Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6,387 Hits in 3.6 sec

Illuminant-based Transformed Spaces for Image Forensics [article]

Tiago Carvalho, Fábio Faria, Helio Pedrini, Ricardo Torres, Anderson Rocha
2016 Figshare  
Instructions for downloading database and source code associated with the paper "Illuminant-based Transformed Spaces for Image Forensics"  ...  To extract image descriptors from illuminant maps (IIC and GGE) of all of the images into ./database/images/ folder, for an specific descriptor, execute the function .  ...  Before to be continues point the steps to extract image descriptors from your illuminant maps, it is necessary to highlight that, for each image in your data, you need to provide a .txt file with the same  ... 
doi:10.6084/m9.figshare.1593104.v4 fatcat:ctod7jpafjflxcl3tzl2nrlp3m

Illuminant-Based Transformed Spaces for Image Forensics

Tiago Carvalho, Fabio A. Faria, Helio Pedrini, Ricardo da S. Torres, Anderson Rocha
2016 IEEE Transactions on Information Forensics and Security  
In this paper, we explore transformed spaces, represented by image illuminant maps, to propose a methodology for selecting complementary forms of characterizing visual properties for an effective and automated  ...  We focus on detecting image forgeries containing people and present a method for locating the forgery, specifically, the face of a person in an image.  ...  Illuminant-Based Transformed Spaces for Image Forensics This verification might be as simple as checking whether an image has been touched up for exhibition improvement purposes (e.g., brightness or contrast  ... 
doi:10.1109/tifs.2015.2506548 fatcat:rqhnm6y2uzfd5gtud4chdsbjoa

Illuminant-based Transformed Spaces for Image Forensics [article]

Tiago Carvalho, Fábio Faria, Helio Pedrini, Ricardo Torres, Anderson Rocha
2015 Figshare  
Instructions for downloading database and source code associated with the paper "Illuminant-based Transformed Spaces for Image Forensics"  ...  Before to be continues point the steps to extract image descriptors from your illuminant maps, it is necessary to highlight that, for each image in your data, you need to provide a .txt file with the same  ...  In addition to all datasets, we are also providing all the illuminant maps (calculated from IIC and GGE method) and the faces positions and labels for each image inside the dataset.  ... 
doi:10.6084/m9.figshare.1593104.v3 fatcat:ip4qsvs2bngrfjgjsksbv6d2ru

Exposing Digital Image Forgeries by Illumination Color Classification
English

Shraddha R Asati, P.R Pardhi
2014 International Journal of Engineering Trends and Technoloy  
In this work, we make an significant step towards reducing user interaction for an illuminant-based tampering decision making.  ...  Initially we identify the illuminant map in the image. We find the face from the photography. For the face detect here we use the violo john method.  ...  RELATED WORK Illumination-based approaches for forgery detection are either color-based or geometry-based.  ... 
doi:10.14445/22315381/ijett-v18p255 fatcat:ejh46ufbongdbfq3lp643tmpyu

Scene Illumination as an Indicator of Image Manipulation [chapter]

Christian Riess, Elli Angelopoulou
2010 Lecture Notes in Computer Science  
The goal of blind image forensics is to distinguish original and manipulated images. We propose illumination color as a new indicator for the assessment of image authenticity.  ...  Experiments show that these illumination maps provide a useful and very general forensics tool for the analysis of color images.  ...  Illuminant Color for Image Forensics Once the illuminant color estimates for the user-annotated regions are computed, the whole image can be examined for illumination color inconsistencies, as described  ... 
doi:10.1007/978-3-642-16435-4_6 fatcat:cqndxtqblvgijdb6apepn6l5mm

Exposing Digital Image Forgeries by Illumination Color Classification using Sift Algorithm

Priyanka Manthale, Geeta Patil
2017 International Journal of Computer Applications  
For implementation of this both IE we make use scale invariant feature transform(SIFT)algorithm in Matlab programming language.  ...  To achieve this, we incorporate information from "physics" and "statistical-based" illuminant estimators on image regions of similar material.  ...  Illumination-based methods for forgery detection are either geometry-based or color-based.  ... 
doi:10.5120/ijca2017915436 fatcat:hewnzs6tuvdadmwz7n77heax4a

Detecting Image Forgery Based On Color Phenomenology

Jamie Stanton, Keigo Hirakawa, Scott McCloskey
2019 Computer Vision and Pattern Recognition  
We propose White Point-Illuminant Consistency (WPIC) algorithm that detects manipulations in images based on the phenomenology of color.  ...  In manipulated images, the chromaticity coordinates will have a shifted illuminant color relative to the EXIF-reported white point.  ...  We thank the authors of [5] for providing access to the DSO-1 dataset.  ... 
dblp:conf/cvpr/StantonHM19 fatcat:kxq7ke2gtfcdri43hadwvs4snq

A Survey on Heterogeneous Face Recognition: Sketch, Infra-red, 3D and Low-resolution [article]

Shuxin Ouyang, Timothy Hospedales, Yi-Zhe Song, Xueming Li
2014 arXiv   pre-print
Moreover, we offer a detailed account of datasets and benchmarks commonly used for evaluation. We finish by assessing the state of the field and discussing promising directions for future research.  ...  In the LRBP framework, face images are first transformed into Radon space, then transformed face images are encoded by Local Binary Pattern (LBP).  ...  In matching across resolution, existing approaches can be categorized into synthesis based and projection-based. Synthesis based approaches, attempt to transform LR into HR images for matching.  ... 
arXiv:1409.5114v2 fatcat:pytctlmtonf6bhb4z3pszxoove

A survey on heterogeneous face recognition: Sketch, infra-red, 3D and low-resolution

Shuxin Ouyang, Timothy Hospedales, Yi-Zhe Song, Xueming Li, Chen Change Loy, Xiaogang Wang
2016 Image and Vision Computing  
Moreover, we offer a detailed account of datasets and benchmarks commonly used for evaluation. We finish by assessing the state of the field and discussing promising directions for future research.  ...  Relative Geometry [6] Global Holistic Whole image [7, 8, 9] Whole image [10, 11, 12] Whole image [13, 14, 15] Whole image [16, 17, 18] Whole image [19, 20, 21] Whole image [17, 22, 23] Whole image with  ...  In the LRBP framework, face images are first transformed into Radon space, then transformed face images are encoded by Local Binary Pattern (LBP).  ... 
doi:10.1016/j.imavis.2016.09.001 fatcat:hy666szkk5bgfoazyxgwy6hli4

A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection
SIFT 기반 카피-무브 위조 검출에 대한 타켓 카운터-포렌식 기법

Munkhbaatar Doyoddorj, Kyung-Hyune Rhee
2014 KIPS Transactions on Computer and Communication Systems  
The Scale Invariant Feature Transform (SIFT) has been widely used in a lot of applications for image feature matching.  ...  In this paper, we propose a targeted counter-forensics method for impeding SIFT-based copy-move forgery detection by applying a semantically admissible distortion in the processing tool.  ...  [8] , keypoints and features based on the scale invariant feature transform [9] are used to account for illumination changes in the detection of copy-move region duplication.  ... 
doi:10.3745/ktccs.2014.3.5.163 fatcat:djo2bv2cqrbr7ikplp62t2vc5i

Deep Metric Color Embeddings for Splicing Localization in Severely Degraded Images [article]

Benjamin Hadwiger, Christian Riess
2022 arXiv   pre-print
As such, this work resides at the intersection of physics-based and statistical forensics with benefits from both sides.  ...  One common task in image forensics is to detect spliced images, where multiple source images are composed to one output image.  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
arXiv:2206.10737v1 fatcat:xjklwkjdvfanbm34ubcrh6ur6y

Pose Variability Compensation Using Projective Transformation for Forensic Face Recognition

Ester Gonzalez-Sosa, Ruben Vera-Rodriguez, Julian Fierrez, Pedro Tome, Javier Ortega-Garcia
2015 2015 International Conference of the Biometrics Special Interest Group (BIOSIG)  
We evaluate the influence of this projective transformation over a baseline system based on principal component analysis and support vector machines (PCA-SVM) for the SCface database.  ...  This paper proves the value of the projective transformation as a simple tool to compensate the pose distortion present in surveillance images in forensic scenarios.  ...  This fact leads to images with any kind of variation: illumination, pose, expression, occlusion etc.  ... 
doi:10.1109/biosig.2015.7314615 dblp:conf/biosig/Gonzalez-SosaVF15 fatcat:i2uvtq5rkbe4tfvsrbsohmt7bi

Face Matching and Retrieval in Forensics Applications

Anil K. Jain, Brendan Klare, Unsang Park
2012 IEEE Multimedia  
Acknowledgments We thank Shengcai Liao for providing facial-  ...  Variations in the feature space alter the facial texture, shape, pose, and the 3D illumination model.  ...  Park and Jain developed an automatic facialmark detection method based on the Laplacian of Gaussian operator, r 2 G(x, y, s), in scale space. 11 A scale-space representation, D(x, y, s), is obtained by  ... 
doi:10.1109/mmul.2012.4 fatcat:nugt44q43ndkzajxvgvj567x64

An Image Forgery Detection using SIFT-PCA

Pooja Bhole, St. Vincent Pallotti College of Engineering and Technology
2020 International Journal of Engineering Research and  
The SIFT (Scale Invariant Feature Transform) algorithm is used for extracting the invariant features from an image and then extract blocks by using PCA.  ...  Copy-move Image Forgery Detection is one of the forensic techniques in which selected area of an image is get copied and then moved onto the other portion of the image.  ...  LITERATURE SURVEY In [2] , author has proposed new methodology based on Transform Invariant Features. The main is based on MPEG-7 image signature tools that forms a part of MPEG-7 standard.  ... 
doi:10.17577/ijertv9is060127 fatcat:acp3vmm3ovbn3jjdw2nxrnerby

Forensic Detection of Digital Image Tampering Using Statistical Analysis

Md. Zahurul Haque, Md. Mahedi Hasan
2020 Zenodo  
On the other hand, for this reason digital image forensics has emerged as a new research field that aims to reveal tampering operations in digital images and to verify images authenticity.  ...  One of the primary goals of digital image forensics is to identify images and image regions which have undergone some form of manipulation or alteration.  ...  Image forensic methods can be divided into only two simple categories: semantics-based detection and nonsemantics-based detection.  ... 
doi:10.5281/zenodo.4130382 fatcat:fge5ohafybbtnma4ckcchpzg5a
« Previous Showing results 1 — 15 out of 6,387 results