Using Depth Information to Aid Stereoscopic Image Forensics
Total Page:16
File Type:pdf, Size:1020Kb
USING DEPTH INFORMATION TO AID STEREOSCOPIC IMAGE FORENSICS BY MARK-ANTHONY FOUCHÉ Submitted in partial fulfilment of the requirements for the degree Master of Science (Computer Science) in the Faculty of Engineering, Build Environment and Information Technology UNIVERSITY OF PRETORIA September 2014 © University of Pretoria SUMMARY USING DEPTH INFORMATION TO AID STEREOSCOPIC IMAGE FORENSICS by Mark-Anthony Fouché Supervisor: Prof MS Olivier Department: Computer Science University: University of Pretoria Degree: Master of Science (Computer Science) Keywords: Stereoscopic Image, Stereo 3D, Image Forensics, Splicing, Depth, Disparity Map, Forgery Detection With the advances in image manipulation software, it has become easier to manipulate digital images. These manipulations can be used to increase image quality, but can also be used to depict a scene that never occurred. One of the purposes of digital image forensics is to identify such manipulations. There is however a lack of research on the detection of manipulated stereoscopic images. Stereoscopic images are images which create an illusion of depth for the viewer by showing an image pair that correlates to a person’s left and right eye. This dissertation investigates how depth information can be used to detect stereoscopic image manipulations. Two techniques were developed and tested through experimentation. The first technique used disparity maps to highlight large areas without internal depth. These areas can be the product of non-stereoscopic to stereoscopic splicing techniques. Experimentation results showed that areas without internal depth can be detected. However, the detected areas can be the product of natural occurrences in images and not only non-stereoscopic to stereoscopic splicing. Post investigation of detected areas is thus required to verify the results. i The second technique used a derived formula to determine the distance an area will lose internal depth. Experimentation results showed that the formula is fairly accurate. This information can be used to aid the detection of internal depth inconsistencies in stereoscopic images. These inconsistencies can arise due to stereoscopic image splicing or other image manipulation techniques that may modify the internal depth of a stereoscopic image. ii TABLE OF CONTENTS Summary ............................................................................................................................... i List of Figures ...................................................................................................................... vi List of Tables........................................................................................................................vii List of Abbreviations .......................................................................................................... viii CHAPTER 1 - Introduction ..................................................................................................... 1 1.1 Introduction ............................................................................................................ 1 1.2 Problem Statement ................................................................................................. 2 1.3 Methodology .......................................................................................................... 3 1.4 Structure of Dissertation ......................................................................................... 4 CHAPTER 2 - Digital Image Forensics .................................................................................... 6 2.1 Introduction ............................................................................................................ 6 2.2 Image Source Identification .................................................................................... 8 2.2.1 Source Camera Identification ........................................................................... 8 2.2.2 Scanner Source Identification ......................................................................... 12 2.2.3 Computer Generated Images ......................................................................... 13 2.2.4 Source Identification Anti-Forensics ............................................................... 16 2.3 Detecting Manipulated Images ............................................................................. 17 2.3.1 Image Manipulation Techniques .................................................................... 17 2.3.2 Image Manipulation Detection....................................................................... 21 2.3.3 Image Manipulation Anti-Forensics ................................................................ 27 2.4 Steganography and Steganalysis ........................................................................... 29 2.4.1 Steganography Techniques ............................................................................ 31 2.4.2 Steganalysis Techniques ................................................................................. 33 CHAPTER 3 - Stereoscopic Images ...................................................................................... 40 3.1 Introduction .......................................................................................................... 40 3.2 Capturing Stereoscopic Images ............................................................................. 41 3.2.1 View Direction and Baseline ........................................................................... 42 iii 3.2.2 Digital Image Capturing Devices .................................................................... 44 3.2.3 Digital File Formats ........................................................................................ 46 3.3 Viewing Methods .................................................................................................. 48 3.3.1 Stereoscopic with Eyewear ............................................................................. 48 3.3.2 Autostereoscopic ........................................................................................... 50 3.3.3 Other Methods............................................................................................... 52 3.4 Applications .......................................................................................................... 53 3.5 Stereoscopic Images and Digital Image Forensics .................................................. 55 3.6 Forging Stereoscopic Images ................................................................................. 57 3.6.1 Stereoscopic Image Splicing ........................................................................... 57 3.6.2 Synthesizing Stereoscopic Images .................................................................. 59 3.7 Extracting Stereoscopic Depth Information ........................................................... 64 CHAPTER 4 - Using Disparity Maps to Aid Stereoscopic Splicing Detection ........................ 70 4.1 Introduction .......................................................................................................... 70 4.2 Methodology ........................................................................................................ 70 4.2.1 Preparing the Dataset .................................................................................... 72 4.2.2 Creating the Disparity Map ............................................................................ 75 4.2.3 Highlighting Flat Areas................................................................................... 76 4.2.4 Taking Measurements ................................................................................... 77 4.3 Discussion ............................................................................................................. 77 4.4 Conclusion ............................................................................................................ 80 CHAPTER 5 - Determining Distance Objects Looses Internal Depth ................................... 83 5.1 Introduction .......................................................................................................... 83 5.2 Methodology ........................................................................................................ 84 5.2.1 Deriving the Algorithm ................................................................................... 84 5.2.2 Testing the Formula ....................................................................................... 87 5.2.3 Testing the Detection of Splicing .................................................................... 90 5.3 Discussion ............................................................................................................. 90 5.3.1 Testing the Formula ....................................................................................... 90 5.3.2 Testing the Detection of Splicing .................................................................... 92 5.4 Conclusion ............................................................................................................ 94 iv CHAPTER 6 - Conclusion ..................................................................................................... 97 6.1 Conclusion ............................................................................................................ 97 6.2 Publications .......................................................................................................... 99 6.3 Future Work