SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Detecting image splicing in the wild (Web)
Markos Zampoglou, Symeon Papadopoulos, Yiannis Kompatsiaris
1Centre for Research and Technology Hellas (CERTH) – Information Technologies Institute (ITI)
WeMuV2015 workshop, ICME, June 29, 2015, Turin, Italy
A new journalistic paradigm
#2
…and its pitfalls
Blind image splicing detection
• Assume the splice differs in some aspect from the
rest of the image
– Capture invisible “traces”: DCT coefficient distribution,
PRNU, CFA interpolation patterns…
• But traces degrade at subsequent image alterations
• Social media journalism establishes a different
paradigm from typical image forensics
– We don’t have the luxury of demanding we see the
originals
#3
Image tampering lifecycle
#4
Images in the wild
#5
• Twitter:
– Images larger than 2048×1024 are scaled down
– Large PNG files (> 3MB) converted to JPEG
– JPEG files resaved at quality 75
• Facebook
– Images larger than 2048 × 2048 are scaled down
– Large PNG files converted to JPEG
– JPEG files resaved at varying quality (~70-90)
• Both media platforms also erase metadata from
images
Existing image splicing datasets
#6
Name Format Masks #images
Columbia1 BMP grayscale No 933/912
Columbia Unc.2 TIFF Unc. Yes 183/180
CASIA TIDE v2.03 TIFF Unc. , JPEG, BMP No 7491/5123
VIPP Synthetic4 JPEG Yes 4800/4800
VIPP Realistic4 JPEG Manual 63/68
1http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm
2http://www.ee.columbia.edu/ln/dvmm/downloads/authsplcuncmp/
3http://forensics.idealtest.org:8080/indexopt_v2.php
4http://clem.dii.unisi.it/~vipp/index.php/imagerepository/129-a-framework-for-decision-fusion-in-
image-forensics-based-on-dempster-shafer-theory-of-evidence
Issues with existing datasets
#7
• Ground-truth masks: only Columbia Uncompressed and
VIPP offer binary masks
• Quality of splices: only CASIA and VIPP Realistic contain
realistic forgeries
• Image format: Only VIPP and CASIA offer JPEG images
– At least 87% of the common crawl corpus
(http://commoncrawl.org/) images are JPEG
– Out of 13,577 forged images collected in our investigations,
~95% were in JPEG format
• Neatness: All datasets contain first-level forgeries with
no further alterations
Collecting a dataset of Web forgeries
• Aim: build an evaluation framework with the web-
based case in mind
– Evaluate existing and future algorithms against the real-
world, web-based application scenario
– Assess the status of the web: how many versions of each
forgery, how close to the original
• Methodology: identify verified forgeries, and
exhaustively download as many instances as possible
for analysis
#8
The Wild Web Dataset (1/5)
• Identified 82 cases of confirmed forgeries
#9
The Wild Web Dataset (2/5)
• Collected all detectable instances of each case
• Removed exact file duplicates
• 13,577 images in total
• Identified and removed heavily altered variants of
each case
#10
The Wild Web Dataset (3/5)
• By removing crops and post-splices, we were left
with 9,751 images
• Variants within cases were separated, and the
sources were gathered where possible
#11
The Wild Web Dataset (4/5)
• Designed ground-truth binary masks for each sub-
case corresponding to each possible forgery step (for
complex forgeries)
#12
The Wild Web Dataset (5/5)
#13
• The final dataset by the numbers:
– 82 cases of forgeries
– 92 forgery variants
– 101 unique masks
– 13,577 images total
– 9,751 images resembling the original forgery
• For each of the 82 cases, a match on any mask of any
variant should be considered an overall success
Experimental evaluations
#14
• Emulated real-world conditions: we applied the
minimum typical transformations (JPEG resave &
rescaling) to the datasets compatible with the task:
– Columbia Uncompressed
– VIPP Synthetic
– VIPP Realistic
– Set 1: JPEG recompression at Quality 75
– Set 2: rescale to 75% size followed JPEG recompression at
Quality 75
Reconsidering evaluation protocols (1/3)
#15
• Forgery localization algorithms typically produce a
