Detecting Image Forgeries using Geometric Cues

This chapter presents a framework for detecting fake regions by using various methods including watermarking technique and blind approaches. In particular, we describe current categories on blind approaches which can be divided into five: pixel-based techniques, format-based techniques, camera-based techniques, physically-based techniques and geometric-based techniques. Then we take a second look on the geometric-based techniques and further categorize them in detail. In the following section, the state-of-the-art methods involved in the geometric technique are elaborated.

[1]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[2]  Hany Farid,et al.  Video Stabilization and Enhancement , 2007 .

[3]  Hany Farid,et al.  The specificity of the search template. , 2009, Journal of vision.

[4]  Xiaochun Cao,et al.  Single view compositing with shadows , 2005, The Visual Computer.

[5]  Dimitrios I. Fotiadis,et al.  Intravascular Imaging: Current Applications and Research Developments , 2011 .

[6]  S J Hickman,et al.  Seeing is not Believing , 2012 .

[7]  Ron Graham,et al.  Digital Imaging , 2003 .

[8]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[9]  Konstantinos Toutouzas,et al.  Research and Clinical Utility of Thermography , 2012 .

[10]  H. Farid A Survey of Image Forgery Detection , 2008 .

[11]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[12]  Min Wu,et al.  Noise Features for Image Tampering Detection and Steganalysis , 2007, 2007 IEEE International Conference on Image Processing.

[13]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[14]  Xiaochun Cao,et al.  Detecting photographic composites using shadows , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[15]  Nasir D. Memon,et al.  Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.

[16]  Micah K. Johnson,et al.  Lighting and optical tools for image forensics , 2007 .

[17]  Xiaochun Cao,et al.  Camera Calibration Using Symmetric Objects , 2006, IEEE Transactions on Image Processing.

[18]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[19]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[20]  Mary J. Bravo,et al.  Training determines the target representation for search , 2010 .

[21]  I. Reid,et al.  Single view metrology , 1999, ICCV 1999.

[22]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.

[23]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[24]  J. Fridrich,et al.  Digital image forensics , 2009, IEEE Signal Processing Magazine.

[25]  C. E. Springer,et al.  Geometry and Analysis of Projective Spaces , 1967 .

[26]  D Kersten,et al.  Moving Cast Shadows Induce Apparent Motion in Depth , 1997, Perception.

[27]  Farhad Soleimanian Gharehchopogh,et al.  A Novel Approach for Edge Detection in Images Based on Cellular Learning Automata , 2012, Int. J. Comput. Vis. Image Process..

[28]  Weihong Wang,et al.  Digital video forensics , 2009 .

[29]  Xiaochun Cao,et al.  Detecting photographic composites using two-view geometrical constraints , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[30]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[31]  Hany Farid,et al.  Photo Fakery and Forensics , 2009, Adv. Comput..

[32]  Mahalingam Ramkumar,et al.  A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[33]  H. Farid Digital Doctoring: can we trust photographs? , 2007 .

[34]  Weihong Wang,et al.  Detecting Re-projected Video , 2008, Information Hiding.

[35]  Wei Su,et al.  Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.

[36]  Ekta Walia,et al.  Fast and High Capacity Digital Image Watermarking Technique Based on Phase of Zernike Moments , 2012, Int. J. Comput. Vis. Image Process..

[37]  E. Bruce Goldstein,et al.  Encyclopedia of perception , 2010 .

[38]  Jan Lukás,et al.  Determining digital image origin using sensor imperfections , 2005, IS&T/SPIE Electronic Imaging.

[39]  Xiaochun Cao,et al.  Video synchronization and its application to object transfer , 2010, Image Vis. Comput..

[40]  Andrew Zisserman,et al.  Metric rectification for perspective images of planes , 1998, Proceedings. 1998 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No.98CB36231).

[41]  M. McPeek,et al.  Modeling Three-Dimensional Morphological Structures Using Spherical Harmonics , 2009, Evolution; international journal of organic evolution.

[42]  Hongmei Liu,et al.  Feature based watermarking scheme for image authentication , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[43]  Shih-Fu Chang,et al.  A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[44]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double quantization , 2009, MM&Sec '09.

[45]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[46]  Shih-Fu Chang,et al.  Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[47]  Zhanyi Hu,et al.  Single view metrology from scene constraints , 2005, Image Vis. Comput..

[48]  Khalid Idrissi,et al.  A Semi-Supervised Metric Learning for Content-Based Image Retrieval , 2011, Int. J. Comput. Vis. Image Process..

[49]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[50]  Siwei Lyu,et al.  How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.

[51]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[52]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[53]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[54]  Bernhard P. Wrobel,et al.  Multiple View Geometry in Computer Vision , 2001 .

[55]  Hany Farid,et al.  THE CORRELATED EVOLUTION OF THREE-DIMENSIONAL REPRODUCTIVE STRUCTURES BETWEEN MALE AND FEMALE DAMSELFLIES , 2009, Evolution; international journal of organic evolution.

[56]  Richard H Wiggins,et al.  Digital imaging. , 2003, Seminars in ultrasound, CT, and MR.

[57]  Hany Farid,et al.  Detecting Photographic Composites of People , 2008, IWDW.

[58]  Xiaochun Cao,et al.  Camera calibration and light source orientation from solar shadows , 2007, Comput. Vis. Image Underst..

[59]  Micah K. Johnson,et al.  Metric Measurements on a Plane from a Single Image , 2006 .

[60]  Mona Nafari,et al.  Reversible Data Hiding Based on Statistical Correlation of Blocked Sub-Sampled Image , 2012, Int. J. Comput. Vis. Image Process..

[61]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[62]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[63]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.