Photo Forensics from Partial Constraints

نویسندگان

  • D. Devin Balkcom
  • Michael Black
  • D. Lorenzo Torresani
چکیده

A variety of forensic methods have been developed to identify falsified photos, each unified by the ability to estimate and detect properties of a photo that are perturbed by forgery. There exist, however, many photos in which the required properties cannot be estimated. We present an approach to detect forgery in these photos. We use this approach to detect physically inconsistent shadows and shading in photos for which it is not possible to estimate the associated lighting properties. Specifically, we develop a method to detect inconsistent shadows cast by point and area light sources when a strict shadow-to-object correspondence cannot be estimated. We further develop a method to detect inconsistencies between shadows and the shading on objects when object geometry is only partially known, and when objects are photographed under unknown perspective. We conclude by describing prior methods that can be generalized to analyze photos in which estimation is not possible.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

High-Quality Facial Photo-Sketch Synthesis Using Multi-Adversarial Networks

Synthesizing face sketches from real photos and its inverse are well studied problems and they have many applications in digital forensics and entertainment. However, photo/sketch synthesis remains a challenging problem due to the fact that photo and sketch have different characteristics. In this work, we consider this task as an image-to-image translation problem and explore the recently popul...

متن کامل

Photo Fakery and Forensics

Photographs can no longer be trusted. From the tabloid magazines to the fashion industry, mainstream media outlets, political campaigns, and the photo hoaxes that land in our email in-boxes, doctored photographs are appearing with a growing frequency and sophistication. I will briefly describe the impact of all of this photographic tampering and recent technological advances that have the poten...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Anti-Forensics of Photo Response Non-Uniformity of Digital Images

The digital image processing is to be used in Antiforensics of photo response non-uniformity of digital images. Fingerprints are one of those irregular twists of nature. The fingerprints are used for authentication and identification processes in forensic tasks such as detection of digital forgeries. Forensic tasks can to be performed in device identification problem, device linking problem, fi...

متن کامل

A Statistical Prior for Photo Forensics: Object Removal

If we consider photo forensics within a Bayesian framework, then the probability that an image has been manipulated given the results of a forensic test can be expressed as a product of a likelihood term (the probability of a forensic test detecting manipulation given that an image was manipulated) and a prior term (the probability that an image was manipulated). Despite the success of many for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013