A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimized 3D Lighting Environment Estimation for Image Forgery Detection
2017
IEEE Transactions on Information Forensics and Security
Outline • Introduction & Motivation • Methods -Reflection Model -3D Face Fitting -Lighting Coefficients Estimation • Experiments & Conclusion -Datasets -Estimation Accuracy -Splicing Detection Efficacy ...
-Conclusion Methods -3D Face Fitting • 3D face shape & texture -
Methods -Lighting Coefficients Estimation • Least Square Error Estimation 1 0,0 0,0 1 1, 1 1 2,2 1 2 1, 1 0,0 2 1, 1 2 2,2 2 2,2 0,0 ...
Conclusions • The relaxation of the convexity and constant reflectance assumptions are more applicable to human faces, and it can get improved forgery detection efficacy • The more information we have, ...
doi:10.1109/tifs.2016.2623589
fatcat:o3ria3tgljbqxeems35szkwo7e
Identifying Photo Forgery using Lighting Elements
2016
Indian Journal of Science and Technology
Results are promising and reproducible making the technique an important tool for image forgery detection. ...
Method: By locating the direction of the light source, forgery in the images can be easily detected. Inconsistencies between different light sources in the image highlight image tampering. ...
In such cases light source are estimated to detect the forgeries 2 . ...
doi:10.17485/ijst/2016/v9i48/105748
fatcat:m3xeu4wfnjboba3ehxqoo3q56u
Face Forgery Detection by 3D Decomposition
[article]
2020
arXiv
pre-print
In this paper, we consider a face image as the production of the intervention of the underlying 3D geometry and the lighting environment, and decompose it in a computer graphics view. ...
Specifically, by disentangling the face image into 3D shape, common texture, identity texture, ambient light, and direct light, we find the devil lies in the direct light and the identity texture. ...
[27] propose an optimized solution to estimate the 3D lighting environment. ...
arXiv:2011.09737v1
fatcat:fb7amik5nrgprkn75nuaiu5uua
Robust Copy-Paste Detection Algorithm using SIFT for Digital Image Forensics
2019
International journal of recent technology and engineering
We developed an approach that shows improved techniques through runtime optimizations and compared various parameters with existing methodologies in order to obtain highly correlated image areas for detecting ...
The paper proposes a robust algorithm for the detection of duplicity using Scale Invariant Feature Transform (SIFT) approach. ...
Quantization
Double JPEG
Multiple JPEG
Physics-based techniques
Light Environment
Light Directions (2D)
Light Directions (3D)
Camera based techniques
Colour Filter Array
Source Camera Identification ...
doi:10.35940/ijrte.d7841.118419
fatcat:titppm5tjvaf5p7pvlyngde25q
Recent Advances in Passive Digital Image Security Forensics: A Brief Review
2018
Engineering
In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. ...
Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or ...
[30] to deal with a complex lighting environment. Kee and Farid [31] further built a 3D head model to improve the estimation performance for a complex lighting environment. ...
doi:10.1016/j.eng.2018.02.008
fatcat:vckmpckspreobdhlg2of6p3xma
TCSD: Triple Complementary Streams Detector for Comprehensive Deepfake Detection
2022
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Then, to supplement the depth information for obtaining comprehensive forgery clues, we consider the incoherence between image foreground and background information (FBI) and the inconsistency between ...
In this paper, to mine the new view for Deepfake detection and utilize the correlation of multi-view information contained in images, we propose a novel triple complementary streams detector, namely TCSD ...
And in [71] , Zhu et al. view the face image as the product of the intervention of the underlying 3D geometry and lighting environment, and decompose it into a computer graphics view. ...
doi:10.1145/3558004
fatcat:xvpvkqqerreyrcvzzxtijfccpe
Digital image forgery detection techniques: a survey
2016
ACCENTS Transactions on Information Security
Then in the M-step, the estimation is optimized and updated. ...
They proposed a technique for estimating the direction of an illuminating light source within one degree of freedom to detect forgery. ...
doi:10.19101/tis.2017.25003
fatcat:vyi63ahmrvfeljjpqqiooxy334
Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information
[article]
2022
arXiv
pre-print
Traditional video forensics approaches can localize forgery traces using spatial-temporal analysis on relatively long video clips, while falling short in real-time forgery detection. ...
Then, a lightweight detection network is developed to accurately discover forgery attacks and an efficient localization algorithm is devised to seamlessly track forgery traces in video streams. ...
