Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hany Farid is active.

Publication


Featured researches published by Hany Farid.


IEEE Signal Processing Magazine | 2009

Image forgery detection

Hany Farid

We are undoubtedly living in an age where we are exposed to a remarkable array of visual imagery. While we may have historically had confidence in the integrity of this imagery, todays digital technology has begun to erode this trust. From the tabloid magazines to the fashion industry and in mainstream media outlets, scientific journals, political campaigns, courtrooms, and the photo hoaxes that land in our e-mail in-boxes, doctored photographs are appearing with a growing frequency and sophistication. Over the past five years, the field of digital forensics has emerged to help restore some trust to digital images. The author reviews the state of the art in this new and exciting field.


IEEE Transactions on Signal Processing | 2005

Exposing digital forgeries in color filter array interpolated images

Alin C. Popescu; Hany Farid

With the advent of low-cost and high-resolution digital cameras, and sophisticated photo editing software, digital images can be easily manipulated and altered. Although good forgeries may leave no visual clues of having been tampered with, they may, nevertheless, alter the underlying statistics of an image. Most digital cameras, for example, employ a single sensor in conjunction with a color filter array (CFA), and then interpolate the missing color samples to obtain a three channel color image. This interpolation introduces specific correlations which are likely to be destroyed when tampering with an image. We quantify the specific correlations introduced by CFA interpolation, and describe how these correlations, or lack thereof, can be automatically detected in any portion of an image. We show the efficacy of this approach in revealing traces of digital tampering in lossless and lossy compressed color images interpolated with several different CFA algorithms.


information hiding | 2002

Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines

Siwei Lyu; Hany Farid

Techniques for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages has become considerably more difficult. This paper describes an approach to detecting hidden messages in images that uses a wavelet-like decomposition to build higher-order statistical models of natural images. Support vector machines are then used to discriminate between untouched and adulterated images.


IEEE Transactions on Information Forensics and Security | 2006

Steganalysis using higher-order image statistics

Siwei Lyu; Hany Farid

Techniques for information hiding (steganography) are becoming increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages is also becoming considerably more difficult. We describe a universal approach to steganalysis for detecting the presence of hidden messages embedded within digital images. We show that, within multiscale, multiorientation image decompositions (e.g., wavelets), first- and higher-order magnitude and phase statistics are relatively consistent across a broad range of images, but are disturbed by the presence of embedded hidden messages. We show the efficacy of our approach on a large collection of images, and on eight different steganographic embedding algorithms.


acm workshop on multimedia and security | 2005

Exposing digital forgeries by detecting inconsistencies in lighting

Micah K. Johnson; Hany Farid

When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from the individual photographs. Lighting inconsistencies can therefore be a useful tool for revealing traces of digital tampering. Borrowing and extending tools from the field of computer vision, we describe how the direction of a point light source can be estimated from only a single image. We show the efficacy of this approach in real-world settings.


information hiding | 2004

Statistical tools for digital forensics

Alin C. Popescu; Hany Farid

A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longer hold the unique stature as a definitive recording of events. We describe several statistical techniques for detecting traces of digital tampering in the absence of any digital watermark or signature. In particular, we quantify statistical correlations that result from specific forms of digital tampering, and devise detection schemes to reveal these correlations.


IEEE Transactions on Information Forensics and Security | 2009

Exposing Digital Forgeries From JPEG Ghosts

Hany Farid

When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one persons head onto another persons body. If these images were originally of different JPEG compression quality, then the digital composite may contain a trace of the original compression qualities. To this end, we describe a technique to detect whether the part of an image was initially compressed at a lower quality than the rest of the image. This approach is applicable to images of high and low quality as well as resolution.


international conference on image processing | 2002

Detecting hidden messages using higher-order statistical models

Hany Farid

Techniques for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages has become considerably more difficult. This paper describes a new approach to detecting hidden messages in images. The approach uses a wavelet-like decomposition to build higher-order statistical models of natural images. A Fisher (1936) linear discriminant analysis is then used to discriminate between untouched and adulterated images.


IEEE Transactions on Medical Imaging | 2003

Elastic registration in the presence of intensity variations

Senthil Periaswamy; Hany Farid

We have developed a general-purpose registration algorithm for medical images and volumes. This method models the transformation between images as locally affine but globally smooth. The model also explicitly accounts for local and global variations in image intensities. This approach is built upon a differential multiscale framework, allowing us to capture both large- and small-scale transformations. We show that this approach is highly effective across a broad range of synthetic and clinical medical images.


IEEE Transactions on Information Forensics and Security | 2007

Exposing Digital Forgeries in Complex Lighting Environments

Micah K. Johnson; Hany Farid

The availability of sophisticated digital imaging technology has given rise to digital forgeries that are increasing in sophistication and frequency. We describe a technique for exposing such fakes by detecting inconsistencies in lighting. We show how to approximate complex lighting environments with a low-dimensional model and, further, how to estimate the models parameters from a single image. Inconsistencies in the lighting model are th.en used as evidence of tampering.

Collaboration


Dive into the Hany Farid's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eero P. Simoncelli

Howard Hughes Medical Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Micah K. Johnson

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Siwei Lyu

State University of New York System

View shared research outputs
Top Co-Authors

Avatar

Edward H. Adelson

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge