Are You Lying: Validating the Time-Location of Outdoor Images

@inproceedings{Li2017AreYL,
  title={Are You Lying: Validating the Time-Location of Outdoor Images},
  author={Xiaopeng Li and W. Xu and Song Wang and Xianshan Qu},
  booktitle={ACNS},
  year={2017}
}
Photos have been commonly used in our society to convey information, and the associated contextual information (i.e., the capture time and location) is a key part of what a photo conveys. However, the contextual information can be easily tampered or falsely claimed by forgers to achieve malicious goals, e.g., creating fear among the general public or distorting public opinions. Thus, this paper aims at verifying the capture time and location using the content of the photos only. Motivated by… Expand
Validating the Contextual Information of Outdoor Images for Photo Misuse Detection
TLDR
This paper is motivated by the law of nature that sun position varies with the time and location, which can be used to determine whether the claimed contextual information corresponds with theSun position that the image content actually indicates and proposes novel algorithms which utilize only one shadow in the image to infer the sun position. Expand
Deep Representation Learning for Metadata Verification
  • Bor-Chun Chen, L. Davis
  • Computer Science
  • 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW)
  • 2019
TLDR
A deep neural network called Attentive Bilinear Convolutional Neural Networks (AB-CNN) is proposed that learns appropriate representation for metadata verification, aiming to verify the authenticity of the metadata associated with the image, using a deep representation learning approach. Expand
Pinto: Enabling Video Privacy for Commodity IoT Cameras
TLDR
Pinto records a realtime video stream at a fast rate and allows post-processing for privacy protection prior to sharing of videos while keeping their original, realtime signatures valid even after the post blurring, guaranteeing no content forgery since the time of their recording. Expand
The Security of IP-Based Video Surveillance Systems
TLDR
This review explores the attack surface of modern surveillance systems and enumerates the various ways they can be compromised with real examples, and identifies the threat agents, their attack goals, attack vectors, and the resulting consequences of successful attacks. Expand
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants
TLDR
A completely inaudible attack, DolphinAttack, that modulates voice commands on ultrasonic carriers to achieve inaudibility and is validated that it is feasible to detect DolphinAttack by classifying the audios using supported vector machine (SVM), and suggests to re-design voice assistants to be resilient to inaudibles voice command attacks. Expand
DolphinAttack: Inaudible Voice Commands
TLDR
A totally inaudible attack, DolphinAttack, that modulates voice commands on ultrasonic carriers to achieve inaudibility and is validated on popular speech recognition systems, including Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa. Expand
Content-Based Detection of Temporal Metadata Manipulation
TLDR
This work proposes an end-to-end approach to verify whether the purported time of capture of an image is consistent with its content and geographic location, and improves upon previous work on a large benchmark dataset. Expand

References

SHOWING 1-10 OF 23 REFERENCES
Photo sundial: Estimating the time of capture in consumer photos
TLDR
This work proposes a system, Photo Sundial, for estimating the time of capture by exploiting the astronomical theory, and develops an optimization framework to jointly estimate the time from multiple photos. Expand
Estimating Geo-temporal Location of Stationary Cameras Using Shadow Trajectories
TLDR
Using only shadow trajectories of stationary objects in a scene, it is demonstrated that using a set of six or more photographs are sufficient to accurately calibrate the camera and a novel application where one can accurately determine the geo-location of the camera, up to a longitude ambiguity, and also the date of image acquisition without using any GPS or other special instruments. Expand
Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation
TLDR
This paper utilizing a novel two-stage shadow detection process is able to estimate the azimuthal direction of the sun in an image and compare it against a calculated theoretical value to establish the authenticity of the time of capture of an image based on its geolocation information. Expand
Detection of Copy-Move Forgery in Digital Images
TLDR
This paper investigates the problem of detecting the copy-move forgery and describes an efficient and reliable detection method that may successfully detect the forged part even when the copied area is enhanced/retouched to merge it with the background and when the forged image is saved in a lossy format, such as JPEG. Expand
Exposing photo manipulation from user-guided 3D lighting analysis
TLDR
It is shown that with minimal training, an analyst can accurately specify 3-D shape in a single image from which3-D lighting can be automatically estimated and a perturbation analysis on the estimated lighting is performed to yield a probabilistic measure of the location of the illuminating light. Expand
Geo-location estimation from two shadow trajectories
  • Lin Wu, Xiaochun Cao
  • Computer Science
  • 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition
  • 2010
TLDR
It is shown that camera parameters, latitude, longitude can be estimated from two observed shadow trajectories, and the design of the analemmatic sundial is used to get the shadow conic and furthermore recover the camera's geographical location. Expand
An efficient and robust method for detecting copy-move forgery
TLDR
The proposed features can detect duplicated region in the images very accurately, even when the copied region was undergone severe image manipulations and use of counting bloom filters offers a considerable improvement in time efficiency at the expense of a slight reduction in the robustness. Expand
Exposing Photo Manipulation from Shading and Shadows
We describe a method for detecting physical inconsistencies in lighting from the shading and shadows in an image. This method imposes a multitude of shading- and shadow-based constraints on theExpand
Detecting image region duplication using SIFT features
  • Xunyu Pan, Siwei Lyu
  • Computer Science
  • 2010 IEEE International Conference on Acoustics, Speech and Signal Processing
  • 2010
TLDR
The robustness of the SIFT features with regards to local transforms renders this method able to detect general region duplications with efficient computation and the effectiveness of this method is demonstrated. Expand
KinWrite: Handwriting-Based Authentication Using Kinect
TLDR
The experimental results involving 35 signatures from 18 subjects and a brute-force attacker have shown that KinWrite can achieve a 100% precision and a 70% recall for verifying honest users, encouraging us to carry out a much larger scale study towards designing a foolproof system. Expand
...
1
2
3
...