15 research outputs found
Source Camera Verification from Strongly Stabilized Videos
Image stabilization performed during imaging and/or post-processing poses one
of the most significant challenges to photo-response non-uniformity based
source camera attribution from videos. When performed digitally, stabilization
involves cropping, warping, and inpainting of video frames to eliminate
unwanted camera motion. Hence, successful attribution requires the inversion of
these transformations in a blind manner. To address this challenge, we
introduce a source camera verification method for videos that takes into
account the spatially variant nature of stabilization transformations and
assumes a larger degree of freedom in their search. Our method identifies
transformations at a sub-frame level, incorporates a number of constraints to
validate their correctness, and offers computational flexibility in the search
for the correct transformation. The method also adopts a holistic approach in
countering disruptive effects of other video generation steps, such as video
coding and downsizing, for more reliable attribution. Tests performed on one
public and two custom datasets show that the proposed method is able to verify
the source of 23-30% of all videos that underwent stronger stabilization,
depending on computation load, without a significant impact on false
attribution
Ten years after ImageNet: a 360° perspective on artificial intelligence
It is 10 years since neural networks made their spectacular
comeback. Prompted by this anniversary, we take a holistic
perspective on artificial intelligence (AI). Supervised learning for
cognitive tasks is effectively solved—provided we have enough
high-quality labelled data. However, deep neural network
models are not easily interpretable, and thus the debate between
blackbox and whitebox modelling has come to the fore. The rise
of attention networks, self-supervised learning, generative
modelling and graph neural networks has widened the
application space of AI. Deep learning has also propelled the
return of reinforcement learning as a core building block of
autonomous decision-making systems. The possible harms made
possible by new AI technologies have raised socio-technical
issues such as transparency, fairness and accountability. The
dominance of AI by Big Tech who control talent, computing
resources, and most importantly, data may lead to an extreme
AI divide. Despite the recent dramatic and unexpected success
in AI-driven conversational agents, progress in much-heralded
flagship projects like self-driving vehicles remains elusive. Care
must be taken to moderate the rhetoric surrounding the field
and align engineering progress with scientific principles
Video Source Characterization Using Encoding and Encapsulation Characteristics
We introduce a new method for camera-model identification. Our approach
combines two independent aspects of video file generation corresponding to
video coding and media data encapsulation. To this end, a joint representation
of the overall file metadata is developed and used in conjunction with a
two-level hierarchical classification method. At the first level, our method
groups videos into metaclasses considering several abstractions that represent
high-level structural properties of file metadata. This is followed by a more
nuanced classification of classes that comprise each metaclass. The method is
evaluated on more than 20K videos obtained by combining four public video
datasets. Tests show that a balanced accuracy of 91% is achieved in correctly
identifying the class of a video among 119 video classes. This corresponds to
an improvement of 6.5% over the conventional approach based on video file
encapsulation characteristics. Furthermore, we investigate a setting relevant
to forensic file recovery operations where file metadata cannot be located or
are missing but video data is partially available. By estimating a partial list
of encoding parameters from coded video data, we demonstrate that an
identification accuracy of 57% can be achieved in camera-model identification
in the absence of any other file metadata
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approach for detecting copy-move forgery in digital images, which is considerably more robust to lossy compression, scaling and rotation type of manipulations. Also, to improve the computational complexity in detecting the duplicated image regions, we propose to use the notion of counting bloom filters as an alternative to lexicographic sorting, which is a common component of most of the proposed copy-move forgery detection schemes. Our experimental results show that the proposed features can detect duplicated region in the images very accurately, even when the copied region was undergone severe image manipulations. In addition, it is observed that use of counting bloom filters offers a considerable improvement in time efficiency at the expense of a slight reduction in the robustness
Video copy detection based on source device characteristics: A complementary approach to contentbased methods
We introduce a new video copy detection scheme to complement existing content-based techniques. The idea of our scheme is based on the fact that visual media possess unique characteristics that can be used to link a media to its source. Proposed scheme attempts to detect duplicate and modified copies of a video primarily based on peculiarities of imaging sensors rather than content characteristics only. We demonstrate the viability of our scheme by both analyzing its robustness against common video processing operations and evaluating its performance on real world data. Results show that proposed scheme is very effective and suitable for video copy detection application
Flatbed scanner identification based on dust and scratches over scanner platen
In this paper, a novel individual source scanner identification scheme is proposed. The scheme uses traces of dust, dirt, and scratches over scanner platen on scanned images to character-ize a source scanner. The efficacy of the proposed scheme is substantiated with experimental analysis. The robustness of the scheme to the JPEG compression is also investigated. Ex-perimental results show that proposed scheme could be used to match a scanned image to its source. Index Terms — Image analysis, Object detection. 1