- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Visual perception and processing mechanisms
- Face Recognition and Perception
- Generative Adversarial Networks and Image Synthesis
- Law in Society and Culture
- Misinformation and Its Impacts
- Image Processing Techniques and Applications
- Advanced Vision and Imaging
- Face recognition and analysis
- Visual Attention and Saliency Detection
- Chaos-based Image/Signal Encryption
- Medical Image Segmentation Techniques
- Aesthetic Perception and Analysis
- Image and Signal Denoising Methods
- Cell Image Analysis Techniques
- Advanced Image Processing Techniques
- Neural and Behavioral Psychology Studies
- Optical measurement and interference techniques
- Neural dynamics and brain function
- Digital and Cyber Forensics
- Robotics and Sensor-Based Localization
- Music and Audio Processing
- Speech and Audio Processing
- Image Retrieval and Classification Techniques
University of California, Berkeley
2019-2025
LinkedIn (United States)
2023-2024
Film Independent
2024
Berkeley College
2022
Bahauddin Zakariya University
2020
Dartmouth College
2010-2019
Dartmouth Hospital
2001-2013
Stanford University
2011
University of Massachusetts Dartmouth
2010
California University of Pennsylvania
2009
We are undoubtedly living in an age where we exposed to a remarkable array of visual imagery. While may have historically had confidence the integrity this imagery, today's digital technology has begun erode trust. From tabloid magazines fashion industry and mainstream media outlets, scientific journals, political campaigns, courtrooms, photo hoaxes that land our e-mail in-boxes, doctored photographs appearing with growing frequency sophistication. Over past five years, field forensics...
Algorithms for predicting recidivism are commonly used to assess a criminal defendant's likelihood of committing crime. These predictions in pretrial, parole, and sentencing decisions. Proponents these systems argue that big data advanced machine learning make analyses more accurate less biased than humans. We show, however, the widely commercial risk assessment software COMPAS is no or fair made by people with little justice expertise. further show simple linear predictor provided only two...
The unique stature of photographs as a definitive recording events is being diminished due, in part, to the ease with which digital images can be manipulated and altered. Although good forgeries may leave no visual clues having been tampered with, they may, nevertheless, alter underlying statistics an image. For example, we describe how resampling (e.g., scaling or rotating) introduces specific statistical correlations, these correlations automatically detected any portion This technique...
The unique stature of photographs as a definitive recording events is being diminished due, in part, to the ease with which digital images can be manipulated and altered. Although good forgeries may leave no visual clues having been tampered with, they may, nevertheless, alter underlying statistics an image. For example, we describe how resampling (e.g., scaling or rotating) introduces specific statistical correlations, these correlations automatically detected any portion This technique...
With the advent of low-cost and high-resolution digital cameras, sophisticated photo editing software, images can be easily manipulated altered. Although good forgeries may leave no visual clues having been tampered with, they may, nevertheless, alter underlying statistics an image. Most for example, employ a single sensor in conjunction with color filter array (CFA), then interpolate missing samples to obtain three channel This interpolation introduces specific correlations which are likely...
When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person's head onto another body. If these images were originally of different JPEG compression quality, then the composite may contain trace original qualities. To this end, we describe technique detect whether part an image was initially compressed at lower quality than rest image. This approach applicable high and low as well resolution.
When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from individual photographs. Lighting inconsistencies can therefore be useful tool revealing traces of tampering. Borrowing and extending tools field computer vision, we describe how direction point light source estimated only single image. We show efficacy this approach in real-world settings.
Techniques for information hiding (steganography) are becoming increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages is also considerably difficult. We describe a universal approach to steganalysis the presence of embedded within images. show that, multiscale, multiorientation image decompositions (e.g., wavelets), first- higher-order magnitude phase statistics relatively consistent across broad range images, but disturbed...
