Preview

Forgery Authentication Using Distortion Cue and Fake Saliency Map

Powerful Essays
Open Document
Open Document
1832 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Forgery Authentication Using Distortion Cue and Fake Saliency Map
Forgery Authentication Using Distortion Cue and Fake Saliency Map

Abstract

The widespread availability of photo manipulation software has made it unprecedentedly easy to manipulate images for malicious purposes. Image splicing is one such form of tampering. In recent years, researchers have proposed various methods for detecting such splicing. In this paper, we present a novel method of detecting splicing in images, using discrepancies in motion blur. We use motion blur estimation through image gradients in order to detect inconsistencies between the spliced region and the rest of the image. We also develop a new measure to assist in inconsistent region segmentation in images that contain small amounts of motion blur. Experimental results show that our technique provides good segmentation of regions with inconsistent motion blur. We also provide quantitative comparisons with other existing blur-based techniques over a database of images. It is seen that our technique gives significantly better detection results.

Distortion is often considered as an unfavorable factor in most image analysis. However, it is undeniable that the distortion reflects the intrinsic property of the lens, especially, the extreme wide-angle lens, which has a significant distortion. In this paper, we discuss how explicitly employing the distortion cues can detect the forgery object in distortion image and make the following contributions: 1) a radial distortion projection model is adopted to simplify the traditional captured ray-based models, where the straight world line is projected into a great circle on the viewing sphere; 2) two bottom-up cues based on distortion constraint are provided to discriminate the authentication of the line in the image; 3) a fake saliency map is used to maximum fake detection density, and based on the fake saliency map, an energy function is provided to achieve the pixel-level forgery object via graph cut. Experimental results on simulated

You May Also Find These Documents Helpful

  • Good Essays

    In 1992, Dallmeier presented the world’s first video sensor with digital image storage. At this time, the idea of using digital image storage in video surveillance wasn’t taken seriously but Dallmeier saw its benefits and potential. In retrospect, this idea has proved to be a groundbreaking development, one that has revolutionized video surveillance. Today we cannot imagine the security field without the use of digital technology.Panomera® is a completely novel camera technology, which was specially developed for the all-encompassing video surveillance of expansive areas. With Panomera®, huge widths, as well as areas with large distances can be displayed with a completely new resolution quality, in real time and at high frame rates of up to 30 fps.While other video analysis systems are limited to pure motion detection, Dallmeier uses SEDOR® – an abbreviation for “Self Learning Event Detector” – a self-learning analysis system. Using intelligent picture analysis algorithms and self-learning detection systems a variety of different situations can be automatically recognised even in complex scenes. For example, object sizes, directions of movement and speeds can be analysed. Environmental influences like rain, snow or branches blowing in the wind are filtered out using special algorithms.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    First of all, photographs can be staged. In a New York Times article, an interview was held with photographer Stanley Greene. In the interview he said “I think setting up photos — where they are completely staged — is very widespread…” Since this is coming from a well known photographer, it is really worrying that photographs might not actually be telling the truth. Secondly, they can be manipulated.…

    • 808 Words
    • 4 Pages
    Good Essays
  • Good Essays

    1984 Pros And Cons Essay

    • 631 Words
    • 3 Pages

    Since 9/11 and other tragedies such as the Boston Marathon bombing surveillance in many ways has increased significantly. One of the most significant ways is through the use and implementation of high-tech security systems, "As the volume and quality of cameras and sensors increases, cities are turning to more advanced face and object recognition software to make sense of the data"(CNN2). One of…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In what ways do composers transport us to another time and place through distinctively visual images?…

    • 831 Words
    • 24 Pages
    Good Essays
  • Better Essays

    Since the early 20th century, the practice of firearm and toolmark identification or comparison has been a crucial factor in forensic science. Agencies such as the FBI have introduced a standard operating procedure which helps to identify weapons and toolmarks. There are certain criteria that must be met to be considered a match. These criteria include multi-level matching of the items brought from the scene of a crime with the test specimens. (http://www.fbi.gov/about-us/lab/forensic-science-communications/fsc/july2009/review/2009_07_review01.htm).…

