用户名: 密码: 验证码:
Image composite authentication using a single shadow observation
详细信息    查看全文
  • 作者:XiaoChun Cao ; HanDong Zhao ; Chuan Wang ; Wei Zhang
  • 关键词:image forensics ; solar shadow ; sun elevation ; exchangeable image file ; geometry ; based technique ; 鍥惧儚鍙栬瘉 ; 澶槼闃村奖 ; 澶槼楠岃 ; 氦鎹㈠浘褰㈡枃浠?/li> 鍩轰簬鍑犱綍鐨勫彇璇佹妧鏈?/li> 092110
  • 刊名:SCIENCE CHINA Information Sciences
  • 出版年:2015
  • 出版时间:September 2015
  • 年:2015
  • 卷:58
  • 期:9
  • 页码:1-13
  • 全文大小:2,341 KB
  • 参考文献:1.Wang H, Fan M. Centroid-based semi-fragile audio watermarking in hybrid domain. Sci China Inf Sci, 2010, 53: 619鈥?33View Article MATH
    2.Zhao Y, Ni R, Zhu Z. RST transforms resistant image watermarking based on centroid and sector-shaped partition. Sci China Inf Sci, 2012, 55: 650鈥?62MathSciNet View Article
    3.Cox I, Miller M, Bloom J. Digital Watermarking. Morgan Kaufmann Publishers, 2002
    4.Zhu G, Huang J, Kwong S, et al. Fragility analysis of adaptive quantization-based image hashing. IEEE Trans Inf Forensics Secur, 2010, 5: 133鈥?47View Article
    5.Jain A K, Uludag U. Hiding biometric data. IEEE Trans Patt Anal Mach Intell, 2003, 25: 1494鈥?498View Article
    6.Li J, Li X, Yang B, et al. Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur, 2015, 10: 507鈥?18View Article MATH
    7.Xia Z, Wang X, Sun X, et al. Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw, 2014, 7: 1283鈥?291View Article
    8.Xia Z, Wang X, Sun X, et al. Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl, 2014, doi: 10.1007/s11042-014-2381-8
    9.Farid H. A survey of image forgery detection. IEEE Signal Process Mag, 2009, 2: 16鈥?5View Article
    10.Hartley R, Zisserman A. Multiple View Geometry in Computer Vision. Cambridge: Cambridge University Press, 2004View Article MATH
    11.Lv F, Zhao T, Nevatia R. Camera calibration from video of a walking human. IEEE Trans Patt Anal Mach Intell, 2006, 28: 1513鈥?518View Article
    12.Criminisi A, Reid I, Zisserman A. Single view metrology. Int J Comput Vis, 2000, 40: 123鈥?48View Article MATH
    13.Kim J S, Gurdjos P, Kweon I S. Geometric and algebraic constraints of projected concentric circles and their applications to camera calibration. IEEE Trans Patt Anal Mach Intell, 2005, 27: 637鈥?42View Article
    14.Guo F, Chellappa R. Video metrology using a single camera. IEEE Trans Patt Anal Mach Intell, 2010, 32: 1329鈥?335View Article
    15.Cham T J, Ciptadi A, Tan W, et al. Estimating camera pose from a single urban ground-view omnidirectional image and a 2D building outline map. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, San Francisco, 2010. 366鈥?73
    16.Wu L, Cao X, Foroosh H. Camera calibration and geo-location estimation from two shadow trajectories. Comput Vis Image Understand, 2010, 114: 915鈥?27View Article
    17.Farid H, Bravo M J. Image forensic analyses that elude the human visual system. In: Proceedings of SPIE Symposium on Electronic Imaging, San Jose, 2010. 754106
    18.Johnson M K, Farid H. Detecting photographic composites of people. In: Proceedings of International Workshop on Digital Watermarking, Guangzhou, 2007. 19鈥?3
    19.Vab Gool L, Proesmans M, Zisserman A. Planar homologies as a basis for grouping and recognition. Image Vis Comput, 1998, 16: 21鈥?6View Article
    20.Jacobs N, Bies B, Pless R. Using cloud shadows to infer scene structure and camera calibration. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, San Francisco, 2010. 1102鈥?109
    21.Santos P, Dee H M, Fenelon V. Notes on a qualitative theory of shadows. In: Proceedings of Cognitive Robotics workshop at ECAI, Patras, 2008. 47鈥?4
    22.Matthew A, Bosse M. Calibration of outdoor cameras from cast shadows. In: Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, Hague, 2004. 3040鈥?045
    23.Wu L, Cao X. Geo-location estimation from two shadow trajectories. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, San Francisco, 2010. 585鈥?90
    24.Cao X, Foroosh H. Camera calibration and light source orientation from solar shadows. Comput Vis Image Understand, 2007, 105: 60鈥?2View Article
    25.Zhang W, Cao X, Zhang J, et al. Detecting photographic composites using shadows. In: Proceedings of IEEE International Conference on Multimedia and Expo, New York City, 2009. 1042鈥?045
    26.Junejo I N, Foroosh H. Estimating geo-temporal location of stationary cameras using shadow trajectories. In: Proceedings of European Conference on Computer Vision, Marseille, 2008. 318鈥?31
    27.Hays J, Efros A A. IM2GPS: estimating geographic information from a single image. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Anchorage, 2008. 1鈥?
