| Andrew Cooke | Contents | Latest | RSS | Twitter | Previous | Next

C[omp]ute

Welcome to my blog, which was once a mailing list of the same name and is still generated by mail. Please reply via the "comment" links.

Always interested in offers/projects/new ideas. Eclectic experience in fields like: numerical computing; Python web; Java enterprise; functional languages; GPGPU; SQL databases; etc. Based in Santiago, Chile; telecommute worldwide. CV; email.

Personal Projects

Lepl parser for Python.

Colorless Green.

Photography around Santiago.

SVG experiment.

Professional Portfolio

Calibration of seismometers.

Data access via web services.

Cache rewrite.

Extending OpenSSH.

Last 100 entries

The Quest for Randomness; Chat Wars; Real-life Financial Co Without ACID Database...; Flexible Muscle-Based Locomotion for Bipedal Creatures; SQL Performance Explained; The Little Manual of API Design; Multiple Word Sizes; CRC - Next Steps; FizzBuzz; Update on CRCs; Decent Links / Discussion Community; Automated Reasoning About LLVM Optimizations and Undefined Behavior; A Painless Guide To CRC Error Detection Algorithms; Tests in Julia; Dave Eggers: what's so funny about peace, love and Starship?; Cello - High Level C Programming; autoreconf needs tar; Will Self Goes To Heathrow; Top 5 BioInformatics Papers; Vasovagal Response; Good Food in Vina; Chilean Drug Criminals Use Subsitution Cipher; Adrenaline; Stiglitz on the Impact of Technology; Why Not; How I Am 5; Lenovo X240 OpenSuse 13.1; NSA and GCHQ - Psychological Trolls; Finite Fields in Julia (Defining Your Own Number Type); Julian Assange; Starting Qemu on OpenSuse; Noisy GAs/TMs; Venezuela; Reinstalling GRUB with EFI; Instructions For Disabling KDE Indexing; Evolving Speakers; Changing Salt Size in Simple Crypt 3.0.0; Logarithmic Map (Moved); More Info; Words Found in Voynich Manuscript; An Inventory Of 3D Space-Filling Curves; Foxes Using Magnetic Fields To Hunt; 5 Rounds RC5 No Rotation; JP Morgan and Madoff; Ori - Secure, Distributed File System; Physical Unclonable Functions (PUFs); Prejudice on Reddit; Recursion OK; Optimizing Julia Code; Cash Handouts in Brazil; Couple Nice Music Videos; It Also Works!; Adaptive Plaintext; It Works!; RC5 Without Rotation (2); 8 Years...; Attack Against Encrypted Linux Disks; Pushing Back On NSA At IETF; Summary of Experimental Ethics; Very Good Talk On Security, Snowden; Locusts are Grasshoppers!; Vagrant (OpenSuse and IDEs); Interesting Take On Mandela's Context; Haskell Cabal O(n^2) / O(n) Fix; How I Am 4; Chilean Charity Supporting Women; Doing SSH right; Festival of Urban Intervention; Neat Idea - Wormholes Provide Entanglement; And a Link....; Simple Encryption for Python 2.7; OpenSuse 13.1 Is Better!; Little Gain...; More Details on Technofull Damage; Palmrest Cracked Too....; Tecnofull (Lenovo Support) Is Fucking Useless; The Neuroscientist Who Discovered He Was a Psychopath; Interpolating Polynomials; Bottlehead Crack as Pre-amp; Ooops K702!; Bottlehead Crack, AKG K701; Breaking RC5 Without Rotation; Great post thank you; Big Balls of Mud; Phabricator - Tools for working together; Amazing Julia RC5 Code Parameterized By Word Size; Chi-Square Can Be Two-Sided; Why Do Brits Accept Surveillance?; Statistics Done Wrong; Mesas Trape from Bravo; European Report on Crypto Primitives and Protocols; Interesting Omissions; Oryx And Crake (Margaret Atwood); Music and Theory; My Arduino Programs; Elliptic Curve Crypto; Re: Licensing Interpreted Code; Licensing Interpreted Code; ASUS 1015E-DS03 OpenSuse 12.3 SSD; translating lettuce feature files into stub steps files; Re: translating lettuce feature files into stub steps files

© 2006-2013 Andrew Cooke (site) / post authors (content).

Detecting Tampering of Digital Images

From: "andrew cooke" <andrew@...>

Date: Sat, 24 Jul 2004 19:21:19 -0400 (CLT)

Intro - http://www.dartmouth.edu/~news/releases/2004/07/01.html

How Realistic is Photo-Realistic? (abstract only) -
http://www.cs.dartmouth.edu/~farid/publications/sp05b.html - we describe a
method for differentiating between photorealistic and photographic images.
Specifically, we show that a statistical model based on first- and
higher-order wavelet statistics reveals subtle but significant differences
between photorealistic and photographic images.

Exposing Digital Forgeries in Color Filter Array Interpolated Images
(abstract only) -
http://www.cs.dartmouth.edu/~farid/publications/sp05a.html - Most digital
cameras, for example, employ a single sensor in conjunction with a color
filter array (CFA), and then interpolate the missing color samples to
obtain a three channel color image. This interpolation introduces specific
correlations which are likely to be destroyed when tampering with an
image.

Exposing Digital Forgeries by Detecting Traces of Re-sampling -
http://www.cs.dartmouth.edu/~farid/publications/sp04.html - we describe
how re-sampling (e.g.,~scaling or rotating) introduces specific
statistical correlations, and describe how these correlations can be
automatically detected in any portion of an image.

Statistical Tools for Digital Forensics -
http://www.cs.dartmouth.edu/~farid/publications/ih04.html - we quantify
statistical correlations that result from specific forms of digital
tampering, and devise detection schemes to reveal these correlations.

A Picture Tells a Thousand Lies (abstract only, New Scientist arcticle) -
http://www.cs.dartmouth.edu/~farid/publications/ns03.html - It had all the
hallmarks of a prizewinning war photograph. Under hostile fire, an armed
British soldier towered over an Iraqi man carrying a baby and directed him
to take cover. The composition was perfect. (you must remember this...)

Higher-Order Wavelet Statistics and their Application to Digital Forensics
- http://www.cs.dartmouth.edu/~farid/publications/sacv03.html - We
describe a statistical model for natural images that is built upon a
multi-scale wavelet decomposition. The model consists of first- and
higher-order statistics that capture certain statistical regularities of
natural images.

Detecting Digital Forgeries Using Bispectral Analysis - assume that in the
frequency domain a "natural" signal has weak higher-order statistical
correlations. We then show that "un-natural" correlations are introduced
if this signal is passed through a non-linearity (which would almost
surely occur in the creation of a forgery). Techniques from polyspectral
analysis are then used to detect the presence of these correlations.

From /. - http://slashdot.org/article.pl?sid=04/07/24/1459257

Andrew

-- 
` __ _ __ ___  ___| |_____   work web site: http://www.ctio.noao.edu/~andrew
 / _` / _/ _ \/ _ \ / / -_)  personal web site: http://www.acooke.org
 \__,_\__\___/\___/_\_\___|  list: http://www.acooke.org/cute


_______________________________________________
compute mailing list
compute@...
https://200.74.39.181/mailman/listinfo/compute

Comment on this post