value map
• Ground truth takes the form of a binary mask
signifying the tampered area
• Past approaches compare values under the mask to
the rest of the image:
– Kolmogorov-Smirnov (KS) statistic (Farid et al, 2009)
– Median value (Fontani et al, 2013)
Reconsidering evaluation protocols (2/3)
#16
• A recompressed image from VIPP Realistic, analyzed
using (Lin et al, 2009)
• This would be considered a good detection under
typical methodologies
– Median under mask: ~0.93
– Median outside mask: ~0.02
– K-S Statistic: ~0.41
• Any human evaluator would disagree
#17
Reconsidering evaluation protocols (3/3)
Proposed evaluation protocol (1/2)
#18
1. Take the output value map
2. Binarize according to some method-appropriate
threshold
– e.g. 0.5 for probabilistic methods
3. Compare the binary map to the ground truth mask:
4. Values above an experimental threshold (0.65)
suggest a strong match
𝐸 𝐴, 𝑀 =
𝐴 ∩ 𝑀 2
𝐴 × 𝑀
Proposed evaluation protocol (2/2)
#19
• Adapt to mimic a human’s perspective:
1. Apply multiple morphological processing operations
2. Try multiple (method-appropriate) thresholds
3. Keep the best-fitting result (bias towards success)
• For non-spliced images (true negative/false positive
detection), apply the same methodology and declare
a success for a blank binary map
– Main disadvantage: binary outcome, no parameters to
tweak for ROC curve generation.
Evaluations
#20
• Evaluated seven algorithms:
– Double JPEG quantization (Lin et al, 2009), (Bianchi et al,
2011), (Bianchi et al, 2012a)
– Non-Aligned double JPEG quantization (Bianchi et al,
2012b)
– CFA artifacts (Ferrara et al, 2007)
– High-frequency DW noise (Mahdian et al, 2009)
– JPEG ghosts (Farid, 2010)
• Comparing median values:
Evaluation results: Emulated datasets (1/2)
#21
Dataset
(Lin et al,
2009)
(Bianchi et
al, 2011)
(Ferrara et
al, 2007)
(Bianchi
et al,
2012b)
(Bianchi
et al,
2012b)
(Mahdian
et al,
2009)
Columbia
Uncomp.
Orig.
JPEG
Resized
- -
0.89 (0.05)
0.05 (0.05)
0.03 (0.04)
- -
0.39 (0.04)
0.09 (0.05)
0.11 (0.05)
VIPP
Synthetic
Orig.
JPEG
Resized
0.47 (0.05)
0.30 (0.04)
0.05 (0.05)
0.51 (0.05)
0.43 (0.04)
0.05 (0.05)
0.15 (0.05)
0.16 (0.05)
0.05 (0.04)
0.57 (0.01)
0.39 (0.05)
0.05 (0.05)
0.28 (0.05)
0.16 (0.05)
0.05 (0.05)
0.13 (0.05)
0.10 (0.05)
0.06 (0.05)
VIPP
Realistic
Orig.
JPEG
Resized
0.54 (0.04)
0.32 (0.04)
0.13 (0.04)
0.58 (0.04)
0.36 (0.04)
0.12(0.06)
0.04 (0.04)
0.04 (0.04)
0.03 (0.04)
0.70 (0.04)
0.51 (0.04)
0.23 (0.04)
0.28 (0.04)
0.17 (0.04)
0.17 (0.04)
0.20 (0.04)
0.20 (0.04)
0.18 (0.04)
• Proposed evaluation framework:
Evaluation results: Emulated datasets (2/2)
#22
Dataset
(Lin et al,
2009)
(Bianchi et
al, 2011)
(Ferrara et
al, 2007)
(Bianchi
et al,
2012b)
(Bianchi
et al,
2012b)
(Mahdian
et al,
2009)
Columbia
Uncomp.
Orig.
JPEG
Resized
- -
0.66 (0.16)
0.00 (0.20)
0.00 (0.24)
- -
0.12 (0.57)
0.02 (0.86)
0.04 (0.79)
VIPP
Synthetic
Orig.
JPEG
Resized
0.44 (0.27)
0.26 (0.30)
0.00 (0.23)
0.52 (0.00)
0.30 (0.10)
0.00 (0.00)
0.01 (0.23)
0.01 (0.28)
0.00 (0.23)
0.58 (0.09)
0.23 (0.27)
0.00 (0.15)
0.04 (0.25)
0.01 (0.29)
0.00 (0.29)
0.04 (0.74)
0.04 (0.74)
0.00 (0.84)
VIPP
Realistic
Orig.
JPEG
Resized
0.41 (0.46)
0.13 (0.44)
0.00 (0.47)
0.38 (0.09)
0.17 (0.29)
0.00 (0.00)
0.09 (0.22)
0.00 (0.25)
0.00 (0.28)
0.23 (0.30)
0.14 (0.46)
0.03 (0.25)
0.03 (0.39)
0.01 (0.43)
0.01 (0.47)
0.04 (0.90)
0.02 (0.90)
0.01 (0.47)
Evaluation results: Emulated datasets (4/4)
#23
• Methods behave generally as expected
– CFA patterns destroyed by the first JPEG compression
• (Mahdian et al, 2009) is not particularly effective, but
shows little vulnerability to alterations
• DQ methods show some degree of robustness to
recompression only
• Rescaling is extremely disruptive, as expected
Evaluation results: Wild Web dataset (1/2)
#24
• 36 out of 82 cases were successfully detected by at
least one method
– Not a single image gave good results for the other 46
cases, for any algorithm
(Lin et
al, 2009)
(Bianchi et
al, 2011)
