Statistical and geometric methods for passive-blind image forensics

Passive-blind image forensics (PBIF) refers to passive ways for evaluating image authenticity and detecting fake images. This dissertation proposes a physics-based approach for PBIF, with our definition of image authenticity derived from the image generative process comprising the 3D scene and the image acquisition device. We propose one statistical method and two geometric methods for capturing the image authenticity properties and addressing three separate problems in PBIF, i.e., detecting spliced images, distinguishing photographic images from photorealistic computer graphics, and estimating camera response function (CRF) from a single image. For image splicing detection, we show a statistical method for capturing the optical low-pass property of cameras. Through analysis on a proposed model of image splicing, we can explain the bicoherence response to image splicing better than the conventional quadratic phase coupling theory. Furthermore, we propose incorporating image-content-related features to improve the performance of image splicing detection. For distinguishing photographic images from photorealistic computer graphics, we propose a geometric method for capturing the properties of the object geometry, the object surface reflectance, and the CRF. The resulting geometry feature not only provides an intuitive understanding on how photographic images are different from photorealistic computer graphics, it also classifies the two types of images better than the wavelet characteristic feature and the features derived from modeling general computer graphics. For the work on CRF estimation, we propose a geometric method based on geometric invariants for estimating CRF from a single-color-channel image. We provide an extensive analysis of the method and also propose a generalized gamma curve CRF model.

[1]  J.W.A. Fackrell,et al.  The higher-order statistics of speech signals , 1994 .

[2]  Shree K. Nayar,et al.  The World in an Eye , 2004, CVPR.

[3]  C. Sparrow The Fractal Geometry of Nature , 1984 .

[4]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[5]  Wei Su,et al.  Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition , 2006, IWDW.

[6]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[7]  Harry Shum,et al.  Review of image-based rendering techniques , 2000, Visual Communications and Image Processing.

[8]  Shih-Fu Chang,et al.  A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[9]  Ilaria Venturini Counteracting Oracle attacks , 2004, MM&Sec '04.

[10]  William T. Freeman,et al.  Learning Low-Level Vision , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[11]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[12]  John M. Lee Introduction to Smooth Manifolds , 2002 .

[13]  Alex Pentland,et al.  On describing complex surface shapes , 1986, Image Vis. Comput..

[14]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[15]  John R. Smith,et al.  Normalized classifier fusion for semantic visual concept detection , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[16]  Lars Kai Hansen,et al.  Neural Network Ensembles , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[17]  Max A. Viergever,et al.  Scale and the differential structure of images , 1992, Image Vis. Comput..

[18]  D J Field,et al.  Relations between the statistics of natural images and the response properties of cortical cells. , 1987, Journal of the Optical Society of America. A, Optics and image science.

[19]  Hany Farid,et al.  Detecting Digital Forgeries Using Bispectral Analysis , 1999 .

[20]  Hany Farid,et al.  Blind inverse gamma correction , 2001, IEEE Trans. Image Process..

[21]  C. Frankel,et al.  Distinguishing photographs and graphics on the World Wide Web , 1997, 1997 Proceedings IEEE Workshop on Content-Based Access of Image and Video Libraries.

[22]  Heung-Yeung Shum,et al.  Radiometric calibration from a single image , 2004, CVPR 2004.

[23]  Isaac Weiss,et al.  Smoothed differentiation filters for images , 1990, [1990] Proceedings. 10th International Conference on Pattern Recognition.

[24]  Mohan S. Kankanhalli,et al.  Robust image authentication using content based compression , 2003, Multimedia Systems.

[25]  Nasir Memon,et al.  Authentication techniques for multimedia content , 1999, Other Conferences.

[26]  Chih-Jen Lin,et al.  A Practical Guide to Support Vector Classication , 2008 .

[27]  Mahalingam Ramkumar,et al.  A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[28]  Donald P. Greenberg,et al.  An experimental evaluation of computer graphics imagery , 1986, TOGS.

[29]  F. E. Nicodemus,et al.  Geometrical considerations and nomenclature for reflectance , 1977 .

[30]  Luc Van Gool,et al.  Affine/ Photometric Invariants for Planar Intensity Patterns , 1996, ECCV.

[31]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[32]  Arjen P. de Vries,et al.  Detecting cartoons: a case study in automatic video-genre classification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[33]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[34]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[35]  Shih-Fu Chang,et al.  Columbia Photographic Images and Photorealistic Computer Graphics Dataset , 2005 .

[36]  C. L. Nikias,et al.  Higher-order spectra analysis : a nonlinear signal processing framework , 1993 .

[37]  Brendan J. Frey,et al.  Unsupervised image translation , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[38]  Jitendra Malik,et al.  Recovering high dynamic range radiance maps from photographs , 1997, SIGGRAPH.

[39]  Guillermo Sapiro,et al.  Navier-stokes, fluid dynamics, and image and video inpainting , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[40]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[41]  Min Wu,et al.  Image Tampering Identification using Blind Deconvolution , 2006, 2006 International Conference on Image Processing.

