A vision-based fully automated approach to robust image cropping detection

Abstract The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content that is quite insensitive to image processing operations, such as compression and resizing, typical of social media platforms. Robust computer vision techniques are employed throughout, so as to cope with large sources of noise in the data and improve detection performance. The method leverages a novel metric based on robust statistics, and is also capable to decide autonomously whether the image at hand is tractable or not. The results of an extensive experimental evaluation covering several cropping scenarios demonstrate the effectiveness and robustness of our approach.

[1]  Alan L. Yuille,et al.  Manhattan World: compass direction from a single image by Bayesian inference , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[2]  Hany Farid,et al.  Detecting Photographic Composites of People , 2008, IWDW.

[3]  Horst Bischof,et al.  Online Auto-Calibration in Man-Made Worlds , 2005, Digital Image Computing: Techniques and Applications (DICTA'05).

[4]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  M. Isard,et al.  Automatic Camera Calibration from a Single Manhattan Image , 2002, ECCV.

[6]  Mohamed Deriche,et al.  A bibliography of pixel-based blind image forgery detection techniques , 2015, Signal Process. Image Commun..

[7]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Marco Fontani,et al.  VISION: a video and image dataset for source identification , 2017, EURASIP Journal on Information Security.

[9]  Alessandro Piva,et al.  Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[11]  Bernhard P. Wrobel,et al.  Multiple View Geometry in Computer Vision , 2001 .

[12]  Yiannis Kompatsiaris,et al.  Detecting image splicing in the wild (WEB) , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[13]  Andrea Fusiello,et al.  Robust Multiple Structures Estimation with J-Linkage , 2008, ECCV.

[14]  Bin Li,et al.  Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Alberto Del Bimbo,et al.  Camera Calibration with Two Arbitrary Coaxial Circles , 2006, ECCV.

[16]  Talmage James Reid,et al.  Geometry, Perspective Drawing, and Mechanisms , 2011 .

[17]  Hany Farid,et al.  Exposing photo manipulation from user-guided 3D lighting analysis , 2015, Electronic Imaging.

[18]  Eric Maisel,et al.  Using vanishing points for camera calibration and coarse 3D reconstruction from a single image , 2000, The Visual Computer.

[19]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[20]  Tarun Kumar,et al.  Towards recent developments in the field of digital image forgery detection , 2018, Int. J. Comput. Appl. Technol..

[21]  James H. Elder,et al.  Efficient Edge-Based Methods for Estimating Manhattan Frames in Urban Imagery , 2008, ECCV.

[22]  Xinxin Niu,et al.  Exposing photo manipulation with inconsistent perspective geometry , 2014 .

[23]  Jean-Philippe Tardif,et al.  Non-iterative approach for fast and accurate vanishing point detection , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[24]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[25]  Hongbin Zha,et al.  Simultaneous Vanishing Point Detection and Camera Calibration from Single Images , 2010, ISVC.

[26]  Jing Dong,et al.  Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[27]  Christian Riess,et al.  Exposing Digital Image Forgeries by Illumination Color Classification , 2013, IEEE Transactions on Information Forensics and Security.

[28]  Manuel Menezes de Oliveira Neto,et al.  Image forgery detection confronts image composition , 2017, Comput. Graph..

[29]  Nenghai Yu,et al.  Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..

[30]  Meng,et al.  Detecting Photographic Cropping Based on Vanishing Points , 2013 .

[31]  A. Piva An Overview on Image Forensics , 2013 .

[32]  James F. O'Brien,et al.  Exposing photo manipulation with inconsistent shadows , 2013, TOGS.

[33]  Maureen T. Carroll Geometry , 2017 .

[34]  Sebastiano Battiato,et al.  Crop Detection through Blocking Artefacts Analysis , 2011, ICIAP.

[35]  Xinpeng Zhang,et al.  Detecting Image Forgery Using Perspective Constraints , 2012, IEEE Signal Processing Letters.

[36]  Vinod Pankajakshan,et al.  A JPEG blocking artifact detector for image forensics , 2018, Signal Process. Image Commun..

[37]  H. Farid A Survey of Image Forgery Detection , 2008 .

[38]  Alessandro Piva,et al.  Image splicing detection based on general perspective constraints , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[39]  Richard Szeliski,et al.  Computer Vision - Algorithms and Applications , 2011, Texts in Computer Science.

[40]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[41]  Alessandro Piva,et al.  Reliability assessment of principal point estimates for forensic applications , 2017, J. Vis. Commun. Image Represent..

[42]  Zhengyou Zhang,et al.  A Flexible New Technique for Camera Calibration , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[43]  Vincent Charvillat,et al.  The toulouse vanishing points dataset , 2015, MMSys.

[44]  Wei Wang,et al.  Image Forensics Based on Planar Contact Constraints of 3D Objects , 2018, IEEE Transactions on Information Forensics and Security.