(Ferrara et
al, 2007)
(Bianchi et
al, 2012b)
(Bianchi et
al, 2012b)
(Mahdian
et al, 2009)
(Farid,
2010)
Detections 13 12 1 8 5 15 29
Unique 4 1 0 1 2 6 10
Evaluation results: Wild Web dataset (2/2)
#25
• The noise-based method of (Mahdian et al, 2009)
proved disproportionately successful,
– We should not forget how prone to false positives it is.
• JPEG Ghosts are very robust, if we can manage the
amount of output they produce
• Even in the cases where successful detection
occurred, only a few images were correctly detected
– 1386 images in the entire dataset (~ 14.3%)
– Excluding the three easiest classes, only 333 out of 8580
images were detected (~ 3.9%)
Forgery detection in the Wild (1/4)
#26
Forgery detection in the Wild (2/4)
#27
Forgery detection in the Wild (3/4)
#28
Forgery detection in the Wild (4/4)
#29
Conclusions
• In the web, very few images retain traces which are detectable
with today’s state-of-the-art forensic approaches
• It is difficult to estimate the relative age of each instance of a
viral image
• DQ-based methods give results with the highest confidence,
but are not particularly robust
• JPEG Ghosts demonstrate significantly higher robustness than
other methods, but produce large amounts of noisy output
• DW high-frequency noise also appears to give good results, but
seems extremely prone to false positives
#30
Future steps
• For the web journalism case, robustness ought to be a central
consideration for future algorithm evaluations
• The Wild Web dataset is freely distributed for research purposes
– Due to copyright considerations, this is currently only feasible through direct contact
– The dataset should be maintained to incorporate new cases of forgeries, as they
come out
• Advance the state-of-the-art by focusing on more robust traces of splicing
• Following the life-cycle of images on the web can help locate their earliest
versions and build an account of the alterations that have taken place
(Kennedy & Chang, 2008)
• The question remains: to what extent is the task feasible? When can we be
certain that all traces have been lost?
#31
References
#32
• Bianchi, Tiziano, Alessia De Rosa, and Alessandro Piva. "Improved DCT coefficient analysis for
forgery localization in JPEG images." In Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE
International Conference on, pp. 2444-2447. IEEE, 2011.
• Bianchi, Tiziano and Alessandro Piva, “Image forgery localization via block-grained analysis of JPEG
artifacts,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1003–1017,
2012.
• Ferrara, Pasquale, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. "Image forgery localization
via fine-grained analysis of cfa artifacts." Information Forensics and Security, IEEE Transactions on
7, no. 5 (2012): 1566-1577.
• Farid, Hany. "Exposing digital forgeries from JPEG ghosts." Information Forensics and Security, IEEE
Transactions on 4, no. 1 (2009): 154-160.
• Fontani, Marco, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni. "A framework
for decision fusion in image forensics based on dempster–shafer theory of evidence." Information
Forensics and Security, IEEE Transactions on 8, no. 4 (2013): 593-607.
• Kennedy, Lyndon, and Shih-Fu Chang. "Internet image archaeology: automatically tracing the
manipulation history of photographs on the web." In Proceedings of the 16th ACM international
conference on Multimedia, pp. 349-358. ACM, 2008.
• Lin, Zhouchen, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. "Fast, automatic and fine-grained
tampered JPEG image detection via DCT coefficient analysis." Pattern Recognition 42, no. 11
(2009): 2492-2501.
• Mahdian, Babak and Stanislav Saic, “Using noise inconsistencies for blind image forensics,” Image
and Vision Computing, vol. 27, no. 10, pp. 1497–1503, 2009.
Thank you!
• Slides:
http://www.slideshare.net/sympapadopoulos/detecting-image-splicing-
in-the-wild-web
• Get in touch:
@markzampoglou / markzampoglou@iti.gr
@sympapadopoulos / papadop@iti.gr
#33

