• Title/Summary/Keyword: Image manipulation detection

Search Result 28, Processing Time 0.023 seconds

Edge based Interactive Segmentation (경계선 기반의 대화형 영상분할 시스템)

  • Yun, Hyun Joo;Lee, Sang Wook
    • Journal of the Korea Computer Graphics Society
    • /
    • v.8 no.2
    • /
    • pp.15-22
    • /
    • 2002
  • Image segmentation methods partition an image into meaningful regions. For image composition and analysis, it is desirable for the partitioned regions to represent meaningful objects in terms of human perception and manipulation. Despite the recent progress in image understanding, however, most of the segmentation methods mainly employ low-level image features and it is still highly challenging to automatically segment an image based on high-level meaning suitable for human interpretation. The concept of HCI (Human Computer Interaction) can be applied to operator-assisted image segmentation in a manner that a human operator provides guidance to automatic image processing by interactively supplying critical information about object boundaries. Intelligent Scissors and Snakes have demonstrated the effectiveness of human-assisted segmentation [2] [1]. This paper presents a method for interactive image segmentation for more efficient and effective detection and tracking of object boundaries. The presented method is partly based on the concept of Intelligent Scissors, but employs the well-established Canny edge detector for stable edge detection. It also uses "sewing method" for including weak edges in object boundaries, and 5-direction search to promote more efficient and stable linking of neighboring edges than the previous methods.

  • PDF

Blockchain Technology for Combating Deepfake and Protect Video/Image Integrity

  • Rashid, Md Mamunur;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1044-1058
    • /
    • 2021
  • Tempered electronic contents have multiplied in last few years, thanks to the emergence of sophisticated artificial intelligence(AI) algorithms. Deepfakes (fake footage, photos, speech, and videos) can be a frightening and destructive phenomenon that has the capacity to distort the facts and hamper reputation by presenting a fake reality. Evidence of ownership or authentication of digital material is crucial for combating the fabricated content influx we are facing today. Current solutions lack the capacity to track digital media's history and provenance. Due to the rise of misrepresentation created by technologies like deepfake, detection algorithms are required to verify the integrity of digital content. Many real-world scenarios have been claimed to benefit from blockchain's authentication capabilities. Despite the scattered efforts surrounding such remedies, relatively little research has been undertaken to discover where blockchain technology can be used to tackle the deepfake problem. Latest blockchain based innovations such as Smart Contract, Hyperledger fabric can play a vital role against the manipulation of digital content. The goal of this paper is to summarize and discuss the ongoing researches related to blockchain's capabilities to protect digital content authentication. We have also suggested a blockchain (smart contract) dependent framework that can keep the data integrity of original content and thus prevent deepfake. This study also aims at discussing how blockchain technology can be used more effectively in deepfake prevention as well as highlight the current state of deepfake video detection research, including the generating process, various detection algorithms, and existing benchmarks.

Hand Gesture Interface for Manipulating 3D Objects in Augmented Reality (증강현실에서 3D 객체 조작을 위한 손동작 인터페이스)

  • Park, Keon-Hee;Lee, Guee-Sang
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.20-28
    • /
    • 2010
  • In this paper, we propose a hand gesture interface for the manipulation of augmented objects in 3D space using a camera. Generally a marker is used for the detection of 3D movement in 2D images. However marker based system has obvious defects since markers are always to be included in the image or we need additional equipments for controling objects, which results in reduced immersion. To overcome this problem, we replace marker by planar hand shape by estimating the hand pose. Kalman filter is for robust tracking of the hand shape. The experimental result indicates the feasibility of the proposed algorithm for hand based AR interfaces.

Implementation of Enhanced Vision for an Autonomous Map-based Robot Navigation

  • Roland, Cubahiro;Choi, Donggyu;Kim, Minyoung;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.41-43
    • /
    • 2021
  • Robot Operating System (ROS) has been a prominent and successful framework used in robotics business and academia.. However, the framework has long been focused and limited to navigation of robots and manipulation of objects in the environment. This focus leaves out other important field such as speech recognition, vision abilities, etc. Our goal is to take advantage of ROS capacity to integrate additional libraries of programming functions aimed at real-time computer vision with a depth-image camera. In this paper we will focus on the implementation of an upgraded vision with the help of a depth camera which provides a high quality data for a much enhanced and accurate understanding of the environment. The varied data from the cameras are then incorporated in ROS communication structure for any potential use. For this particular case, the system will use OpenCV libraries to manipulate the data from the camera and provide a face-detection capabilities to the robot, while navigating an indoor environment. The whole system has been implemented and tested on the latest technologies of Turtlebot3 and Raspberry Pi4.

