14
1 Exposing Digital Forgeri es Through Chromatic Abe rration Micah K. Johnson, Hany Farid, MM&Sec’06, September 26-27, 2006, Geneva, Switzerland Multimedia Security

Multimedia Security

  • Upload
    stevie

  • View
    26

  • Download
    0

Embed Size (px)

DESCRIPTION

Exposing Digital Forgeries Through Chromatic Aberration Micah K. Johnson, Hany Farid, MM&Sec’06, September 26-27, 2006, Geneva, Switzerland. Multimedia Security. Chromatic Aberration. Ideal imaging system Light passes through the lens and is focused to a single point on the sensor . - PowerPoint PPT Presentation

Citation preview

Page 1: Multimedia Security

1

Exposing Digital Forgeries Through Chromatic Aberration

Micah K. Johnson, Hany Farid,MM&Sec’06, September 26-27, 2006, Geneva, Switzerland

Multimedia Security

Page 2: Multimedia Security

2

Chromatic Aberration

• Ideal imaging system– Light passes through the lens and is focused to a single point on

the sensor.

• Longitudinal chromatic aberration– Longitudinal aberration manifests itself as differences in the focal

planes for different wavelengths of light.

• Lateral chromatic aberration– Lateral aberration manifests itself as a spatial shift in the

locations when light of different wavelengths reach the sensor.

Page 3: Multimedia Security

3

Lateral Chromatic Aberration (1/2)

• 1-D aberration– Snell’s Law : )sin()sin( ffnn

00 )( xxxxxx

br

br

Page 4: Multimedia Security

4

Lateral Chromatic Aberration (2/2)

• 2-D aberration– This model is simply an expansion/contraction about the center of t

he image.– It is common for lens designers to try to minimize chromatic aberrat

ion in lenses.

),( brbr yyxxv

),( 00 yx

00

00

)()(),(),(

yyyyxxxxyxyx

br

br

bbrr

Expansion center :Each vector :

Model parameters : ),,( 00 yx

Page 5: Multimedia Security

5

Estimating Chromatic Aberration

• Assume that the lateral chromatic aberration is constant within each color channel (RGB).

• Using green channel as reference, estimating the aberration between– the red and green channels, the model parameters– the blue and green channels, the model parameters

• Seek the best model parameters to approximate following equations, which bring color channels back into alignment.

),,( 111 yx),,( 222 yx

111

111

)(

)(

yyyy

xxxx

gr

gr

Page 6: Multimedia Security

6

Alignment by Mutual Information

• A metric based on mutual information has been proven successful in such situation.

• The mutual information between R and G, which are the random variables from the pixel intensities of

• The model parameters are determined by maximizing the mutual information as follows (using brute-force iterative search):

Rr Gg gPrPgrPgrPGRI)()(),(log),();(

);(maxarg111 ,, GRIyx

),(),( ggrr yxGandyxR

111

111

)(

)(

yyyy

xxxx

gr

gr

Page 7: Multimedia Security

7

Quantify Estimated Error

• Using average angular error to quantify the error between the estimated and known model parameters.

• The angular error can be computed by the displacement vectors :

• The average angular error over all P pixels in the image is :

10

101

111

1111

000

0000

cos),(

))(())((

),(

))(())((

),(

),(),(

vvvvyx

yyyyxxxx

yxv

yyyyxxxx

yxv

yyxxyxv

gg

gg

gg

gg

grgr

yx

yxP ,

),(1

Page 8: Multimedia Security

8

Experiment of synthetic images

• Generate 512*512 color image with anti-aliased discs of various size and color.

• Simulate aberration by warping blue channel to green channel.• Distortion center is image center.• Chosen 40 α between 1.0004 and 1.0078, 50 images for each.• Average angular error : 3.4 degrees• 93% error < 10 degrees• The result demonstrate the general efficacy of this algorithm.

Page 9: Multimedia Security

9

Experiment of calibrated images

• The goal of this part is finding actual parameters.• Calibration target : a board with ¼-inch diameter holes spaced

1-inch apart. The camera take 500 holes in each picture.• For each channel, computing the center of each hole. Compute

displacements of (R, G) and (B, G).• Using brute-force search by minimizing r.m.s between the mea

sured and modeled displacements to approximate the actual parameters.

),,( 000 yx

Page 10: Multimedia Security

10

Experiment of calibrated images cont.

• Test the efficacy of this approach on real images.• Use the same camera and calibrated lens.• Image size 3020*2008, TIFF format, 205 images.• Results :

Average angular error is 20.3 degree with 96.6% < 60 degrees.Much error is due to other aberrations, that are not considered in this model.

Quality 95% JPEG : error 26.1 degrees with 93.7% < 60 degrees

Quality 85% JPEG : error 26.7 degrees with 93.4% < 60 degrees

Quality 75% JPEG : error 28.9 degrees with 93.2% < 60 degrees

Page 11: Multimedia Security

11

Experiment of forensics

• Based on inconsistent chromatic aberration.• Assume only small portion has been manipulated.• Then use global estimate compare against block estimates.• Judge : Any block that derivates significantly from the global

estimate is suspected of having been manipulated.• Difficult to estimate aberration from block with little spatial frequency

content. (e.g., sky) Only consider 50 blocks with the largest gradients.

),(),(),( 22 yxIyxIyxI yx

Page 12: Multimedia Security

12

Experiment of forensics cont.

• Errors are estimated over 50 blocks per 205 images.• Result :

Average angular error 14.8 degrees with 98% < 60 degrees That is, block error > 60 degrees is considered to be tampered.

Page 13: Multimedia Security

13

Page 14: Multimedia Security

14

Conclusion

• Digital cameras introduce an inherent amount of noise uniformly spread across an image. When creating tampering, it is common to contain inconsistent pattern. Usually detect tamper image by those inconsistent pattern.

• The general digital forensics approach :– First, statistical changes associated with specific types of tampering.– Then, detection methods are designed to estimate these changes and

differentiate.

• There is no general forensics detection method for all types of tampering. But the more detection method can provide the more confidence on tampering detection.