Eric Kee: publications |
|
Exposing Photo Manipulation from Shading and Shadows E. Kee, J. O'Brien, H. Farid Transactions on Graphics / SIGGRAPH, 2014 Paper Talk Bibtex | |
We describe a method for detecting physical inconsistencies in lighting from the shading and shadows in an image. This method imposes a multitude of shading- and shadow-based constraints on the projected location of a distant point light source. The consistency of a collection of such constraints is posed as a linear programming problem. A feasible solution indicates that the combination of shading and shadows is physically consistent, while a failure to find a solution provides evidence of photo tampering. | |
Photo Forensics from Partial Constraints E. Kee (advisor: H. Farid) Ph.D. Dissertation, Dartmouth College, 2013 Paper Bibtex | |
A variety of forensic methods have been developed to identify falsified photos, each unified by the ability to estimate and detect properties of a photo that are perturbed by forgery. There exist, however, many photos in which the required properties cannot be estimated. We present an approach to detect forgery in these photos. We use this approach to detect physically inconsistent shadows and shading in photos for which it is not possible to estimate the associated lighting properties. Specifically, we develop a method to detect inconsistent shadows cast by point and area light sources when a strict shadow-to-object correspondence cannot be estimated. We further develop a method to detect inconsistencies between shadows and the shading on objects when object geometry is only partially known, and when objects are photographed under unknown perspective. We conclude by describing prior methods that can be generalized to analyze photos in which estimation is not possible. | |
Exposing Photo Manipulation with Inconsistent Shadows E. Kee, J. O'Brien, H. Farid Transactions on Graphics / SIGGRAPH, 2013 Paper Talk Bibtex User interface demo Test subject analyzing a photo Examples from perceptual study Press |
|
We describe a geometric technique to detect physically inconsistent arrangements of shadows in an image. This technique combines multiple constraints from cast and attached shadows to constrain the projected location of a point light source. The consistency of the shadows is posed as a linear programming problem. A feasible solution indicates that the collection of shadows is physically plausible, while a failure to find a solution provides evidence of photo tampering. | |
A Perceptual Metric for Photo Retouching E. Kee, H. Farid Proceedings of the National Academy of Sciences, 2011 Paper Bibtex Supplemental Material PNAS Supporting Information Press |
|
In recent years, advertisers and magazine editors have been widely criticized for taking digital photo retouching to an extreme. Impossibly thin, tall, and wrinkle- and blemish-free models are routinely splashed onto billboards, advertisements, and magazine covers. The ubiquity of these unrealistic and highly idealized images has been linked to eating disorders and body image dissatisfaction in men, women, and children. In response, several countries have considered legislating the labeling of retouched photos. We describe a quantitative and perceptually meaningful metric of photo retouching. Photographs are rated on the degree to which they have been digitally altered by explicitly modeling and estimating geometric and photometric changes. This metric correlates well with perceptual judgments of photo retouching and can be used to objectively judge by how much a retouched photo has strayed from reality. | |
Digital Image Authentication from JPEG Headers E. Kee, M. K. Johnson, H. Farid IEEE Transactions on Information Forensics and Security, 2011 Paper Bibtex |
|
It is often desirable to determine if an image has been modified in any way from its original recording. The JPEG format affords engineers many implementation trade-offs which give rise to widely varying JPEG headers. We exploit these variations for image authentication. A camera signature is extracted from a JPEG image consisting of information about quantization tables, Huffman codes, thumbnails, and EXIF format. We show that this signature is highly distinct across 1.3 million images spanning 773 different cameras and cellphones. Specifically, 62% of images have a signature that is unique to a single camera, 80% of images have a signature that is shared by three or fewer cameras, and 99% of images have a signature that is unique to a single manufacturer. The signature of Adobe Photoshop is also shown to be unique relative to all 773 cameras. These signatures are simple to extract and offer an efficient method to establish the authenticity of a digital image. | |
Modeling and Removing Spatially-Varying Optical Blur E. Kee, S. Paris, S. Chen, J. Wang IEEE International Conference on Computational Photography, 2011 Paper Talk Bibtex Supplemental Material |
|
Photo deblurring has been a major research topic in the past few years. So far, existing methods have focused on removing the blur due to camera shake and object motion. In this paper, we show that the optical system of the camera also generates significant blur, even with professional lenses. We introduce a method to estimate the blur kernel densely over the image and across multiple aperture and zoom settings. Our measures show that the blur kernel can have a non-negligible spread, even with top-of-the-line equipment, and that it varies nontrivially over this domain. In particular, the spatial variations are not radially symmetric and not even left-right symmetric. We develop and compare two models of the optical blur, each of them having its own advantages. We show that our models predict accurate blur kernels that can be used to restore photos. We demonstrate that we can produce images that are more uniformly sharp unlike those produced with spatially-invariant deblurring techniques. | |
Exposing Digital Forgeries from 3-D Lighting Environments E. Kee, H. Farid IEEE International Workshop on Information Forensics and Security, 2010 Paper Bibtex |
|
When creating a photographic composite, it can be difficult to match lighting conditions. We describe a technique for measuring lighting conditions in an image, and describe its use in detecting photographic composites. Specifically, we describe how to approximate a 3-D lighting environment with a low-dimensional model and how to estimate the model's parameters from a single image. Inconsistencies in the lighting model are then used as evidence of tampering. | |
Digital Image Authentication from Thumbnails E. Kee, H. Farid SPIE Symposium on Electronic Imaging, San Jose, CA, 2010 Paper Bibtex |
|
We describe how to exploit the formation and storage of an embedded image thumbnail for image authentication. The creation of a thumbnail is modeled with a series of filtering operations, contrast adjustment, and compression. We automatically estimate these model parameters and show that these parameters differ significantly between camera manufacturers and photo-editing software. We also describe how this signature can be combined with encoding information from the underlying full resolution image to further refine the signature's distinctiveness. | |
Detecting Photographic Composites of Famous People E. Kee, H. Farid Technical Report, TR2009-656, Dartmouth College, Computer Science Paper Bibtex |
|
Photos are commonly falsified by compositing two or more people into a single image. We describe how such composites can be detected by estimating a camera's intrinsic parameters. Differences in these parameters across the image are then used as evidence of tampering. Expanding on earlier work, this approach is more applicable to low-resolution images, but requires a reference image of each person in the photo as they are directly facing the camera. When considering composites of famous people, such a reference photo is easily obtained from an on-line image search. | |
A novel approach for semi-automated segmentation of MS lesions on FLAIR imaging: Reliability and clinical correlates Wishart, H., Kee, E.R., Ford, J.C., MacDonald, J.W., Aney, S., LoVerde, S. Annual Meeting of the International Neuropsychological Society, Acapulco, Mexico, February 3-6, 2010 |
|
Rapid, reliable methods for segmenting and quantifying MS lesions on brain magnetic resonance imaging are important for monitoring patients over time. This work describes a novel approach for semi-automated segmentation of MS lesions on fluid-attenuated inversion recovery (FLAIR) images. | |
Printer Profiling for Forensics and Ballistics E. Kee, H. Farid ACM Multimedia and Security Workshop, Oxford, UK, 2008 Paper Bibtex |
|
We describe a technique for authenticating printed and scanned text documents. This technique works by modeling the degradation in a document caused by printing. The resulting printer profile is then used to detect inconsistencies across a document, and for ballistic purposes -- that of linking a document to a printer. |