Multiple view geometry in computer visiond
Multiple view geometry in computer visiond
An Ocularist's Approach to Human Iris Synthesis
IEEE Computer Graphics and Applications
Physically Based Rendering: From Theory to Implementation
Physically Based Rendering: From Theory to Implementation
ACM SIGGRAPH 2004 Papers
Least Squares Orthogonal Distance Fitting of Curves and Surfaces in Space (Lecture Notes in Computer Science)
Exposing digital forgeries by detecting inconsistencies in lighting
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Nonlinear Optimization
Detecting Photographic Composites of People
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
A Survey of Passive Image Tampering Detection
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Exposing digital forgeries from JPEG ghosts
IEEE Transactions on Information Forensics and Security
Detecting photographic composites using shadows
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Hash-based identification of sparse image tampering
IEEE Transactions on Image Processing
A bibliography on blind methods for identifying image forgery
Image Communication
Scene illumination as an indicator of image manipulation
IH'10 Proceedings of the 12th international conference on Information hiding
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications
Display-camera calibration using eye reflections and geometry constraints
Computer Vision and Image Understanding
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
A forgery detection algorithm for exemplar-based inpainting images using multi-region relation
Image and Vision Computing
Hi-index | 0.00 |
When creating a digital composite of two people, it is difficult to exactly match the lighting conditions under which each individual was originally photographed. In many situations, the light source in a scene gives rise to a specular highlight on the eyes. We show how the direction to a light source can be estimated from this highlight. Inconsistencies in lighting across an image are then used to reveal traces of digital tampering.