[42]  Ron Kimmel,et al.  A general framework for low level vision , 1998, IEEE Trans. Image Process..

[43]  Rafael C. González,et al.  Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[44]  Shih-Fu Chang,et al.  Visually Searching the Web for Content , 1997, IEEE Multim..

[45]  Brian A. Wandell,et al.  Preferred color spaces for white balancing , 2003, IS&T/SPIE Electronic Imaging.

[46]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[47]  L. Rudin,et al.  Nonlinear total variation based noise removal algorithms , 1992 .

[48]  Eero P. Simoncelli Modeling the joint statistics of images in the wavelet domain , 1999, Optics & Photonics.

[49]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[50]  Shih-Fu Chang,et al.  Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[51]  Thomas G. Dietterich Multiple Classifier Systems , 2000, Lecture Notes in Computer Science.

[52]  Mohamed F. Mansour,et al.  Secure watermark detection with nonparametric decision boundaries , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[53]  Carl de Boor,et al.  A Practical Guide to Splines , 1978, Applied Mathematical Sciences.

[54]  Eero P. Simoncelli,et al.  On Advances in Statistical Modeling of Natural Images , 2004, Journal of Mathematical Imaging and Vision.

[55]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.

[56]  Hany Farid,et al.  Digital Image Ballistics from JPEG Quantization , 2006 .

[57]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[58]  Luo Wei,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .

[59]  Guillermo Sapiro,et al.  Video inpainting of occluding and occluded objects , 2005, IEEE International Conference on Image Processing 2005.

[60]  Junfeng He,et al.  Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.

[61]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[62]  Stephen Lin,et al.  Determining the radiometric response function from a single grayscale image , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[63]  Shih-Fu Chang,et al.  An online system for classifying computer graphics images from natural photographs , 2006, Electronic Imaging.

[64]  Shree K. Nayar,et al.  What is the space of camera response functions? , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..

[65]  Guillermo Sapiro,et al.  Image inpainting , 2000, SIGGRAPH.

[66]  Shree K. Nayar,et al.  Radiometric self calibration , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[67]  Steve Mann,et al.  Comparametric equations with practical applications in quantigraphic image processing , 2000, IEEE Trans. Image Process..

[68]  Steven M. Seitz,et al.  Photo tourism: exploring photo collections in 3D , 2006, ACM Trans. Graph..

[69]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[70]  John M. Lee Riemannian Manifolds: An Introduction to Curvature , 1997 .

[71]  Takeo Kanade,et al.  Statistical calibration of CCD imaging process , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[72]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[73]  Ying Wang,et al.  On Discrimination between Photorealistic and Photographic Images , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[74]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[75]  Shih-Fu Chang,et al.  Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.

[76]  Isaac Weiss Noise-Resistant Invariants of Curves , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[77]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[78]  Shih-Fu Chang,et al.  A Data Set of Authentic and Spliced Image Blocks , 2004 .

[79]  Alexei A. Efros,et al.  Image quilting for texture synthesis and transfer , 2001, SIGGRAPH.

[80]  Ravi Ramamoorthi,et al.  A Theory of Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency , 2006, ECCV.

[81]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[82]  Olivier D. Faugeras,et al.  Robust and fast computation of unbiased intensity derivatives in images , 1992, ECCV.

[83]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[84]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[85]  T. C. Huang,et al.  Engineering Mechanics, Volume 2: Dynamics , 1967 .

[86]  Kim Steenstrup Pedersen,et al.  The Nonlinear Statistics of High-Contrast Patches in Natural Images , 2003, International Journal of Computer Vision.

[87]  Wei Su,et al.  Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.

[88]  Stanley Osher,et al.  Modeling Textures with Total Variation Minimization and Oscillating Patterns in Image Processing , 2003, J. Sci. Comput..

[89]  Nasir D. Memon,et al.  Distortion-bounded authentication techniques , 2000, Electronic Imaging.

[90]  G. Krieger,et al.  Higher-order statistics of natural images and their exploitation by operators selective to intrinsic dimensionality , 1997, Proceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics.

[91]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[92]  Shih-Fu Chang,et al.  Classifying Photographic and Photorealistic Computer Graphic Images using Natural Image Statistics , 2006 .

[93]  Tomas Akenine-Möller,et al.  Real-time rendering , 1997 .

[94]  Thomas L. Friedman,et al.  The world is flat : the globalized world in the twenty-first century , 2006 .

[95]  Tom E. Bishop,et al.  Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[96]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[97]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[98]  E. Powers,et al.  Digital Bispectral Analysis and Its Applications to Nonlinear Wave Interactions , 1979, IEEE Transactions on Plasma Science.

[99]  Nassib G. Chamoun,et al.  An introduction to bispectral analysis for the electroencephalogram , 1994, Journal of Clinical Monitoring.

[100]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[101]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).