Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Activities

MULTIMEDIA FORENSICS AND SECURITY

Multimedia forensics aims to introduce novel methodologies to support clue analysis and to provide an aid for making a decision about a crime by looking at a multimedia content as a digital clue (image and video). Multimedia forensics deals with developing technological instruments operating in the absence of signatures or watermarks inserted in the image. These techniques basically allow the user to determine if a particular content has been tampered with or which was the acquisition device used.

The basic idea behind multimedia forensics relies on the observation that both the acquisition process and any post-processing operation leave a distinctive imprint on the data, as a sort of digital fingerprint. The analysis of such a fingerprint may permit to determine image/video origin and to establish digital content authenticity.

PCM The ICL lab carries on research activity in this scientific field in collaboration with many Italian and international Universities. In particular, the ICL Lab directly cooperates with the Scientific and Technological Department of the Italian Prime Minister .

 

Copy-Move Forgery Detection and Localization

siria thimbIn many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watcher’s opinion. Image forensics tools provide answers to similar questions. We have been working on a novel method that focuses in particular on the problem of detecting if a tampered image has been created by cloning an area of the image onto another zone to make a duplication or to cancel something awkward ...

 

    Acquisition Device Identification

    deviceOur group is involved in two aspects regarding the task of acquisition device identification: the first is to determine which specific camera or scanner (by recognizing model and brand) acquired that certain content, while the second is to understand which kind of device generated a digital image (e.g. a scanner, a digital camera or is a computer graphics product)...

     

      Splicing Forgeries Localization

      splicingOne of the main multimedia forensics topic is image tampering detection, that is assessing the authenticity of a digital image. Information integrity is fundamental in a trial, but it is clear that the advent of digital pictures and relative ease of digital image processing today makes this authenticity uncertain...

       

        Counter- Forensics

        counterThe question of trustworthiness of digital image forensic arises because most publications still lack rigorous discussions of robustness against counterfeiters. Forensic methods might benefit from research on countermeasures in a similar way as reasoning about attacks in multimedia security in general is useful to improve security ...

         

          Trustworthiness and Social Forensic

          secure fmwkNowadays, information are provided through diverse network channels and, above all, their diffusion occurs in an always faster and pervasive manner Social Networks (SN) plays a crucial role in distributing, in an uncontrolled way, news, opinions, media contents and so on, and can basically contribute to spread information that sometimes are untrue and misleading...

           

            Image forensics in the “real world”

            firenze_match2On 8th February 2014 has appeared on various Italian newspapers the new advertising campaign “Divina Toscana” to promote tourism in the Tuscany Region. This campaign has risen a lot of discussion due to excessive use of photo editing. The eight images chosen for the campaign in fact, show landscapes in which has been added fake details...

             

              FORimage app

               4imageFORimage is an innovative system to determine the authenticity of an image or a video discovering the possible manipulations and allowing the sharing of the obtained results through different end-users...

                 

                 

                You can find the complete list of our publications in the Publications page.

                Top
                Top