Content-Based Detection of Temporal Metadata Manipulation

03/08/2021
by   Rafael Padilha, et al.
0

Most pictures shared online are accompanied by a temporal context (i.e., the moment they were taken) that aids their understanding and the history behind them. Claiming that these images were captured in a different moment can be misleading and help to convey a distorted version of reality. In this work, we present the nascent problem of detecting timestamp manipulation. We propose an end-to-end approach to verify whether the purported time of capture of an image is consistent with its content and geographic location. The central idea is the use of supervised consistency verification, in which we predict the probability that the image content, capture time, and geographical location are consistent. We also include a pair of auxiliary tasks, which can be used to explain the network decision. Our approach improves upon previous work on a large benchmark dataset, increasing the classification accuracy from 59.03 an ablation study highlights the importance of various components of the method, showing what types of tampering are detectable using our approach.

READ FULL TEXT

page 1

page 7

page 8

research
03/02/2019

AIRD: Adversarial Learning Framework for Image Repurposing Detection

Image repurposing is a commonly used method for spreading misinformation...
research
09/16/2019

Learning Geo-Temporal Image Features

We propose to implicitly learn to extract geo-temporal image features, w...
research
10/22/2019

Weakly-Supervised Completion Moment Detection using Temporal Attention

Monitoring the progression of an action towards completion offers fine g...
research
07/04/2020

Modality Shifting Attention Network for Multi-modal Video Question Answering

This paper considers a network referred to as Modality Shifting Attentio...
research
07/09/2018

Beyond Pixels: Image Provenance Analysis Leveraging Metadata

Creative works, whether paintings or memes, follow unique journeys that ...
research
12/29/2020

Learning a Dynamic Map of Visual Appearance

The appearance of the world varies dramatically not only from place to p...
research
05/14/2023

CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates

DNS manipulation is an increasingly common technique used by censors and...

Please sign up or login with your details

Forgot password? Click here to reset