Professional Documents
Culture Documents
Anthony Sutardja
Yan Zhao
DI
MF
UC BERKELEY M ASTER OF ENGINEERING
EECS CAPSTONE PROJECT
OmarRamadan
Ant
honySut
ar
dj
a
YanZhao
Adv
i
s
or
:Pr
of
es
s
orJ
amesF
.O
Br
i
en
Table of Contents
For the UC Berkeley Master of Engineering Capstone Project
1. Introduction
3. Industry
12
5. Works Cited
17
6. Appendix
21
25
30
Introduction
Problem Statement
Forthepastcentury,photographshaveservedasreliableprimarysourcesofevidence,butthatis
quicklychanging.Photomanipulationtoolshavebecomewidespreadanditiseasytomanipulate
images.PhotomanipulationstoolssuchasAdobePhotoShopaffordgreaterartisticexpression,and
enableuserstocreatemanipulationsthatchallengethelimitsofournaturalperception.Thedifference
betweenauthenticandmanipulatedphotoshasbecomehardertodistinguish,andcanonlybedetected
bydigitalforensicexperts.Theimageforensicscapstoneprojectaimstocreateanonlinesoftware
servicethatperformstheworkofforensicanalysts,andvisualizesandanalyzesthepossible
manipulationsthatmayhavebeenperformedonanimage.Ourgoalistoempoweranybodytoperform
imageforensicanalysis,andhelpincreaseourfaithindigitalcontent.
Ourcapstonehascompletedaprototypeofthisimagemanipulationdetectionwebservicethathelpsa
useridentifyfraudulentfeatureswithinanimage.Althoughfullyfunctional,ourserviceisnotyetready
forcommercializationasmanyofthetechniquesarestillunderresearch.Inthefollowingsections,we
performamarket,industry,andintellectualpropertyanalysisonhowwewouldhypotheticallytakeour
onlinesoftwareservicetomarket.
Market
Potential Markets
Thereareseveralmarketsinwhichanimageforensicssolutionisgreatlyneeded.
Ourtechnologyhasseriousimplicationsforthepressimagemarket.Theexplodinggrowthofthe
Internetanddigitalcontenthasempoweredcitizenjournalismandtransformedthepressindustrywith
exclusiverichmediacollections.Withthisgrowth,presscompaniesnowhavetheadditionalchallenge
ofmaintainingtheircredibilitybyvalidatingmediafromnewunverifiedsources.Photoeditorsatsuch
institutionsworktoensurethatonlygenuinephotosarepublished,butwithadvancededitingtools,
evenanexperiencedanalystcanfailtoidentifyimagemanipulations.The$32billiondollarnewspaper
industrytakesphotomanipulationasaseriousthreatbecauseofthedamageitbringstotheircredibility
(McKenna).Theirzerotolerancepolicytowardsphotomanipulationfrequentlyresultsinhundredsof
thousandsofdollarsinlosseseachmanipulatedphotoisissuedamandatorykillthatalertsall
affectedcustomerstocontroldamages(Lum).Theinvolvedphotographersareusuallyterminatedsuch
asinthecaseofGettyfreelancerMarcFeldman(Lum),L.ATimesstaffphotographerColinCrawford
(Irby),orReutersfreelancerAdnanHajj(AlteredImagesPromptPhotographersFiring).
Anotherpotentialmarketresidesinthecourtoflaw.Admittingmanipulatedphotographicevidencein
courtisbothagrowingtrendandagrowingconcern.Perjuryisnotuncommon,andpoliceofficersare
estimatedtocommitperjurytwentytofiftypercentofthetimeonfourthamendmentissues(Slobogin).
Lawyersalsocommitperjury,andevengoodlawyersandareuntruthfulintheirprofession.Asit
stands,theauthenticityofphotographsiscontingentonthehonestyofthewitnesses.Animage
forensicsexpertisonlycalleduponwhentherearenowitnessestotestifyinalawsuitorwhenthe
photographicevidencehasitsintegritychallenged(Kashi).Otherwise,thereisnostandardprocedureto
havethephotoevidencethoroughlyvetted.The$400billiondollarlegalindustryneedsabetterwayto
admitphotographicevidenceinacourtoflawthatismorerobustthanasingletestamentofthetruth
(Novet).Weseeourimageforensicsoftwareasanopportunitytochangethewayphotoevidenceis
processed.
Marketing Strategy
Product
Thedetectionofmanipulatedimagesisanimportantproblemthatrequirestheconsultationofhighly
specializedforensicexperts.Giventhegrowingnatureofthisproblem,weproposeaservicethatputs
theanalyticalpowerofimageforensicmethodsinthehandsofthecommonuser.Wegeneratedetailed
reportsthatcanbeinterpretedbynonexperts,effectivelyallowinglowerlevelanalyststocreatemore
valuewhilerelievingtheworkloadsofbusyforensicexperts.
Ourproductincreasesthecapacityofanalystsitprovidesthemwithforensicinformationthathelps
themmakeinformeddecisionswhenevaluatingclaims.Whileimagessubmittedwithaclaimareonlya
portionoftheevidencethatanalystsusetobasetheirdecisions,theinformationweprovidehelpsthem
identifyandflagsuspiciousclaimsforfurtherreview,ultimatelyenablingthemtopreventmorefraud.
