334 research outputs found
Optical Font Recognition in Smartphone-Captured Images, and its Applicability for ID Forgery Detection
In this paper, we consider the problem of detecting counterfeit identity
documents in images captured with smartphones. As the number of documents
contain special fonts, we study the applicability of convolutional neural
networks (CNNs) for detection of the conformance of the fonts used with the
ones, corresponding to the government standards. Here, we use multi-task
learning to differentiate samples by both fonts and characters and compare the
resulting classifier with its analogue trained for binary font classification.
We train neural networks for authenticity estimation of the fonts used in
machine-readable zones and ID numbers of the Russian national passport and test
them on samples of individual characters acquired from 3238 images of the
Russian national passport. Our results show that the usage of multi-task
learning increases sensitivity and specificity of the classifier. Moreover, the
resulting CNNs demonstrate high generalization ability as they correctly
classify fonts which were not present in the training set. We conclude that the
proposed method is sufficient for authentication of the fonts and can be used
as a part of the forgery detection system for images acquired with a smartphone
camera
OCR Graph Features for Manipulation Detection in Documents
Detecting manipulations in digital documents is becoming increasingly
important for information verification purposes. Due to the proliferation of
image editing software, altering key information in documents has become widely
accessible. Nearly all approaches in this domain rely on a procedural approach,
using carefully generated features and a hand-tuned scoring system, rather than
a data-driven and generalizable approach. We frame this issue as a graph
comparison problem using the character bounding boxes, and propose a model that
leverages graph features using OCR (Optical Character Recognition). Our model
relies on a data-driven approach to detect alterations by training a random
forest classifier on the graph-based OCR features. We evaluate our algorithm's
forgery detection performance on dataset constructed from real business
documents with slight forgery imperfections. Our proposed model dramatically
outperforms the most closely-related document manipulation detection model on
this task
Receipt Dataset for Fraud Detection
International audienceThe aim of this paper is to introduce a new dataset initially created to work on fraud detection in documents. This dataset is composed of 1969 images of receipts and the associated OCR result for each. The article details the dataset and its interest for the document analysis community. We indeed share this dataset with the community as a benchmark for the evaluation of fraud detection approaches
CTP-Net: Character Texture Perception Network for Document Image Forgery Localization
Due to the progression of information technology in recent years, document
images have been widely disseminated in social networks. With the help of
powerful image editing tools, document images are easily forged without leaving
visible manipulation traces, which leads to severe issues if significant
information is falsified for malicious use. Therefore, the research of document
image forensics is worth further exploring. In a document image, the character
with specific semantic information is most vulnerable to tampering, for which
capturing the forgery traces of the character is the key to localizing the
forged region in document images. Considering both character and image
textures, in this paper, we propose a Character Texture Perception Network
(CTP-Net) to localize the forgery of document images. Based on optical
character recognition, a Character Texture Stream (CTS) is designed to capture
features of text areas that are essential components of a document image.
Meanwhile, texture features of the whole document image are exploited by an
Image Texture Stream (ITS). Combining the features extracted from the CTS and
the ITS, the CTP-Net can reveal more subtle forgery traces from document
images. To overcome the challenge caused by the lack of fake document images,
we design a data generation strategy that is utilized to construct a Fake
Chinese Trademark dataset (FCTM). Through a series of experiments, we show that
the proposed CTP-Net is able to capture tampering traces in document images,
especially in text regions. Experimental results demonstrate that CTP-Net can
localize multi-scale forged areas in document images and outperform the
state-of-the-art forgery localization methods
Security and Privacy for the Internet of Things: An Overview of the Project
As the adoption of digital technologies expands, it becomes vital to build trust and confidence in the integrity of such technology. The SPIRIT project investigates the proof of concept of employing novel secure and privacy-ensuring techniques in services set-up in the Internet of Things (IoT) environment, aiming to increase the trust of users in IoTbased systems. The proposed system integrates three highly novel technology concepts developed by the consortium partners. Specifically, a technology, termed ICMetrics, for deriving encryption keys directly from the operating characteristics of digital devices; secondly, a technology based on a contentbased signature of user data in order to ensure the integrity of sent data upon arrival; a third technology, termed semantic firewall, which is able to allow or deny the transmission of data derived from an IoT device according to the information contained within the data and the information gathered about the requester
Multimedia Forensics
This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field
Multimedia Forensics
This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field
- …