Contenu connexe

Tendances

A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014SondosFadl
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainSondosFadl
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...IJMER
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationMostafa G. M. Mostafa
 
Basics of image processing using MATLAB
Basics of image processing using MATLABBasics of image processing using MATLAB
Basics of image processing using MATLABMohsin Siddique
 
New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentationAzad Singh
 
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice DetectionStatistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice Detectionrahulmonikasharma
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsCSCJournals
 
Image Enhancement by Image Fusion for Crime Investigation
Image Enhancement by Image Fusion for Crime InvestigationImage Enhancement by Image Fusion for Crime Investigation
Image Enhancement by Image Fusion for Crime InvestigationCSCJournals
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...IOSR Journals
 
Fuzzy Logic based Contrast Enhancement
Fuzzy Logic based Contrast EnhancementFuzzy Logic based Contrast Enhancement
Fuzzy Logic based Contrast EnhancementSamrudh Keshava Kumar
 
Feature isolation and extraction of satellite images for remote sensing appli...
Feature isolation and extraction of satellite images for remote sensing appli...Feature isolation and extraction of satellite images for remote sensing appli...
Feature isolation and extraction of satellite images for remote sensing appli...IAEME Publication
 
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...iosrjce
 
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURESSEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATUREScscpconf
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeySougata Das
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator cscpconf
 

Tendances (20)

A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
Digital Image Forgery
Digital Image ForgeryDigital Image Forgery
Digital Image Forgery
 
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 
Basics of image processing using MATLAB
Basics of image processing using MATLABBasics of image processing using MATLAB
Basics of image processing using MATLAB
 
New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
 
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice DetectionStatistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped Windows
 
Image Enhancement by Image Fusion for Crime Investigation
Image Enhancement by Image Fusion for Crime InvestigationImage Enhancement by Image Fusion for Crime Investigation
Image Enhancement by Image Fusion for Crime Investigation
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
 
Fuzzy Logic based Contrast Enhancement
Fuzzy Logic based Contrast EnhancementFuzzy Logic based Contrast Enhancement
Fuzzy Logic based Contrast Enhancement
 
Feature isolation and extraction of satellite images for remote sensing appli...
Feature isolation and extraction of satellite images for remote sensing appli...Feature isolation and extraction of satellite images for remote sensing appli...
Feature isolation and extraction of satellite images for remote sensing appli...
 
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
 
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURESSEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session Key
 
Image segmentation
Image segmentation Image segmentation
Image segmentation
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator
 

Similaire à Detecting image splicing in the wild Web

Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learningpratik pratyay
 
From ensembles to computer networks
From ensembles to computer networksFrom ensembles to computer networks
From ensembles to computer networksCSIRO
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldIRJET Journal
 
Knowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering LocalizationKnowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering LocalizationSymeon Papadopoulos
 
Aiai2020 paper27-forensics-fusion-201021113929
Aiai2020 paper27-forensics-fusion-201021113929Aiai2020 paper27-forensics-fusion-201021113929
Aiai2020 paper27-forensics-fusion-201021113929Weverify
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBPMarwan H. Noman
 
Introduction to computer vision with Convoluted Neural Networks
Introduction to computer vision with Convoluted Neural NetworksIntroduction to computer vision with Convoluted Neural Networks
Introduction to computer vision with Convoluted Neural NetworksMarcinJedyk
 
Introduction talk to Computer Vision
Introduction talk to Computer Vision Introduction talk to Computer Vision
Introduction talk to Computer Vision Chen Sagiv
 
Introduction to computer vision
Introduction to computer visionIntroduction to computer vision
Introduction to computer visionMarcin Jedyk
 
Coin recognition using matlab
Coin recognition using matlabCoin recognition using matlab
Coin recognition using matlabslmnsvn
 
IRJET- Exploring Image Super Resolution Techniques
IRJET- Exploring Image Super Resolution TechniquesIRJET- Exploring Image Super Resolution Techniques
IRJET- Exploring Image Super Resolution TechniquesIRJET Journal
 
陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰台灣資料科學年會
 
Comparison of Matrix Completion Algorithms for Background Initialization in V...
Comparison of Matrix Completion Algorithms for Background Initialization in V...Comparison of Matrix Completion Algorithms for Background Initialization in V...
Comparison of Matrix Completion Algorithms for Background Initialization in V...ActiveEon
 
rsec2a-2016-jheaton-morning
rsec2a-2016-jheaton-morningrsec2a-2016-jheaton-morning
rsec2a-2016-jheaton-morningJeff Heaton
 
20181128 satellogic @ barcelona ai
20181128 satellogic @ barcelona ai20181128 satellogic @ barcelona ai
20181128 satellogic @ barcelona aiAlbert Pujol Torras
 
Computer vision for transportation
Computer vision for transportationComputer vision for transportation
Computer vision for transportationWanjin Yu
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 

Similaire à Detecting image splicing in the wild Web (20)

slide-171212080528.pptx
slide-171212080528.pptxslide-171212080528.pptx
slide-171212080528.pptx
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
 
From ensembles to computer networks
From ensembles to computer networksFrom ensembles to computer networks
From ensembles to computer networks
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time World
 
Knowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering LocalizationKnowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering Localization
 
Aiai2020 paper27-forensics-fusion-201021113929
Aiai2020 paper27-forensics-fusion-201021113929Aiai2020 paper27-forensics-fusion-201021113929
Aiai2020 paper27-forensics-fusion-201021113929
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 
1025 track1 Malin
1025 track1 Malin1025 track1 Malin
1025 track1 Malin
 
Introduction to computer vision with Convoluted Neural Networks
Introduction to computer vision with Convoluted Neural NetworksIntroduction to computer vision with Convoluted Neural Networks
Introduction to computer vision with Convoluted Neural Networks
 
Introduction talk to Computer Vision
Introduction talk to Computer Vision Introduction talk to Computer Vision
Introduction talk to Computer Vision
 
Introduction to computer vision
Introduction to computer visionIntroduction to computer vision
Introduction to computer vision
 
lec6a.ppt
lec6a.pptlec6a.ppt
lec6a.ppt
 
Coin recognition using matlab
Coin recognition using matlabCoin recognition using matlab
Coin recognition using matlab
 
IRJET- Exploring Image Super Resolution Techniques
IRJET- Exploring Image Super Resolution TechniquesIRJET- Exploring Image Super Resolution Techniques
IRJET- Exploring Image Super Resolution Techniques
 
陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰
 
Comparison of Matrix Completion Algorithms for Background Initialization in V...
Comparison of Matrix Completion Algorithms for Background Initialization in V...Comparison of Matrix Completion Algorithms for Background Initialization in V...
Comparison of Matrix Completion Algorithms for Background Initialization in V...
 
rsec2a-2016-jheaton-morning
rsec2a-2016-jheaton-morningrsec2a-2016-jheaton-morning
rsec2a-2016-jheaton-morning
 
20181128 satellogic @ barcelona ai
20181128 satellogic @ barcelona ai20181128 satellogic @ barcelona ai
20181128 satellogic @ barcelona ai
 
Computer vision for transportation
Computer vision for transportationComputer vision for transportation
Computer vision for transportation
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

Plus de Symeon Papadopoulos

DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
 
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Symeon Papadopoulos
 
COVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingCOVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingSymeon Papadopoulos
 
Similarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSymeon Papadopoulos
 
Twitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualityTwitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualitySymeon Papadopoulos
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentSymeon Papadopoulos
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetSymeon Papadopoulos
 
A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionSymeon Papadopoulos
 
Learning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterLearning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterSymeon Papadopoulos
 
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersSymeon Papadopoulos
 
Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Symeon Papadopoulos
 
Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Symeon Papadopoulos
 
In-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceIn-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceSymeon Papadopoulos
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Symeon Papadopoulos
 
Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsSymeon Papadopoulos
 
Predicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsPredicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsSymeon Papadopoulos
 
Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Symeon Papadopoulos
 
CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015Symeon Papadopoulos
 

Plus de Symeon Papadopoulos (20)

DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
 
COVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingCOVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact Tracing
 
Similarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia content
 
Twitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualityTwitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air Quality
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media Content
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the Internet
 
A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering Detection
 
Learning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterLearning to detect Misleading Content on Twitter
Learning to detect Misleading Content on Twitter
 
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
 
Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...
 
In-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceIn-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging Performance
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...
 
Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News Professionals
 
Predicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsPredicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online Discussions
 
Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015
 
CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Detecting image splicing in the wild Web

  • 1. Detecting image splicing in the wild (Web) Markos Zampoglou, Symeon Papadopoulos, Yiannis Kompatsiaris 1Centre for Research and Technology Hellas (CERTH) – Information Technologies Institute (ITI) WeMuV2015 workshop, ICME, June 29, 2015, Turin, Italy
  • 2. A new journalistic paradigm #2 …and its pitfalls
  • 3. Blind image splicing detection • Assume the splice differs in some aspect from the rest of the image – Capture invisible “traces”: DCT coefficient distribution, PRNU, CFA interpolation patterns… • But traces degrade at subsequent image alterations • Social media journalism establishes a different paradigm from typical image forensics – We don’t have the luxury of demanding we see the originals #3
  • 5. Images in the wild #5 • Twitter: – Images larger than 2048×1024 are scaled down – Large PNG files (> 3MB) converted to JPEG – JPEG files resaved at quality 75 • Facebook – Images larger than 2048 × 2048 are scaled down – Large PNG files converted to JPEG – JPEG files resaved at varying quality (~70-90) • Both media platforms also erase metadata from images
  • 6. Existing image splicing datasets #6 Name Format Masks #images Columbia1 BMP grayscale No 933/912 Columbia Unc.2 TIFF Unc. Yes 183/180 CASIA TIDE v2.03 TIFF Unc. , JPEG, BMP No 7491/5123 VIPP Synthetic4 JPEG Yes 4800/4800 VIPP Realistic4 JPEG Manual 63/68 1http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm 2http://www.ee.columbia.edu/ln/dvmm/downloads/authsplcuncmp/ 3http://forensics.idealtest.org:8080/indexopt_v2.php 4http://clem.dii.unisi.it/~vipp/index.php/imagerepository/129-a-framework-for-decision-fusion-in- image-forensics-based-on-dempster-shafer-theory-of-evidence
  • 7. Issues with existing datasets #7 • Ground-truth masks: only Columbia Uncompressed and VIPP offer binary masks • Quality of splices: only CASIA and VIPP Realistic contain realistic forgeries • Image format: Only VIPP and CASIA offer JPEG images – At least 87% of the common crawl corpus (http://commoncrawl.org/) images are JPEG – Out of 13,577 forged images collected in our investigations, ~95% were in JPEG format • Neatness: All datasets contain first-level forgeries with no further alterations
  • 8. Collecting a dataset of Web forgeries • Aim: build an evaluation framework with the web- based case in mind – Evaluate existing and future algorithms against the real- world, web-based application scenario – Assess the status of the web: how many versions of each forgery, how close to the original • Methodology: identify verified forgeries, and exhaustively download as many instances as possible for analysis #8
  • 9. The Wild Web Dataset (1/5) • Identified 82 cases of confirmed forgeries #9
  • 10. The Wild Web Dataset (2/5) • Collected all detectable instances of each case • Removed exact file duplicates • 13,577 images in total • Identified and removed heavily altered variants of each case #10
  • 11. The Wild Web Dataset (3/5) • By removing crops and post-splices, we were left with 9,751 images • Variants within cases were separated, and the sources were gathered where possible #11
  • 12. The Wild Web Dataset (4/5) • Designed ground-truth binary masks for each sub- case corresponding to each possible forgery step (for complex forgeries) #12
  • 13. The Wild Web Dataset (5/5) #13 • The final dataset by the numbers: – 82 cases of forgeries – 92 forgery variants – 101 unique masks – 13,577 images total – 9,751 images resembling the original forgery • For each of the 82 cases, a match on any mask of any variant should be considered an overall success
  • 14. Experimental evaluations #14 • Emulated real-world conditions: we applied the minimum typical transformations (JPEG resave & rescaling) to the datasets compatible with the task: – Columbia Uncompressed – VIPP Synthetic – VIPP Realistic – Set 1: JPEG recompression at Quality 75 – Set 2: rescale to 75% size followed JPEG recompression at Quality 75