Analogous to video data, the set of feature maps F can be viewed as a 3D cube that is stacked by a sequence of image-size tensors, making 3D convolutions suitable for our refinement task. ...
arXiv:2201.09487v1
fatcat:fsssrvun6fh4bjpuzq7cw2sz2q
Recent Advances in Digital Image and Video Forensics, Anti-forensics and Counter Anti-forensics
[article]
2024
arXiv
pre-print
This survey explores image and video identification and forgery detection covering both manipulated digital media and generative media. ...
However, media forgery detection techniques are susceptible to anti-forensics; on the other hand, such anti-forensics techniques can themselves be detected. ...
Additionally, a technique was proposed [146] to analyze shadows in 3D lighting environments. ...
arXiv:2402.02089v1
fatcat:sugmqvnwz5f47j5gtz7xm2f4ma
Front Matter: Volume 10033
2016
Eighth International Conference on Digital Image Processing (ICDIP 2016)
Publication of record for individual papers is online in the SPIE Digital Library. SPIEDigitalLibrary.org Paper Numbering: Proceedings of SPIE follow an e-First publication model. ...
small visual dictionaries [10033-60]
10033 5V
Indoor robot 3D scene reconstruction optimization using planar features [10033-183]
10033 5W
Selective background prior for saliency detection [10033 ...
for detecting multi-image forgery [10033-243]
SESSION 12
SUPER-RESOLUTION IMAGE AND COMPUTATIONAL PHOTOGRAPHY
10033 47
Implementation of ill-sampled image geometry super-resolution processing technology ...
doi:10.1117/12.2257252
fatcat:v2ipfp2mp5gedjypzpecahpo7e
Deepfake Generation and Detection: A Benchmark and Survey
[article]
2024
arXiv
pre-print
In addition to the advancements in deepfake generation, corresponding detection technologies need to continuously evolve to regulate the potential misuse of deepfakes, such as for privacy invasion and ...
Subsequently, we comprehensively benchmark representative methods on popular datasets for each field, fully evaluating the latest and influential works published in top conferences/journals. ...
forgery detection. ...
arXiv:2403.17881v1
fatcat:iqies3vnbne5tg26f7y26dtscq
Label Denoising Adversarial Network (LDAN) for Inverse Lighting of Face Images
[article]
2017
arXiv
pre-print
Lighting estimation from face images is an important task and has applications in many areas such as image editing, intrinsic image decomposition, and image forgery detection. ...
Moreover, our method is 100,000 times faster in execution time than prior optimization-based lighting estimation approaches. ...
Lighting estimation can be used in applications such as image editing, 3D structure estimation, and image forgery detection. This paper focuses on estimating lighting from a single face image. ...
arXiv:1709.01993v1
fatcat:z3yxyqllfnf5nntthzrsiuzzgu
Exploring Temporal Coherence for More General Video Face Forgery Detection
[article]
2021
arXiv
pre-print
In this work, we explore to take full advantage of the temporal coherence for video face forgery detection. ...
Extensive experiments show that our framework outperforms existing methods and remains effective when applied to detect new sorts of face forgery videos. ...
We will briefly introduce previous work on face forgery detection in this section. Image Face Forgery Detection. ...
arXiv:2108.06693v1
fatcat:kyl3ipxts5d7dnjfrccks6t7uy
Identifying Image Composites Through Shadow Matte Consistency
2011
IEEE Transactions on Information Forensics and Security
Our approach efficiently extracts these constraints from a single view of a target scene and makes use of them for the digital forgery detection. ...
In this paper, we propose a framework for detecting tampered digital images based on photometric consistency of illumination in shadows. ...
TABLE II FORGERY II DETECTION ON IMAGES INFIG. 11
TABLE IV FORGERY IV DETECTION ON IMAGES IN
TABLE V FORGERY V DETECTION ON IMAGES INFIG. 17 ...
doi:10.1109/tifs.2011.2139209
fatcat:sb6ueskcpjajdlmi4fkt2sbb4e
Passive Framework of Sparse Region Duplication Detection from Digital Images
2022
Journal of Sensors
is a challenging research problem in copy-move forgery detection (CMFD). ...
Copy-move forgery (CMF) is among the most widely employed image manipulation methods. ...
The authors are thankful for this support. ...
doi:10.1155/2022/6580508
doaj:a7925f078e6a4ee1824c4b2a727c6cfd
fatcat:ww5gqdfdqvg2dpeqgiv6a3w56u
« Previous
Showing results 1 — 15 out of 472 results