InnerEye: A Tale on Images Filtered Using Instagram Filters - How Do We Interact with them and How Can We Automatically Identify the Extent of Filtering?

被引:0
作者
Rakib, Gazi Abdur [1 ]
Adnin, Rudaiba [1 ]
Bashir, Shekh Ahammed Adnan [1 ]
Islam, Chashi Mahiul [1 ]
Turza, Abir Mohammad [1 ]
Manzur, Saad [1 ]
Rashik, Monowar Anjum [1 ]
Azad, Abdus Salam [1 ,2 ]
Chakraborty, Tusher [3 ]
Rahaman, Sydur [1 ]
Shikder, Muhammad Rayhan [1 ]
Ahmed, Syed Ishtiaque [4 ]
Al Islam, A. B. M. Alim [1 ]
机构
[1] Bangladesh Univ Engn & Technol, Dhaka, Bangladesh
[2] Univ Calif Berkeley, Berkeley, CA 94720 USA
[3] Microsoft, Redmond, WA USA
[4] Univ Toronto, Toronto, ON, Canada
来源
MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES, MOBIQUITOUS 2022 | 2023年 / 492卷
关键词
Images; Filters; Survey; Deep Learning; CONTEXT;
D O I
10.1007/978-3-031-34776-4_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Even though digitally filtered images are taking over the Internet for their aesthetic appeal, general people often feel betrayed if they are dealt with filtered images. Our study, comprising a series of structured surveys over images filtered using Instagram filters, reveals that different people perceive the filtered images differently. However, people have a common need for an automated tool to help them distinguish between original and filtered images. Accordingly, we develop an automated tool named 'InnerEye', which is capable of identifying how far an image is filtered or not. InnerEye utilizes a novel analytical design of a Neural Network Model that learns from a diverse set of images filtered using Instagram filters. Rigorous objective and subjective evaluations confirm the efficacy of InnerEye in identifying the extent of filtering in the images.
引用
收藏
页码:494 / 514
页数:21
相关论文
共 44 条
[1]  
Agarwal S., 2019, Limits of Deepfake Detection: A Robust Estimation Viewpoint
[2]  
Bandura A., 1999, Handbook of Personality, P154
[3]  
Belkasoft, 2021, Belkasoft forgery detection module
[4]   Digital image forgery detection using passive techniques: A survey [J].
Birajdar, Gajanan K. ;
Mankar, Vijay H. .
DIGITAL INVESTIGATION, 2013, 10 (03) :226-245
[5]   Challenges of Computational Verification in Social Multimedia [J].
Boididou, Christina ;
Papadopoulos, Symeon ;
Kompatsiaris, Yiannis ;
Schifferes, Steve ;
Newman, Nic .
WWW'14 COMPANION: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2014, :743-748
[6]  
Dearden L., 2015, Independent, V16, P15
[7]   Image Forensic Analyses that Elude the Human Visual System [J].
Farid, Hany ;
Bravo, Mary J. .
MEDIA FORENSICS AND SECURITY II, 2010, 7541
[8]  
Frank Joel, 2020, Leveraging Frequency Analysis for Deep Fake Image Recognition
[9]  
Fridrich Jessica, 2003, P DIG FOR RES WORKSH, V3, P1
[10]   Detection of linear and cubic interpolation in JPEG compressed images [J].
Gallagher, AC .
2nd Canadian Conference on Computer and Robot Vision, Proceedings, 2005, :65-72