  • 15. Reconsidering evaluation protocols (1/3) #15 • Forgery localization algorithms typically produce a value map • Ground truth takes the form of a binary mask signifying the tampered area • Past approaches compare values under the mask to the rest of the image: – Kolmogorov-Smirnov (KS) statistic (Farid et al, 2009) – Median value (Fontani et al, 2013)
  • 16. Reconsidering evaluation protocols (2/3) #16 • A recompressed image from VIPP Realistic, analyzed using (Lin et al, 2009)
  • 17. • This would be considered a good detection under typical methodologies – Median under mask: ~0.93 – Median outside mask: ~0.02 – K-S Statistic: ~0.41 • Any human evaluator would disagree #17 Reconsidering evaluation protocols (3/3)
  • 18. Proposed evaluation protocol (1/2) #18 1. Take the output value map 2. Binarize according to some method-appropriate threshold – e.g. 0.5 for probabilistic methods 3. Compare the binary map to the ground truth mask: 4. Values above an experimental threshold (0.65) suggest a strong match 𝐸 𝐴, 𝑀 = 𝐴 ∩ 𝑀 2 𝐴 × 𝑀
  • 19. Proposed evaluation protocol (2/2) #19 • Adapt to mimic a human’s perspective: 1. Apply multiple morphological processing operations 2. Try multiple (method-appropriate) thresholds 3. Keep the best-fitting result (bias towards success) • For non-spliced images (true negative/false positive detection), apply the same methodology and declare a success for a blank binary map – Main disadvantage: binary outcome, no parameters to tweak for ROC curve generation.
  • 20. Evaluations #20 • Evaluated seven algorithms: – Double JPEG quantization (Lin et al, 2009), (Bianchi et al, 2011), (Bianchi et al, 2012a) – Non-Aligned double JPEG quantization (Bianchi et al, 2012b) – CFA artifacts (Ferrara et al, 2007) – High-frequency DW noise (Mahdian et al, 2009) – JPEG ghosts (Farid, 2010)
  • 21. • Comparing median values: Evaluation results: Emulated datasets (1/2) #21 Dataset (Lin et al, 2009) (Bianchi et al, 2011) (Ferrara et al, 2007) (Bianchi et al, 2012b) (Bianchi et al, 2012b) (Mahdian et al, 2009) Columbia Uncomp. Orig. JPEG Resized - - 0.89 (0.05) 0.05 (0.05) 0.03 (0.04) - - 0.39 (0.04) 0.09 (0.05) 0.11 (0.05) VIPP Synthetic Orig. JPEG Resized 0.47 (0.05) 0.30 (0.04) 0.05 (0.05) 0.51 (0.05) 0.43 (0.04) 0.05 (0.05) 0.15 (0.05) 0.16 (0.05) 0.05 (0.04) 0.57 (0.01) 0.39 (0.05) 0.05 (0.05) 0.28 (0.05) 0.16 (0.05) 0.05 (0.05) 0.13 (0.05) 0.10 (0.05) 0.06 (0.05) VIPP Realistic Orig. JPEG Resized 0.54 (0.04) 0.32 (0.04) 0.13 (0.04) 0.58 (0.04) 0.36 (0.04) 0.12(0.06) 0.04 (0.04) 0.04 (0.04) 0.03 (0.04) 0.70 (0.04) 0.51 (0.04) 0.23 (0.04) 0.28 (0.04) 0.17 (0.04) 0.17 (0.04) 0.20 (0.04) 0.20 (0.04) 0.18 (0.04)
  • 22. • Proposed evaluation framework: Evaluation results: Emulated datasets (2/2) #22 Dataset (Lin et al, 2009) (Bianchi et al, 2011) (Ferrara et al, 2007) (Bianchi et al, 2012b) (Bianchi et al, 2012b) (Mahdian et al, 2009) Columbia Uncomp. Orig. JPEG Resized - - 0.66 (0.16) 0.00 (0.20) 0.00 (0.24) - - 0.12 (0.57) 0.02 (0.86) 0.04 (0.79) VIPP Synthetic Orig. JPEG Resized 0.44 (0.27) 0.26 (0.30) 0.00 (0.23) 0.52 (0.00) 0.30 (0.10) 0.00 (0.00) 0.01 (0.23) 0.01 (0.28) 0.00 (0.23) 0.58 (0.09) 0.23 (0.27) 0.00 (0.15) 0.04 (0.25) 0.01 (0.29) 0.00 (0.29) 0.04 (0.74) 0.04 (0.74) 0.00 (0.84) VIPP Realistic Orig. JPEG Resized 0.41 (0.46) 0.13 (0.44) 0.00 (0.47) 0.38 (0.09) 0.17 (0.29) 0.00 (0.00) 0.09 (0.22) 0.00 (0.25) 0.00 (0.28) 0.23 (0.30) 0.14 (0.46) 0.03 (0.25) 0.03 (0.39) 0.01 (0.43) 0.01 (0.47) 0.04 (0.90) 0.02 (0.90) 0.01 (0.47)
  • 23. Evaluation results: Emulated datasets (4/4) #23 • Methods behave generally as expected – CFA patterns destroyed by the first JPEG compression • (Mahdian et al, 2009) is not particularly effective, but shows little vulnerability to alterations • DQ methods show some degree of robustness to recompression only • Rescaling is extremely disruptive, as expected
