242 research outputs found
An Evaluation of Popular Copy-Move Forgery Detection Approaches
A copy-move forgery is created by copying and pasting content within the same
image, and potentially post-processing it. In recent years, the detection of
copy-move forgeries has become one of the most actively researched topics in
blind image forensics. A considerable number of different algorithms have been
proposed focusing on different types of postprocessed copies. In this paper, we
aim to answer which copy-move forgery detection algorithms and processing steps
(e.g., matching, filtering, outlier detection, affine transformation
estimation) perform best in various postprocessing scenarios. The focus of our
analysis is to evaluate the performance of previously proposed feature sets. We
achieve this by casting existing algorithms in a common pipeline. In this
paper, we examined the 15 most prominent feature sets. We analyzed the
detection performance on a per-image basis and on a per-pixel basis. We created
a challenging real-world copy-move dataset, and a software framework for
systematic image manipulation. Experiments show, that the keypoint-based
features SIFT and SURF, as well as the block-based DCT, DWT, KPCA, PCA and
Zernike features perform very well. These feature sets exhibit the best
robustness against various noise sources and downsampling, while reliably
identifying the copied regions.Comment: Main paper: 14 pages, supplemental material: 12 pages, main paper
appeared in IEEE Transaction on Information Forensics and Securit
Digital documentation and planning of student projects in engineering and product design using e-portfolios
The use of e-portfolios is very rare among academic teaching on engineering design and product design especially in Germany. Written exams and reports are not always suitable to evaluate competencies and skills of students gained through such projects. A wide range of competencies is required and a variety of results (sketches, 3D-CAD-models, real prototypes, user feedback, etc.) are generated, that cannot be adequately represented in a written exam or report. We see the use of e-portfolios as a solution to this problem. Our goal is to enable the documentation and planning of the entire product design process using e-portfolios for student projects in a course on product design - and thus also include the production and assembly of the individual parts until the real final product. This short-paper will detail the necessary preparations and changes in content and organization to a course on product design and how the students are introduced to the use of e-portfolios. We develop a three-step process, that supports i) the preparation of e-portfolios (in advance to the course), ii) the design of individual e-portfolios (during the course) and iii) the evaluation at the end of the course. The main findings of this work are seen in a provided recommendation on structure and design of an e-portfolio based course on product design (integrating required and useful software-tools and manufacturing machine interfaces) as well as the identified specific requirements of students and lecturers that need to be fulfilled to successfully implement e-portfolios
Towards Unconstrained Audio Splicing Detection and Localization with Neural Networks
Freely available and easy-to-use audio editing tools make it straightforward
to perform audio splicing. Convincing forgeries can be created by combining
various speech samples from the same person. Detection of such splices is
important both in the public sector when considering misinformation, and in a
legal context to verify the integrity of evidence. Unfortunately, most existing
detection algorithms for audio splicing use handcrafted features and make
specific assumptions. However, criminal investigators are often faced with
audio samples from unconstrained sources with unknown characteristics, which
raises the need for more generally applicable methods.
With this work, we aim to take a first step towards unconstrained audio
splicing detection to address this need. We simulate various attack scenarios
in the form of post-processing operations that may disguise splicing. We
propose a Transformer sequence-to-sequence (seq2seq) network for splicing
detection and localization. Our extensive evaluation shows that the proposed
method outperforms existing dedicated approaches for splicing detection [3, 10]
as well as the general-purpose networks EfficientNet [28] and RegNet [25].Comment: Accepted at MMFORWILD 2022, ICPR Workshops - Code:
https://faui1-gitlab.cs.fau.de/denise.moussa/audio-splicing-localizatio
Can We Identify Unknown Audio Recording Environments in Forensic Scenarios?
Audio recordings may provide important evidence in criminal investigations.
One such case is the forensic association of the recorded audio to the
recording location. For example, a voice message may be the only investigative
cue to narrow down the candidate sites for a crime. Up to now, several works
provide tools for closed-set recording environment classification under
relatively clean recording conditions. However, in forensic investigations, the
candidate locations are case-specific. Thus, closed-set tools are not
applicable without retraining on a sufficient amount of training samples for
each case and respective candidate set. In addition, a forensic tool has to
deal with audio material from uncontrolled sources with variable properties and
quality.
In this work, we therefore attempt a major step towards practical forensic
application scenarios. We propose a representation learning framework called
EnvId, short for environment identification. EnvId avoids case-specific
retraining. Instead, it is the first tool for robust few-shot classification of
unseen environment locations. We demonstrate that EnvId can handle forensically
challenging material. It provides good quality predictions even under unseen
signal degradations, environment characteristics or recording position
mismatches.
Our code and datasets will be made publicly available upon acceptance.Comment: This work has been submitted to the IEEE for possible publicatio
Illuminant Estimation by Voting
Obtaining an estimate of the illuminant color is an important component in many image analysis applications. Due to the complexity of the problem many restrictive assumptions are commonly applied, making the existing illuminant estimation methodologies not widely applicable on natural images. We propose a methodology which analyzes a large number of regions in an image. An illuminant estimate is obtained independently from each region and a global illumination color is computed by consensus. Each region itself is mainly composed by pixels which simultaneously exhibit both diffuse and specular reflection. This allows for a larger inclusion of pixels than purely specularitybased methods, while avoiding, at the same time, some of the restrictive assumptions of purely diffuse-based approaches. As such, our technique is particularly well-suited for analyzing real-world images. Experiments with laboratory data show that our methodology outperforms 75 % of other illuminant estimation methods. On natural images, the algorithm is very stable and provides qualitatively correct estimates. 1
- …