The technology we use, and even rely on, in our everyday lives –computers, radios, video, cell phones – is enabled by signal processing. Learn More »
1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.
News and Resources for Members of the IEEE Signal Processing Society
Digital images are everywhere. However, the way people deal with digital images may raise several legal and ethical issues that need to be addressed. Before legal action can be taken based on an image, whose content truthfulness may be questionable, it is necessary to provide some forensic evidence about the image itself.
In the last years, the field of Digital Image Forensics has emerged with several tools and algorithms presented to help researchers and forensics experts to assess the authenticity of digital documents. However, the lack of a clear benchmark and an established comparison protocol resulted in the absence of evaluation of such algorithms under real-world conditions.
In this context, the IEEE Information Forensics and Security Technical Committee (IFS-TC) launched the First IFS-TC Image Forensics Challenge, a detection and localization forensics contest, open to students, researchers and practitioners interested in role-playing a forensic analyst.
Aims
With this challenge, the IFS-TC has three major objectives in mind:
Rules
The First IFS-TC Image Forensics Challenge will happen in two phases.
Phase 1 (tampering detection): All competing challengers submit a binary answer for each test image (0 for "pristine/non-manipulated" and 1 for "fake").
Phase 2 (tampering localization): All competing challengers submit a binary map file for each test image (white for "pristine/non-manipulated", black for "fake" pixels). The objective here is to evaluate how good are current techniques at localizing possible manipulations given a manipulated image. Only test fake images will be evaluated.
Challenge Corpus
Several original images of various scenes, both indoor and outdoor, were taken with different digital cameras. The corpus is then partitioned into images referred to as "pristine" (non-manipulated) on one hand, and "forged" or "fakes" on the other hand. "Forged" images are obtained using a set of different manipulation techniques such as copy/pasting and splicing with
different degrees of photorealism.
A training set will be made available with the associated ground truth so that the challengers can tune their algorithms. The challenge will then be run with a disjoint testing set for evaluation.
Awards
The Winner and Runner-Up of each phase will receive certificates and financial grants (at least $1k) to attend WIFS’13 in Guangzhou, China.
Email contact: ifc@ic.unicamp.br
Home | Sitemap | Contact | Accessibility | Nondiscrimination Policy | IEEE Ethics Reporting | IEEE Privacy Policy | Terms | Feedback
© Copyright 2024 IEEE – All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.