Totems: Physical Objects for Verifying Visual Integrity

نویسندگان

چکیده

AbstractWe introduce a new approach to image forensics: placing physical refractive objects, which we call totems, into scene so as protect any photograph taken of that scene. Totems bend and redirect light rays, thus providing multiple, albeit distorted, views the within single image. A defender can use these distorted totem pixels detect if an has been manipulated. Our unscrambles rays passing through totems by estimating their positions in using known geometric material properties. To verify totem-protected image, inconsistencies between reconstructed from viewpoints scene’s appearance camera viewpoint. Such makes adversarial manipulation task more difficult, adversary must modify both geometrically consistent manner without knowing properties totem. Unlike prior learning-based approaches, our method does not require training on datasets specific manipulations, instead uses solve forensics problem.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verifying Reference Counted Objects

Reference counting is a pervasive resource management idiom where each resource contains a count of the number of clients that hold a reference to it, and each client increments (resp., decrements) the count on acquiring (resp., releasing) the resource. If the reference count falls to zero, the system can reclaim the resource. Reference counting is often a source of subtle bugs, ranging from le...

متن کامل

Verifying Integrity of Decision Diagrams

Decision Diagrams (DDs) are the state-of-the-art data structure in CAD of integrated circuits. They are used in many safety critical applications, like veriication. In this paper security aspects of implementation techniques of DDs are discussed. A recursive checksum technique is presented for on-line and oo-line checks. These methods are used to verify the integrity of DDs. The correctness of ...

متن کامل

Verifying System Integrity by Proxy

Users are increasingly turning to online services, but are concerned for the safety of their personal data and critical business tasks. While secure communication protocols like TLS authenticate and protect connections to these services, they cannot guarantee the correctness of the endpoint system. Users would like assurance that all the remote data they receive is from systems that satisfy the...

متن کامل

Verifying Data Integrity in Hybrid Cloud

In this paper we are going to say an efficient technique that describe how integrity is maintained in storage of the data. Cloud computing is used to store the data from various resources by the user. It is very complex for the user to store whole data within the system. In that case cloud has to provide to store as much large amount of the data as user wants. This Stored data has to be integra...

متن کامل

Verifying Integrity Constraints on Web Sites

Data-intensive Web sites have created a new form of knowledge base, as richly structured bodies of data. Several novel systems for creating dataintensive Web sites support declarative specification of a site's structure and content (i.e., the pages, the data available in each page, and the links between pages). Declarative systems provide a platform on which A1 techniques can be developed that,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2022

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-19781-9_10