Featured Research

from universities, journals, and other organizations

Shadows and light: New software to detect forged photos

Date:
August 11, 2013
Source:
Dartmouth College
Summary:
Researchers have developed new software to detect faked photos, using a geometric algorithm to locate inconsistent shadows that are not obvious to the naked eye. The new method debunks claims that the Apollo 11 lunar landing photo is fake.

Dartmouth and UC Berkeley researchers have developed new software to detect faked photos, using a geometric algorithm to locate inconsistent shadows that are not obvious to the naked eye. The new method debunks claims that the Apollo 11 lunar landing photo is fake.

Related Articles


The new method is a significant step in the field of digital forensics, which national security agencies, the media, scientific journals and others use to differentiate between authentic images and computerized forgeries.

The study, titled "Exposing Photo Manipulation with Inconsistent Shadows," was presented last week at the Association for Computing Machinery's SIGGRAPH conference and is to be published in the journal ACM Transactions on Graphics in September.

The new forensic method analyzes a variety of shadows in an image to determine if they are physically consistent with a single illuminating light source. This allows a forensic analyst to determine if a photo is physically plausible or the result of image fakery. This method has, for example, debunked the claims that the lighting and shadows in the famous 1969 moon landing photo are fake.

"Our method shifts the dialogue from 'does the lighting/shadow look correct?,' which is well known to be highly unreliable, to a discussion of whether an analyst has correctly selected the location of cast and attached shadows in an image, a far more objective task," says senior author Hany Farid, a professor of computer science and head of the Image Science Group at Dartmouth. "In this regard, our method lets humans do what computers are poor at -- understanding scene content -- and lets the computer do what humans are poor at -- assessing the validity of geometric constraints."


Story Source:

The above story is based on materials provided by Dartmouth College. Note: Materials may be edited for content and length.


Journal Reference:

  1. Eric Kee, James O’Brien and Hany Farid. Exposing Photo Manipulation with Inconsistent Shadows. ACM Transactions on Graphics, 2013 (in press)

Cite This Page:

Dartmouth College. "Shadows and light: New software to detect forged photos." ScienceDaily. ScienceDaily, 11 August 2013. <www.sciencedaily.com/releases/2013/08/130805152427.htm>.
Dartmouth College. (2013, August 11). Shadows and light: New software to detect forged photos. ScienceDaily. Retrieved November 25, 2014 from www.sciencedaily.com/releases/2013/08/130805152427.htm
Dartmouth College. "Shadows and light: New software to detect forged photos." ScienceDaily. www.sciencedaily.com/releases/2013/08/130805152427.htm (accessed November 25, 2014).

Share This


More From ScienceDaily



More Computers & Math News

Tuesday, November 25, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

FCC Forces T-Mobile To Alert Customers Of Data Throttling

FCC Forces T-Mobile To Alert Customers Of Data Throttling

Newsy (Nov. 25, 2014) T-Mobile and the FCC have reached an agreement requiring the company to alert customers when it throttles their data speeds. Video provided by Newsy
Powered by NewsLook.com
Symantec Uncovers Sophisticated Spying Malware Regin

Symantec Uncovers Sophisticated Spying Malware Regin

Newsy (Nov. 24, 2014) A Symantec white paper reveals details about Regin, a spying malware of unusual complexity which is believed to be state-sponsored. Video provided by Newsy
Powered by NewsLook.com
How to Keep Your Android Device Safe This Holiday Season

How to Keep Your Android Device Safe This Holiday Season

Howdini (Nov. 24, 2014) Protect yourself against malware and hackers, especially during the hectic online shopping season. Mobile device security makes a great holiday gift and protects your loved ones from cyber attacks and identity theft. Video provided by Howdini
Powered by NewsLook.com
How to Keep You and Your Family's Identitiy Safe Online This Holiday Season

How to Keep You and Your Family's Identitiy Safe Online This Holiday Season

Howdini (Nov. 24, 2014) The hectic holiday season is a prime time for online identity theft, so make sure you’re protected.Be cautious when shopping online Internet security software makes a great holiday gift and protects your loved ones from cyber attacks and identity theft. Video provided by Howdini
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins