skip to main content
10.1145/1161366.1161376acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Exposing digital forgeries through chromatic aberration

Published:26 September 2006Publication History

ABSTRACT

Virtually all optical imaging systems introduce a variety of aberrations into an image. Chromatic aberration, for example, results from the failure of an optical system to perfectly focus light of different wavelengths. Lateral chromatic aberration manifests itself, to a first-order approximation, as an expansion/contraction of color channels with respect to one another. When tampering with an image, this aberration is often disturbed and fails to be consistent across the image. We describe a computational technique for automatically estimating lateral chromatic aberration and show its efficacy in detecting digital tampering.

References

  1. T.E. Boult and G. Wolberg. Correcting chromatic aberrations using image warping. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 684--687, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  2. H. Farid and E. Simoncelli. Differentiation of multi-dimensional signals. IEEE Transactions on Image Processing, 13(4):496--508, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Fridrich, D. Soukal, and J. Lukáš. Detection of copy-move forgery in digital images. In Proceedings of DFRWS, 2003.Google ScholarGoogle Scholar
  4. E. Hecht. Optics. Addison-Wesley Publishing Company, Inc., 4th edition, 2002.Google ScholarGoogle Scholar
  5. M.K. Johnson and H. Farid. Exposing digital forgeries by detecting inconsistencies in lighting. In ACM Multimedia and Security Workshop, New York, NY, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Lukáš, J. Fridrich, and M. Goljan. Detecting digital image forgeries using sensor pattern noise. In Proceedings of the SPIE, volume 6072, 2006.Google ScholarGoogle Scholar
  7. T. Ng and S. Chang. A model for image splicing. In IEEE International Conference on Image Processing, Singapore, 2004.Google ScholarGoogle Scholar
  8. A.C. Popescuand, H. Farid. Exposing digital forgeries by detecting duplicated image regions. Technical Report TR2004- 15, Department of Computer Science, Dartmouth College, 2004.Google ScholarGoogle Scholar
  9. A.C. Popescuand, H. Farid. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing, 53(2):758--767, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A.C. Popescu and H. Farid. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing, 53(10):3948--3959, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Viola and W.M. Wells, III. Alignment by maximization of mutual information. International Journal of Computer Vision, 24(2):137--154, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R.G. Willson and S.A. Shafer. What is the center of the image? Journal of the Optical Society of America A, 11(11):2946--2955, November 1994.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Exposing digital forgeries through chromatic aberration

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MM&Sec '06: Proceedings of the 8th workshop on Multimedia and security
        September 2006
        244 pages
        ISBN:1595934936
        DOI:10.1145/1161366

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 September 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate128of318submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader