Reflectance Normalization in Illumination-Based Image Manipulation Detection

  • Christian RiessEmail author
  • Sven Pfaller
  • Elli Angelopoulou
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9281)


One approach to detect spliced images is to compare the lighting environment of suspicious objects or persons in the scene. The original method, proposed by Johnson and Farid, requires an investigator to mark occluding contours of multiple objects, from which the distribution of the incident light intensity is estimated. Unfortunately, this method imposes relatively strict constraints on the user and on the scene under investigation.

In this work, we propose a color-normalization approach to relax one important constraint. With our modification, a user is able to select the contours from multiple different materials (instead of having to use a single material). The proposed method will automatically compensate the differences in the reflected intensities. We demonstrate the robustness of the method with a carefully designed ground-truth dataset, consisting of 10 subjects, each of them under 3 controlled lighting environments. With the proposed method, lighting direction as a forensic cue becomes applicable to a much wider range of natural images.


Lighting Environment Incident Light Intensity Forgery Detection Digital Imagery Image Forgery 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Conotter, V., O’Brien, J.F., Farid, H.: Exposing Digital Forgeries in Ballistic Motion. IEEE Transactions on Information Forensics and Security 7(1), 283–296 (2012)CrossRefGoogle Scholar
  2. 2.
    Fan, W., Wang, K., Cayre, F., Xiong, Z.: 3D lighting-based image forgery detection using shape-from-shading. In: Proceedings of the 20th European Signal Processing Conference (EUSIPCO-2012), pp. 1777–1781, Bucarest, Romania, August 2012Google Scholar
  3. 3.
  4. 4.
    Forsyth, D.A., Ponce, J.: Computer Vision – A Modern Approach. Pearson Education Inc. (2003)Google Scholar
  5. 5.
    Gehler, P.V., Rother, C., Kiefel, M., Zhang, L., Schölkopf, B.: Recovering intrinsic images with a global sparsity prior on reflectance. In: Advances in Neural Information Processing Systems (NIPS 2011), vol. 24, pp. 765–773, Granada, Spain, December 2011Google Scholar
  6. 6.
    Johnson, M., Farid, H.: Exposing Digital Forgeries in Complex Lighting Environments. IEEE Transactions on Information Forensics and Security 2(3), 450–461 (2007)CrossRefGoogle Scholar
  7. 7.
    Johnson, M.K., Farid, H.: Exposing digital forgeries through specular highlights on the eye. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 311–325. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  8. 8.
    Kee, E., Farid, H.: Exposing digital forgeries from 3-d lighting environments. In: Proceedings of the 2nd IEEE International Workshop on Information Forensics and Security (WIFS 2010), Seattle, WA, USA, December 2010Google Scholar
  9. 9.
    Ostrovsky, Y., Cavanagh, P., Sinha, P.: Perceiving Illumination Inconsistencies in Scenes. Perception 34(11), 1301–1314 (2005)CrossRefGoogle Scholar
  10. 10.
    Redi, J., Taktak, W., Dugelay, J.L.: Digital Image Forensics: A Booklet for Beginners. Multimedia Tools and Applications 51(1), 133–162 (2011)CrossRefGoogle Scholar
  11. 11.
    Shen, L., Yeo, C.: Intrinsic images decomposition using a local and global sparse representation of reflectance. In: Proceedings of the 24th IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2011), pp. 697–704, Colorado Springs, CO, USA, June 2011Google Scholar
  12. 12.
    Zhang, W., Cao, X., Qu, Y., Hou, Y., Zhang, C.: Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut. IEEE Transactions on Information Forensics and Security 5(3), 544–555 (2010)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Christian Riess
    • 1
    Email author
  • Sven Pfaller
    • 1
  • Elli Angelopoulou
    • 1
  1. 1.Pattern Recognition LabFriedrich-Alexander UniversityErlangenGermany

Personalised recommendations