SlideShare a Scribd company logo
1 of 26
Download to read offline
Detecting malicious tampering in
digital images
Markos Zampoglou - markzampoglou@iti.gr
Information Technologies Institute (ITI)
Centre for Research and Technology Hellas (CERTH)
Workshop on Tools for Video Discovery & Verification in Social Media
Dec 14, 2017 @ Thessaloniki, Greece
Image forgeries in the news
https://www.snopes.com/photos/animals/puertorico.asp
Image forgeries in the news
http://www.imperfectedblog.com/2015/11/crimes-of-retouching-and-the-
importance-of-community/
Image forgeries in the news
https://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile-
too-many/
The promise of image forensics
Image verification: tools of the trade
• Metadata analysis
• Photoshop? Dates/locations? Copyrights?
• Reverse image search
• Content analysis / tampering localization
Tampering localization algorithms
Splicing
localization
Copy-move
detection
Block
matching
Keypoint
matching
High-frequency
noise
CFA
patterns
JPEG compression
traces
Filtering and
analysis
Camera-
specific (PRNU)
Quantization
artefacts
Compression grid
misalignment
JPEG ghosts,
ELA
REVEAL Media Verification Assistant (1/2)
http://reveal-mklab.iti.gr/
• REVEAL (FP7, 2013-2016)
• Second round of testing as part of InVID
• Collaboration between CERTH and DW
• Features:
• Metadata: listing, GPS geolocation, EXIF thumbnails
• Reverse image search: Google Images integration
• Tampering detection: Eight state-of-the-art algorithms
• Aims:
• a comprehensive, self-contained verification toolset
• an evaluation framework for verification tools and protocols
REVEAL Media Verification Assistant (2/2)
Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y., Bouwmeester, R., & Spangenberg, J. (2016, April). Web
and Social Media Image Forensics for News Professionals. In SMN@ ICWSM.
Comparison of verification tools
FotoForensics1 Forensically2 Ghiro3 REVEAL4
ELA X X X X
Ghost X
DW Noise X
Median Noise X X
Block Artifact X
Double Quantization X
Copy-move X*
Thumbnail X X
Metadata X X X X
Geotagging X X X X
Reverse search X
1http://fotoforensics.com
2http://29a.ch/photo-forensics/
3http://www.imageforensic.org/
4http://reveal-mklab.iti.gr/reveal/verify.html
*Forensically implements a very simple block-
matching algorithm with low robustness
Further features
• Open source1
• Public demo version
• Real-world examples of detections and non-
detections
• Tutorials and algorithm explanations
• “Magnifying glass” for examining fine details
• Scrolling image/map overlay
• Export personalized analysis as PDF
1https://github.com/MKLab-ITI/image-forensics
Usage distribution
France 401
Netherlands 262
Germany 214
UK 181
US 153
Argentina 96
Egypt 52
Current challenges (1/2)
• Absence of automatic methods to analyse metadata
• High computational requirements
• Interpretation of results not always intuitive
Current challenges (2/2)
• When applied in real-world cases, algorithms
perform significantly worse than in research
datasets
• This could partly be attributed to the effects of Social
Media dissemination
Identifying Untampered Images (1/2)
• Interpreting the results (especially for non-
detections) can be an issue
Untampered:
Tampered:
Algorithm: ADQ1 (Lin et al, 2009)
Identifying Untampered Images (2/2)
• Not all algorithms are created equal
• Still, some training is usually necessary
Untampered:
Tampered:
Algorithm: ADQ2 (Bianchi et al, 2011)
The pitfalls of image forensics
“MH17 – Forensic Analysis of Satellite Images
Released by the Russian Ministry of Defence”
• A report by Bellingcat1 using ELA to prove that the
Russian MoD had forged the images
• N. Krawetz: Bellingcat “misinterpreted the results”2
1https://www.bellingcat.com
2http://www.hackerfactor.com/blog/index.php?/archives/676-Continuing-Education.html
Future steps
• Add a tampering probability score
• Generate a “merged” tampering heat map
