DARPA Program Targets Image Doctoring (networkworld.com) 41
coondoggie writes: It isn't hard for just about anyone to change or alter an image these days — and that can be a problem. It's an issue researchers at the Defense Advanced Research Projects Agency want to put to rest with a new program called Media Forensics, or MediFor, which looks to build an algorithmic-based platform that can detect image manipulation. "The forensic tools used today lack robustness and scalability and address only some aspects of media authentication; an end-to-end platform to perform a complete and automated forensic analysis does not exist. Although there are a few applications for image manipulation detection in the commercial sector, they are typically limited to a yes/no decision about the source being an "original" asset, obtained directly from an imaging device. As a result, media authentication is typically performed manually using a variety of ad hoc methods that are often more art than science, and forensics analysts rely heavily on their own background and experience," DARPA states.
Frosty (Score:5, Funny)
Just check if some of the pixels are wrong. It helps if you've seen a few shops.
Re:Frosty (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
If you can create an algorithm that can detect pixels that have been modified in a picture, you can create an algorithm that can modify the pixels to hide the fact that they've been modified.
So, are you able to reverse https://en.wikipedia.org/wiki/... [wikipedia.org] I'm sure it's possible, like MD5, but not likely for all but groups like NSA.
Re: Frosty (Score:1)
Is society trying to eliminate anyone have specialized training or knowledge, or is that just a side-effect of its downward spiral?
Signing cameras (Score:2)
Re: (Score:1)
That functionality already exists and has done for some time.
However the implementations so far haven't stood up to attack - Canon [petapixel.com] Nikon [computerworld.com]
There's no reason that should be the case though. It should be something that can be done securely, only falsifiable if you can either crack the key or find a hash collision (which'd likely mean making enough changes to the image to make it obvious that it's been modified).
Re: (Score:1)
The problem is that I can otherwise create a virtual camera in software that signs the forgery after it is created. I can even use wavelets to extract the grain/noise/high frequency artefact layers from an image before I modify it, then return them to obscure "
Re: (Score:2)
Is that an "I can" or a "One can"?
Re: (Score:3)
Everyone with two brain cells is already rooting for Trump.
Fortunately, I have a lot more than two brain cells, so I can see how Trump will repeat history in a bad way [t.co].
Algorithm: (Score:2)
printf("THIS LOOKS SHOPPED");
}
Adobe doesn't like use of its brand as a verb (Score:2)
Or has the OP been contacted by counsel for Adobe Systems?
Re: (Score:2)
Hey, I didn't spend four years in image doctoring school to be called a shopper!
I hate the (tech) world I live in... (Score:2)
By definition....if you can see it, you can fix it (Score:1)
nt.
Re: (Score:2)
The last time this was trotted out, it was something you can't see: steganography.
Authentication? (Score:2)
I can tell cheap photoshop color adjustments (Score:2)
Re: (Score:2)
Error diffusion will help (calculate the floating point value and then store the two nearest integers with a probability based on the value) but not if the correction is extreme. Blurting the image to a floating point value will fix it but, of course, introduces blur.
Novel Explores this Idea (Score:4, Interesting)
Warning: Shameless Self-Promotion
I've written a science fiction novel, The NPC [amazon.com] that deals with the ramifications of this sort of thing. The solution in the novel is extreme: all recording devices are required to stream their data to a trusted 3rd party (in this case, a corporation called VuDyne) in real time with an encrypted certificate. Otherwise the digital data is not trusted to represent reality. As you can imagine, this gives VuDyne a great deal of power.
Re: (Score:2)
Well that doesn't make for a very fun "evil corporation" story, now does it?
Re: (Score:2)
Why not just have each device add an encrypted checksum using public key encryption. That way you don't have to send all the data to one source, the verification can be done by anyone and as long as the encryption isn't broken any tampering is detectable.
It also doesn't give a ton of power to one verification entity.
The company also provides the service of enforcing copyright laws.
It can't work in the long run (Score:2)
If you can use an algorithm to detect tampering, you can use that same algorithm to alter your image so the algorithm no longer detects the manipulation.
Re: (Score:2)
If you can use an algorithm to detect tampering, you can use that same algorithm to alter your image so the algorithm no longer detects the manipulation.
See my earlier response regarding https://en.wikipedia.org/wiki/... [wikipedia.org] and tell me how you'd get around it.
Re: (Score:2)
Your previous comment is the same as this one. SHA-2 has nothing to do with it - you could simply encrypt your altered photo. If you wanted to do it the (physically) hard way (assuming you're talking about a camera with internal encryption hardware), you could wire something up to the CCD inputs so the camera doesn't realize it's being fed a pre-made image instead of a view of the real world.
Re: (Score:2)
Okay, I think we're misunderstanding each other.
My point...If I take an original image, and apply an encryption to it (this doesn't necessarily involve doing so with the camera), and that's my original image which I post for the world to see. Someone else can't necessarily come along and mess with that.
Yours...Sure, if you're the originator of some photo, and you've doctored it, I agree with you.
What if... (Score:2)
...the doubts on the reality of any kind of imagery cannot be overcome and we need to abandon the idea that images (moving or not) can be trusted as evidence ? Would the world stop spinning ? I highly doubt this.
Perhaps there can be an exception in cases where the entire chain of taking and handling an image can be verified in one way or another ?
Unalterable checksum produced by the camera perhaps ? I know that we can already do this with GPS flight logs (track/altitude) coming from certified flight record