    28.Kee E, O鈥橞rien J, Farid H. Exposing photo manipulation with inconsistent shadows. ACM Trans Graph, 2013, 32: 2956鈥?067View Article
    29.Kee E, O鈥橞rien J, Farid H. Exposing photo manipulation from shading and shadows. ACM Trans Graph, 2014, 33: 165鈥?85View Article
    30.Kakar P, Sudha N. Verifying temporal data in geotagged images via sun azimuth estimation. IEEE Trans Inf Forensics Secur, 2012, 7: 1029鈥?039View Article
    31.Cao X, Shen Y, Shah M, et al. Single view compositing with shadows. Vis Comput, 2005, 21: 639鈥?48View Article
    32.Agarwal S, Snavely N, Simon I, et al. Building Rome in a day. In: Proceedings of IEEE International Conference on Computer Vision, Kyoto, 2009. 72鈥?9
    33.Hoiem D, Efros A E, Hebert M. Recovering surface layout from an image. Int J Comput Vis, 2007, 75: 151鈥?72View Article
    34.Gioi R G, Jakubowicz J, Morel J M, et al. LSD: a fast line segment detector with a false detection control. IEEE Trans Patt Anal Mach Intell, 2010, 32: 722鈥?32View Article
    35.Aggarwal N, Karl W C. Line detection in images through regularized Hough transform. IEEE Trans Patt Anal Mach Intell, 2006, 15: 582鈥?91
    36.Lalonde J F, Efros A A, Narasimhan S G. Estimating natural illumination from a single outdoor image. In: Proceedings of IEEE International Conference on Computer Vision, Kyoto, 2009. 183鈥?90
    37.Rohr R R J. Sundials: History, Theory, and Practice. New York: Dover, 1996
    38.Waugh A. Sundials: Their Theory and Construction. New York: Dover, 1973
  • 作者单位:XiaoChun Cao (1) (2)
    HanDong Zhao (2)
    Chuan Wang (1)
    Wei Zhang (2) (3)

    1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China
    2. School of Computer Science and Technology, Tianjin, 300072, China
    3. Department of Computer Science, City University of Hong Kong, Hong Kong, China
  • 刊物类别:Computer Science
  • 刊物主题:Chinese Library of Science
    Information Systems and Communication Service
  • 出版者:Science China Press, co-published with Springer
  • ISSN:1869-1919
文摘
The paper presents a novel method for image composite authentication based on a single shadow in an outdoor image. Existing methods based on the shadow geometry consistency involve more than two shadow observations. We relax the requirement of two shadow observations in the same scene. As a trade-off, we use the information in EXIF (Exchangeable Image File) based on which the ground truth sun elevation is calculated. We also estimate the sun elevation based on geometric constraints the scene provides, whose consistency serves as the cue to authenticate image forgery. It is the first attempt, to our best knowledge, to make use of sun elevation with shadow of one object to authenticate outdoor images. Also, the novel use of GPS (Global Positioning System), and Date and Time data of captured image makes image forensics possible even in one image containing a single shadow. Experimental results on both the synthetic data and visually plausible images demonstrate the performance of the proposed method.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700