Image authentication by assessing manipulations using illumination

被引:24
作者
Kumar, Manoj [1 ]
Srivastava, Sangeet [2 ]
机构
[1] AMITY Univ, Dept Comp Sci, ASET, Noida, India
[2] Northcap Univ, Dept Appl Sci, Gurugram, India
关键词
Lighting; Image forensics; Decorrelation; Image manipulation;
D O I
10.1007/s11042-018-6775-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing use of digital media, image tampering has become imperative. This spurs the need to identify such tampering for authentication and jurisdiction. The main idea of this paper is an assessment of the possible light source direction from the image. This technique uses the inconsistencies in the light source direction to detect the image forgery. Initially, in the preprocessing step on input image, surface normals are calculated using surface texture profile. RED band is mainly used for obtaining surface texture information and, further, surface normal calculations are done. With estimated illumination profile and normals, the incident angle (i) is computed for various chosen image patches. The (i) angle is the estimated angle from image object to light source direction. The inconsistency in (i) values is used as an evidence of tampering. The proposed technique is tested on different known fake images and is found capable of identifying manipulated objects in an image. This technique works for homogenous illuminated surfaces and has better forgery detection accuracy. Additionally, our technique also diminishes human intervention for forgery detection. The performance of proposed forgery detection technique is examined using CASIA1 image database to give users a feel of the performance.
引用
收藏
页码:12451 / 12463
页数:13
相关论文
共 23 条
[1]  
[Anonymous], THESIS
[2]  
Austin John D., 1988, INFORM PROCESSING ME, P375
[3]  
Carvalho T, 2015, SPIE S MED WAT SEC F
[4]   REVISITING PENTLANDS ESTIMATOR OF LIGHT-SOURCE DIRECTION [J].
CHOJNACKI, W ;
BROOKS, MJ ;
GIBBINS, D .
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, 1994, 11 (01) :118-124
[5]   Methods for image authentication: a survey [J].
Haouzia, Adil ;
Noumeir, Rita .
MULTIMEDIA TOOLS AND APPLICATIONS, 2008, 39 (01) :1-46
[6]  
Johnson M.K., 2005, Proceedings of the 7th Workshop on Multimedia and Security, P1, DOI [10.1007/1-84628-148-2/COVER, DOI 10.1145/1073170.1073171]
[7]  
KEE E, 2013, ACM T GRAPHIC, V32, P1
[8]  
KEE E, 2010, IEEE WORKSHOP INFORM, V3
[9]   Exposing Photo Manipulation from Shading and Shadows [J].
Kee, Eric ;
O'Brien, James F. ;
Farid, Hany .
ACM TRANSACTIONS ON GRAPHICS, 2014, 33 (05)
[10]  
Kranthi Kumar M, 2016, Indian Jou Sci Technol, V9, P1