Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.

Slides:



Advertisements
Similar presentations
PANKAJ MALVIYA RUCHIRA NASKAR
Advertisements

Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
University of Ioannina - Department of Computer Science Wavelets and Multiresolution Processing (Background) Christophoros Nikou Digital.
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
VISUALIZATION OF HYPERSPECTRAL IMAGES ROBERTO BONCE & MINDY SCHOCKLING iMagine REU Montclair State University.
Digital Image Forensics
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
1 Exposing Digital Forgeries in Color Array Interpolated Images Presented by: Ariel Hutterer Final Fantasy,2001My eye.
ECE643 DIGITAL IMAGE PROCESSING Steganalysis versus Splicing detection Paper by: Yun Q. Shi, Chunhua Chen, Guorong Xuan and Wei Su By: Nehal Patel Siddharth.
Detecting Digital Image Forgeries Using Sensor Pattern Noise presented by: Lior Paz Jan Lukas, jessica Fridrich and Miroslav Goljan.
Digital Image Processing
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
CS443: Digital Imaging and Multimedia Filters Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University Spring 2008 Ahmed Elgammal Dept.
Image Tampering Detection Using Bayesian Analytical Methods 04/11/2005 As presented by Jason Kneier ELEN E6886 Spring 2005.
VISUALIZATION OF HYPERSPECTRAL IMAGES ROBERTO BONCE & MINDY SCHOCKLING iMagine REU Montclair State University.
1 How Realistic is Photorealistic?. 2 Yaniv Lefel Hagay Pollak Based on the work of - Siwei Lyu and Hany Farid.
12/2/10 Detecting Fakes Computational Photography Derek Hoiem, University of Illinois Bernadette by Stephen MolyneauxStephen Molyneaux
ENG4BF3 Medical Image Processing
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Identifying Computer Graphics Using HSV Model And Statistical Moments Of Characteristic Functions Xiao Cai, Yuewen Wang.
MULTITEMP 2005 – Biloxi, Mississippi, USA, May 16-18, 2005 Remote Sensing Laboratory Dept. of Information and Communication Technology University of Trento.
Following the work of John Daugman University of Cambridge
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Medical Image Analysis Image Enhancement Figures come from the textbook: Medical Image Analysis, by Atam P. Dhawan, IEEE Press, 2003.
Communications-2010, Bucharest, June 11 A Second Order Statistical Analysis of the 2D Discrete Wavelet Transform Corina Nafornita 1, Ioana Firoiu 1,2,
Steganalysis of audio: attacking the Steghide
Image Processing Jitendra Malik. Different kinds of images Radiance images, where a pixel value corresponds to the radiance from some point in the scene.
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines Siwei Lyu and Hany Farid Department of Computer Science, Dartmouth.
School of Electrical & Computer Engineering Image Denoising Using Steerable Pyramids Alex Cunningham Ben Clarke Dy narath Eang ECE November 2008.
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
Ch5 Image Restoration CS446 Instructor: Nada ALZaben.
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
傅思維. How to implement? 2 g[n]: low pass filter h[n]: high pass filter :down sampling.
By Dr. Rajeev Srivastava CSE, IIT(BHU)
1 Detecting Hidden Messages using higher-order stats and SVMs Siwei Lyu and Hany Farid.
A DIGITAL IMAGE WATERMARKING PREPARED BY AMAR RAEED KHORSHıD ALHıLALı ıD : R.G. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark”, Procedding.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification Irene Amerini, Roberto Caldelli, Vito.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
Digital Image Processing Lecture 10: Image Restoration II Naveed Ejaz.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Medical Image Analysis
Multiresolution Analysis (Chapter 7)
Reflection Correspondence for Exposing Photograph Manipulation
Measures for Classification and Detection
Directional Multiscale Modeling of Images
Exposing Digital Forgeries Through Chromatic Aberration Micah K
Following the work of John Daugman University of Cambridge
Image Denoising in the Wavelet Domain Using Wiener Filtering
מנחה קורס - פרופ' חגית הל-אור
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
IMAGE FORGERY DETECTION
Image filtering Images by Pawan Sinha.
Image filtering Images by Pawan Sinha.
Filtering Part 2: Image Sampling
Image and Video Processing
Wavelet transform application – edge detection
Detecting Digital Forgeries using Blind Noise Estimation
A Second Order Statistical Analysis of the 2D Discrete Wavelet Transform Corina Nafornita1, Ioana Firoiu1,2, Dorina Isar1, Jean-Marc Boucher2, Alexandru.
Introduction to Multimedia Security Topics Covered in this Course
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal

Which of them are digitally manipulated?

How can we know? We call a digital image manipulated if either it has been retouched by a photo editing software or has been produced by the software itself. To prevent the former, the owner of the original image may introduce a watermark or a digital signature. But this process may not be feasible every time. Most approaches for detecting digital image manipulation are blind approaches.

Our Methodology In [1], the authors argue that the statistical artifacts associated with images generated from cameras is inherently different form that associated with images manipulated by a software. These properties can be captured by analyzing the noise present in the image. Further, a discrete wavelet transform of the image can also be used to obtain some other statistical features.

Building the feature vectors Image De-noising Image was filtered using a wiener adaptive filter and a median filter. Neighborhood model of Wavelet sub bands To capture the strong correlation that exists between the wavelet subband coefficient, we find the residual error by building a neighborhood prediction model. Discrete wavelet transform We find the distance of the sub-bands distribution from the corresponding Gaussian distribution.

Results Image denoising True Positive = 37/47 False Positive = 21/53 Neighborhood model of Wavelet sub bands True Positive = 32/47 False Positive = 11/53 Discrete wavelet transform True Positive = 34/47 False positive = 15/53

Detecting Fake Regions Detecting abnormal noise patterns in Image Detecting Duplicated Image Regions

References Digital image Forensics For Identifying Computer Generated And Digital Camera Images Sintayehu Dehnie, Taha Sencar and Nasir Memon Exposing Digital Forgeries by Detecting Duplicated Image Regions Alin C Popescu and Hany Farid Noise Features for Image Tampering Detection and Steganalysis Hongmei Gou, Swaminathan, A., Min Wu How realistic is photorealistic? Siwei Lyu and Hany Farid