Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
Fifty years have passed since the assassination of U.S. President Kennedy. Despite the long passage of time, it is still argued that the famous backyard photo of Oswald, holding the same type of rifle used to assassinate the President, is a fake. These claims include, among others, that Oswald’s pose in the photo is physically implausible. We describe a detailed 3-D stability analysis to determine if this claim is warranted.
References
Akhter, I., & Black, M. J. (2015). Poseconditioned joint angle limits for 3D human pose reconstruction. In IEEE Conference on Computer Vision and Pattern Recognition.
Chen, M., Fridrich, J., Goljan, M., & Lukas, J. (2008). Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security, 3 (1), 74-90.
de Berg, M., Cheong, O., van Kreveld, M., & Overmars, M. (2008). Computational geometry: Algorithms and applications (3rd ed.). Springer.
de Carvalho, T. J., Riess, C., Angelopoulou, E., Pedrini, H., & de Rezende Rocha, A. (2013). Exposing digital image forgeries by illumination color classification. IEEE Transactions on Information Forensics and Security, 8 (7), 1182-1194.
DeLeva, P. (1996). Adjustments to ZatsiorskySeluyanovs segment inertia parameters. Journal of Biomechanics, 29 (9), 1223- 1230.
Derouet-Jourdan, A., Bertails-Descoubes, F., & Thollot, J. (2010). Stable inverse dynamic curves. ACM Transactions on Graphics, 29 (6), 137:1–137:10.
Duffy, V. G. (2008). Handbook of digital human modeling: Research for applied ergonomics and human factors engineering (1st ed.). Boca Raton, FL, USA: CRC Press, Inc.
Farid, H. (2009a). The Lee Harvey Oswald backyard photos: Real or fake? Perception, 11 (38), 1731-1734.
Farid, H. (2009b). A survey of image forgery detection. IEEE Signal Processing Magazine, 2 (26), 16-25.
Farid, H. (2010). A 3-D photo forensic analysis of the Lee Harvey Oswald backyard photo (Tech. Rep. No. TR2010-669). Hanover, NH, USA: Department of Computer Science, Dartmouth College.
Fridrich, J. (2009). Digital image forensic using sensor noise. IEEE Signal Processing Magazine, 26 (2), 26-37.
Fridrich, J., Soukal, D., & Lukas, J. (2003). Detection of copy move forgery in digital images. In Digital Forensic Research Workshop.
Fu, H., Cohen-Or, D., Dror, G., & Sheffer, A. (2008). Upright orientation of man-made objects. ACM Transactions on Graphics, 27 (3).
Goswami, A. (1999). Postural stability of biped robots and the foot rotation indicator (FRI) point.
Gupta, A., Efros, A. A., & Hebert, M. (2010). Blocks world revisited: Image understanding using qualitative geometry and mechanics. In European Conference on Computer Vision.
Hibbeler, R. C. (2010). Statics and mechanics of materials. Prentice Hall.
Johnson, M. K., & Farid, H. (2005). Exposing digital forgeries by detecting inconsistencies in lighting. In 7th Workshop on Multimedia and Security (pp. 1–10). ACM.
Johnson, M. K., & Farid, H. (2006). Exposing digital forgeries through chromatic aberration. In 8th Workshop on Multimedia and Security (pp. 48–55). ACM.
Johnson, M. K., & Farid, H. (2007). Exposing digital forgeries in complex lighting environments. IEEE Transactions on Information Forensics and Security, 3 (2), 450- 461.
Kee, E., & Farid, H. (2010a). Exposing digital forgeries from 3-D lighting environments. In IEEE International Workshop on Information Forensics and Security (p. 1- 6).
Kee, E., & Farid, H. (2010b). Exposing digital forgeries from 3-D lighting environments. In Workshop on Information Forensics and Security.
Kee, E., Johnson, M. K., & Farid, H. (2011). Digital image authentication from JPEG headers. IEEE Transactions on Information Forensics and Security, 6 (3), 1066– 1075.
Kee, E., O’Brien, J., & Farid, H. (2013). Exposing photo manipulation with inconsistent shadows. ACM Transactions on Graphics, 32 (3), 28:1–28:12.
Kirchner, M. (2010). Efficient estimation of CFA pattern configuration in digital camera images. In Society of PhotoOptical Instrumentation Engineers Conference Series (Vol. 7541).
Lin, Z., Wang, R., Tang, X., & Shum, H.-Y. (2005). Detecting doctored images using camera response normality and consistency. IEEE Conference on Computer Vision and Pattern Recognition, 1 , 1087- 1092.
Mahdian, B., & Saic, S. (2009). Detecting double compressed JPEG images. In 3rd International Conference on Crime Detection and Prevention (p. 1-6).
O’Brien, J. F., & Farid, H. (2012, January). Exposing photo manipulation with inconsistent reflections. ACM Transactions on Graphics, 31 (1), 4:1–11.
Pan, X., & Lyu, S. (2010). Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security, 5 (4), 857 -867.
Popescu, A., & Farid, H. (2005). Statistical tools for digital forensics. In Information Hiding. Springer Berlin / Heidelberg.
Popescu, A. C., & Farid, H. (2005a). Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing, 53 (2), 758-767.
Popescu, A. C., & Farid, H. (2005b). Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing, 53 (10), 3948-3959.
Pr´evost, R., Whiting, E., Lefebvre, S., & Sorkine-Hornung, O. (2013). Make it stand: Balancing shapes for 3D fabrication. ACM Transactions on Graphics, 32 (4), 81:1–81:10.
Rocha, A., Scheirer, W., Boult, T. E., & Goldenstein, S. (2011). Vision of the unseen: Current trends and challenges in digital image and video forensics. ACM Computing Surveys, 43 (4), 26:1–26:42.
Shao, T., Monszpart, A., Zheng, Y., Koo, B., Xu, W., Zhou, K., & Mitra, N. (2014). Imagining the unseen: Stability-based cuboid arrangements for scene understanding. ACM Transactions on Graphics, 209:1–209:11.
Shi, X., Zhou, K., Tong, Y., Desbrun, M., Bao, H., & Guo, B. (2007). Mesh puppetry: Cascading optimization of mesh deformation with inverse kinematics. ACM Transactions on Graphics, 26 (3).
States, U. (1964). The official Warren Commission report on the assassination of President John F. Kennedy. Doubleday, Garden City, N.Y.
States, U. (1979). Report of the Select Committee on Assassinations of the U.S. House of Representatives. The National Archives.
Umetani, N., Igarashi, T., & Mitra, N. J. (2012). Guided exploration of physically valid shapes for furniture design. ACM Transactions on Graphics, 31 (4), 86:1– 86:11.
Vouga, E., H¨obinger, M., Wallner, J., & Pottmann, H. (2012). Design of selfsupporting surfaces. ACM Transactions on Graphics, 31 (4), 87:1–87:11.
Whiting, E., Ochsendorf, J., & Durand, F. (2009). Procedural modeling of structurally-sound masonry buildings. ACM Transactions on Graphics, 28 (5), 112:1–112:9.
Zhang, W., Cao, X., Zhang, J., Zhu, J., & Wang, P. (2009). Detecting photographic composites using shadows. In IEEE International Conference on Multimedia and Expo (p. 1042-1045).
Recommended Citation
Pittala, Srivamshi; Whiting, Emily; and Farid, Hany
(2015)
"A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo,"
Journal of Digital Forensics, Security and Law: Vol. 10
, Article 4.
DOI: https://doi.org/10.15394/jdfsl.2015.1206
Available at:
https://commons.erau.edu/jdfsl/vol10/iss3/4
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons