Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








472 Hits in 6.1 sec

Optimized 3D Lighting Environment Estimation for Image Forgery Detection

Bo Peng, Wei Wang, Jing Dong, Tieniu Tan
2017 IEEE Transactions on Information Forensics and Security  
Outline • Introduction & Motivation • Methods -Reflection Model -3D Face Fitting -Lighting Coefficients Estimation • Experiments & Conclusion -Datasets -Estimation Accuracy -Splicing Detection Efficacy  ...  -Conclusion Methods -3D Face Fitting • 3D face shape & texture - Methods -Lighting Coefficients Estimation • Least Square Error Estimation 1 0,0 0,0 1 1, 1 1 2,2 1 2 1, 1 0,0 2 1, 1 2 2,2 2 2,2 0,0  ...  Conclusions • The relaxation of the convexity and constant reflectance assumptions are more applicable to human faces, and it can get improved forgery detection efficacy • The more information we have,  ... 
doi:10.1109/tifs.2016.2623589 fatcat:o3ria3tgljbqxeems35szkwo7e

Identifying Photo Forgery using Lighting Elements

Manoj Kumar, Sangeet Srivastava
2016 Indian Journal of Science and Technology  
Results are promising and reproducible making the technique an important tool for image forgery detection.  ...  Method: By locating the direction of the light source, forgery in the images can be easily detected. Inconsistencies between different light sources in the image highlight image tampering.  ...  In such cases light source are estimated to detect the forgeries 2 .  ... 
doi:10.17485/ijst/2016/v9i48/105748 fatcat:m3xeu4wfnjboba3ehxqoo3q56u

Face Forgery Detection by 3D Decomposition [article]

Xiangyu Zhu, Hao Wang, Hongyan Fei, Zhen Lei, Stan Z. Li
2020 arXiv   pre-print
In this paper, we consider a face image as the production of the intervention of the underlying 3D geometry and the lighting environment, and decompose it in a computer graphics view.  ...  Specifically, by disentangling the face image into 3D shape, common texture, identity texture, ambient light, and direct light, we find the devil lies in the direct light and the identity texture.  ...  [27] propose an optimized solution to estimate the 3D lighting environment.  ... 
arXiv:2011.09737v1 fatcat:fb7amik5nrgprkn75nuaiu5uua

Robust Copy-Paste Detection Algorithm using SIFT for Digital Image Forensics

2019 International journal of recent technology and engineering  
We developed an approach that shows improved techniques through runtime optimizations and compared various parameters with existing methodologies in order to obtain highly correlated image areas for detecting  ...  The paper proposes a robust algorithm for the detection of duplicity using Scale Invariant Feature Transform (SIFT) approach.  ...  Quantization Double JPEG Multiple JPEG Physics-based techniques Light Environment Light Directions (2D) Light Directions (3D) Camera based techniques Colour Filter Array Source Camera Identification  ... 
doi:10.35940/ijrte.d7841.118419 fatcat:titppm5tjvaf5p7pvlyngde25q

Recent Advances in Passive Digital Image Security Forensics: A Brief Review

Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, Xiao-Sa Huang
2018 Engineering  
In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade.  ...  Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or  ...  [30] to deal with a complex lighting environment. Kee and Farid [31] further built a 3D head model to improve the estimation performance for a complex lighting environment.  ... 
doi:10.1016/j.eng.2018.02.008 fatcat:vckmpckspreobdhlg2of6p3xma

TCSD: Triple Complementary Streams Detector for Comprehensive Deepfake Detection

Xiaolong Liu, Yang Yu, Xiaolong Li, Yao Zhao, Guodong Guo
2022 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)  
Then, to supplement the depth information for obtaining comprehensive forgery clues, we consider the incoherence between image foreground and background information (FBI) and the inconsistency between  ...  In this paper, to mine the new view for Deepfake detection and utilize the correlation of multi-view information contained in images, we propose a novel triple complementary streams detector, namely TCSD  ...  And in [71] , Zhu et al. view the face image as the product of the intervention of the underlying 3D geometry and lighting environment, and decompose it into a computer graphics view.  ... 
doi:10.1145/3558004 fatcat:xvpvkqqerreyrcvzzxtijfccpe

Digital image forgery detection techniques: a survey

Shwetha B, S V Sathyanarayana
2016 ACCENTS Transactions on Information Security  
Then in the M-step, the estimation is optimized and updated.  ...  They proposed a technique for estimating the direction of an illuminating light source within one degree of freedom to detect forgery.  ... 
doi:10.19101/tis.2017.25003 fatcat:vyi63ahmrvfeljjpqqiooxy334

Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information [article]

Yong Huang, Xiang Li, Wei Wang, Tao Jiang, Qian Zhang
2022 arXiv   pre-print
Traditional video forensics approaches can localize forgery traces using spatial-temporal analysis on relatively long video clips, while falling short in real-time forgery detection.  ...  Then, a lightweight detection network is developed to accurately discover forgery attacks and an efficient localization algorithm is devised to seamlessly track forgery traces in video streams.  ...  Analogous to video data, the set of feature maps F can be viewed as a 3D cube that is stacked by a sequence of image-size tensors, making 3D convolutions suitable for our refinement task.  ... 
arXiv:2201.09487v1 fatcat:fsssrvun6fh4bjpuzq7cw2sz2q

