Abstract:
Pattern information of a color filter array and algorithm information of color interpolation processing used in photography of input image data are obtained. Comparative image data is generated from the input image data using the pattern information and algorithm information. The comparative image data and input image data are compared to detect alteration of the input image data.
Abstract:
A CFA pattern is extracted from captured image data for each first unit region. A first altered region is detected from disturbance of the periodicity of the CFA pattern, and the first altered region is an image region in which copying has been performed from image data different from the captured image data to the captured image data. The feature amount of the captured image data is extracted for each second unit region different in size from the first unit region. The feature amounts are compared for each second unit region to detect a second altered region, and the second altered region is an image region in which copying has been performed from the captured image data to the captured image data. Information concerning the first and second altered regions are output as alteration detection results in the captured image data.
Abstract:
An image processing method and apparatus for tamper proofing are proposed. The method includes: acquiring a first robust feature representation of a first set of robust feature points for an original image and a second robust feature representation of a second set of robust feature points for an image to be detected, respectively; matching the first robust feature representation with the second robust feature representation so as to acquire mismatching feature points; and determining whether the image to be detected has been tampered with relative to the original image based on a distribution characteristic of the mismatching feature points. With the embodiments of the invention, the distribution characteristic of the mismatching feature points is analyzed based on the robust feature representations of the original image and the image to be detected, so that conventional operations on the image can be distinguished effectively from tampering in the image with sufficient robustness.
Abstract:
This invention provides a technique of preventing determination of image alteration when digital image data has undergone, e.g., rotation without any substantial change in contents. To do this, an area separation processing unit separates image data into areas. For each of the separated areas, an area feature value calculator calculates an area feature value independent of the coordinate information of the image. An area order sorter sorts the separated areas in accordance with the calculated area feature values. A validation data generation processing unit generates validation data based on the sort result.
Abstract:
A method for watermarking of video content is provided. An averaged scene image is computed for each scene of video content by performing averaging of frames present in each scene of video content. For each averaged scene image a set of random numbers are generated using a secret key to identify pixels at random locations of the averaged scene image. The secret key is associated with a watermark pattern corresponding to each averaged scene image. The identified pixels in each averaged scene image are mapped to each pixel of corresponding watermark pattern to obtain respective mapped pixels. Using respective mapped pixels, values of verification information are fetched and assigned using predetermined rules. The values of verification information are arranged to obtain first visual cryptographic share of watermark pattern for each averaged scene image.
Abstract:
In accordance with an embodiment, a method of authenticating images includes electronically receiving an anchor image and a query image, performing a feature point extraction of an anchor image, and performing a feature point extraction of a query image. The method also includes clustering feature points of the anchor image and feature points of the query image, where clustering includes determining matching feature points, determining outlier feature points, and excluding outlier feature points. Whether the anchor image is similar to the query image is determined based on a distance between the feature points of the anchor image and the feature points of the query image. If the anchor image is similar to the query image, possible tampered areas of the query image based on the outlier feature points are identified.
Abstract:
A digital data false alteration detection program causes a computer to execute (a) a step (S1) of dividing digital data into a plurality of smaller block data, (b) a step (S2) of extracting noise inherent to a digital data acquisition device for each of the small block data, (c) a step (S3) of calculating correlation of the noise between adjacent small block data, and (d) a step (S4) of detecting small block data having noise correlation lower than a level predetermined for the surrounding small block data, as falsely altered data.
Abstract:
Techniques described herein are generally related to steganalysis of suspect media. Steganalysis techniques may include receiving instances of suspect media as input for steganalytic processing. A first set of quantized blocks of data elements may be identified within the media, with this first set of blocks being eligible to be embedded with steganographic data. A second set of quantized blocks of data elements may be identified within the media, with this second set of blocks being ineligible to be embedded with steganographic data. The steganalysis techniques may requantize the first and second blocks. In turn, these techniques may compare statistics resulting from requantizing the first block with statistics resulting from requantizing the second block. The steganalysis techniques may then assess whether the first block of data elements is embedded with steganographic features based on how the statistics of the second blocks compare with the statistics of the first blocks.
Abstract:
A method and apparatus are provided for analyzing, identifying, and comparing images. The method can be used with any visually-displayed medium that is represented in any type of color space. An identified image can be authenticated, registered, marked, compared to another image, or recognized using the method and apparatus according to the present invention. At least one characteristic of an image's color space is selected and determined to generate a unique description of the image. This identification information is then used to compare different identified images to determine if they are identical according to a set of predetermined criteria. The predetermined criteria can be adjusted to permit the identification of images that are identical in part. In the preferred embodiment of the present invention, a software search application, such as a search engine or a spider, is used to locate and retrieve an image to be identified from an electronic network. A notification alarm is triggered when a duplicate image is located. In one embodiment, the present invention is implemented using a computer. One or more software applications, software modules, firmware, and hardware, or any combination thereof, are used to determine the identification information for the selected image characteristics, search for images, provide notification of identical images, and to generate a database of identified images.