SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Markos Zampoglou
Postdoctoral Research Associate, CERTH
Workshop on Content Verification Tools
June 6, 2018 @ Thessaloniki, Greece
DETECTING MALICIOUS TAMPERING
IN DIGITAL IMAGES
Image forgeries in the news
https://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile-
too-many/
Image forensics
Lens
Optical
filter
CFA pattern
Real-world
scene
R
G
G
B
Imaging
sensor
(e.g. CCD)
CFA
interpolat.
In-camera
SW
processing
In-camera
JPEG
compress.
DIGITAL CAMERA
Digital image
Tampered
digital image
Out of camera SW
processing
Piva, A. (2013). An overview on image forensics. ISRN Signal Processing, 2013.
Example: JPEG Ghosts
Farid, H. (2009). Exposing digital forgeries from JPEG ghosts. IEEE transactions on information forensics
and security, 4(1), 154-160.
• JPEG compression
• DCT coefficient quantization
• Tampered areas: different
quantization coefficients
• Recompression &
subtraction highlights
differences
• JPEG Ghosts
Tampering localization algorithms
Tampering
localization
Splicing
localization
Copy-move
detection
Block
matching
Keypoint
matching
High-frequency
noise
CFA
patterns
JPEG compression
traces
Filtering and
analysis
Camera-
specific (PRNU)
Quantization
artefacts
Compression grid
misalignment
JPEG ghosts,
ELA
Web image forensics
REVEAL Media Verification Assistant
Features
• Tampering localization maps
• “Magnifying glass”
• GPS localization
• Thumbnails
• Metadata
• Tutorials and examples
• Export PDF
Using the tools
1. Magnifying glass
2. Tampering localization
• Do more than one maps agree?
• Does the highlighted region correspond to a specific
object/part?
• Is this part suspicious/interesting?
3. Reverse search
• Is this the best version for analysis?
Forensic analysis outputs
The pitfalls of image forensics
“MH17 – Forensic Analysis of Satellite Images
Released by the Russian Ministry of Defence”
• A report by Bellingcat1 using ELA to prove that the
Russian MoD had forged the images
• N. Krawetz: Bellingcat “misinterpreted the results”2
1https://www.bellingcat.com
2http://www.hackerfactor.com/blog/index.php?/archives/676-Continuing-Education.html
The future of image forensics
https://www.technologyreview.com/s/610784/this-algorithm-
automatically-spots-face-swaps-in-videos/
Acknowledgements
• Dr. Chryssanthi Iakovidou (CAGI algorithm)
• Olga Papadopoulou (back-end development)
• Lazaros Apostolidis (front-end development)
• Dr. Symeon Papadopoulos (Overview & design)
• Ruben Bouwmeester, DW (Design and evaluation)
• Yiannis Kompatsiaris (Overview)
Thank you!
http://reveal-mklab.iti.gr/reveal
Get in touch!
Markos Zampoglou markzampoglou@iti.gr
Symeon Papadopoulos papadop@iti.gr
Olga Papadopoulou olgapapa@iti.gr

Mais conteúdo relacionado

Semelhante a Presentation of the InVID technologies for image forensics analysis

20110220 computer vision_eruhimov_lecture01
20110220 computer vision_eruhimov_lecture0120110220 computer vision_eruhimov_lecture01
20110220 computer vision_eruhimov_lecture01
Computer Science Club
 

Semelhante a Presentation of the InVID technologies for image forensics analysis (20)

Stegnography projects
Stegnography projectsStegnography projects
Stegnography projects
 
A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering Detection
 
IRJET- Video Forgery Detection using Machine Learning
IRJET-  	  Video Forgery Detection using Machine LearningIRJET-  	  Video Forgery Detection using Machine Learning
IRJET- Video Forgery Detection using Machine Learning
 
Elucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragmentElucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragment
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation Recovery
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
 
20110220 computer vision_eruhimov_lecture01
20110220 computer vision_eruhimov_lecture0120110220 computer vision_eruhimov_lecture01
20110220 computer vision_eruhimov_lecture01
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
SasuriE ajal
SasuriE ajalSasuriE ajal
SasuriE ajal
 
4. ijece edit sat
4. ijece edit sat4. ijece edit sat
4. ijece edit sat
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
 
Baythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationBaythreat Cryptolocker Presentation
Baythreat Cryptolocker Presentation
 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVM
 
MODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptx
MODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptxMODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptx
MODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptx
 
IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics
 
LCI - MICC Seminario-Forensics
LCI - MICC Seminario-ForensicsLCI - MICC Seminario-Forensics
LCI - MICC Seminario-Forensics
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
"High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro...
"High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro..."High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro...
"High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro...
 

Mais de InVID Project

Mais de InVID Project (20)

InVID at IFCN Global Fact V
InVID at IFCN Global Fact VInVID at IFCN Global Fact V
InVID at IFCN Global Fact V
 
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
 
Presentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologiesPresentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologies
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018
 
IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018
 
A state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detectionA state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detection
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verification
 
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
 
Presentation of the InVID Verification Plugin
Presentation of the InVID Verification PluginPresentation of the InVID Verification Plugin
Presentation of the InVID Verification Plugin
 
Overview of the InVID project
Overview of the InVID projectOverview of the InVID project
Overview of the InVID project
 
Second issue of the InVID newsletter
Second issue of the InVID newsletterSecond issue of the InVID newsletter
Second issue of the InVID newsletter
 
The InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserThe InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the Browser
 
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
Video Retrieval for Multimedia Verification  of Breaking News on Social NetworksVideo Retrieval for Multimedia Verification  of Breaking News on Social Networks
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
 
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpoThe InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
 
The InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLabThe InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLab
 
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
 
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITI
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITITRECVID 2016 Ad-hoc Video Seach task, CERTH-ITI
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITI
 
InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016
 
ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016
 
InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Presentation of the InVID technologies for image forensics analysis