    • 1029 Words
    • 1 Page
    Better Essays
  • Satisfactory Essays

    Hey Bill Nye Analysis

    • 852 Words
    • 4 Pages

    Are they real? Could the possibility exist of faked space exploration photos? This example, seems to be a solid point. With the existence of thousands of photos having been taken from space, of the Earth, one might think it would be next to impossible to have made sure that those all look similar in shape and detail. The flat Earthers however, believe since all photos taken by satellite have been digitally edited to make details more vivid and other undisclosed reasons, they are…

    • 852 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    In therapy, there are various models to help a patient(s) solve their problem and find solutions. Some therapist can focus on one model or they can use various models to find a solution for their client. Each model is unique because they have their own perspective on insight, clinical focus, problem development, goals of therapy, and tools and techniques. Some models focus on insight while some lack interest in it. Only certain models would help foster a solution depending on what the problem is.…

    • 1316 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    In order to catch a criminal you have to have the right tools and one of the Technology tools I have found is Automatic License Plate Recognition it is used in a wide range of policing. The software aspect of this advanced system is run on any computer; it can also be linked to other devices, applications, or database. It uses a wide range of manipulation techniques to detect and enhance the…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Perception Checking

    • 769 Words
    • 4 Pages

    Have you ever asked yourself “do I have a good communication skills”?. Some people don’t have a good communication skill because they don’t get involved with people in the communities a lot, but other do because they want to build up the relationship and understand how people react.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Lie Detection

    • 1000 Words
    • 4 Pages

    Body language is a form of non-verbal communication, that is, talking without saying a word. On the other hand, non-verbal communication includes body movements, posture, gestures, facial expressions and eye movements. According to the social anthropologist, Edward T. Hall, in a normal conversation between two parties, he discovered that approximately 35% of interactions is actually expressed through words, while 65% of it is conveyed through body language. In modern society, more and more liars exist. According to James Patterson, the writer of The Day America Told the Truth, discovered that 91% among the two thousand Americans that he interviewed lies regularly both work and home. Based on research by Robert Feldman, in any given conversation, an average of two to three lies occurs every ten minutes. So, why do people lie? It is because they want to avoid punishment, protect themselves, look good and gain socially. Therefore, by understanding body language, individuals able to know attitude, feelings, and emotion of a person.…

    • 1000 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Swets’ ROC analysis was developed and validated for signal detection given a known location. Clinically relevant tasks are often more complicated, e.g., search, multi-class classification, estimation, etc. Many extended ROC methods are proposed for each task, and there is a sincere lack of consensus concerning which extended ROC method is more appropriate. Before discussing how the lack of falsifiability contributes to this lack of consensus, in this section, I present a falsifiable search assessment method.…

    • 1168 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Steganography

    • 1427 Words
    • 6 Pages

    2. Fridrich, Goljan, Du. “Reliable Detection of LSB Steganography in Color and Grayscale Images” http://www.ws.binghamton.edu/fridrich/Research/acmwrkshp_version.pdf…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer Class

    • 419 Words
    • 2 Pages

    Verifying Photo Validity: You are writing a research paper for your history class and have found a photo on the Web that you would like to use. You are cautious about using photos on the Web because of copyright issues and photos that have been altered digitally. How might you verify the validity of a photo on the Web?…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Counterfeit Money

    • 712 Words
    • 3 Pages

    The first technique is observing the portrait. On a genuine bill, the portrait will be life like and clearly recognize all features. It will also stand out from the background distinctively. On a counterfeit bill, the portrait is dull and lifeless. The portrait will also blend into the background, which is often to dark.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In information technology, biometrics authentication refers to the way that we measure and analyzed these characteristics include fingerprints, eye retinas, and irises, facial patterns, hand measurements, signature, gait, voice and typing patterns. Out of these biometrics methods, fingerprint authentication is the best fit for the PC world due to its relatively inexpensive cost and it’s the most readily available method to…

    • 284 Words
    • 2 Pages
    Satisfactory Essays