Web-Books
in the Austria-Forum
Austria-Forum
Web-Books
Informatik
Joint Austrian Computer Vision and Robotics Workshop 2020
Page - 166 -
  • User
  • Version
    • full version
    • text only version
  • Language
    • Deutsch - German
    • English

Page - 166 - in Joint Austrian Computer Vision and Robotics Workshop 2020

Image of the Page - 166 -

Image of the Page - 166 - in Joint Austrian Computer Vision and Robotics Workshop 2020

Text of the Page - 166 -

EvaluatingCounterMeasuresagainstSIFTKeypointForensics MuhammadSalman,AndreasUhl DepartmentofComputerSciences,UniversityofSalzburg uhl@cs.sbg.ac.at Abstract. Forensic analysis is used to detect image forgeries e.g. the copy move forgery and the object removal forgery. Counter forensic techniques (meth- ods to fool the forensic analyst by concealing traces of manipulation) have become popular in the game of cat and mouse between the analyst and the at- tacker. Methods tocounter forensic techniquesbased on SIFT keypoints are being analysed in this paper (aka anti-forensic techniques), with particular em- phasis on keypoint removal in the context of copy move forgery detection. Local smoothing is sug- gested in this paper and turns out to be a highly at- tractive alternative to techniques investigated in lit- erature so far. 1. Introduction In the past, images were considered as an authen- ticsourceofinformation–withincreasingpopularity and the availability of low-cost image editing soft- ware such as Adobe photoshop, corel paint shop and GIMP the truthfulness of an image can no longer be taken for granted. Among other forgery types, copy move forgery and object removal forgery are the most prominent ones. In a copy move forgery, a part of the image itself is copied and pasted into another part of the same image to conceal an impor- tant object or information, or to conceal that an ob- ject has been removed from the image in an object removal forgery. Inmostcasesof imageforgery, it is extremelydifficult todistinguishbetweenanoriginal imageandtheforgedone. Therefore, it is required to develop methods/techniques to assess the authentic- ityofan image–Digital ImageForensics (DIF[19]) has served this purpose to a large extent. Whenever an image is forged, there are some traces which are leftbehind in theforged image. These tracesareuse- ful for the forensic researcher todetect a forgery. Awide rangeofDIF forgerydetection techniques have been established in the recent years [4, 6, 21]. Besides recent deep learning based schemes, tech- niques relying on Scale Invariance Feature Trans- form (SIFT) keypoints have been shown to be effec- tive. In particular, SIFT keypoints [12] have been proposed to reveal copy move forgeries [6] and im- agecloning[17],aswellas todetectcopyrightedma- terial usingCBIRtechniques [9]. Attackers are making it difficult to apply these techniques by developing counter forensic tech- niques, i.e. by minimising those traces left behind in forged images. In the context of SIFT keypoint forensics, this is done by manipulating SIFT key- points, e.g. removing existing ones or injecting fake keypoints tofool theforensic techniques. Thispaper is acontribution to suchcounter forensicapproaches againstSIFT-keypoint forensic techniques. Inpartic- ular,wefocusonSIFTkeypoint removal techniques. Section 2 reviews corresponding techniques as pro- posed in literature and suggest a new approach. Sec- tion 3 is devoted to an extensive empirical evalua- tion, looking at the tradeoff among image quality, keypoint removal effectiveness as well as the gener- ationofnewkeypoints. In theconclusionwediscuss results obtained and give an outlook to further work in thisdirection. 2.SIFTKeypointRemovalTechniques The simplest approach, global smoothing (GS), reduces the potential keypoints at the level of dif- ference of Gaussian (DoG) by Gaussian smoothing (whichflattens thepixelvaluesofan image), e.g. [1] applies a Gaussian filter with σ = 0.7 and window size 3× 3 as a good compromise between amount of deleted keypoints and overall visual quality of an image. A more sophisticated approach is to first ap- ply GS (the original paper [9] suggests to employ σ = 1.3), detect remaining keypoints, and apply lo- cal smoothing (LS) in patches around detected key- 166
back to the  book Joint Austrian Computer Vision and Robotics Workshop 2020"
Joint Austrian Computer Vision and Robotics Workshop 2020
Title
Joint Austrian Computer Vision and Robotics Workshop 2020
Editor
Graz University of Technology
Location
Graz
Date
2020
Language
English
License
CC BY 4.0
ISBN
978-3-85125-752-6
Size
21.0 x 29.7 cm
Pages
188
Categories
Informatik
Technik
Web-Books
Library
Privacy
Imprint
Austria-Forum
Austria-Forum
Web-Books
Joint Austrian Computer Vision and Robotics Workshop 2020