Skip to main content

Image Forensics

  • Living reference work entry
  • First Online:
Computer Vision
  • 147 Accesses

Synonyms

Digital forensics; Image authentication

Related Concepts

Definition

Image forensics refers to the analysis of an image to determine if it has been manipulated from the time of its recording. The techniques described here – so called passive techniques – operate in the absence of digital watermarks, signatures, or specialized hardware. Instead, these techniques analyze physical, geometric, optical, sensor, and file properties for inconsistencies that may arise from image manipulation.

Background

History has shown that many autocratic leaders had photographs manipulated in an attempt to rewrite history. These men understood the power of photography and that if they changed photographs they could change history. Cumbersome and time-consuming darkroom techniques were required to alter the historical record on behalf of Stalin and others. Today, powerful and low-cost digital technology coupled with sophisticated rendering and synthesis...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    The metadata for a digital image contains data about the camera make and model, the camera settings (e.g., exposure time and focal length), the date and time of image capture, the GPS location of image capture, and much more. The metadata is stored along with the image data in the image file, and it is readily extracted with various programs.

  2. 2.

    Ignoring overlapping regions and the edges of the image, there are 1, 000, 000 choose 2, equal to (1, 000, 000 × 999, 998)∕2 = 500, 000, 000, 000 possible pairings of pixels, each of which may be the center of a pair of cloned regions.

References

  1. Farid H (2016) Photo forensics. MIT Press, Cambridge

    Book  Google Scholar 

  2. O’Brien J, Farid H (2012) Exposing photo manipulation with inconsistent reflections. ACM Trans Graph 31(1):4:1–4:11

    Article  Google Scholar 

  3. Kee E, O’Brien J, Farid H (2014) Exposing photo manipulation from shading and shadows. ACM Trans Graph 33(5):165:1–165:21

    Article  Google Scholar 

  4. Popescu A, Farid H (2010) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948–3959

    Article  MathSciNet  Google Scholar 

  5. Fridrich J, Lukas J, Goljan M (2006) Digital camera identification from sensor noise. IEEE Trans Inf Secur Forensic 1(2):205–214

    Article  Google Scholar 

  6. Kirchner M (2010) Efficient estimation of CFA pattern configuration in digital camera images. In: Media forensics and security II. International Society for Optics and Photonics, vol 7541, p 754111

    Google Scholar 

  7. Kee E, Johnson M, Farid H (2011) Digital image authentication from JPEG headers. IEEE Trans Inf Forensics Secur 7(3):1066–1075

    Article  Google Scholar 

  8. Gloe T (2012) Forensic analysis of ordered data structures on the example of JPEG files. In: IEEE workshop on information forensics and security

    Book  Google Scholar 

  9. Popescu A, Farid H (2004) Statistical tools for digital forensics. In: International workshop on information hiding

    Book  Google Scholar 

  10. Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867

    Article  Google Scholar 

  11. Bianchi T, Piva A (2011) Analysis of non-aligned double JPEG artifacts for the localization of image forgeries. In: IEEE workshop on information forensics and security

    Book  Google Scholar 

  12. Liu M-Y, Breuel T, Kautz J (2018) Unsupervised image-to-image translation networks. In: Neural information processing systems, pp 700–708

    Google Scholar 

  13. Suwajanakorn S, Seitz SM, Kemelmacher-Shlizerman I (2017) Synthesizing Obama: learning lip sync from audio. ACM Trans Graph 36(4):95

    Article  Google Scholar 

  14. Zhu J-Y, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. In: IEEE international conference on computer vision

    Book  Google Scholar 

  15. Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Wade-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems, pp 2672–2680

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hany Farid .

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Farid, H. (2020). Image Forensics. In: Computer Vision. Springer, Cham. https://doi.org/10.1007/978-3-030-03243-2_877-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03243-2_877-1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03243-2

  • Online ISBN: 978-3-030-03243-2

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics