Methods for detecting manipulations in 3D scan data

Abstract While interest in using 3D scanning technology for crime scene investigation (CSI) has grown in recent years, a number of barriers still remain that prevent its wide adoption in the criminal justice system. One such barrier comes from the lack of tools that can validate a 3D scan and verify that it has not been manipulated. While a great deal of research has gone into the detection of manipulations for 2D images, the detection of manipulations for 3D scenes has yet to be fully realized. This paper introduces a series of techniques to detect if a 3D point cloud generated from a LiDAR scan has been subsequently manipulated. These techniques exploit fundamental structures inherent in the collection and storage of these types of data. While the proposed techniques are able to detect a number of different types of manipulations, their limitations are also discussed. The goal of this work is to provide a foundation for the creation of a validation toolkit that can ensure 3D scan data is valid and unaltered.

[1]  Jeng-Shyang Pan,et al.  A Reversible Data Hiding Scheme for 3D Point Cloud Model , 2006, 2006 IEEE International Symposium on Signal Processing and Information Technology.

[2]  Luigi Barazzetti,et al.  3D scanning and imaging for quick documentation of crime and accident scenes , 2012, Defense + Commercial Sensing.

[3]  E. Mikhail,et al.  Introduction to modern photogrammetry , 2001 .

[4]  Michael Wimmer,et al.  Out-of-core selection and editing of huge point clouds , 2011, Comput. Graph..

[5]  James F. O'Brien,et al.  Exposing photo manipulation with inconsistent shadows , 2013, TOGS.

[6]  Hany Farid,et al.  Photo Fakery and Forensics , 2009, Adv. Comput..

[7]  L. Dawson,et al.  Criminal and Environmental Soil Forensics , 2009 .

[8]  Michael J Thali,et al.  Accident or homicide--virtual crime scene reconstruction using 3D methods. , 2013, Forensic science international.

[9]  Ryutarou Ohbuchi,et al.  Watermarking a 3D shape model defined as a point set , 2003, 2004 International Conference on Cyberworlds.

[10]  Donald Meagher,et al.  Geometric modeling using octree encoding , 1982, Comput. Graph. Image Process..

[11]  Maurizio Seracini,et al.  2D open-source editing techniques for 3D laser scans , 2013 .

[12]  Hany Farid,et al.  Digital image forensics. , 2008, Scientific American.

[13]  Neal Krawetz Digital Photo Forensics , 2015 .

[14]  Hans-Peter Seidel,et al.  Processing and interactive editing of huge point clouds from 3D scanners , 2008, Comput. Graph..

[15]  H. Farid Photo Forensics , 2016 .

[16]  H. Farid How to Detect Faked Photos , 2017 .

[17]  Michael Wand,et al.  Interactive Editing of Large Point Clouds , 2007, PBG@Eurographics.

[18]  Daniel G. Aliaga,et al.  Procedural Editing of 3D Building Point Clouds , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).