skip to main content
10.1145/1854229.1854233acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Estimating vignetting function from a single image for image authentication

Published:09 September 2010Publication History

ABSTRACT

Vignetting is the phenomenon of reduced brightness in an image at the peripheral region compared to the central region. As patterns of vignetting are characteristics of lens models, they can be used to authenticate digital images for forensic analysis. In this paper, we describe a new method for model based single image vignetting estimation and correction. We use the statistical properties of natural images in the discrete derivative domains and formulate the vignetting estimation problem as a maximum likelihood estimation. We further provide a simple and efficient procedure for better initialization of the numerical optimization. Empirical evaluations of the proposed method using synthesized and real vignetted images show significant gain in both performance and running efficiency in correcting vignetting from digital images, and the estimated vignetting functions are shown to be effective in classifying different lens models.

References

  1. A. Levin and Y. Weiss. User assisted separation of reflections from a single image using a sparsity prior. In ECCV, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  2. N. Asada, A. Amano, and M. Baba. Photometric calibration of zoom lens systems. In ICPR, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Baddeley. Searching for filters with "interesting" output distributions: an uninteresting direction to explore. Network, 7:409--421, 1996.Google ScholarGoogle Scholar
  4. P. J. Burt and E. H. Adelson. The Laplacian pyramid as a compact image code. IEEE Transactions on Communication, 31(4):532--540, 1981.Google ScholarGoogle ScholarCross RefCross Ref
  5. G. Casella and R. L. Berger. Statistical Inference. Duxbury Press, 2nd edition, 2001.Google ScholarGoogle Scholar
  6. M. Chen, J. Fridrich, M. Goljan, and J. Lukas. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security, 3(1):74--90, March 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Farid. Photo fakery and forensics. In Advances in Computers. 2009. (to appear).Google ScholarGoogle ScholarCross RefCross Ref
  8. H. Farid and E.P. Simoncelli. Differentiation of discrete multi-dimensional signals. IEEE Trans. Image Proc., 13(4):496--508, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Fergus, B. Singh, A. Hertzmann, S. T. Roweis, and W. T. Freeman. Removing camera shake from a single photograph. In ACM SIGGRAPH, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Thomas Gloe, Karsten Borowka, and Antje Winkler. Feature-based camera model identification works in practice results of a comprehensive evaluation study. In S. Katzenbeisser and A.-R. Sadeghi, editors, IH 2009, LNCS 5806,, pages 262--276, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. B. Goldman and J. H. Chen. Vignette and exposure cal- ibration and compensation. In ICCV, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y-F. Hsu and S-F. Chang. Image splicing detection using camera response function consistency and automatic segmentation. In International Conference on Multimedia and Expo, Beijing, China, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  13. J. Huang and D. Mumford. Statistics of natural images and models. In CVPR, 1999.Google ScholarGoogle Scholar
  14. A. Hyvärinen, J. Hurri, and P. O. Hoyer. Natural Image Statistics: A probabilistic approach to early computational vision. Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Jia and C.-K. Tang. Tensor voting for image correction by global and local intensity alignment. IEEE Trans. PAMI, 27(1):36--50, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M.K. Johnson and H. Farid. Exposing digital forgeries through chromatic aberration. In ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Kang and R. Weiss. Can we calibrate a camera using an image of a flat textureless lambertian surface? In ECCV, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Kharrazi, H.T. Sencar, and N Memon. Blind source camera identification. In Proceedings of the 2004 IEEE International Conference on Image Processing (ICIP 2004),, pages 709--712, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  19. Rudolf Kingslake and R. Barry Johnson. Lens Design Fundamentals. Academic Press, 2nd edition, 2009.Google ScholarGoogle Scholar
  20. A. Levin, A. Zomet, and Y. Weiss. Learning how to inpaint from global image statistics. In ICCV, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Litvinov and Y. Y. Schechner. Addressing radiometric nonidealities: A unified framework. In CVPR, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Lyu and E. P. Simoncelli. Reducing statistical dependencies in natural signals using radial Gaussianization. In NIPS, 2008.Google ScholarGoogle Scholar
  23. S G Mallat. A theory for multiresolution signal decomposition: The wavelet representation. 11:674--693, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. D. Martin, C. Fowlkes, D. Tal, and J. Malik. A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. In ICCV, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  25. A.C. Popescu and H. Farid. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing, 53(10):3948--3959, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Sidney F. Ray. Applied photographic optics. Focal Press, 3rd edition, 2002.Google ScholarGoogle Scholar
  27. S. Roth and M. Black. Fields of experts: A framework for learning image priors. In CVPR, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. D. Ruderman. The statistics of natural images. Network: Comp. in Neural Sys., 5:598--605, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  29. A. A. Sawchuk. Real-time correction of intensity nonlinearities in imaging systems. IEEE Trans. Computers, 26(1):34--39, 1977.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. E. P. Simoncelli and E. H. Adelson. Noise removal via Bayesian wavelet coring. In ICIP, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  31. A. Swaminathan, Min Wu, and K.J.R. Liu. Digital image forensics via intrinsic fingerprints. IEEE Transactions on Information Forensics and Security, 3(1):101--117, March 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A van der Schaaf and J H van Hateren. Modelling the power spectra of natural images: Statistics and information. Vision Research, 28(17):2759--2770, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  33. W. Yu. Practical anti-vignetting methods for digital cameras. IEEE Trans. on Cons. Elect, 50(2):975--983, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Yuanjie Zheng, Stephen Lin, and Sing Bing Kang. Single-image vignetting correction. In CVPR, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Yuanjie Zheng, Jingyi Yu, Stephen Lin, Sing Bing Kang, and Chandra Kambhamettu. Single-image vignetting correction using radial gradient symmetry. In CVPR, 2008.Google ScholarGoogle Scholar

Index Terms

  1. Estimating vignetting function from a single image for image authentication

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and security
        September 2010
        264 pages
        ISBN:9781450302869
        DOI:10.1145/1854229

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 September 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate128of318submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader