed” for dramatic effect.

The author proposes using Artificial Intelligence (AI) techniques of common-sense reasoning to detect duplicated and anomalous elements in a set of images. The basic premise: If they can detect a set of key elements in an image then they can detect if they have been moved, added, or deleted from a scene prior to image created.

The most important step of this process it to split the images into Regions of Importance (ROI). They use mean-shift image segmentation to decompose an image into homogeneous regions. Routine has inputs: Spatial radius: h s Color radius: h r Minimum number of pixels: M They then over segment the image using low values of h r and M and merge adjacent regions.

(Top)Results of mean-shift segmentation with parameters h s = 7, h r = 6, and M=50. (Bottom) Results of region merging.

After they segment the image the next step is to classify the ROI. They propose a segment based classification scheme. Brute force pixel comparisons take too long to do. Segment-wise classification reduces the size of the problem space significantly. Comparing the relationship of ROI across a corpus of images gives the ability to determine if a scene has been manipulated during the photo recording process.

They set about this classification by computing an importance map that assigns a scalar value to each pixel estimating the importance of that image location based on an attention model. They use measures of visual salience, image regions likely to be interesting to the low-level vision system, and high-level detectors for specific objects that are likely to be important.

(Top) Importance map. Saliency regions are outlined in magenta, face regions in cyan. (Bottom) Regions of importance.

They use two different approaches to assist digital forensics. To resolve local classification ambiguities within images, they query a knowledge base to resolve the proper relation A common-sense knowledge base such as Cyc and OpenMind is well suited for this task. For example, given two large horizontal blue regions many classifiers cannot distinguish which is ‘sky’ and which is ‘water’. A common-sense knowledge base can be queried to find the answer.

Then, they reason across a larger corpus of images to find unique or missing elements during an investigation. In many cases, the single image might not tell the complete story. A collection of photos, however, does show a narrative of a larger story. For example, a man-made object such as a plane in a field of grass should raise suspicion. Unless, all the photos in a corpus have a similar qualitative structure.

They suggest a software system based on a combination of existing tools to identify common objects across a corpus of images. By visualizing such objects, as in this figure, even a layperson can quickly determine whether a given image isfalsely captioned.

Through a series of segmentation, classification, and common sense reasoning they can find parts of images that might have been manipulated. These methods are limited by the performance of the components they use though.