Identifying Manipulated Images
来源:互联网 发布:nx8.0加工编程 编辑:程序博客网 时间:2024/06/05 06:37
文章摘自:http://www.technologyreview.com/Infotech/20423/?a=f
Photo-editing software gets more sophisticated all the time, allowing users to alter pictures in ways both fun and fraudulent. Last month, for example, a photo of Tibetan antelope roaming alongside a high-speed train was revealed to be a fake, according to the Wall Street Journal, after having been published by China's state-run news agency. Researchers are working on a variety of digital forensics tools, including those that analyze the lighting in an image, in hopes of making it easier to catch such manipulations.
Tools that analyze lighting are particularly useful because "lighting is hard to fake" without leaving a trace, says Micah Kimo Johnson, a researcher in the brain- and cognitive-sciences department at MIT, whose work includes designing tools for digital forensics. As a result, even frauds that look good to the naked eye are likely to contain inconsistencies that can be picked up by software.
Many fraudulent images are created by combining parts of two or more photographs into a single image. When the parts are combined, the combination can sometimes be spotted by variations in the lighting conditions within the image. An observant person might notice such variations, Johnson says; however, "people are pretty insensitive to lighting." Software tools are useful, he says, because they can help quantify lighting irregularities--they can give solid information during evaluations of images submitted as evidence in court, for example--and because they can analyze more complicated lighting conditions than the human eye can. Johnson notes that in many indoor environments, there are dozens of light sources, including lightbulbs and windows. Each light source contributes to the complexity of the overall lighting in the image.
Johnson's tool, which requires an expert user, works by modeling the lighting in the image based on clues garnered from various surfaces within the image. (It works best for images that contain surfaces of a fairly uniform color.) The user indicates the surface he wants to consider, and the program returns a set of coefficients to a complex equation that represents the surrounding lighting environment as a whole. That set of numbers can then be compared with results from other surfaces in the image. If the results fall outside a certain variance, the user can flag the image as possibly manipulated.
Hany Farid, a professor of computer science at Dartmouth College, who collaborated with Johnson in designing the tool and is a leader in the field of digital forensics, says that "for tampering, there's no silver button." Different manipulations will be spotted by different tools, he points out. As a result, Farid says, there's a need for a variety of tools that can help experts detect manipulated images and can give a solid rationale for why those images have been flagged.
- Identifying Manipulated Images
- The Memory Manipulated
- images
- images
- images
- images
- images
- images
- Identifying Keywords
- IDENTIFYING AND NON-IDENTIFYING RELATIONSHIPS
- Identifying and non-identifying relationships
- IDENTIFYING AND NON-IDENTIFYING RELATIONSHIPS in Database
- DB Concept": Identifying and Non-Identifying Relationships
- Identifying Locking Issues
- Identifying App Installations
- Identifying the replacement drive
- Identifying Expensive SQL Statements
- MYSQL Identifying relationship 和non-Identifying relationship 区别。
- 系统分析员、系统架构师、项目经理的区别
- 刚夜骑回来了
- [转]mysql性能的检查和调优方法
- 利用myeclipse 生成Hibernate Mapping文件时出现No entries available的解决办法
- 系统分析
- Identifying Manipulated Images
- 20110525
- Silverlight OA源代码(Silverlight4+SQLServer2005)
- 第二讲准备kodigo的排版服务n_svc_resize
- Ie6 Ie8样式显示问题
- The PDO extension is required for this adapter but the extension is not loaded 错误解决方案
- 连续序列相加得N问题
- 转[多图+详解]Android开发环境搭建全程演示(jdk+eclip+android sdk)
- Android基础篇之显示GIF格式图片