Berkeley CSUA MOTD:Entry 32464
Berkeley CSUA MOTD
2017/09/25 [General] UID:1000 Activity:popular

2004/7/24 [Science] UID:32464 Activity:high
        From /. : just want to point out this (male) professor is hot.
        \_ he's okay
2017/09/25 [General] UID:1000 Activity:popular

You may also be interested in these entries...
2012/6/26-7/20 [Science/GlobalWarming] UID:54422 Activity:nil
6/26    WW2 brought us antibiotics, syringe, production capacity,
        excessive petroleum, radar, television, atomic energy,
        rocketry (HEIL VON BRAUN), synthetic rubber, microwave,
        computers (GAY TURING), jets.
        What did the Iraq war bring us?
        \_ HMMWV -> Hummer H1 the gas guzzler.
2012/3/8-26 [Science/Space, Science/GlobalWarming] UID:54334 Activity:nil
3/8     "Invisible Mercedes brings James Bond technology to life" (
        How many years and dollars have our military spent on trying to achieve
        the same thing and yet still haven't gotten any result!?  Now a
        civilian company has done it, and they did it even merely for
Cache (3761 bytes)
He is referring to the digital images that appear everywhere: in newspapers, on Web sites, in advertising, and in business materials, for example. Hany Farid Hany Farid (photo by Joe Mehling '69) Farid and Dartmouth graduate student Alin Popescu have developed a mathematical technique to tell the difference between a "real" image and one that's been fiddled with. Consider a photo of two competing CEOs talking over a document labeled "confidential - merger," or a photo of Saddam Hussein shaking hands with Osama bin Laden. The Dartmouth algorithm, presented recently at the 6th International Workshop on Information Hiding, in Toronto, Canada, can determine if someone has manipulated the photos, like blending two photos into one, or adding or taking away objects or people in an image. "Sometimes this seemingly harmless talent is used to influence public opinion and trust, especially when altered photos are used in news reports." Photos have been altered in the past, from airbrushing in fashion magazines, to aliens in tabloid newspapers, to giant lizards in the movies, but computers make it easier for more and more people to manipulate images. Farid explains that "regular" photos are hard to change without special expertise in altering negatives or dark room privileges that would allow someone to influence the printing process. However, once images have been digitized, translated into the computer language of ones and zeros, it's easier to manipulate them. A digital image is a collection of pixels or dots, and each pixel contains numbers that correspond to a color or brightness value. When marrying two images to make one convincing composite, you have to alter pixels. They have to be stretched, shaded, twisted, and otherwise changed. The end result is, more often than not, a realistic, believable image. "With today's technology, it's not easy to look at an image these days and decide if it's real or not," says Farid. "We look, however, at the underlying code of the image for clues of tampering." "With today's technology, it's not easy to look at an image these days and d ecide if it's real or not. We look, however, at the underlying code of the image for clues of tampering." Statistical clues lurk in all digital images, and the ones that have been tampered with contain altered statistics. "In the same way that placing a monkey in front of a typewriter is unlikely to produce a play by Shakespeare, a random set of pixels thrown on a page is unlikely to yield a natural image. It means that there are underlying statistics and regularities in naturally occurring images." Farid and his students have built a statistical model that captures the mathematical regularities inherent in natural images. Because these statistics fundamentally change when images are altered, the model can be used to detect digital tampering. "This technology to manipulate and change digital media is developing at an incredible rate," says Farid. "But our ability to contend with its ramifications is still in the Dark Ages. I'm always asked if this technology would stand up in a court of law." Farid predicts there will be skepticism and a great deal of scientific and legal debate. But eventually, he believes that some form of his technology or someone else's will be incorporated into our legal system. US Department of Homeland Security, also works with law enforcement officials, government representatives, and corporate leaders on this issue of authenticating digital images. "There is little doubt that counter-measures will be developed to foil our detection schemes," says Farid. "Our hope, however, is that as more authentication tools are developed it will become increasingly more difficult to create convincing digital forgeries."