Abstract:
Ein Verfahren zur Charakterisierung von Objekten hat die Schritte: a) Beschreiben eines Objektes mit einem elliptischen, selbstadjungierten Eigenwertproblem zur Bildung eines isometrieinvarianten Modells; b) Bestimmen von Eigenwerten des Eigenwertproblems; und c) Charakterisieren des Objektes durch die Eigenwerte.
Abstract:
An image forensics system estimates a camera response function (CRF) associated with a digital image, and compares the estimated CRF to a set of rules and compares the estimated CRF to a known CRF. The known CRF is associated with a make and a model of an image sensing device. The system applies a fusion analysis to results obtained from comparing the estimated CRF to a set of rules and from comparing the estimated CRF to the known CRF, and assesses the integrity of the digital image as a function of the fusion analysis.
Abstract:
A method and a device for detecting copies or near-copies of images, comprises receiving an initial image, converting the initial image to grayscale, resizing the grayed image to a reduced image having a plurality of rows and an even number of columns, computing an overall signature for the reduced image, and determining whether the initial image is a copy or near-copy of an image according to the result of a comparison between the overall signature of the reduced image and reference image signatures. The step of computing the overall signature comprises the steps of computing a row signature for each row of the reduced image, the computation being based on a comparison of values obtained statistically across subsets of symmetrical pixels in each row, and concatenating the row signatures in order to obtain an overall signature.
Abstract:
The present disclosure is generally directed to a method and computing device for determining whether a mark is genuine. According to various embodiments, a computing device (or logic circuitry thereof) uses unintentionally-produced artifacts within a genuine mark to define an identifiable electronic signature, and extracts certain location identifiers corresponding to certain measured features of the signature in order to enhance the ease and speed with which numerous genuine signatures can be searched and compared with signatures of candidate marks.
Abstract:
A counterfeit identification performance attribute (CIPA) sensitivity to changes in resolution of the image for features of an image is determined (102). The CIPA sensitivity for the features is used to choose at least one feature to determine whether the image on a sample is a counterfeit (106).
Abstract:
An image processor includes an image degradation measuring unit configured to compute a degradation level of block data with respect to each of blocks within an image, a degradation determining unit configured to select, with respect to each of the blocks within the image, the block data of a target block of one of a plurality of the images based on degradation levels of respective block data of the target blocks of the plurality of the images, and an image synthesis unit configured to generate a sheet of an image by synthesizing the block data selected with respect to the blocks within the image.
Abstract:
A CFA pattern is extracted from captured image data for each first unit region. A first altered region is detected from disturbance of the periodicity of the CFA pattern, and the first altered region is an image region in which copying has been performed from image data different from the captured image data to the captured image data. The feature amount of the captured image data is extracted for each second unit region different in size from the first unit region. The feature amounts are compared for each second unit region to detect a second altered region, and the second altered region is an image region in which copying has been performed from the captured image data to the captured image data. Information concerning the first and second altered regions are output as alteration detection results in the captured image data.
Abstract:
A security substrate may include at least one area for authentication and/or for revealing attempts at forgery using solvents. The at least one area may include individualized polymer- or copolymer-based particles comprising at least one visible or detectable marker. The polymer or copolymer may be at least partially soluble in solvents used for forgery.
Abstract:
An image processor includes an image degradation measuring unit configured to compute a degradation level of block data with respect to each of blocks within an image, a degradation determining unit configured to select, with respect to each of the blocks within the image, the block data of a target block of one of a plurality of the images based on degradation levels of respective block data of the target blocks of the plurality of the images, and an image synthesis unit configured to generate a sheet of an image by synthesizing the block data selected with respect to the blocks within the image.
Abstract:
Techniques described herein are generally related to steganalysis of suspect media. Steganalysis techniques may include receiving instances of suspect media as input for steganalytic processing. A first set of quantized blocks of data elements may be identified within the media, with this first set of blocks being eligible to be embedded with steganographic data. A second set of quantized blocks of data elements may be identified within the media, with this second set of blocks being ineligible to be embedded with steganographic data. The steganalysis techniques may requantize the first and second blocks. In turn, these techniques may compare statistics resulting from requantizing the first block with statistics resulting from requantizing the second block. The steganalysis techniques may then assess whether the first block of data elements is embedded with steganographic features based on how the statistics of the second blocks compare with the statistics of the first blocks.