Multimedia Security, Volume 1. William Puech

Чтение книги онлайн.

Читать онлайн книгу Multimedia Security, Volume 1 - William Puech страница 14

Multimedia Security, Volume 1 - William Puech

Скачать книгу

the results do not show any different behavior in the tampered zone. If another scale is considered, S1, we find that the manipulated area has lower noise levels than the rest of the image. In fact, the noise curves corresponding to macro-blocks containing the spliced region have about 80% of their bins below the global noise curve, this percentage being slightly different for each channel. Finally, S2 provides the strongest proof of falsification. Indeed, the noise curves corresponding to forged macro-blocks have all of their bins below the global estimation in all the three RGB channels.

Photographs of the example of falsification.

      Figure 1.7. Example of falsification: the vase in b) has been cut out and copied onto a), which gives c)

      COMMENT ON FIGURE 1.7.– The original image was taken with ISO 800 and exposure time 1/8 s. The auxiliary image was taken with ISO 100 and exposure time 1.3 s. Both images were taken with the same Panasonic Lumix DMC-FZ8 camera under the high-quality JPEG compression setting.

      This example illustrates the need for a multi-scale approach for noise inconsistency analysis applied to forgery detection.

      To conclude, noise inconsistency analysis is a rich source for forgery detection due to the fact that forged regions are likely to present different noise models from the rest of the image. However, to exploit this, it is necessary to have algorithms that are capable of dealing with signal and frequency-dependent noise. The multi-scale approach is shown as an appropriate framework for noise inconsistency analysis.

      Image demosaicing, which will be presented in detail in section 1.2.2, leaves artifacts that can be used to find falsifications. The Bayer CFA (see Figure 1.3) is by far the most commonly used. Mosaic detection algorithms thus focus on this matrix, although they could be adapted to other patterns.

      Figure 1.8. Percentage of points below the global noise curve and geometric mean for each macro-block at S0, S1 and S2

      1.4.1. Forgery detection through demosaicing analysis

      Detecting demosaicing artifacts can answer two questions:

       – Is it possible that a given image was obtained with a given device?

       – Is there a region of the image whose demosaicing traces are inconsistent with the rest of the image?

      A more promising approach is to directly detect the position of the Bayer matrix. Indeed, while the CFA pattern is almost always a Bayer matrix, the exact position of the matrix, that is, the offset of the CFA, varies. Detecting the position of the matrix therefore has two uses:

       – we can compare the position of the Bayer matrix in the image to the one normally used by a specific device. If the positions do not correspond, then the image was either not taken by that device, or it was cropped in the processing;

       – in the case of copy-move, both internal and external (splicing), there is a probability that the position of the Bayer matrix does not correspond between the original image and the pasted region. Therefore, detecting the position of the Bayer matrix, both globally and locally, can be used to find inconsistencies.

      Most current demosaicing detection methods focus on this second idea, as local CFA inconsistencies give useful information on the image and can be found relatively easily in ideal conditions, that is, in uncompressed images, as we will now present.

      1.4.2. Detecting the position of the Bayer matrix

      Different methods make it possible to detect either the position of the Bayer matrix directly or inconsistencies of this matrix in the image.

      1.4.2.1. Joint estimation of the sampled pixels and the demosaicing algorithm

Скачать книгу