  • 24. Evaluation results: Wild Web dataset (1/2) #24 • 36 out of 82 cases were successfully detected by at least one method – Not a single image gave good results for the other 46 cases, for any algorithm (Lin et al, 2009) (Bianchi et al, 2011) (Ferrara et al, 2007) (Bianchi et al, 2012b) (Bianchi et al, 2012b) (Mahdian et al, 2009) (Farid, 2010) Detections 13 12 1 8 5 15 29 Unique 4 1 0 1 2 6 10
  • 25. Evaluation results: Wild Web dataset (2/2) #25 • The noise-based method of (Mahdian et al, 2009) proved disproportionately successful, – We should not forget how prone to false positives it is. • JPEG Ghosts are very robust, if we can manage the amount of output they produce • Even in the cases where successful detection occurred, only a few images were correctly detected – 1386 images in the entire dataset (~ 14.3%) – Excluding the three easiest classes, only 333 out of 8580 images were detected (~ 3.9%)
  • 26. Forgery detection in the Wild (1/4) #26
  • 27. Forgery detection in the Wild (2/4) #27
  • 28. Forgery detection in the Wild (3/4) #28
  • 29. Forgery detection in the Wild (4/4) #29
  • 30. Conclusions • In the web, very few images retain traces which are detectable with today’s state-of-the-art forensic approaches • It is difficult to estimate the relative age of each instance of a viral image • DQ-based methods give results with the highest confidence, but are not particularly robust • JPEG Ghosts demonstrate significantly higher robustness than other methods, but produce large amounts of noisy output • DW high-frequency noise also appears to give good results, but seems extremely prone to false positives #30
  • 31. Future steps • For the web journalism case, robustness ought to be a central consideration for future algorithm evaluations • The Wild Web dataset is freely distributed for research purposes – Due to copyright considerations, this is currently only feasible through direct contact – The dataset should be maintained to incorporate new cases of forgeries, as they come out • Advance the state-of-the-art by focusing on more robust traces of splicing • Following the life-cycle of images on the web can help locate their earliest versions and build an account of the alterations that have taken place (Kennedy & Chang, 2008) • The question remains: to what extent is the task feasible? When can we be certain that all traces have been lost? #31
  • 32. References #32 • Bianchi, Tiziano, Alessia De Rosa, and Alessandro Piva. "Improved DCT coefficient analysis for forgery localization in JPEG images." In Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on, pp. 2444-2447. IEEE, 2011. • Bianchi, Tiziano and Alessandro Piva, “Image forgery localization via block-grained analysis of JPEG artifacts,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1003–1017, 2012. • Ferrara, Pasquale, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. "Image forgery localization via fine-grained analysis of cfa artifacts." Information Forensics and Security, IEEE Transactions on 7, no. 5 (2012): 1566-1577. • Farid, Hany. "Exposing digital forgeries from JPEG ghosts." Information Forensics and Security, IEEE Transactions on 4, no. 1 (2009): 154-160. • Fontani, Marco, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni. "A framework for decision fusion in image forensics based on dempster–shafer theory of evidence." Information Forensics and Security, IEEE Transactions on 8, no. 4 (2013): 593-607. • Kennedy, Lyndon, and Shih-Fu Chang. "Internet image archaeology: automatically tracing the manipulation history of photographs on the web." In Proceedings of the 16th ACM international conference on Multimedia, pp. 349-358. ACM, 2008. • Lin, Zhouchen, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis." Pattern Recognition 42, no. 11 (2009): 2492-2501. • Mahdian, Babak and Stanislav Saic, “Using noise inconsistencies for blind image forensics,” Image and Vision Computing, vol. 27, no. 10, pp. 1497–1503, 2009.
  • 33. Thank you! • Slides: http://www.slideshare.net/sympapadopoulos/detecting-image-splicing- in-the-wild-web • Get in touch: @markzampoglou / markzampoglou@iti.gr @sympapadopoulos / papadop@iti.gr #33