[Ssc-dev] A question from Thomson Reuters
Andrew Senior
aws at andrewsenior.com
Wed May 23 16:33:38 EDT 2012
I was imagining something similar to "scalado remove" which we discussed on
the list before - that erases some part of the foreground.
I would think that in general image manipulations on the device could be
made pretty difficult to detect - since the device it's being done on is
the device that took the images it might even match the sensor noise, as
well as the huffman coding tables etc. On the other hand "replacing with
background" would require building a background model (that wouldn't in
general be pixel-for pixel aligned with the image to be doctored) and that
would have different characteristics to a natural image. I'm not sure what
features a forensic examination would use, but pixel-level features and
statistics might always be faked. Global consistency (like correct shadows)
might be harder to achieve but I would think that detecting images doctored
by sophisticated user + sophisticated software is very difficult.
Proving chain of custody within obscuracam could involve marking when an
image has been taken by obscuracam itself (then you're limited by the
security of the intent that was called) and storing sufficient data to
bit-perfectly restore any image that was read off the sdcard. In both cases
obscuracam has to sign this to declare its part of the chain of custody
safe, but in neither case do we go all the way to the sensor.
Andrew
On Wed, May 23, 2012 at 12:57 PM, Bryan Nunez <bryan at witness.org> wrote:
> Hi Mandy,
>
> I'm cc'ing the SSC group for their thoughts on this as well.
>
> I'm not familiar with the iphone "replace" software, but am assuming it
> does some sort of image manipulation that could affect the authenticity of
> what's being depicted in the image or video.
>
> As with any image or video, manipulation of both the visual and meta data
> is possible. What we're trying to do with InformaCam is build in a
> mechanism that will essentially create a "sealed" around the image or video
> file which can be mathematically checked to reveal if any tampering has
> occurred between the time the file was sent and the time the recipient
> "opens" the file. What happens before the file is "sealed" is harder to
> verify.
>
> Thanks,
> Bryan
>
> On Wed, May 23, 2012 at 12:37 PM, Mandy Lee <mandy.lee at int-bar.org> wrote:
>
>> Hi Bryan and Sam****
>>
>> Thomas Szlukovenyi who will be joining our meeting by phone for a short
>> while on 18 June, has highlighted this question below. Mark is hoping to
>> gain some cooperation from Thomson Reuters so would like us to be fully
>> prepared to answer his question.****
>>
>> Could you let us have your thoughts on this?****
>>
>> ** **
>>
>> 2. Verification is a big issue. Of course you somehow have to make ****
>>
>> > sure that the pictures have not been altered and unfortunately there **
>> **
>>
>> > is no secure technological method for doing so. Even very experienced *
>> ***
>>
>> > photo editors can be fooled by the latest developments in Photoshop's *
>> ***
>>
>> > "content aware fill" or the Iphone's "Replace" software under ****
>>
>> > development. Also there is the issue of copyright and is the picture **
>> **
>>
>> > actually showing what it says it does. This could easily become ****
>>
>> > politically important - some people or NGOs might want to take
>> advantage of it.****
>>
>> >** **
>>
>> ** **
>>
>> Many thanks****
>>
>> Mandy****
>>
>> ** **
>>
>> Mandy Lee****
>>
>> Executive Assistant ****
>>
>> ** **
>>
>> [image: Description: Description: Description: IBA logo email signature]<http://www.ibanet.org/>
>> ****
>>
>> ** **
>>
>
>
>
> --
> Bryan Nunez
> Technology Manager
> WITNESS
> +1 (718) 783-2000 x-311
>
>
> _______________________________________________
> Ssc-dev mailing list
>
> Post: Ssc-dev at lists.mayfirst.org
> List info: https://lists.mayfirst.org/mailman/listinfo/ssc-dev
>
> To Unsubscribe
> Send email to: Ssc-dev-unsubscribe at lists.mayfirst.org
> Or visit:
> https://lists.mayfirst.org/mailman/options/ssc-dev/aws%40andrewsenior.com
>
> You are subscribed as: aws at andrewsenior.com
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.mayfirst.org/pipermail/ssc-dev/attachments/20120523/3f9100b8/attachment.htm>
More information about the Ssc-dev
mailing list