Abstract
An interesting and challenging problem in digital image forensics is the identification of the device used to acquire an image. Although the source imaging device can be retrieved exploiting the file’s header (e.g., EXIF), this information can be easily tampered. This lead to the necessity of blind techniques to infer the acquisition device, by processing the content of a given image. Recent studies are concentrated on exploiting sensor pattern noise, or extracting a signature from the set of pictures. In this paper we compare two popular algorithms for the blind camera identification. The first approach extracts a fingerprint from a training set of images, by exploiting the camera sensor’s defects. The second one is based on image features extraction and it assumes that images can be affected by color processing and transformations operated by the camera prior to the storage. For the comparison we used two representative dataset of images acquired, using consumer and mobile cameras respectively. Considering both type of cameras this study is useful to understand whether the theories designed for classic consumer cameras maintain their performances on mobile domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Redi, J.A., Taktak, W., Dugelay, J.-L.: Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1), 133–162 (2010)
Kee, E., Johnson, M.K., Farid, H.: Digital image authentication from JPEG headers. IEEE Transactions on Information Forensics and Security 6(3), 1066–1075 (2011)
Piva, A.: An overview on image forensics. ISRN Signal Processing, Article ID 496701, 22 (2013)
Lukáš, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1(2), 205–214 (2006)
Gloe, T., Borowka, K., Winkler, A.: Feature-based camera model identification works in practice. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 262–276. Springer, Heidelberg (2009)
Gloe, T.: Feature-based forensic camera model identification. Transactions on Data Hiding and Multimedia Security 8, 42–62 (2012)
Holst, G.C.: CCD arrays, cameras, and displays, 2nd edn. JCD Publishing & SPIE Press, USA (1998)
Janesick, J.R.: Scientic Charge-Coupled Devices. SPIE Press, USA (2001)
Chen, M., Fridrich, J., Goljan, M.: Digital imaging sensor identification (further study). In: Delp III, E.J., Wong, P.W. (ed.) Security, Steganography, and Watermarking of Multimedia Contents IX. Proceedings of the SPIE, vol. 6505 (2007)
Goljan, M., Fridrich, J., Filler, T.: Large scale test of sensor fingerprint camera identification. In: Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI, pp. 18–22
Cooper, A.J.: Improved photo response non-uniformity (PRNU) based source camera identification. Forensic Science International 226(1–3), 132–141 (2013)
Kharrazi, M., Sencar, H.T., Memon, N.: Blind source camera identification. In: 2004 International Conference on Image Processing, ICIP 2004, vol. 1, pp. 709–712 (2004)
Battiato, S., Bruna, A.R., Messina, G., Puglisi, G.: Image Processing for Embedded Devices. Bentham Science Publisher (2010)
Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. Transaction on Image Processing 12(2), 221–229 (2003)
Ismail, A., Bülent, S., Khalid, S.: Statistical evaluation of image quality measures. Journal of Electronic Imaging 12(2), 221–229 (2003)
Celiktutan, O., Sankur, B., Avcibas, I.: Blind identification of source cell-phone model. IEEE Transactions on Information Forensics and Security 3(3), 553–566 (2008)
Cristianini, N., Shawe-Taylor, J.: An introduction to support Vector Machines: and other kernel-based learning methods. Cambridge University Press, New York (2000)
Gloe, T., Böhme, R.: The dresden image database for benchmarking digital image forensics. In: Proceedings of the 25th Symposium on Applied Computing (ACM SAC 2010), vol. 2, pp. 1585–1591 (2010)
Webb, A.R.: Statistical Pattern Recognition, 2nd edn. John Wiley & Sons Ltd., November 2002
Gloe, T., Böhme, R.: The dresden image database for benchmarking digital image forensics. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1584–1590 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Farinella, G.M., Giuffrida, M.V., Digiacomo, V., Battiato, S. (2015). On Blind Source Camera Identification. In: Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D., Scheunders, P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2015. Lecture Notes in Computer Science(), vol 9386. Springer, Cham. https://doi.org/10.1007/978-3-319-25903-1_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-25903-1_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25902-4
Online ISBN: 978-3-319-25903-1
eBook Packages: Computer ScienceComputer Science (R0)