Localisation of image tampering

A technology of image and identification bit, which is applied in the field of identification and positioning of image tampering, and can solve problems such as the complexity of identification problems

Inactive Publication Date: 2005-11-30
KONINK PHILIPS ELECTRONICS NV
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The identification problem is complicated by the fact that some image changes are acceptable, such as those due to decaying compression
These changes may cause a slight degradation in image quality but will not affect the interpretation or intended use of the image
As a result, traditional authentication techniques using cryptography are no longer suitable, as these methods typically only account for changes of only one bit of the image when tampering occurs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Localisation of image tampering
  • Localisation of image tampering
  • Localisation of image tampering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The invention is described in detail below by means of an embodiment described with reference to a surveillance system. However, the invention is not meant to be limited to those exemplary embodiments described with reference to the monitoring system, and modifications and other applications thereof will be readily apparent to a person skilled in the art within the scope of the appended independent claims.

[0036] figure 1 The layout of a typical surveillance system 1 is illustrated. It usually consists of the following components:

[0037] - at least one video camera 10 with a video output 11 usually in an analog format such as PAL or NTSC,

[0038] - a digital recording device 12 which receives video input from a plurality of cameras 10 and applies attenuation compression, and

[0039] - a computer network 13 providing storage and retrieval, and

[0040] - authentication means 14 for compressed video

[0041] The surveillance system 1 adopts various compression ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and device (8) for verifying the authenticity of media content is provided. According to an embodiment accurate tampering location for digital image authentication is provided. Typically, a suspect image is divided into blocks. For each block, an authentication bit is generated by computing a property of the image content and then thresholding said property to give a '0' or '1'. The authentication bits of the suspect image are compared with those of the original image. If there is a mismatch, and the content has indeed been tampered, tampering is detected. A mismatch due to allowable operations, such as e.g. compression, is called a false alarm, which should be avoided. A so-called ROC curve (Receiver Operating Characteristic) gives the relation between detection probability and false alarm probability. Preferably, the threshold used to determine the authentication bits represents an operation point on the ROC curve. In accordance with an embodiment of the invention, an operation point corresponding to a low false alarm probability is initially chosen. In order to more precisely identify a tampered image area, the authentication decisions are repeated for neighbouring blocks, using a different operation point. This continues until no further tampered blocks are found. Thus improved tampering localisation is provided, being valuable e.g. to authenticate images captured by e.g. a security camera, and localise any tampered areas, whereby the value of these images is increased as e.g. evidence in a court of law.

Description

technical field [0001] The present invention is generally in the field of digital imaging, and in particular relates to the authentication of digital images and videos, and more particularly to the identification and location of image tampering for authentication purposes. Background technique [0002] The need to easily edit and alter images and video in digital form has fueled the need for devices that can authenticate original, unaltered content. When it is judged that an image has been changed, it is also desirable to have a flag indicating that the image area has been changed. [0003] The authentication problem is complicated by the fact that some image changes are acceptable, such as those due to attenuated compression. These changes may cause a slight degradation in image quality but do not affect the interpretation or intended use of the image. The result is that traditional authentication techniques using cryptography are no longer suitable, as these methods typi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00H04N1/32
CPCH04N1/32149G06T1/0042H04N2201/3236H04N2201/3235G06T2201/0051G06T2201/0061G06T1/00H04N1/32H04N7/167
Inventor D·K·罗伯特斯
Owner KONINK PHILIPS ELECTRONICS NV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products