• Test new approaches based on deep learning
• Keep improving stability, speed, GUI responsiveness
Acknowledgements
• Dr. Chryssanthi Iakovidou (CAGI algorithm)
• Olga Papadopoulou (back-end development)
• Lazaros Apostolidis (front-end development)
• Dr. Symeon Papadopoulos (Overview & design)
• Ruben Bouwmeester, DW (Design and evaluation)
• Yiannis Kompatsiaris (Overview)
Thank you!
http://reveal-mklab.iti.gr/reveal
Get in touch!
Markos Zampoglou markzampoglou@iti.gr
Symeon Papadopoulos papadop@iti.gr
References
• Bianchi, Tiziano, Alessia De Rosa, and Alessandro Piva. "Improved DCT coefficient analysis
for forgery localization in JPEG images." In Acoustics, Speech and Signal Processing
(ICASSP), 2011 IEEE International Conference on, pp. 2444-2447. IEEE, 2011.
• Ferrara, Pasquale, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. "Image forgery
localization via fine-grained analysis of cfa artifacts." Information Forensics and Security,
IEEE Transactions on 7, no. 5 (2012): 1566-1577.
• Farid, Hany. "Exposing digital forgeries from JPEG ghosts." Information Forensics and
Security, IEEE Transactions on 4, no. 1 (2009): 154-160.
• Fontani, Marco, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni. "A
framework for decision fusion in image forensics based on dempster–shafer theory of
evidence." Information Forensics and Security, IEEE Transactions on 8, no. 4 (2013): 593-
607.
• Lin, Zhouchen, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. "Fast, automatic and fine-
grained tampered JPEG image detection via DCT coefficient analysis." Pattern Recognition
42, no. 11 (2009): 2492-2501.
• Mahdian, Babak and Stanislav Saic, “Using noise inconsistencies for blind image forensics,”
Image and Vision Computing, vol. 27, no. 10, pp. 1497–1503, 2009.
• Zampoglou, Markos, Symeon Papadopoulos, and Yiannis Kompatsiaris. "Detecting image
splicing in the wild (WEB)." In Multimedia & Expo Workshops (ICMEW), 2015 IEEE
International Conference on, pp. 1-6. IEEE, 2015.
Evaluation methodology
• Quantitative
• Six reference datasets (images + binary masks of tampering
= “ground truth”)
• Measures capturing the matching between ground truth
mask and algorithm output
• Comparison of 14 algorithms, “best” six plus a newly
proposed one ended up in the tool
• Qualitative
• Informal feedback has been received by end users
• Pertains to both usability and quality of results
Zampoglou, M., Papadopoulos, S., & Kompatsiaris, Y. (2017). Large-scale evaluation of splicing localization
algorithms for web images. Multimedia Tools and Applications, 76(4), 4801-4834.
Quantitative evaluations (1/3)
• To assess the performance of the implemented algorithms,
we evaluated their performance on a large number of
images
• Benchmark datasets:
• Columbia Uncompressed (Hsu and Chang 2006, “COLUMB”), First
Image Forensics Challenge (“CHAL”)1, Fontani et al 2013 (“FON”)
• Additional datasets
• The Wild Web Dataset (Zampoglou et al, 2015)
• The Deutsche Welle Image Forensics Dataset
1http://ifc.recod.ic.unicamp.br/fc
Quantitative evaluations (2/3)
• Evaluations on benchmark datasets:
• Robustness to resaves:
Quantitative evaluations (3/3)
• Performance on the Wild Web Dataset:
• Performance on the Deutsche Welle Image
Forensics Dataset:
• Successful detection for 2 out of 6 cases (4 out of 12
images)
Algorithm DQ GHO BLK ELA DWHF MED
Detections
(out of 80)
3 12 3 2 3 1
Time (sec) 0.27 6.12 13.40 1.29 122.13 0.54
Image verification software:
requirements
• Easy to use; requires little expertise and training
• Integrates easily in established workflows and IT
systems
• Provides all common functionalities
• Metadata analysis
• Reverse image search
• Tampering localization
• Clear, interpretable and transparent output
• No “black box” results
• Intuitive and simple interface
• Allows sharing and archiving of reports and
conclusions
• Comparable or better results than existing solutions

More Related Content

What's hot

Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelAlex Pinto
 
Fuzzing: Challenges and Reflections
Fuzzing: Challenges and ReflectionsFuzzing: Challenges and Reflections
Fuzzing: Challenges and Reflectionsmboehme
 
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics:  Why Big Data Needs Rich DataLies, Damned Lies and Software Analytics:  Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich DataMargaret-Anne Storey
 
Use Combinatorial Testing for Mobile Device Fragmentation
Use Combinatorial Testing for Mobile Device FragmentationUse Combinatorial Testing for Mobile Device Fragmentation
Use Combinatorial Testing for Mobile Device FragmentationJosiah Renaudin
 
Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of FindingsCellebrite
 

What's hot (6)

Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity Model
 
Fuzzing: Challenges and Reflections
Fuzzing: Challenges and ReflectionsFuzzing: Challenges and Reflections
Fuzzing: Challenges and Reflections
 
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics:  Why Big Data Needs Rich DataLies, Damned Lies and Software Analytics:  Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
 
Final october interviewing_techniques
Final october interviewing_techniquesFinal october interviewing_techniques
Final october interviewing_techniques
 
Use Combinatorial Testing for Mobile Device Fragmentation
Use Combinatorial Testing for Mobile Device FragmentationUse Combinatorial Testing for Mobile Device Fragmentation
Use Combinatorial Testing for Mobile Device Fragmentation
 
Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of Findings
 

Similar to Presentation of the InVID tools for image forensics analysis

Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsSymeon Papadopoulos
 
Classification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsClassification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsTELKOMNIKA JOURNAL
 
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...sipij
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryIRJET Journal
 
Microlearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitonsMicrolearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitonsDenis Havlik
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...IRJET Journal
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...IRJET Journal
 
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionTutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionJean-Paul Calbimonte
 
International Visual Methods Conference Sept OU 2011
International Visual Methods Conference Sept OU 2011International Visual Methods Conference Sept OU 2011
International Visual Methods Conference Sept OU 2011Nicola Louise Beddall-Hill
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...IRJET Journal
 
Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.sandipan paul
 
IRJET- A Survey on Object Detection using Deep Learning Techniques
IRJET- A Survey on Object Detection using Deep Learning TechniquesIRJET- A Survey on Object Detection using Deep Learning Techniques
IRJET- A Survey on Object Detection using Deep Learning TechniquesIRJET Journal
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Computer vision introduction
Computer vision  introduction Computer vision  introduction
Computer vision introduction Wael Badawy
 
Object tracking presentation
Object tracking  presentationObject tracking  presentation
Object tracking presentationMrsShwetaBanait1
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object DetectionIRJET Journal
 
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning ApproachesBroadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approachesijtsrd
 
6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docx6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docxpriestmanmable
 

Similar to Presentation of the InVID tools for image forensics analysis (20)

Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News Professionals
 
Classification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsClassification and evaluation of digital forensic tools
Classification and evaluation of digital forensic tools
 
Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...
Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...
Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...
 
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation Recovery
 
Microlearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitonsMicrolearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitons
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
 
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionTutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
 
International Visual Methods Conference Sept OU 2011
International Visual Methods Conference Sept OU 2011International Visual Methods Conference Sept OU 2011
International Visual Methods Conference Sept OU 2011
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
 
Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.
 
IRJET- A Survey on Object Detection using Deep Learning Techniques
IRJET- A Survey on Object Detection using Deep Learning TechniquesIRJET- A Survey on Object Detection using Deep Learning Techniques
IRJET- A Survey on Object Detection using Deep Learning Techniques
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Computer vision introduction
Computer vision  introduction Computer vision  introduction
Computer vision introduction
 
Object tracking final
Object tracking finalObject tracking final
Object tracking final
 
Object tracking presentation
Object tracking  presentationObject tracking  presentation
Object tracking presentation
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object Detection
 
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning ApproachesBroadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approaches
 
6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docx6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docx
 

More from InVID Project

InVID at IFCN Global Fact V
InVID at IFCN Global Fact VInVID at IFCN Global Fact V
InVID at IFCN Global Fact VInVID Project
 
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...InVID Project
 
Presentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologiesPresentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologiesInVID Project
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018InVID Project
 
IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018InVID Project
 
A state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detectionA state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detectionInVID Project
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationInVID Project
 
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...InVID Project
 
Presentation of the InVID Verification Plugin
Presentation of the InVID Verification PluginPresentation of the InVID Verification Plugin
Presentation of the InVID Verification PluginInVID Project
 
Overview of the InVID project
Overview of the InVID projectOverview of the InVID project
Overview of the InVID projectInVID Project
 
Second issue of the InVID newsletter
Second issue of the InVID newsletterSecond issue of the InVID newsletter
Second issue of the InVID newsletterInVID Project
 
The InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserThe InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserInVID Project
 
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
Video Retrieval for Multimedia Verification  of Breaking News on Social NetworksVideo Retrieval for Multimedia Verification  of Breaking News on Social Networks
Video Retrieval for Multimedia Verification of Breaking News on Social NetworksInVID Project
 
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpoThe InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpoInVID Project
 
The InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLabThe InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLabInVID Project
 
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...InVID Project
 
InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016InVID Project
 
ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016InVID Project
 
InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16InVID Project
 
InVID platform presentation at SMVW16
InVID platform presentation at SMVW16InVID platform presentation at SMVW16
InVID platform presentation at SMVW16InVID Project
 

More from InVID Project (20)

InVID at IFCN Global Fact V
InVID at IFCN Global Fact VInVID at IFCN Global Fact V
InVID at IFCN Global Fact V
 
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
 
Presentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologiesPresentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologies
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018
 
IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018
 
A state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detectionA state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detection
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verification
 
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
 
Presentation of the InVID Verification Plugin
Presentation of the InVID Verification PluginPresentation of the InVID Verification Plugin
Presentation of the InVID Verification Plugin
 
Overview of the InVID project
Overview of the InVID projectOverview of the InVID project
Overview of the InVID project
 
Second issue of the InVID newsletter
Second issue of the InVID newsletterSecond issue of the InVID newsletter
Second issue of the InVID newsletter
 
The InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserThe InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the Browser
 
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
Video Retrieval for Multimedia Verification  of Breaking News on Social NetworksVideo Retrieval for Multimedia Verification  of Breaking News on Social Networks
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
 
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpoThe InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
 
The InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLabThe InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLab
 
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
 
InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016
 
ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016
 
InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16
 
InVID platform presentation at SMVW16
InVID platform presentation at SMVW16InVID platform presentation at SMVW16
InVID platform presentation at SMVW16
 

Recently uploaded

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Presentation of the InVID tools for image forensics analysis

  • 1. Detecting malicious tampering in digital images Markos Zampoglou - markzampoglou@iti.gr Information Technologies Institute (ITI) Centre for Research and Technology Hellas (CERTH) Workshop on Tools for Video Discovery & Verification in Social Media Dec 14, 2017 @ Thessaloniki, Greece
  • 2. Image forgeries in the news https://www.snopes.com/photos/animals/puertorico.asp
  • 3. Image forgeries in the news http://www.imperfectedblog.com/2015/11/crimes-of-retouching-and-the- importance-of-community/
  • 4. Image forgeries in the news https://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile- too-many/
  • 5. The promise of image forensics
  • 6. Image verification: tools of the trade • Metadata analysis • Photoshop? Dates/locations? Copyrights? • Reverse image search • Content analysis / tampering localization
  • 7. Tampering localization algorithms Splicing localization Copy-move detection Block matching Keypoint matching High-frequency noise CFA patterns JPEG compression traces Filtering and analysis Camera- specific (PRNU) Quantization artefacts Compression grid misalignment JPEG ghosts, ELA
  • 8. REVEAL Media Verification Assistant (1/2) http://reveal-mklab.iti.gr/ • REVEAL (FP7, 2013-2016) • Second round of testing as part of InVID • Collaboration between CERTH and DW • Features: • Metadata: listing, GPS geolocation, EXIF thumbnails • Reverse image search: Google Images integration • Tampering detection: Eight state-of-the-art algorithms • Aims: • a comprehensive, self-contained verification toolset • an evaluation framework for verification tools and protocols
  • 9. REVEAL Media Verification Assistant (2/2) Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y., Bouwmeester, R., & Spangenberg, J. (2016, April). Web and Social Media Image Forensics for News Professionals. In SMN@ ICWSM.
  • 10. Comparison of verification tools FotoForensics1 Forensically2 Ghiro3 REVEAL4 ELA X X X X Ghost X DW Noise X Median Noise X X Block Artifact X Double Quantization X Copy-move X* Thumbnail X X Metadata X X X X Geotagging X X X X Reverse search X 1http://fotoforensics.com 2http://29a.ch/photo-forensics/ 3http://www.imageforensic.org/ 4http://reveal-mklab.iti.gr/reveal/verify.html *Forensically implements a very simple block- matching algorithm with low robustness
  • 11. Further features • Open source1 • Public demo version • Real-world examples of detections and non- detections • Tutorials and algorithm explanations • “Magnifying glass” for examining fine details • Scrolling image/map overlay • Export personalized analysis as PDF 1https://github.com/MKLab-ITI/image-forensics
  • 12. Usage distribution France 401 Netherlands 262 Germany 214 UK 181 US 153 Argentina 96 Egypt 52
  • 13. Current challenges (1/2) • Absence of automatic methods to analyse metadata • High computational requirements • Interpretation of results not always intuitive
  • 14. Current challenges (2/2) • When applied in real-world cases, algorithms perform significantly worse than in research datasets • This could partly be attributed to the effects of Social Media dissemination
  • 15. Identifying Untampered Images (1/2) • Interpreting the results (especially for non- detections) can be an issue Untampered: Tampered: Algorithm: ADQ1 (Lin et al, 2009)
  • 16. Identifying Untampered Images (2/2) • Not all algorithms are created equal • Still, some training is usually necessary Untampered: Tampered: Algorithm: ADQ2 (Bianchi et al, 2011)
  • 17. The pitfalls of image forensics “MH17 – Forensic Analysis of Satellite Images Released by the Russian Ministry of Defence” • A report by Bellingcat1 using ELA to prove that the Russian MoD had forged the images • N. Krawetz: Bellingcat “misinterpreted the results”2 1https://www.bellingcat.com 2http://www.hackerfactor.com/blog/index.php?/archives/676-Continuing-Education.html
  • 18. Future steps • Add a tampering probability score • Generate a “merged” tampering heat map • Test new approaches based on deep learning • Keep improving stability, speed, GUI responsiveness
  • 19. Acknowledgements • Dr. Chryssanthi Iakovidou (CAGI algorithm) • Olga Papadopoulou (back-end development) • Lazaros Apostolidis (front-end development) • Dr. Symeon Papadopoulos (Overview & design) • Ruben Bouwmeester, DW (Design and evaluation) • Yiannis Kompatsiaris (Overview)
  • 20. Thank you! http://reveal-mklab.iti.gr/reveal Get in touch! Markos Zampoglou markzampoglou@iti.gr Symeon Papadopoulos papadop@iti.gr
  • 21. References • Bianchi, Tiziano, Alessia De Rosa, and Alessandro Piva. "Improved DCT coefficient analysis for forgery localization in JPEG images." In Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on, pp. 2444-2447. IEEE, 2011. • Ferrara, Pasquale, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. "Image forgery localization via fine-grained analysis of cfa artifacts." Information Forensics and Security, IEEE Transactions on 7, no. 5 (2012): 1566-1577. • Farid, Hany. "Exposing digital forgeries from JPEG ghosts." Information Forensics and Security, IEEE Transactions on 4, no. 1 (2009): 154-160. • Fontani, Marco, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni. "A framework for decision fusion in image forensics based on dempster–shafer theory of evidence." Information Forensics and Security, IEEE Transactions on 8, no. 4 (2013): 593- 607. • Lin, Zhouchen, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. "Fast, automatic and fine- grained tampered JPEG image detection via DCT coefficient analysis." Pattern Recognition 42, no. 11 (2009): 2492-2501. • Mahdian, Babak and Stanislav Saic, “Using noise inconsistencies for blind image forensics,” Image and Vision Computing, vol. 27, no. 10, pp. 1497–1503, 2009. • Zampoglou, Markos, Symeon Papadopoulos, and Yiannis Kompatsiaris. "Detecting image splicing in the wild (WEB)." In Multimedia & Expo Workshops (ICMEW), 2015 IEEE International Conference on, pp. 1-6. IEEE, 2015.
  • 22. Evaluation methodology • Quantitative • Six reference datasets (images + binary masks of tampering = “ground truth”) • Measures capturing the matching between ground truth mask and algorithm output • Comparison of 14 algorithms, “best” six plus a newly proposed one ended up in the tool • Qualitative • Informal feedback has been received by end users • Pertains to both usability and quality of results Zampoglou, M., Papadopoulos, S., & Kompatsiaris, Y. (2017). Large-scale evaluation of splicing localization algorithms for web images. Multimedia Tools and Applications, 76(4), 4801-4834.
  • 23. Quantitative evaluations (1/3) • To assess the performance of the implemented algorithms, we evaluated their performance on a large number of images • Benchmark datasets: • Columbia Uncompressed (Hsu and Chang 2006, “COLUMB”), First Image Forensics Challenge (“CHAL”)1, Fontani et al 2013 (“FON”) • Additional datasets • The Wild Web Dataset (Zampoglou et al, 2015) • The Deutsche Welle Image Forensics Dataset 1http://ifc.recod.ic.unicamp.br/fc
  • 24. Quantitative evaluations (2/3) • Evaluations on benchmark datasets: • Robustness to resaves:
  • 25. Quantitative evaluations (3/3) • Performance on the Wild Web Dataset: • Performance on the Deutsche Welle Image Forensics Dataset: • Successful detection for 2 out of 6 cases (4 out of 12 images) Algorithm DQ GHO BLK ELA DWHF MED Detections (out of 80) 3 12 3 2 3 1 Time (sec) 0.27 6.12 13.40 1.29 122.13 0.54
  • 26. Image verification software: requirements • Easy to use; requires little expertise and training • Integrates easily in established workflows and IT systems • Provides all common functionalities • Metadata analysis • Reverse image search • Tampering localization • Clear, interpretable and transparent output • No “black box” results • Intuitive and simple interface • Allows sharing and archiving of reports and conclusions • Comparable or better results than existing solutions