Value Guarantee
Thelargestriskforourcustomersisanegativereturnoninvestment,inthatthecostofourplatformis
notexceededbythevalueoffraudthatwestop.Toreducethisrisk,andpromotethesaleofour
service,ourstrategyistominimizethesoftwareacquisitionrisksforourcustomers.Wecanreducethe
switchingcostsbysupplyingourownforwarddeployedengineerstointegratewithourcustomers
softwarestacksandourownsupportteamtoprovidetrainingservices.Furthermore,withefficiencyour
serviceoffersanditseffectivenessincombatingfraud,wecanofferaguaranteedreturnoninvestment.
Customer Outreach
Customeracquisitionisthelargestchallengethatwewillface.Giventhebusinesstobusinessnatureof
ourbusinessmodelandthatcustomersarelikelytohavealargebureaucracywithseveraldecision
makers,oursalestimelinewilllikelytakemonths.Togenerateleads,weplantoattenddigitalforensic
conferencesandinsurancefraudconferencestopromoteourservices.
Industry
Theimageforensicsservicesindustryissubindustryofthemuchlargerdigitalfrauddetectionservices
industry.Byfocusingontheinsurancemarketfirst,webalanceourneedsforlargepotentialcustomer
volumewithourcustomersurgentneedsforasolutiontotheirfraudproblem.Withalargenumberof
insurancecorporationsacrossthecountrythatfacelargeinsurancefraudlosses,wecanmitigatethe
bargainingpowerofbuyersandjustifybigticketsales.Furthermore,thealternativestoourserviceare
weakinthismarket,sothebarrierstoentryarelow.Additionally,oursoftwareasaservice(SaaS)
modelallowsustoreplicateandscaleourofferingswithease.
Substitute Offerings
Theuseofdigitalevidencehasbecomeacceptedpractice.Inthecaseofautomobileinsuranceclaims,
agenciesactuallyencouragethebehavior.TheDMV.orgproceduresforfilinganautoinsuranceclaim
suggestsusinga
smartphoneorcameratotakepicturesatthesceneoftheautomobiledamages
(HowCarInsuranceCompaniesInvestigateAccidentClaims).Theseimagesareeasilymanipulated
toexaggeratedamagestoincreaseliabilityorremoveevidencetolessenliability.Insuranceindustry
studiesrevealthat10percentormoreofclaimsfiledarefraudulent(GEICO,GEICOsSpecial
InvestigationsUnit),manyofwhichincludedigitallyeditedphotos(Verifeyed,VerifeyedImage,
VideoandPDFForensics,Authentication,ManipulationDetection,andandDigitalSecurity).By
analyzingclaimsforfraudulentimages,wecangreatlyimprovetheefficiencyoftheclaimreview
process.
Current Methods
Thedetailsastohowinsurancecompanieshandleinsuranceclaimsvariesbasedonthenatureand
severityoftheclaim,aswellasthecompanysownpolicies.However,therearecertainstepswhichare
commonamongstinvestigations.
Claimsprocessbeginswhenareportofdamageissubmittedtotheinsurancecompanyusinganonline
formorbydirectlycallingthecompanysclaimdivision.Theclaimantisexpectedtosupplysufficient
documentationthatallowsthecompanytounderstandthecircumstancesoftheaccident,andestimate
thedamagesassociatedwithit.
Thecasecreatedisassignedtoanemployeeoftheinsurancecompany.Theseemployeeshavea
numberoftitlesacrosscompaniesincludingLiabilityInvestigatorsorClaimAdjusters,Appraisers,and
Investigators(U.S.BureauofLaborStatistics).However,theresponsibilitiesofsuchpersonnelare
fairlyconsistenttheirroleistodeterminewhethertheinsurancepolicywillpayout,andifso,how
muchitwillcover.
Thefirststepofevaluatingtheclaiminvolvessurveyingthedamage,andcheckingthecasefor
inconsistencies.Thisisachievedthroughindepthinterviewswiththeinvolvedpartiesandwitnesses
followedbyacomparisonofallaccounts
(GEICO,HowGEICOInvestigatesaClaim)
.The
interviewsarealsocomparedwithinformationfromthepolicereport,andtheinvestigatorreviews
auxiliarydocumentssuchasphotosassociatedwiththeincidentandpublicinformationfromsocial
media
(GEICO)
.Intheeventthatacaseisflaggedbyanexaminerasbeingsuspicious,thecaseis
reassignedtoaSpecialInvestigationsUnit(SIU)whichexaminesthecasecloselyforevidenceoffraud
(GEICO).Iftheimagesassociatedwiththeclaimcomeintoquestion,theSIUwillconsultanimage
forensicsexpert.
Themainprobleminidentifyingfraudulentcasesistheintenselaborthatitrequires.Beforeacaseis
evenflaggedasbeingfraudulentandreferredtotheSIU,ithasalreadyconsumedtheresourcesofthe
claimadjuster.Inthecaseoflowvalueclaimswhereitischeapertopaytheclaimantratherthanverify
thedamage,imageverificationcancutcosts.
Manipulatedimagesaredangeroustoclaiminvestigators.Inthecaseofafraudulentclaim,itis
unlikelythataperpetratorwouldsubmitphotographicevidencethatcontradictstheclaimstory.
Manipulatedphotographscangounnoticedtothenakedeye,andsinceseeingisbelieving,
convincingfakescanbringinvestigatorstolapsesinjudgement.Whilethereareforensictoolsthatcan
beusedtoverifyphotos,suchtoolsrequiretechnicalanalysisskillsthatarebeyondthescopeofacase
examinerscapabilities.
Anotheroptioninsurancecompaniesexerciseinthefaceoffraudistosimplybepassive.Lossesarea
commonoccurrenceintheinsurancemarket,andthewaytheyaredealtwithisbypassingthemonto
theircustomersintheformofincreasedpremiums(StateFarm).Notonlydoesitmakeinsuranceless
affordable,butaccordingtotheNationalInsuranceCrimeBureau(NICB),insurancefraudisalso
correlatedwithhighertaxesandinflatedpricesforconsumergoods(NationalInsuranceCrimeBureau).
Competitive Landscape
Ourcapstoneteamisnotthefirstgroupofpeoplewhohaveidentifiedthevaluetoberestoredtothe
insurancecompaniesfromdetectingmanipulatedimages.Wehaveidentifiedtwocompaniesthatour
productwilldirectlypotentiallycompetewith.
Competitors
SystemofMethodsandToolsofDigitalProcessingTechnologyLLC,knownasSMTDPisaRussian
technologycompanyfoundedin2011thatfocusesonautomatedbusinessprocessesandimage
manipulationdetections(CompanyOverviewofSMTDPTechnology,LLC).Someofthe
technologiesusedbySMTDPareimagemetadataanalysisandimagecompressionanalysis.SMTDPs
businessmainlyfocusesonthedevelopmentoftechnologyandreliesonpartnershipagreementswith
othercompanies,likeBelkasoftandPricewaterhouseCoopers,todistributeandutilizetheirproducts
(CompanyOverviewofSMTDPTechnology,LLC).SinceSMTDPinteractsonlywithvalueadded
resellers,thecustomersthatreceivetheenduserproductdependsentirelyonthesepartners.Being
basedinSaintPetersburg,SMTDPislimitedinitscustomerreach.SMTDPinsteadworkswithits
partnerstocreatethirdpartyproductsthatintegratetheirimagemanipulationdetectionmethods
(SMTDP,SMTDP|Company).Thisisamodelthatleadstocustomersupportandintegration
difficultiesasopposedtoworkingdirectlywithcustomerstomeettheirneeds.
BesidesSMTDP,thesecondlargestcompetitorinthedigitalimageforensicsspaceisVerifeyed,a
privatelyownedcompanylocatedatCzechRepublic(Verifeyed,Verifeyed|WhatIsVerifeyed).
Verifeyedsproductisasoftwaresuitethatcanbeinstalledbyuserswhoobtainalicensethenend
userscanprocesssuspectimagestoevaluateiftheimagesaremanipulatedornot(Verifeyed,
Verifeyed|WhatIsVerifeyed).UnlikeSMTDP,Verifeyeddistributestheirsoftwaresuiteby
themselvesandsellsdirectlytoitscustomers.Fromthetechnologyperspective,Verifeyedfocuseson
imagemetadataanalysisandballisticsanalysis(atypeofimagecompressionanalysis).
BothSMTDPandVerifeyedhavedirectandindirectcustomersthatarefrommajorinsurance
companies,journalismindustries,andcreditcardcompanies.Thecompaniesbelongtomarketsthat
highlyvalueimageauthenticityinordertoreducethepotentiallossestofraud.LikeSMTDPand
Verifeyed,ourtargetedmarketsaretheinsurance,journalism,andcreditcardmarkets,thoughwewill
targettheinsurancemarketsegmentfirst.
Comparison
Comparedtoourcompetitorsbusinessesandproducts,ourimagedetectionwebserviceisstrategically
positionedtohavemoreinformativedetectionresultsandtobesimplerinintegration.
Ourproductismoreinformativeinlocalmanipulationchangesthanotherproductsonthemarket.Our
algorithmsfocusonbothlowlevelimageanalysesandhighlevelimagefeatures,whileourcompetitors
mainlyfocusonbringingmeaningoutofasuspectedimagesmetadataandcompressionanalysis.
Verifeyedskeydifferentiatingfactoristheirimageballisticsmethodwhichcanidentifythesource
cameraofaphotousingitsquantizationtable.Whilethisrequiresbuildingadatabaseofcamera
signatures,augmentingpubliclyavailabledatasetsisnotaninsurmountablechallenge.Wehave
matchedsomefeaturesofourcompetitorsbyprovidingthesamelowlevelanalysis,butwehavealso
addedmoreadvancedformsofanalysis.WelookforhighlevelimagefeatureslikeCopyMove
detectionsandimagesplicingdetections.Thesehighlevelfeaturesarecommonamongstmostdigital
imagemanipulations,andaremoredifficulttoconcealbyimageforgers.Theseextradimensionshelp
ourcustomersfurtherininterpretingwhathappenedtoaparticularimage.Theresultofallthesefeature
detectionsisamorecomprehensiveandinformativeimagemanipulationdetection.
Ourproducthassimpleandinterpretableresults.Ourcompetitorssoftwaretoolsonlyoutputssimple
binaryclassificationresultindicatingifanimagehasbeenmanipulatedornot.Incontrast,ourweb
serviceprovidesadetailedreportshowingvisualizationsofinterestingmanipulatedfeatures,aswellas
humanreadableinterpretationsofwhatmanipulationsmayhavehappenedintheimage.Thisdetailed
reportiscrucialtoourcustomerssinceasimplebutpowerfultoolwouldreducetheneedtohireimage
analysisexpertstoinvestigatesuspectimages.
Mostimportantly,ourimagedetectionsoftwareisawebserviceproductthatcanbeintegratedintoany
existingworkflow.SMTDPdistributesitstechnologythroughthirdpartyresellersitstechnologycould
onlybenefitusersafterintegratingwiththirdpartiesproducts(SMTDP,SMTDP|Partners).
