Digital Image Forgery Detection Techniques for Still Images - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

Digital Image Forgery Detection Techniques for Still Images

Description:

An image can become a forgery based upon the context in which it is used ... Objects are be removed or added, for example, a person can be added or removed ... – PowerPoint PPT presentation

Number of Views:861
Avg rating:3.0/5.0
Slides: 16
Provided by: And48
Category:

less

Transcript and Presenter's Notes

Title: Digital Image Forgery Detection Techniques for Still Images


1
Digital Image Forgery Detection Techniques for
Still Images
  • Andy Riome

2
  • This is a new project commencing in 2007
  • The period of this research is being conducted
    over four years on a part time basis

3
  • The objective of this research is to develop
    a new forgery detection method that does not rely
    upon digital watermarks.
  • It is an area which has been researched by a
    number of scientists, but most notably - Alin C.
    Popescu and Hany Farid who developed a number of
    techniques.
  • Techniques include
  • 1) How light falls on objects within an image
  • 2) Whether there are any areas of an image
    which has been cloned or copied
  • 3) Looking for evidence of retouching in an
    image by detecting whether the pattern in the
    pixels have been destroyed

4
Three Core Areas of Research
  • Developing a new technique to detect changes and
    alterations to an image and does not rely on
    watermarks
  • Evaluate the algorithms used for image
    manipulation and to group them based upon their
    degree of manipulation. It is also important to
    consider image compression of image files in this
    area of work
  • An evaluation and comparison of the existing
    forgery detection techniques, and to carry out
    the evaluation along with defining a new grouping
    structure for forgery detection techniques

5
Digital Watermarks
  • Scientists, such as Alin C. Popescu and Hany
    Farid, have stated in their research papers about
    the vulnerability of watermarks in digital images
    in regards to authenticity of images
  • These drawbacks have made scientists to start
    looking for alternative methods in order to
    detect for tell-tale signs of tampering

6
Drawbacks of Digital Watermarks
  • It is not possible to determine whether the
    watermark has been inserted after manipulation
  • Watermarks can be fragile, and when a watermark
    image has been compressed with using a
    compressing algorithm like JPEG, they are
    destroyed
  • Extract a watermark manipulate the image and then
    reinsert the watermark, which itself can be
    modified during insertion therefore making the
    technique unreliable
  • Detecting areas where an image has been
    manipulated
  • Determining whether a manipulation is innocent,
    such as JPEG Compression and sharpening, from
    those which are malicious, such as adding or
    removing parts to an image. This is where
    watermarks have a difficulty they are unable to
    determine this difference

7
What is a Forgery?
  • Forgery is a subjective word
  • An image can become a forgery based upon the
    context in which it is used
  • An image altered for fun or someone who has taken
    an bad photo, but has been altered to improve its
    appearance cannot be considered a forgery even
    though it has been altered from its original
    capture

8
What is a Forgery?
  • The other side of forgery are those who
    perpetuate a forgery for gain and prestige they
    create an image in which to dupe the recipient
    into believing the image is real and from this be
    able to gain payment and fame
  • Three type of forgery can be identified
  • 1) An image that is created using graphical
    software
  • 2) An image where the content has been
    altered
  • 3) An image where the context has been
    altered

9
What is a Forgery?
  • Using graphical software is one method in which a
    forged image can be created
  • It needs the creator to especially skilful in
    ensuring that the image they are creating is
    realistic, for example, that the fall of light on
    objects in an image is consistent right across
    the image, that shading is consistent, the
    absorption of light
  • An image created using this method can take some
    time to develop

10
What is a Forgery?
  • Creating an image by altering its content is
    another method
  • Duping the recipient into believing that the
    objects in an image are something else from what
    they really are!
  • The image itself is not altered, and if examined
    will be proven as so

11
What is a Forgery?
  • This method is where the context of the image is
    altered
  • Objects are be removed or added, for example, a
    person can be added or removed
  • The easiest way is to cut an object from one
    image and insert it into another image image
    editing software makes this a simple task

12
Altering Images
  • Altering images is not new it has been around
    since the early days of photography
  • The concepts have moved into the digital world by
    virtue of digital cameras and the availability of
    digital image editing software
  • The ease of use of digital image editing
    software, which does not require any special
    skills, makes image manipulation easy to achieve
    and do

13
Digital Image Editors
  • Firstly, this research is not concentrating on
    any one make or brand of editor, but specifically
    the algorithms used
  • The algorithms are basically the tools which the
    photo editor uses to manipulate the image
  • Some of the tools found in the editors are
    resizing an image, cropping, selecting part of an
    (lasso tool), removing unwanted parts of an
    image, rotating objects, merging pictures together

14
Research In Progress
  • An understanding of how digital cameras work
    the sensors (CCD, CMOS, X3), how colour is
    captured Bayer Array, their drawbacks noise
  • An understanding of the algorithms used in image
    manipulation which can be used in digital forgery

15
  • Any Questions ?
Write a Comment
User Comments (0)
About PowerShow.com