The 1996 Child Pornography Prevention Act (CPPA) extended the existing federal criminal laws against child pornography to include certain types of “virtual porn”. In 2002, the United States Supreme Court found that portions of the CPPA, being overly broad and restrictive, violated First Amendment rights. The Court ruled that images containing an actual minor or portions of a minor are not protected, while computer generated images depicting a fictitious “computer generated” minor are constitutionally protected. In this report I outline various forms of digital tampering, placing them in the context of this recent ruling. I also review computational techniques for detecting doctored and virtual (computer generated) images. Hany Farid, 6211 Sudikoff Lab, Computer Science Department, Dartmouth College, Hanover, NH 03755 USA (email: farid@cs.dartmouth.edu; tel/fax: 603.646.2761/603.646.1672). This work was supported by an Alfred P. Sloan Fellowship, a National Science Foundation CAREER Award (IIS-99-83806), a departmental National Science Foundation Infrastructure Grant (EIA-98-02068), and under Award No. 2000-DT-CS-K001 from the Office for Domestic Preparedness, U.S. Department of Homeland Security (points of view in this document are those of the author and do not necessarily represent the official position of the U.S. Department of Homeland Security).
[1]
Hany Farid,et al.
Detecting hidden messages using higher-order statistical models
,
2002,
Proceedings. International Conference on Image Processing.
[2]
Siwei Lyu,et al.
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
,
2002,
Information Hiding.
[3]
Siwei Lyu,et al.
Higher-order Wavelet Statistics and their Application to Digital Forensics
,
2003,
2003 Conference on Computer Vision and Pattern Recognition Workshop.
[4]
Siwei Lyu,et al.
Steganalysis using color wavelet statistics and one-class support vector machines
,
2004,
IS&T/SPIE Electronic Imaging.
[5]
Hany Farid,et al.
Statistical Tools for Digital Forensics
,
2004,
Information Hiding.
[6]
Hany Farid,et al.
Exposing digital forgeries by detecting traces of resampling
,
2005,
IEEE Transactions on Signal Processing.
[7]
Alin C. Popescu,et al.
Exposing digital forgeries in color filter array interpolated images
,
2005,
IEEE Transactions on Signal Processing.
[8]
Siwei Lyu,et al.
How realistic is photorealistic?
,
2005,
IEEE Transactions on Signal Processing.