VerifeyedsellstraditionalsoftwaressuchthatusersneedtopurchaseandinstallVerifeyedssoftware
andinstallontheirowncomputers(Verifeyed,Verifeyed|WhatIsVerifeyed).Incontrast,our
customersarenotrequiredtouseaparticularoperatingsystemtorunastandaloneapplication.
Furthermore,theRESTservicesflexibilityallowsourproducttobeintegratedintoexistingworkflows
helpingtoreducecustomertrainingburdensandswitchingcosts.
10
Scalability
Oursoftwareisdesignedtobedeployedonadistributedinfrastructurethatcanscalelinearlywiththe
rateatwhichweprocessimages.Wecangrowandscalewiththerequirementsofourcustomers.
Softwareasaservice(SaaS)productsonlyhaveonesupplier:clouddatacenters.Thecompaniesthat
offerclouddatacentersserviceshavebeenrelentlesslycuttingpricestothepointwhereallthe
providersareextremelycheap(StateFarm).Ifoneprovidertriedtoraiseprices,wecouldeasilyshift
ourproductofferingstoadifferentprovidersincesoftwareservicedeploymentarchitectureisgenerally
thesame.Thecheaplandscapeofcloudserviceprovidersenablestohostourdetectionserviceat
minimalcosts.
Thealternativetodeployingoursoftwareserviceonthecloudistorentorbuyourownservers.
However,thiswouldhavetobeatapricepointinwhichthecloudofferingsarenolongercheaper,
whichispossibledependingontheusageoftheservers(Leong12).Evenintheeventwherewemust
purchaseservers,hostingandmaintainingserversisarathersmallfixedcost.Hence,thechoiceof
hostingoncloudprovidersversushostingonourownserversisnotadecisionthatwillconstrainour
profitability.
11
Intellectual Property
Forthiscapstone,wehavedevelopednewalgorithmsfordetectingandidentifyingmanipulated
featuresinadigitalimage.Ourteamhastakencarefulconsiderationoftheintellectualpropertylawsof
theUnitedStatestoprotectthefutureprospectsofourbusiness.Copyrightandtradesecretlawsinthe
UnitedStatescanhelpusenforceourbusinessmodelandkeepourcompetitiveadvantage.
Non-obviousness
USpatentlawrequiresapatentclaimtobenonobvioustoapersonhavingordinaryskillintheart
(35USC103).Softwarepatentscanbeinvalidatedduetotheideasbeingofcommonsenseor
obvioustotryasanextstep(PerfectWebTechnologies,Inc).
Weholdconcernsthatourdetectionwebserviceasawholeisobvioustotry.Althoughourdetection
serviceusesacombinationofdifferentmethodologies,thesetechniquesthatwevecreatedareheavily
basedonacademicpapersandresourcesthatareinthepublicdomain.Usingallofthesedifferent
featuresinamachinelearningclassifiercouldbeseenasthenextstepforperformingageneralimage
manipulationdetectionclassification.Hence,theUnitedStatesPatentandTrademarkOfficemay
invalidateourclaimtoapatentduetononobviousness.
Novelty
Theothermainchallengeinobtainingsoftwarepatentsisestablishingnovelty.USpatentlawsrequires
thatapatentclaimtobefiledbeforetheclaimedinventionwaspatented,describedinaprinted
publication,orinpublicuse,onsale,orotherwiseavailabletothepublic(35USC102).
12
Existing Patents
Althoughwebelieveourprocessestobenonpatentable,wemustmakesurethatwearenotinfringing
onanypatentclaims.Weperformedathoroughsearchofpatentsrelevanttoourimagemanipulation
detectionservice.Althoughwewereunabletofindanypatentsthatcapturedtheessenceofour
endtoendclassificationsystem,wewereabletofindafewmorespecificpatentsthatpertaintothe
featuresthatourclassificationengineuses.
Lookingintopatentsfiledintoothercountries,wefoundthatChinesepatentCN102609948Ahadmany
ofthesimilarkeywordsandthesameultimateobjectivetooneofoursubprocessesrelatedto
CopyMovedetection().TheUnitedStatesPatentandTrademarkOfficewilllooktoforeign
patentstodetermineifthereisalreadypriorart(UnitedStates.Dept.ofCommerce).However,upona
closerreadingofthetechnicalspecificationsoftheChinesepatent,wehavedeterminedthatthe
Chinesepatentwouldnotbeseenaspriorarttoourprocesses.Eventhoughweareusingsomeofthe
sameimagelevelcharacteristicstodeliverananalysislikeScaleInvariantFeatureTransform
(abbreviatedasSIFT),ourprocessforCopyMovedetectioninvolvestechnicalprocessesthatare
unrelatedanddifferenttothetechnicalprocessesdetailedintheChinesepatent.Webelievethis
differentiationisenoughsuchthatthisclaimcannotbeappliedtoourCopyMovedetectionprocessin
theUnitedStatescourts,asextremespecificityresultsinnarrowapplicabilityofapatentsclaims
(LizardTech,Inc).Hence,wedonotbelieveweareinfringingonanypriorclaims.Inadditiontothe
differentiatedproceduresoftheChinesepatent,wecanalsodisregardthisforeignpatentclaimsinceit
isnotenforceableintheUnitedStates.
