Title :
Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map
Author :
Fu, Huazhu ; Cao, Xiaochun
Author_Institution :
Sch. of Comput. Sci. & Technol., Tianjin Univ., Tianjin, China
Abstract :
Distortion is often considered as an unfavorable factor in most image analysis. However, it is undeniable that the distortion reflects the intrinsic property of the lens, especially, the extreme wide-angle lens, which has a significant distortion. In this paper, we discuss how explicitly employing the distortion cues can detect the forgery object in distortion image and make the following contributions: 1) a radial distortion projection model is adopted to simplify the traditional captured ray-based models, where the straight world line is projected into a great circle on the viewing sphere; 2) two bottom-up cues based on distortion constraint are provided to discriminate the authentication of the line in the image; 3) a fake saliency map is used to maximum fake detection density, and based on the fake saliency map, an energy function is provided to achieve the pixel-level forgery object via graph cut. Experimental results on simulated data and real images demonstrate the performances of our method.
Keywords :
graph theory; image processing; lenses; message authentication; object detection; ray tracing; realistic images; bottom-up cues; captured ray-based models; distortion constraint; distortion cue; distortion image; energy function; extreme wide-angle lens; fake detection density; fake saliency map; forgery authentication; forgery object detection; graph cut; image analysis; intrinsic property; line authentication; pixel-level forgery object; radial distortion projection model; real images; straight world line; unfavorable factor; viewing sphere; Authentication; Cameras; Forgery; Lenses; Optical distortion; Solid modeling; Three dimensional displays; Distortion constraint; fake saliency map; forgery detection; lens distortion; wide-angle lens;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Conference_Location :
4/19/2012 12:00:00 AM
DOI :
10.1109/TIFS.2012.2195492