The availability of sophisticated digital imaging technology has given rise to forgeries that are increasing in sophistication and frequency. We describe a technique for exposing such fakes by detecting inconsistencies lighting. show how approximate complex lighting environments with low-dimensional model and, further, estimate the model's parameters from single image. Inconsistencies th.en used as evidence tampering.
Summary 1. Photographic mark–recapture is a cost‐effective, non‐invasive way to study populations. However, efficiently apply photographic large populations, computer software needed for image manipulation and pattern matching. 2. We created an open‐source application the storage, extraction matching of digital images purposes analysis. The resulting package stand‐alone, multiplatform implemented in Java. Our program employs Scale Invariant Feature Transform (SIFT) operator that extracts...
Understanding shifts in creative work will help guide AI's impact on the media ecosystem.
Artificial intelligence (AI)-synthesized text, audio, image, and video are being weaponized for the purposes of nonconsensual intimate imagery, financial fraud, disinformation campaigns. Our evaluation photorealism AI-synthesized faces indicates that synthesis engines have passed through uncanny valley capable creating indistinguishable-and more trustworthy-than real faces.
Synthetically-generated audios and videos - so-called deep fakes continue to capture the imagination of computer-graphics computer-vision communities. At same time, democratization access technology that can create a sophisticated manipulated video anybody saying anything continues be concern because its power disrupt democratic elections, commit small large-scale fraud, fuel disinformation campaigns, non-consensual pornography. We describe biometric-based forensic technique for detecting...
The luminance nonlinearity introduced by many imaging devices can often be described a simple point-wise operation (gamma correction). This paper presents technique for blindly estimating the amount of gamma correction in absence any calibration information or knowledge device. basic approach exploits fact that introduces specific higher-order correlations frequency domain. These detected using tools from polyspectral analysis. is then estimated minimizing these correlations.
Techniques for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages has considerably difficult. This paper describes a new approach to in images. The uses wavelet-like decomposition build higher-order statistical models of natural A Fisher (1936) linear discriminant analysis is then used discriminate between untouched adulterated
Computer graphics rendering software is capable of generating highly photorealistic images that can be impossible to differentiate from photographic images. As a result, the unique stature photographs as definitive recording events being diminished (the ease with which digital manipulated is, course, also contributing this demise). To end, we describe method for differentiating between and Specifically, show statistical model based on first-order higher order wavelet statistics reveals...
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition,an ever-growing number surveillance cameras giving rise an enormous amount data. The ability ensure integrity authenticity this data poses considerable challenges. Here we begin explore techniques for detecting traces tampering in Specifically, show how a doublycompressed MPEG sequence introduces specific static temporal statistical perturbations...
Computer graphics rendering software is capable of generating highly photorealistic images that can be impossible to differentiate from photographic images. As a result, the unique stature photographs as definitive recording events being diminished (the ease with which digital manipulated is, course, also contributing this demise). To end, we describe method for differentiating between and Specifically, show statistical model based on first-order higher order wavelet statistics reveals...
We have developed a general-purpose registration algorithm for medical images and volumes. This method models the transformation between as locally affine but globally smooth. The model also explicitly accounts local global variations in image intensities. approach is built upon differential multiscale framework, allowing us to capture both large- small-scale transformations. show that this highly effective across broad range of synthetic clinical images.
Quantifying morphological shape is a fundamental issue in evolutionary biology. Recent technological advances (e.g., confocal microscopy, laser scanning, computer tomography) have made the capture of detailed three-dimensional (3D) structure easy and cost-effective. In this article, we develop 3D analytic framework (SPHARM-spherical harmonics) for modeling shapes complex structures from continuous surface maps that can be produced by these technologies. Because traditional SPHARM methodology...
Virtually all optical imaging systems introduce a variety of aberrations into an image. Chromatic aberration, for example, results from the failure system to perfectly focus light different wavelengths. Lateral chromatic aberration manifests itself, first-order approximation, as expansion/contraction color channels with respect one another. When tampering image, this is often disturbed and fails be consistent across We describe computational technique automatically estimating lateral show...