WewerealsoabletofindexistingpatentsintheUnitedStatessuchasUS8200034B2byNewJersey
InstituteofTechnology,US7439989B2byMicrosoft,andUS7720288B2byEastmanKodakthattarget
doubleJPEGcompression.Whatisuniquetothesemethodsisnottheartifactsthattheyaredetecting,
buttheclassificationmethodsbeingused.Allofthepatentslisteddescribeuniqueprocessesfor
detectingdoublecompression,whilethemethodweemployusesdistinctworkflowsforalignedand
nonalignedJPEG(Bianchi).Thatbeingsaid,thespecificsofhowourtechniquedetectsJPEGdouble
compressionaredistinctfromtheclaimsmadeinthepatent.Hence,likeintheChinesepatentcase,we
believethatourimplementationdoesnotinfringeonthepatentsandtheirwaysofextractingthis
feature.
13
Eventhoughthereareseveralrelevantpatentstohowweextractvarioustypesofimagemanipulation
features,webelieveourtechniquesaredifferentiatedenoughsuchthatwearenotinfringingonany
patentclaims.
Existing Publications
Havingprocessesthatdonotinfringeonexistingpatentclaimsdoesnotmeanthatwenecessarilyhave
anovelandpatentableclaim.Inadditiontoanexistingpatentsearch,theUnitedStatesPatentand
TrademarkOfficewillalsolooktopublicationstodeterminetheexistenceofpriorartwhen
determiningwhetherornottograntapatent(UnitedStates.Dept.ofCommerce).
Manyofourcomponentsarebasedonacademicpapersfromexternalresearchgroupsthathaveheavily
guidedourimplementationsofdetectinginterestingimagemanipulationfeatures.Thesefeatures
includehigherorderstatistics,JPEGerrorlevelanalysis,anddoubleJPEGcompression(Faridand
Lyu)(Krawetz)(BianchiandPiva).Althoughourcopymovedetectiontechniquewasdeveloped
independentlyfromknowledgethatisdocumentedbytheacademicpublicationsofIreneAmeriniatthe
UniversityofFlorenceinItaly,theUnitedStatesPatentandTrademarkOfficewouldstillusethese
publicationsasevidenceofpriorartduetothesubstantialsimilarityofprocessesanditspublication
datebeingin2011(Amerini).
Inadditiontothepriorartwithinthefeatureextractioncontext,priorartinpublicationsalsoexistsin
thecontextofourfullimagedetectionservice.AdissertationfromColumbiaUniversitybyYuFeng
HsuandShihFuChangcapturestheessenceofusingavarietyofimagefeaturestoperforma
classificationforimagemanipulationdetection(HsuandChang1).Althoughthedissertationuse
differentfeatures,HsuandChangdescribeafullsystemthatisverysimilartoimagedetectionservice.
No Patents
Thepriorartfoundinexistingpublicationsfurtherreduceourpossibleclaimstoapatent.Furthermore,
ouruseofourclassificationsystemwiththesespecificfeaturescanbeseenasobvioustotry.We
concludethatboththeoverallclassificationsystemandtheindividualfeaturecomponentsforour
classifieraretobenonpatentable.
14
Trademark Law
Weanticipatethatothernewentrantscouldmimicourimagedetectionprocessessincetheprocesses
arenotpatentable.Ouradvantageovernewentrantsisthetimethatwehavealreadyspentinfinding
andtuningtheoptimalparameters.Inordertominimizethethreatofanotherentrantcopyingour
systems,wewillusetradesecretprotectionstoprotectourmethods,techniques,processes,
procedures,programs,orcodes(18USC1839).Inotherwords,wewillbeabletoprotectthe
parametersinourmachinelearningprocess,themanipulatedimagedatasetsthattestourmethods,as
wellasthedetailedlistsonourcustomers.Protectingtheseassetsofourbusinesswillbecrucialto
maintainingourcompetitiveadvantage.
Copyright Law
Thelast,andmostimportantpart,ofourintellectualpropertystrategyistoenforcethecopyright
protectionsofferedbyUnitedStateslaw.
Primarily,wewillusecopyrighttoenforceourbusinessmodelofsellingthelicensetoviewtheimage
forensicreportsproducedbyourwebservice.UnitedStatescopyrightlawgivesusthesolerightto
reproduce,distribute,anddisplayourimageanalysisreports(17USC106).Successfulenforcementof
copyrightprotectionswouldpreventthescenarioinwhichamiddlemantakesadvantageofouronline
softwareservicebyresellingorredistributingourreportsindirectlytoourpotentialcustomers.Rather
thansellingoursoftwareorourreports,wewillsellthelicensetoviewtheimageanalysisreportsthat
ourwebserviceproduces.
UnitedStatescopyrightwillalsoprotectourrighttocreateanyderivationsofourproduct(17USC
106).Thiswouldpreventanyscenarioinwhichathirdpartyusedourimageanalysisreportstomakea
slightlymorecomprehensivereportorredressedthereportbyplagiarizingourmetricsandanalyses.
CourtsintheUnitedStateswouldenforceourcopyrightbasedonthesubstantiallysimilarityofideas
thatarecontainedinapotentiallyinfringingwork,aswellasthelookandfeelofthepotentially
infringingwork(DataEastUSA,Inc).
Hence,copyrightisthestrongestportionofourintellectualpropertystrategies.Theenforceabilityof
copyrightprotectionswillhelpourbusinessmodelflourish.
15
16
Works Cited
17USC.Sec.106.2008.
CornellUniversityLawSchool
.Web.26Feb.2015.
18USC.Sec.1839.1996.
CornellUniversityLawSchool
.Web.26Feb.2015.
35USC.Sec.102.2012.
CornellUniversityLawSchool
.Web.2Mar.2015.
35USC.Sec.103.2011.
CornellUniversityLawSchool
.Web.26Feb.2015.
AlteredImagesPromptPhotographersFiring.
Msnbc.com
.AccessedApril15,2015.
http://www.nbcnews.com/id/13165165/ns/world_newsmideast_n_africa/t/alteredimagespro
mptphotographersfiring/.
Bianchi,T.,andA.Piva.ImageForgeryLocalizationviaBlockGrainedAnalysisofJPEGArtifacts.
IEEETransactionsonInformationForensics&Security
7,no.3(June2012):100317.
CompanyOverviewofSMTDPTechnology,LLC.
bloomberg.com
.N.p.,n.d.Web.12Apr.2015.
DataEastUSA,Inc.v.Epyx,Inc.862F.2d204.CourtofAppeals,9thCircuit.1988.
GoogleScholar
.
Web.26Feb.2015.
Dulaney,Ken,etal.Predicts2015:MobileandWirelessGartner,Inc.Stamford,Connecticut.
November5,2014.Print.
Farid,Hany,andSiweiLyu.HigherOrderWaveletStatisticsandTheirApplicationtoDigital
Forensics.AccessedDecember19,2014.
FBI,InsuranceFraud.
FBI
.N.p.,n.d.Web.12Apr.2015.
GEICO,GEICOsSpecialInvestigationsUnit.
geico.com
.N.p.,n.d.Web.12Apr.2015.
GEICO,HowGEICOInvestigatesaClaim.
geico.com
.N.p.,n.d.Web.12Apr.2015.
GEICO,JoinGEICOintheFightagainstInsuranceFraudbyReportingSuspiciousActivity.
geico.com
.N.p.,n.d.Web.12Apr.2015.
17
HowCarInsuranceCompaniesInvestigateAccidentClaims.
DMV.org
.N.p.,n.d.Web.12Apr.
2015.
HowtoDocumentAutoAccidentDamage.
DMV.org
.N.p.,n.d.Web.12Apr.2015.
Hsu,YuFeng,andShihFuChang.ImageTamperingDetectionForForensicsApplications.
ColumbiaUniversity,2009.Print.
I.Amerini,L.Ballan,R.Caldelli,A.D.Bimbo,G.Serra.ASIFTBasedForensicMethodfor
CopyMoveAttackDetectionandTransformationRecovery.InformationForensicsand
Security,IEEETransactions.Volume6,Issue3.IEEE.17March2011.
Irby,Kenneth.L.A.TimesPhotographerFiredOverAlteredImage,April2,2003.
Kahn,Sarah.Design,Editing&RenderingSoftwarePublishingintheUSIBISWorld.September
2014.Print.AccessedonFebruary17,2015.
Kashi,Joe.AuthenticatingDigitalPhotographsasEvidence:APracticeApproachUsingJPEG
Metadata.
americanbar.org
.N.p.,n.d.Web.12Apr.2015.
Krawetz,Neal.APicturesWorthDigitalImageAnalysisandForensics.HackerFactorSolutions.
BlackHatBriefingsUSA2007.
Leong,Lydia.TechnologyOverviewforCloudInfrastructureasaServiceGartner,Inc.Stamford,
Connecticut.June30,2014.Print.
LizardTech,Inc.v.EarthResourceMapping,Inc.424F.3d1336.CourtofAppeals,FederalCircuit.
2005.
GoogleScholar
.Web.26Feb.2015.
Lum,Jessica.GettyPhotographerTerminatedOverAlteredGolfPhoto.
PetaPixel
.N.p.,n.d.Web.
12Apr.2015.
McKenna,Farrell.
NewspaperPublishingintheUS
.Melbourne,Australia:IBISWorldServices,2014.
IBISWorld
.Web.12Apr.2015.
18
NationalInsuranceCrimeBureau,INSURANCEFRAUD:UNDERSTANDINGTHEBASICS.
NationalInsuranceCrimeBureau
n.pag.Web.12Apr.2015.
Novet,Jordan.AllRise:TheEraofLegalStartupsIsNowinSession|VentureBeat|Entrepreneur|by
JordanNovet.
venturebeat.com
.N.p.,n.d.Web.12Apr.2015.
PerfectWebTechnologies,Inc.v.InfoUSA,Inc.587F.3d1324.CourtofAppeals,FederalCircuit.
2009.
GoogleScholar
.Web.26Feb.2015.
PictureImperfect.
TheEconomist
9Mar.2013.
TheEconomist
.Web.12Apr.2015.
Porter,MichaelE.TheFiveCompetitiveForcesthatShapeStrategyHarvardBusinessSchool
PublishingCorporation.2008.Print.
StateFarm,ReportingFraudStateFarm.
StateFarm
.N.p.,n.d.Web.12Apr.2015.
SilverLining.
TheEconomist
.
TheEconomist
.Web.12Apr.2015.
Slobogin,Christopher.TESTILYING:POLICEPERJURYANDWHATTODOABOUTIT.
UniversityofColoradoLawReview,Inc.
67.1037(1996):n.pag.Print.
Smith,Aaron.MobileAccess2010.
PewResearchCentersInternet&AmericanLifeProject
.N.p.,
n.d.Web.12Apr.2015.
Smith,Aaron.SmartphoneOwnership2013.
PewResearchCentersInternet&AmericanLife
Project
.N.p.,n.d.Web.12Apr.2015.
