Blind detection of image manipulation @ PoliMi


Published on

Presentation given @ PoliMi Como - 12/1/2011

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Blind detection of image manipulation @ PoliMi

  1. 1. Blind detection of image manipulation <ul>Giorgio Sironi, matr. 764852 Politecnico di Milano - Como, January 12th, 2011 </ul>
  2. 2. Problem statement
  3. 3. Possible solutions <ul>Automated detection of tampering on non-watermarked images </ul><ul>Pixel-based </ul><ul>Format-based </ul><ul>Camera-based </ul><ul>Physics-based </ul><ul>Geometric-based </ul>
  4. 4. Pixel-based techniques <ul>Detection of cloning, resampling , splicing </ul>
  5. 5. Format based techniques <ul>Double JPEG , JPEG quantization and blocking </ul>
  6. 6. Camera based techniques <ul>Chromatic aberration , sensor noise... </ul>
  7. 7. Physics-based <ul>Light direction (2D or 3D) </ul>
  8. 8. Geometric-based <ul>Sign manipulations <li>Assumptions: manual selection, [known font] </li></ul>
  9. 9. What is a photograph? <ul>Camera executes a projective transformation ( homography ). We use projective geometry tools. </ul>
  10. 10. Math background <ul><li>Homegeneous coordinates: O is (0,0,1)... Or (0,0,2), or (0,0,3). (10, 15) is (10, 15, 1) or (20, 30, 2)
  11. 11. Planar homography: 3x3 matrix (linear transformation) </li></ul>
  12. 12. <ul>How do we estimate an homography? </ul>
  13. 13. How do we find the keypoints? <ul><li>SIFT: feature detection
  14. 14. RANSAC: matching of keypoints pairs </li></ul>
  15. 15. How do we judge a rectification? <ul>Comparison between (binary) rectified image and world sample(s) </ul>
  16. 16. It's an arm race Computer programs support projective geometry tools; do humans?
  17. 17. References Main Hany Farid, A Survey of Image Forgery Detection (2009), in: IEEE Signal Processing Magazine, 2:26(16-25) Valentina Conotter, Giulia Boato and Hany Farid, Detecting Photo Manipulation on Signs and Billboards, in: International Conference on Image Processing, Hong Kong, 2010 R. Hartley and A. Zisserman, Multiple View Geometry in Computer Vision, Cambridge University Press, 2004. D.G. Lowe, “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, vol. 2, no. 60, pp. 91–110, 2004. Minor Prasad S. and K. R. Ramakrishnan, ON RESAMPLING DETECTION AND ITS APPLICATION TO DETECT IMAGE TAMPERING, in: IEEE International Conference on Multimedia and Expo (ICME 2006),, Jul 09-12, 2006, Toronto, Canada, pp. 1325-1328. Micah K. Johnson and Hany Farid, Exposing Digital Forgeries by Detecting Inconsistencies in Lighting (2005), in: MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security Babak Mahdian and Stanislav Saic, A Bibliography on Blind Methods for Identifying Image Forgery (2010), in: Signal Processing: Image Communication, 25:6(389-399) Sevinc Bayram, Husrev T. Sencar and Nasir Memon, A Survey of Copy-Move Forgery Detection Techniques, in: IEEE Western New York Image Processing Workshop, Rochester, NY, 2008 Nitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T.-C. Chiu, Jan P. Allebach and Edward J. Delp, A Survey of Forensic Characterization Methods for Physical Devices (2006), in: Digital Investigation, 3:Supplement 1(17-28)
  18. 18. Thanks for your attention