583 research outputs found
Camera-based Image Forgery Localization using Convolutional Neural Networks
Camera fingerprints are precious tools for a number of image forensics tasks.
A well-known example is the photo response non-uniformity (PRNU) noise pattern,
a powerful device fingerprint. Here, to address the image forgery localization
problem, we rely on noiseprint, a recently proposed CNN-based camera model
fingerprint. The CNN is trained to minimize the distance between same-model
patches, and maximize the distance otherwise. As a result, the noiseprint
accounts for model-related artifacts just like the PRNU accounts for
device-related non-uniformities. However, unlike the PRNU, it is only mildly
affected by residuals of high-level scene content. The experiments show that
the proposed noiseprint-based forgery localization method improves over the
PRNU-based reference
Autoencoder with recurrent neural networks for video forgery detection
Video forgery detection is becoming an important issue in recent years,
because modern editing software provide powerful and easy-to-use tools to
manipulate videos. In this paper we propose to perform detection by means of
deep learning, with an architecture based on autoencoders and recurrent neural
networks. A training phase on a few pristine frames allows the autoencoder to
learn an intrinsic model of the source. Then, forged material is singled out as
anomalous, as it does not fit the learned model, and is encoded with a large
reconstruction error. Recursive networks, implemented with the long short-term
memory model, are used to exploit temporal dependencies. Preliminary results on
forged videos show the potential of this approach.Comment: Presented at IS&T Electronic Imaging: Media Watermarking, Security,
and Forensics, January 201
An Overview on Image Forensics
The aim of this survey is to provide a comprehensive overview of the state of the art in the area of image forensics. These techniques have been designed to identify the source of a digital image or to determine whether the content is authentic or modified, without the knowledge of any prior information about the image under analysis (and thus are defined as passive). All these tools work by detecting the presence, the absence, or the incongruence of some traces intrinsically tied to the digital image by the acquisition device and by any other operation after its creation. The paper has been organized by classifying the tools according to the position in the history of the digital image in which the relative footprint is left: acquisition-based methods, coding-based methods, and editing-based schemes
- …