Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1161366.1161376acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Exposing digital forgeries through chromatic aberration

Published: 26 September 2006 Publication History

Abstract

Virtually all optical imaging systems introduce a variety of aberrations into an image. Chromatic aberration, for example, results from the failure of an optical system to perfectly focus light of different wavelengths. Lateral chromatic aberration manifests itself, to a first-order approximation, as an expansion/contraction of color channels with respect to one another. When tampering with an image, this aberration is often disturbed and fails to be consistent across the image. We describe a computational technique for automatically estimating lateral chromatic aberration and show its efficacy in detecting digital tampering.

References

[1]
T.E. Boult and G. Wolberg. Correcting chromatic aberrations using image warping. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 684--687, 1992.
[2]
H. Farid and E. Simoncelli. Differentiation of multi-dimensional signals. IEEE Transactions on Image Processing, 13(4):496--508, 2004.
[3]
J. Fridrich, D. Soukal, and J. Lukáš. Detection of copy-move forgery in digital images. In Proceedings of DFRWS, 2003.
[4]
E. Hecht. Optics. Addison-Wesley Publishing Company, Inc., 4th edition, 2002.
[5]
M.K. Johnson and H. Farid. Exposing digital forgeries by detecting inconsistencies in lighting. In ACM Multimedia and Security Workshop, New York, NY, 2005.
[6]
J. Lukáš, J. Fridrich, and M. Goljan. Detecting digital image forgeries using sensor pattern noise. In Proceedings of the SPIE, volume 6072, 2006.
[7]
T. Ng and S. Chang. A model for image splicing. In IEEE International Conference on Image Processing, Singapore, 2004.
[8]
A.C. Popescuand, H. Farid. Exposing digital forgeries by detecting duplicated image regions. Technical Report TR2004- 15, Department of Computer Science, Dartmouth College, 2004.
[9]
A.C. Popescuand, H. Farid. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing, 53(2):758--767, 2005.
[10]
A.C. Popescu and H. Farid. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing, 53(10):3948--3959, 2005.
[11]
P. Viola and W.M. Wells, III. Alignment by maximization of mutual information. International Journal of Computer Vision, 24(2):137--154, 1997.
[12]
R.G. Willson and S.A. Shafer. What is the center of the image? Journal of the Optical Society of America A, 11(11):2946--2955, November 1994.

Cited By

View all
  • (2024)A Comprehensive Survey on Methods for Image IntegrityACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363320320:11(1-34)Online publication date: 12-Sep-2024
  • (2024)FaceSensor-ID: A High Precision Approach on Multi-Spectral (Visible and NIR) Camera Sensor Origin IdentificationSoutheastCon 202410.1109/SoutheastCon52093.2024.10500114(1046-1053)Online publication date: 15-Mar-2024
  • (2024)Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detectionComplex & Intelligent Systems10.1007/s40747-024-01634-611:1Online publication date: 9-Nov-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '06: Proceedings of the 8th workshop on Multimedia and security
September 2006
244 pages
ISBN:1595934936
DOI:10.1145/1161366
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. digital forensics
  2. digital tampering

Qualifiers

  • Article

Conference

MM&Sec '06
Sponsor:
MM&Sec '06: Multimedia and Security Workshop
September 26 - 27, 2006
Geneva, Switzerland

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Comprehensive Survey on Methods for Image IntegrityACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363320320:11(1-34)Online publication date: 12-Sep-2024
  • (2024)FaceSensor-ID: A High Precision Approach on Multi-Spectral (Visible and NIR) Camera Sensor Origin IdentificationSoutheastCon 202410.1109/SoutheastCon52093.2024.10500114(1046-1053)Online publication date: 15-Mar-2024
  • (2024)Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detectionComplex & Intelligent Systems10.1007/s40747-024-01634-611:1Online publication date: 9-Nov-2024
  • (2024)Deep Learning-based forgery detection and localization for compressed images using a hybrid optimization modelMultimedia Systems10.1007/s00530-024-01336-630:3Online publication date: 21-Apr-2024
  • (2023)Cross-Point Alignment for All AF Pixels in CMOS Image SensorsIEEE Sensors Journal10.1109/JSEN.2023.330678823:20(24404-24412)Online publication date: 15-Oct-2023
  • (2023)Unmasking the digital deception - a comprehensive survey on image forgery and detection techniquesAustralian Journal of Forensic Sciences10.1080/00450618.2023.227057556:6(635-683)Online publication date: 15-Nov-2023
  • (2022)Focal stack based image forgery localizationApplied Optics10.1364/AO.45065461:14(4030)Online publication date: 2-May-2022
  • (2022)CRNet: Unsupervised Color Retention Network for Blind Motion DeblurringProceedings of the 30th ACM International Conference on Multimedia10.1145/3503161.3547962(6193-6201)Online publication date: 10-Oct-2022
  • (2022)Deep Metric Color Embeddings for Splicing Localization in Severely Degraded ImagesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.318952717(2614-2627)Online publication date: 2022
  • (2022)Splicing forgery localization via noise fingerprint incorporated with CFA configurationForensic Science International10.1016/j.forsciint.2022.111464340(111464)Online publication date: Nov-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media