Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows

As sophisticated photo editing software is increasingly available and the widespread use of multimedia social network, the reliability of digital images becomes more and more important. Photographic splicing, herein defined as a cut-and-paste of image regions from one image onto another image, is difficult to be detected due to the absence of a reference object. To carry out such forensic analysis, we present a novel shadow-based method, with which the fake shadow of the composites can be detected. We show how to estimate the shadow scale factors with a shadow removal technique and, further, how to estimate the growth rate of the penumbra width (GRPW). Inconsistencies in the shadows are then used as evidence of tampering. Compared with other shadow-based forensic methods, the proposed method can not only deal with the problem of shadow cloning in the same image, but also expose the fakery containing the real shadow, which benefit from the estimation of shadow scale factors and GRPW. Comparison results obtained from the splicing forgery detection database verify the ability of our approach.

[1]  H. Barrow,et al.  RECOVERING INTRINSIC SCENE CHARACTERISTICS FROM IMAGES , 1978 .

[2]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[3]  Charlie Daly,et al.  A Technique for Detecting Plagiarism in Computer Code , 2005, Comput. J..

[4]  Xiaochun Cao,et al.  Identifying Image Composites Through Shadow Matte Consistency , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[6]  Zhiyong Zhang Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.

[7]  Hany Farid,et al.  Digital doctoring: how to tell the real from the fake , 2006 .

[8]  Hagit Hel-Or,et al.  Shadow Removal Using Intensity Surfaces and Texture Anchor Points , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[9]  Kanliang Wang,et al.  A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.

[10]  George A. F. Seber,et al.  Linear regression analysis , 1977 .

[11]  Zhiyong Zhang,et al.  Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .

[12]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[13]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[14]  Harry Shum,et al.  Natural shadow matting , 2007, TOGS.

[15]  Tim Weyrich,et al.  Principles of appearance acquisition and representation , 2007, SIGGRAPH '08.

[16]  Xiaochun Cao,et al.  Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map , 2012, IEEE Transactions on Information Forensics and Security.

[17]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[18]  Mark S. Drew,et al.  Removing Shadows from Images , 2002, ECCV.

[19]  Thomas Ertl,et al.  Hierarchical Solutions for the Deformable Surface Problem in Visualization , 2000, Graph. Model..

[20]  Fred L. Bookstein,et al.  Principal Warps: Thin-Plate Splines and the Decomposition of Deformations , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[21]  Jiejie Zhu,et al.  Learning to recognize shadows in monochromatic natural images , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[22]  Min Wu,et al.  Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images , 2009, IEEE Transactions on Information Forensics and Security.

[23]  Cheng Lu,et al.  Entropy Minimization for Shadow Removal , 2009, International Journal of Computer Vision.

[24]  Hagit Hel-Or,et al.  Texture-Preserving Shadow Removal in Color Images Containing Curved Surfaces , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[25]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[26]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[27]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[28]  Hany Farid,et al.  Detecting Photographic Composites of People , 2008, IWDW.

[29]  Martin D. Levine,et al.  Removing shadows , 2005, Pattern Recognit. Lett..

[30]  Xiaochun Cao,et al.  Detecting photographic composites using shadows , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[31]  Bernhard Schölkopf,et al.  A tutorial on support vector regression , 2004, Stat. Comput..

[32]  Babak Mahdian,et al.  A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..

[33]  Norman I. Badler,et al.  Generating soft shadows with a depth buffer algorithm , 1984, IEEE Computer Graphics and Applications.

[34]  Jianfeng Ma,et al.  Security and Trust in Digital Rights Management: A Survey , 2009, Int. J. Netw. Secur..

[35]  Ingemar J. Cox,et al.  Normalized Energy Density-Based Forensic Detection of Resampled Images , 2012, IEEE Transactions on Multimedia.

[36]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[37]  Fei Peng,et al.  A complete passive blind image copy-move forensics scheme based on compound statistics features. , 2011, Forensic science international.

[38]  Ronen Basri,et al.  Lambertian reflectance and linear subspaces , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[39]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[40]  Primack,et al.  Penumbra diffraction in the quantization of dispersing billiards. , 1995, Physical review letters.