SMTDP,SMTDP|Company.N.p.,n.d.Web.12Apr.2015.
SMTDP,SMTDP|Partners.N.p.,n.d.Web.12Apr.2015.
Thomson,LucyL.MobileDevices:NewChallengesforAdmissibilityofElectronicEvidenceThe
SciTechLawyer,Volume9,Number3,Winter/Spring2013.Print.
19
U.S.BureauofLaborStatistics,ClaimsAdjusters,Appraisers,Examiners,andInvestigators:
OccupationalOutlookHandbook::U.S.BureauofLaborStatistics.N.p.,n.d.Web.12
Apr.2015.
UnitedStates.Dept.ofCommerce.TheUnitedStatesPatentandTrademarkOffice.PriorArt.
Chapter0900.Section901.
TheUnitedStatesPatentandTrademarkOffice.
Web.26Feb.
2015.
Verifeyed,VerifeyedImage,VideoandPDFForensics,Authentication,ManipulationDetection,
andandDigitalSecurity.N.p.,n.d.Web.12Apr.2015.
Verifeyed,
VerifeyedImage,VideoandPDFForensics,Authentication,ManipulationDetection,
andandDigitalSecurity|Technology&Documentation.N.p.,n.d.Web.12Apr.2015.
Verifeyed,
VerifeyedImage,VideoandPDFForensics,Authentication,ManipulationDetection,
andandDigitalSecurity|WhatIsVerifeyed.N.p.,n.d.Web.12Apr.2015.
,,,.Manipulationdetectionmethodforcopypastedistortedphotodigital
photos.PatentCN102609948A.16Apr.2014.
20
Appendix
Figure1:Thelandingpageforourprototypeimagedetectionservice.
21
Figure2:Theprogresspagewhileaphotoisbeingprocessed.
22
Figure3:Theresultspagedetailingacopymovedetectionandhigherorderstatisticanalysis.
23
I NTRODUCTION
It is relatively simple to generate images that are indistinguishable from authentic photographs. Recent advancements
in photo editing tools have made manipulated photos common
occurrences in our lives, undermining the credibility of digital
photographs. There is an increased demand for forensic systems that can verify the authenticity of digital photographs.
For such a classification system, it is desirable that it be
both passive and blind, meaning it requires no interaction to
generate a response so that it can be used in batch processing,
and require no prior information about the photograph such as
the original. It is possible to design such systems by leveraging
the artifacts that are introduced into images through photo
editing.
The task of image forensics first begins with searching for
evidence of tampering. Manipulations frequently leave behind
artifacts that differentiate them for authentic photographs. An
inconsistency in the time that a digital file was created and the
time it was last modified is a particularly obvious indicator
of a manipulation, though it is not completely reliable. These
irregularities can exist at the metadata level such as in this
case. They can also occur at a visual level with inconsistencies in shadows or lighting [1], or within the encoding and
compression of the file itself [2] [3]. Forensic analysts can also
detect forgeries by modeling irregularities that occur in natural
images such chromatic aberrations caused by the camera lens
[4] and correlations introduced in sensor arrays [5].
Any combination of these pieces of evidence can exist in
the case of a tampered photograph, and the more a system
is capable of detecting, the better its performance. For this
capstone project, one of the core tasks is to design and
implement multiple methods for detecting forgeries. In this
paper, we describe a method to detect an image splicing
forgery.
II.
P RIOR W ORK
A. Image Statistics
Image splicing is defined as the construction of an image
from multiple image sources. Spliced images can be some of
the more misleading manipulations because they fuse together
different contexts to create deception as in Figure 1.
To detect these forgeries, we exploit the use of statistical
correlations contained within the wavelet representation of
images. The decomposition of images into basis functions
(i.e wavelets) that are localized in position, orientation and
Technical Contribution
Fig. 1: Image-splicing can be used to create convincing fakes: (a) A star ship hovering over the valley. (b) A spliced
picture of the Singapore skyline.
III.
M ETHODS
Technical Contribution
separates the segment types. The separation of the two classes
is visualized in Figure 3.
We perform further evaluation of the methods using classification. The images in the data set are segmented using NCuts
or as a lattice, and we randomly select a maximum of 10, 000
segments, 70% of which are used for training. The results in
Table I summarize the results of the automatic segmentation,
and the number of segments by type that are used in the
evaluation.
TABLE I: Number of segments trained on for each type of
segmentation by type
NCuts
n=20
D. Feature Extraction
For the k levels of the QMF pyramid decomposition of each
segment, we compute the first four moments corresponding to
each of the three orientations. The bottom two layers from
the pyramid contain 1 and 4 pixels which are too small of
samples to extract statistics from, so we exclude them. This
gives (k 2) 3 3 4 features per block. We also compute the
interpolation error as given by (1) which doubles the number
of features we collect.
Since at each level of the pyramid, we are leveraging the
spatial relations of neighboring pixels, we are forced to discard
pixels on the edges, which translates to an analysis region of
the image that is 2k smaller on each side.
With the lattice segmentation, our segments are closely
aligned to the manipulated region, with the downside that there
are more segments to analyze.
IV.
R ESULTS
The data set used is the image splicing data set from
Columbia [9] consisting of 180 spliced images. The images
are from four different camera sources and contains 6 sets of
30 spliced images created by splicing two different camera
sources.
We divide the segments into three categories, (1) authentic:
this is a detected segment that lies fully within the larger
of the edge-masked region, (2) spliced: a segment that lies
fully within the minority portion of the edge-mask meaning
it is spliced from a secondary source, and (3) unaligned: a
segmented region that spans across both edge-masks regions.
