ABSTRACT
Digital forensics is a relatively new research area which aims at authenticating digital media by detecting possible digital forgeries. Indeed, the ever increasing availability of multimedia data on the web, coupled with the great advances reached by computer graphical tools, makes the modification of an image and the creation of visually compelling forgeries an easy task for any user. This in turns creates the need of reliable tools to validate the trustworthiness of the represented information. In such a context, we present here RAISE, a large dataset of 8156 high-resolution raw images, depicting various subjects and scenarios, properly annotated and available together with accompanying metadata. Such a wide collection of untouched and diverse data is intended to become a powerful resource for, but not limited to, forensic researchers by providing a common benchmark for a fair comparison, testing and evaluation of existing and next generation forensic algorithms. In this paper we describe how RAISE has been collected and organized, discuss how digital image forensics and many other multimedia research areas may benefit of this new publicly available benchmark dataset and test a very recent forensic technique for JPEG compression detection.
- I. Amerini et al. A sift-based forensic method for copy-move attack detection and transformation recovery,. IEEE Transactions on Information Forensics and Security, 6(3):1099--1110, 2011. Google ScholarDigital Library
- F. Battisti et al. Watermarking and encryption of color images in the fibonacci domain. In SPIE Image Processing: Algorithms and Systems, volume 6812, 2008.Google ScholarCross Ref
- V. Christlein et al. An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security, 7(6):1841--1854, 2012. Google ScholarDigital Library
- V. Conotter and G. Boato. Analysis of sensor fingerprint for source camera identification. IEEE Electronic Letters, 47(25):1366--1367, 2011.Google ScholarCross Ref
- V. Conotter et al. A crowdsourced data set of edited images online. In ACM Workshop on Crowdsourcing for Multimedia, 2014. Google ScholarDigital Library
- V. Conotter et al. Physiologically-based detection of computer generated faces in video. In IEEE International Conference on Image Processing, 2014.Google ScholarCross Ref
- A. Criminisi. Single-view metrology: Algorithms and applications. In Pattern Recognition, volume 2449 of Lecture Notes in Computer Science, pages 224--239. Springer Berlin Heidelberg, 2002. Google ScholarDigital Library
- E. Delp et al. Special issue on digital forensics. IEEE Signal Processing Magazine, 2(26), 2009.Google Scholar
- J. Dong et al. Casia image tampering detection evaluation database. In IEEE International Conference on Signal and Information Processing, pages 422--426, 2013. Online at http://forensics.idealtest.org.Google ScholarCross Ref
- T. Gloe and R. Böhme. The 'Dresden Image Database' for benchmarking digital image forensics. In ACM Symposium On Applied Computing, volume 2, pages 1585--1591, 2010. Online at https://forensics.inf.tu-dresden.de/ddimgdb. Google ScholarDigital Library
- M. Goljan et al. Large scale test of sensor fingerprint camera identification. In SPIE Media Forensics and Security, volume 7254, 2009.Google Scholar
- Y.-F. Hsu and S.-F. Chang. Detecting image splicing using geometry invariants and camera characteristics consistency. In IEEE International Conference on Multimedia and Expo, pages 549--552, 2006.Google ScholarCross Ref
- M. J. Huiskes and M. S. Lew. The MIR Flickr retrieval evaluation. In ACM International Conference on Multimedia Information Retrieval, pages 39--43, 2008. Online at http://press.liacs.nl/mirflickr/. Google ScholarDigital Library
- P. Kakar and N. Sudha. Verifying temporal data in geotagged images via sun azimuth estimation. IEEE Transactions on Information Forensics and Security, 7(3):1029--1039, 2012. Google ScholarDigital Library
- J. Lukas et al. Digital camera identification from sensor noise. IEEE Transactions on Information Forensics and Security, 1(2):205--214, 2006. Google ScholarDigital Library
- C. Pasquini et al. A Benford-Fourier JPEG compression detector. In IEEE International Conference on Image Processing, pages 5322--5326, 2014.Google ScholarCross Ref
- A. Piva. An overview on image forensics. ISRN Signal Processing, 2013: 1--22, 2013.Google ScholarCross Ref
- REWIND. Reverse engineering of audio-visual content data - datasets. Online at http://www.rewindproject.eu/.Google Scholar
- G. Schaefer and M. Stich. UCID - an uncompressed colour image database. In SPIE Conference on Storage and Retrieval Methods and Applications for Multimedia, pages 472--480, San Jose (CA), January 2004. Online at http://homepages.lboro.ac.uk/cogs/datasets/ucid/ucid.html.Google Scholar
- P. Zontone et al. Impact of contrast modification on human feeling: an objective and subjective assessment. In IEEE International Conference on Image Processing, 2010.Google ScholarCross Ref
Index Terms
- RAISE: a raw images dataset for digital image forensics
Recommendations
Restoration and enhancement on low exposure raw images by joint demosaicing and denoising
AbstractRestoring high quality images from raw data in low light is challenging due to various noises caused by limited photon count and complicated Image Signal Process (ISP). Although several restoration and enhancement approaches are ...
Highlights- We propose a Short2Long raw restoration strategy to process low quality raw images and restore pseudo raw ones for the subsequent subnet. It extracts ...
Additive spread-spectrum watermark detection in demosaicked images
MM&Sec '09: Proceedings of the 11th ACM workshop on Multimedia and securityIn this paper we investigate watermarking of digital camera raw images and blind detection of spread-spectrum watermarks in demosaicked images. We propose straightforward watermark embedding in sensor data combined with a novel detector. To this end, we ...
An Overview of Digital Watermarking in Image Forensics
CSO '11: Proceedings of the 2011 Fourth International Joint Conference on Computational Sciences and OptimizationDigital watermarking used in image forensics has been extensively studied. First, we concluded the research level at home and abroad, including the comparison between the active and passive image forensics, the application of robust and fragile ...
Comments