Blind detection of image manipulation <ul>Giorgio Sironi, matr. 764852 Politecnico di Milano - Como, January 12th, 2011 </ul>
Problem statement http://xkcd.com/331
Possible solutions <ul>Automated detection of tampering on non-watermarked images </ul><ul>Pixel-based </ul><ul>Format-bas...
Pixel-based techniques <ul>Detection of cloning,  resampling , splicing </ul>
Format based techniques <ul>Double JPEG , JPEG quantization and blocking </ul>
Camera based techniques <ul>Chromatic aberration , sensor noise... </ul>
Physics-based <ul>Light direction  (2D or 3D) </ul>
Geometric-based <ul>Sign manipulations <li>Assumptions: manual selection, [known font] </li></ul>
What is a photograph? <ul>Camera executes a projective transformation ( homography ). We use  projective  geometry tools. ...
Math background <ul><li>Homegeneous coordinates: O is (0,0,1)... Or (0,0,2), or (0,0,3). (10, 15) is (10, 15, 1) or (20, 3...
Planar homography: 3x3 matrix (linear transformation) </li></ul>
<ul>How do we estimate an homography? </ul>
How do we find the keypoints? <ul><li>SIFT: feature detection
RANSAC: matching of keypoints pairs </li></ul>
How do we judge a rectification? <ul>Comparison between (binary) rectified image and world sample(s) </ul>
It's an arm race Computer programs support projective geometry tools; do humans?
Upcoming SlideShare
Loading in...5
×

Blind detection of image manipulation @ PoliMi

1,857

Published on

Presentation given @ PoliMi Como - 12/1/2011

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,857
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
35
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Blind detection of image manipulation @ PoliMi

  1. 1. Blind detection of image manipulation <ul>Giorgio Sironi, matr. 764852 Politecnico di Milano - Como, January 12th, 2011 </ul>
  2. 2. Problem statement http://xkcd.com/331
  3. 3. Possible solutions <ul>Automated detection of tampering on non-watermarked images </ul><ul>Pixel-based </ul><ul>Format-based </ul><ul>Camera-based </ul><ul>Physics-based </ul><ul>Geometric-based </ul>
  4. 4. Pixel-based techniques <ul>Detection of cloning, resampling , splicing </ul>
  5. 5. Format based techniques <ul>Double JPEG , JPEG quantization and blocking </ul>
  6. 6. Camera based techniques <ul>Chromatic aberration , sensor noise... </ul>
  7. 7. Physics-based <ul>Light direction (2D or 3D) </ul>
  8. 8. Geometric-based <ul>Sign manipulations <li>Assumptions: manual selection, [known font] </li></ul>
  9. 9. What is a photograph? <ul>Camera executes a projective transformation ( homography ). We use projective geometry tools. </ul>
  10. 10. Math background <ul><li>Homegeneous coordinates: O is (0,0,1)... Or (0,0,2), or (0,0,3). (10, 15) is (10, 15, 1) or (20, 30, 2)
  11. 11. Planar homography: 3x3 matrix (linear transformation) </li></ul>
  12. 12. <ul>How do we estimate an homography? </ul>
  13. 13. How do we find the keypoints? <ul><li>SIFT: feature detection
  14. 14. RANSAC: matching of keypoints pairs </li></ul>
  15. 15. How do we judge a rectification? <ul>Comparison between (binary) rectified image and world sample(s) </ul>
  16. 16. It's an arm race Computer programs support projective geometry tools; do humans?
  17. 17. References Main Hany Farid, A Survey of Image Forgery Detection (2009), in: IEEE Signal Processing Magazine, 2:26(16-25) Valentina Conotter, Giulia Boato and Hany Farid, Detecting Photo Manipulation on Signs and Billboards, in: International Conference on Image Processing, Hong Kong, 2010 R. Hartley and A. Zisserman, Multiple View Geometry in Computer Vision, Cambridge University Press, 2004. D.G. Lowe, “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, vol. 2, no. 60, pp. 91–110, 2004. Minor Prasad S. and K. R. Ramakrishnan, ON RESAMPLING DETECTION AND ITS APPLICATION TO DETECT IMAGE TAMPERING, in: IEEE International Conference on Multimedia and Expo (ICME 2006),, Jul 09-12, 2006, Toronto, Canada, pp. 1325-1328. Micah K. Johnson and Hany Farid, Exposing Digital Forgeries by Detecting Inconsistencies in Lighting (2005), in: MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security Babak Mahdian and Stanislav Saic, A Bibliography on Blind Methods for Identifying Image Forgery (2010), in: Signal Processing: Image Communication, 25:6(389-399) Sevinc Bayram, Husrev T. Sencar and Nasir Memon, A Survey of Copy-Move Forgery Detection Techniques, in: IEEE Western New York Image Processing Workshop, Rochester, NY, 2008 Nitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T.-C. Chiu, Jan P. Allebach and Edward J. Delp, A Survey of Forensic Characterization Methods for Physical Devices (2006), in: Digital Investigation, 3:Supplement 1(17-28)
  18. 18. Thanks for your attention
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×