Shadow Removal Detection and Localization for Forensics Analysis

The recent advancements in image processing and computer vision allow realistic photo manipulations. In order to avoid the distribution of fake imagery, the image forensics community is working towards the development of image authenticity verification tools. Methods based on shadow analysis are particularly reliable since they are part of the physical integrity of the scene, thus detecting forgeries is possible whenever inconsistencies are found (e.g., shadows not coherent with the light direction). An attacker can easily delete inconsistent shadows and replace them with correctly cast shadows in order to fool forensics detectors based on physical analysis. In this paper, we propose a method to detect shadow removal done with state-of-the-art tools. The proposed method is based on a conditional generative adversarial network (cGAN) specifically trained for shadow removal detection.

[1]  Marc Chaumont,et al.  Camera model identification with the use of deep convolutional neural networks , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[2]  A. Piva An Overview on Image Forensics , 2013 .

[3]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Anthony Hoogs,et al.  Reflection correspondence for exposing photograph manipulation , 2017, 2017 IEEE International Conference on Image Processing (ICIP).

[5]  Paolo Bestagini,et al.  Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[6]  James F. O'Brien,et al.  Exposing photo manipulation with inconsistent shadows , 2013, TOGS.

[7]  Le Hui,et al.  Stacked Conditional Generative Adversarial Networks for Jointly Learning Shadow Detection and Shadow Removal , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[8]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[9]  Derek Hoiem,et al.  Paired Regions for Shadow Detection and Removal , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Yiannis Kompatsiaris,et al.  Large-scale evaluation of splicing localization algorithms for web images , 2017, Multimedia Tools and Applications.

[11]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.

[12]  Paolo Bestagini,et al.  Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks , 2017, J. Vis. Commun. Image Represent..

[13]  Shujun Li,et al.  Forensic Camera Model Identification , 2015 .

[14]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[15]  Milan Tuba,et al.  Digital image forgery detection based on shadow HSV inconsistency , 2017, 2017 5th International Symposium on Digital Forensic and Security (ISDFS).

[16]  Davide Cozzolino,et al.  A feature-based approach for image tampering detection and localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[17]  Xiaochun Cao,et al.  Identifying Image Composites Through Shadow Matte Consistency , 2011, IEEE Transactions on Information Forensics and Security.

[18]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[19]  David Vazquez-Padin,et al.  Prefilter design for forensic resampling estimation , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[20]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[21]  Paolo Bestagini,et al.  Multi-Clue Image Tampering Localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[22]  Han Gong,et al.  Interactive Shadow Removal and Ground Truth for Variable Scene Categories , 2014, BMVC.

[23]  Shaziya .P.S. Khan,et al.  Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .

[24]  Anderson Rocha,et al.  Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.

[25]  Han Gong,et al.  User-aided single image shadow removal , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[26]  Narendra Ahuja,et al.  Shadow Removal Using Bilateral Filtering , 2012, IEEE Transactions on Image Processing.

[27]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[28]  Weidong Min,et al.  Exposing Image Forgery by Detecting Consistency of Shadow , 2014, TheScientificWorldJournal.

[29]  Matthias Kirchner,et al.  Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.

[30]  Alexei A. Efros,et al.  Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).