Recent Advances in Digital Image and Video Forensics, Anti-forensics and Counter Anti-forensics [article]

Maryam Al-Fehani, Saif Al-Kuwari
2024 arXiv   pre-print
This survey explores image and video identification and forgery detection covering both manipulated digital media and generative media.  ...  However, media forgery detection techniques are susceptible to anti-forensics; on the other hand, such anti-forensics techniques can themselves be detected.  ...  Additionally, a technique was proposed [146] to analyze shadows in 3D lighting environments.  ... 
arXiv:2402.02089v1 fatcat:sugmqvnwz5f47j5gtz7xm2f4ma

Front Matter: Volume 10033

2016 Eighth International Conference on Digital Image Processing (ICDIP 2016)  
Publication of record for individual papers is online in the SPIE Digital Library. SPIEDigitalLibrary.org Paper Numbering: Proceedings of SPIE follow an e-First publication model.  ...  small visual dictionaries [10033-60] 10033 5V Indoor robot 3D scene reconstruction optimization using planar features [10033-183] 10033 5W Selective background prior for saliency detection [10033  ...  for detecting multi-image forgery [10033-243] SESSION 12 SUPER-RESOLUTION IMAGE AND COMPUTATIONAL PHOTOGRAPHY 10033 47 Implementation of ill-sampled image geometry super-resolution processing technology  ... 
doi:10.1117/12.2257252 fatcat:v2ipfp2mp5gedjypzpecahpo7e

Deepfake Generation and Detection: A Benchmark and Survey [article]

Gan Pei, Jiangning Zhang, Menghan Hu, Guangtao Zhai, Chengjie Wang, Zhenyu Zhang, Jian Yang, Chunhua Shen, Dacheng Tao
2024 arXiv   pre-print
In addition to the advancements in deepfake generation, corresponding detection technologies need to continuously evolve to regulate the potential misuse of deepfakes, such as for privacy invasion and  ...  Subsequently, we comprehensively benchmark representative methods on popular datasets for each field, fully evaluating the latest and influential works published in top conferences/journals.  ...  forgery detection.  ... 
arXiv:2403.17881v1 fatcat:iqies3vnbne5tg26f7y26dtscq

Label Denoising Adversarial Network (LDAN) for Inverse Lighting of Face Images [article]

Hao Zhou and Jin Sun and Yaser Yacoob and David W. Jacobs
2017 arXiv   pre-print
Lighting estimation from face images is an important task and has applications in many areas such as image editing, intrinsic image decomposition, and image forgery detection.  ...  Moreover, our method is 100,000 times faster in execution time than prior optimization-based lighting estimation approaches.  ...  Lighting estimation can be used in applications such as image editing, 3D structure estimation, and image forgery detection. This paper focuses on estimating lighting from a single face image.  ... 
arXiv:1709.01993v1 fatcat:z3yxyqllfnf5nntthzrsiuzzgu

Exploring Temporal Coherence for More General Video Face Forgery Detection [article]

Yinglin Zheng, Jianmin Bao, Dong Chen, Ming Zeng, Fang Wen
2021 arXiv   pre-print
In this work, we explore to take full advantage of the temporal coherence for video face forgery detection.  ...  Extensive experiments show that our framework outperforms existing methods and remains effective when applied to detect new sorts of face forgery videos.  ...  We will briefly introduce previous work on face forgery detection in this section. Image Face Forgery Detection.  ... 
arXiv:2108.06693v1 fatcat:kyl3ipxts5d7dnjfrccks6t7uy

Identifying Image Composites Through Shadow Matte Consistency

Qiguang Liu, Xiaochun Cao, Chao Deng, Xiaojie Guo
2011 IEEE Transactions on Information Forensics and Security  
Our approach efficiently extracts these constraints from a single view of a target scene and makes use of them for the digital forgery detection.  ...  In this paper, we propose a framework for detecting tampered digital images based on photometric consistency of illumination in shadows.  ...  TABLE II FORGERY II DETECTION ON IMAGES INFIG. 11 TABLE IV FORGERY IV DETECTION ON IMAGES IN TABLE V FORGERY V DETECTION ON IMAGES INFIG. 17  ... 
doi:10.1109/tifs.2011.2139209 fatcat:sb6ueskcpjajdlmi4fkt2sbb4e

Passive Framework of Sparse Region Duplication Detection from Digital Images

Zahid Mehmood, Hassan Nazeer Chaudhry, Rizwan Ali Naqvi, Farzana Kulsoom, Asmaa Munshi, Muhammad Bilal
2022 Journal of Sensors  
is a challenging research problem in copy-move forgery detection (CMFD).  ...  Copy-move forgery (CMF) is among the most widely employed image manipulation methods.  ...  The authors are thankful for this support.  ... 
doi:10.1155/2022/6580508 doaj:a7925f078e6a4ee1824c4b2a727c6cfd fatcat:ww5gqdfdqvg2dpeqgiv6a3w56u
« Previous Showing results 1 — 15 out of 472 results