Since the unaligned segments do not have a clearly defined
ground truth, we do not use them in training.
This results in some issues with the availability of training
data for the images segmented by NCuts. Since the number
of strongly separable segments varies significantly across
images, the resulting segments may have poor overlap with
the manipulated region. See Figure 4 for an example of
the automatic segmentation of a training image with NCuts.
However, across the entire data set, with 20 cuts, only 10.55%
of the images contained segments that lied fully within a
manipulated region.
To analyze the effectiveness of the extracted features,
we train a Fishers linear discriminant to project the high
dimensional feature descriptor into a single dimension that best
Blocks
k=4
Blocks
k=5
Segment Type
Authentic
Manipulated
Unaligned
Authentic
Manipulated
Unaligned
Authentic
Manipulated
Unaligned
Set 1
222
51
327
6443
3241
316
3595
1917
368
Set 2
217
55
328
6270
3390
340
3395
2051
434
Set 3
241
55
304
6787
2879
334
3795
1727
358
Set 4
234
55
341
7762
2041
197
7425
2133
442
Set 5
275
18
307
7749
2052
199
7184
1643
413
Set 6
253
27
320
7445
2330
225
6557
2228
455
All Sets
1442
231
1927
7264
2493
243
7058
2425
517
From the results in Table II, we firstly learn that the lattice
segmentation technique performs more robustly in disambiguation between two data sources as given by the results for each
of the independent sets. However, NCuts outperforms lattice
cuts on the full dataset. This may be explained by how a
model based on the small blocks tend to capture the statistical
properties introduced by the capture device, while NCuts with
its segmentation along object boundaries can learn to model
the irregularities that occur at manipulation boundaries.
We also learn that increasing the image pyramid depth
decreased the mean Type I error by 31.7% and the mean Type
II error by 31.8% across the individual sets, which may be
attributable that each layer added increases the segments by a
factor of four giving a larger sample that allows us to better
approximate the true distribution parameters.
There is the difficulty of comparing the performance of
these methods because of the difference in the number of
training examples generated. NCuts generates a total of 20
segments per image while the blocking methods generate
thousands per image so the size of the set of examples used
in training, though from the same number of images.
TABLE II: Classification error
NCuts
n=20
Blocks
k=4
Blocks
k=5
Error Type
Type I
Type II
Type I
Type II
Type I
Type II
Set 1
31.3
37.5
8.03
16.9
1.73
23.4
V.
Set 2
22.7
23.6
6.20
20.1
1.06
8.56
Set 3
34.3
41.1
13.6
32.1
7.50
20.1
Set 4
25.6
62.5
8.31
27.1
10.6
9.99
Set 5
34.9
16.7
10.3
17.9
5.90
6.08
Set 6
29.0
22.2
9.33
23.3
12.2
22.0
All Sets
11.8
28.6
14.5
30.5
21.0
32.3
D ISCUSSION
Technical Contribution
27
Technical Contribution
the sensor records data so we can more accurately measure
statistical irregularities introduced by manipulation rather than
measuring the statistical correlations between the colors given
their computation from the YCrCb channels.
R EFERENCES
[1]
[2]
[3]
Fig. 5: Even with 99% block level accuracy, the image level
classification error rate is unusable for images with a large
number of segments. For a 1024x768 pixel image, there are
3,072 16x16 segments.
[4]
[5]
VI.
F UTURE W ORK
[6]
[7]
[8]
[9]
[10]
[11]
[12]
C. Color Domain
Given that most statistical analysis is performed on the
luminance channel, it would be interesting to repeat this
analysis in the YCrCb domain. This is the domain in which
28
Technical Contribution
29
Concluding Reflections
Inconclusion,wesucceededindeliveringasystemthatcouldautomaticallyclassifymanipulated
images.However,thedetectioncapacityofoursystemdidnotmeettheexpectationsthatwehad
envisioned.
Iamquitepleasedwiththeoutcomeofthehigherorderstatisticsandhowwellitworkedgivenitsuse
asinimagesplicingdetectionhasnotbeenexplored.However,wewereunabletobringaworking
implementationofafusionclassificationsystemtolifeasweoriginallyintendedduetotime
constraints.Buildingthisdetectorrequiredimplementingmultipleclassificationtechniques,butinstead
ofbuildingoutmultiplemethods,wefocusedoniteratingandthethreeclassificationsystemswe
initiallysought.Perhapsthescopeoftheprojectwastoolarge.
Imageforensicanalysisisanichespecialitythathasasteeplearningcurve.Fromaproject
managementperspective,Ilearnedthattoefficientlyengineerandimplementmethodsrequiresa
comprehensiveunderstandingofthesubjectmaterial,andaverywelldefinedscope.Inretrospect,it
wouldhavebeenmoreadvisableforourfirstprojectdeliverabletobealiteraturereviewtonarrowour
scope,ratherthanapreliminaryimplementationofthemethodologiesonwhichwewoulditerateand
improve.Itwoulddelaytheoutputoftechnicalresults,however,itwouldincreasethequalityofour
endresult.
Ifsomeoneweretopickupfromwhereourteamleftoff,theywouldfirstlyneedtofamiliarize
themselveswiththerelevantliterature.Ibelievethereferencesinourtechnicalcontribution,aswellas
ourliteraturereviewswouldbeinstructiveindoingso.Ourcodeiswelldocumentedandeasyto
contributeto.
30