  • PDF

Three-Dimensional Processing of Ultrasonic Pulse-Echo Signal (초음파 펄스에코 신호의 3차원 처리)

  • Song, Moon-Ho;Song, Sang-Rock;Cho, Jung-Ho;Sung, Je-Joong;Ahn, Hyung-Keun;Jang, Soon-Jae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.23 no.5
    • /
    • pp.464-474
    • /
    • 2003
  • Ultrasonic imaging of 3-D structures for nondestructive evaluation must provide readily recognizable images with enough details to clearly show various flaws that may or may not be present. Typical flaws that need to be detected are miniature cracks, for instance, in metal pipes having aged over years of operation in nuclear power plants; and these sub-millimeter cracks or flaws must be depicted in the final 3-D image for a meaningful evaluation. As a step towards improving conspicuity and thus detection of flaws, we propose a pulse-echo ultrasonic imaging technique to generate various 3-D views of the 3-D object under evaluation through strategic scanning and processing of the pulse-echo data. We employ a 2-D Wiener filter that filters the pulse-echo data along the plane orthogonal to the beam propagation so that ultrasonic beams can be sharpened. This three-dimensional processing and display coupled with 3-D manipulation capabilities by which users are able to pan and rotate the 3-D structure improve conspicuity of flaws. Providing such manipulation operations allow a clear depiction of the size and the location of various flaws in 3-D.

Detection method of proximal caries using line profile in digital intra-oral radiography (디지털 구내방사선사진에서 라인 프로파일을 이용한 인접면우증식의 인지 방법)

  • Park, Jeong-Hoon;Choi, Yong-Suk;Kim, Gyu-Tae;Hwang, Eui-Hwan;Lee, Gi-Ja;Choi, Sam-Jin;Park, Hun-Kuk
    • Imaging Science in Dentistry
    • /
    • v.39 no.4
    • /
    • pp.185-189
    • /
    • 2009
  • Purpose : The purpose of this study was to investigate how to detect proximal caries using line profile and validate linear measurements of proximal caries lesions by basic digital manipulation of radiographic images. Materials and Methods : The X-ray images of control group (15) and caries teeth (15) from patients were used. For each image, the line profile at the proximal caries-susceptible zone was calculated. To evaluate the contrast as a function of line profile to detect proximal caries, a difference coefficient (D) that indicates the relative difference between caries and sound dentin or intact enamel was measured. Results : Mean values of D were $0.0354{\pm}0.0155$ in non-caries and $0.2632{\pm}0.0982$ in caries (p<0.001). Conclusion : The mean values of caries group were higher than non-caries group and there was correlation between proximal dental caries and D. It is demonstrated that the mean value of D from caries group was higher than that of control group. From the result, values of D possess great potentiality as a new detection parameter for proximal dental caries.

  • PDF

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

A Study on Detection of Overloaded Vehicles at Highway Toll Gates Using Detection of Height Changes in Vehicle Cargo Boxes (차량 적재함의 높이 변화 감지를 이용한 고속도로 톨게이트 과적차량 검출에 관한 연구)

  • Gwang Lee;Bong-Keun Kim
    • Journal of Practical Engineering Education
    • /
    • v.16 no.3_spc
    • /
    • pp.391-399
    • /
    • 2024
  • All highway toll gates in Korea use low-speed WIM(Weight-In-Motion) to block overloaded cargo vehicles from entering the main highway, but some cargo vehicle owners are illegally modifying vehicles to operate variable axles and evading crackdowns by manipulating the axles. In previous studies detect all tires of a running vehicle were detected to determine whether there is axle manipulation. However, because the vehicle entry area at the highway toll gate checkpoint is very narrow, there is a problem that it is realistically difficult to film all tires of the entering vehicle in one video frame. In this paper, we proposed a system that can determine whether the axle is being operated through changes in the height of the vehicle's cargo box rather than by detecting tires. To detect changes in the height of a cargo box, we propose a method to extract the representative line of the cargo box using Hough transform and then measure the change in height of the representative line to detect the change in height of the cargo box. In addition, we propose a method to detect changes in the vertical height of a cargo box by accumulating motion vectors of pixels within a certain area of the image using optical flow. And the two methods were compared and their advantages and disadvantages were analyzed and presented.