skip to main content
10.1145/1459359.1459406acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Internet image archaeology: automatically tracing the manipulation history of photographs on the web

Published: 26 October 2008 Publication History

Abstract

We propose a system for automatically detecting the ways in which images have been copied and edited or manipulated. We draw upon these manipulation cues to construct probable parent-child relationships between pairs of images, where the child image was derived through a series of visual manipulations on the parent image. Through the detection of these relationships across a plurality of images, we can construct a history of the image, called the visual migration map (VMM), which traces the manipulations applied to the image through past generations. We propose to apply VMMs as part of a larger internet image archaeology system (IIAS), which can process a given set of related images and surface many interesting instances of images from within the set. In particular, the image closest to the "original" photograph might be among the images with the most descendants in the VMM. Or, the images that are most deeply descended from the original may exhibit unique differences and changes in the perspective being conveyed by the author. We evaluate the system across a set of photographs crawled from the web and find that many types of image manipulations can be automatically detected and used to construct plausible VMMs. These maps can then be successfully mined to find interesting instances of images and to suppress uninteresting or redundant ones, leading to a better understanding of how images are used over different times, sources, and contexts.

References

[1]
H. Farid. Detecting Digital Forgeries Using Bispectral Analysis. Technical Report AIM-1657, MIT, 1999.
[2]
M. Fischler and R. Bolles. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Communications of the ACM, 24(6):381--395, 1981.
[3]
A. Hampapur, K. Hyun, and R. Bolle. Comparison of sequence matching techniques for video copy detection. In Conference on Storage and Retrieval for Media Databases, pages 194--201, 2002.
[4]
J. He, Z. Lin, L. Wang, and X. Tang. Detecting Doctored JPEG Images Via DCT Coefficient Analysis. European Conference on Computer Vision, 2006.
[5]
L. Kennedy and M. Naaman. Generating diverse and representative image search results for landmarks. In World Wide Web, 2008.
[6]
W.-H. Lin and A. Hauptmann. Are These Documents Written from Diff erent Perspectives? A Test of Different Perspectives Based On Statistical Distribution Divergence. In Proceedings of the International Conference on Computational Linguistics, 2006.
[7]
W.-H. Lin and A. Hauptmann. Do these news videos portray a news event from different ideological perspectives? In International Conference on Semantic Computing, 2008.
[8]
D. Lowe. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision, 60(2):91--110, 2004.
[9]
D.-Q. Zhang and S.-F. Chang. Detecting image near-duplicate by stochastic attributed relational graph matching with learning. In ACM Multimedia, 2004.

Cited By

View all
  • (2024)VideoFACT: Detecting Video Forgeries Using Attention, Scene Context, and Forensic Traces2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)10.1109/WACV57701.2024.00837(8548-8558)Online publication date: 3-Jan-2024
  • (2022)Image Provenance AnalysisMultimedia Forensics10.1007/978-981-16-7621-5_15(389-432)Online publication date: 2-Apr-2022
  • (2022)Impact of Media Forensics and Deepfake in SocietyBreakthroughs in Digital Biometrics and Forensics10.1007/978-3-031-10706-1_18(387-410)Online publication date: 29-Jun-2022
  • Show More Cited By

Index Terms

  1. Internet image archaeology: automatically tracing the manipulation history of photographs on the web

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM '08: Proceedings of the 16th ACM international conference on Multimedia
    October 2008
    1206 pages
    ISBN:9781605583037
    DOI:10.1145/1459359
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 October 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. image manipulation history
    2. internet image mining
    3. perspective discovery

    Qualifiers

    • Research-article

    Conference

    MM08
    Sponsor:
    MM08: ACM Multimedia Conference 2008
    October 26 - 31, 2008
    British Columbia, Vancouver, Canada

    Acceptance Rates

    Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)21
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 26 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)VideoFACT: Detecting Video Forgeries Using Attention, Scene Context, and Forensic Traces2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)10.1109/WACV57701.2024.00837(8548-8558)Online publication date: 3-Jan-2024
    • (2022)Image Provenance AnalysisMultimedia Forensics10.1007/978-981-16-7621-5_15(389-432)Online publication date: 2-Apr-2022
    • (2022)Impact of Media Forensics and Deepfake in SocietyBreakthroughs in Digital Biometrics and Forensics10.1007/978-3-031-10706-1_18(387-410)Online publication date: 29-Jun-2022
    • (2020)Media Forensics and DeepFakes: An OverviewIEEE Journal of Selected Topics in Signal Processing10.1109/JSTSP.2020.300210114:5(910-932)Online publication date: Aug-2020
    • (2020)Discovering Image Manipulation History by Pairwise Relation and Forensics ToolsIEEE Journal of Selected Topics in Signal Processing10.1109/JSTSP.2020.299982714:5(1012-1023)Online publication date: Aug-2020
    • (2019)Image phylogeny tree construction based on local inheritance relationship correctionMultimedia Tools and Applications10.1007/s11042-018-6352-378:5(6119-6138)Online publication date: 1-Mar-2019
    • (2018)Stay True to the Sound of History: Philology, Phylogenetics and Information Engineering in MusicologyApplied Sciences10.3390/app80202268:2(226)Online publication date: 1-Feb-2018
    • (2018)Phylogenetic Analysis of Multimedia Codec Software2018 26th European Signal Processing Conference (EUSIPCO)10.23919/EUSIPCO.2018.8553158(1427-1431)Online publication date: Sep-2018
    • (2018)Image Provenance Analysis at ScaleIEEE Transactions on Image Processing10.1109/TIP.2018.286567427:12(6109-6123)Online publication date: Dec-2018
    • (2018)Visual instance mining from the graph perspectiveMultimedia Systems10.1007/s00530-016-0533-624:2(147-162)Online publication date: 1-Mar-2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media