Abstract
As smartphones are being widely used in daily lives, the images captured by smartphones become ubiquitous and may be used for legal purposes. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. In this paper, we propose a method to determine the smartphone camera source of a particular image and operations that may have been performed on that image. We first take images using different smartphones and purposely manipulate the images, including different combinations of double JPEG compression, cropping, and rescaling. Then, we extract the marginal density in low frequency coordinates and neighboring joint density features on intra-block and inter-block as features. Finally, we employ a support vector machine to identify the smartphone source as well as to reveal the operations. Experimental results show that our method is very promising for identifying both smartphone source and manipulations. Our study also indicates that applying unsupervised clustering and supervised classification together (clustering first, followed by classification) leads to improvement in identifying smartphone sources and manipulations and thus provides a means to address the complexity issue of intentional manipulation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alles, E.J., Geradts, J.M.H., Veenman, C.J.: Source camera identification for heavily JPEG compressed low resolution still images. Journal of Forensic Sciences 54(3), 628–638 (2009)
Celiktutan, O., Sankur, B., Avcibas, I.: Blind identification of source cell-phone model. IEEE Trans. Information Forensics and Security 3(3), 553–566 (2008)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm
Choi, K.S., Lam, E.Y., Wong, K.K.Y.: Source camera identification using footprints from lens aberration. In: Proc. SPIE, vol. 6069, pp. 172–179 (2008)
Dirik, A.E., Sencar, H.T., Memon, N.: Source camera identification based on sensor dust characteristics. In: Proc. IEEE Workshop on Signal Processing Applications for Public Security and Forensics, pp. 1–6 (2007)
Farid, H.: Image forgery detection, a survey. IEEE Signal Processing Magazine, 16–25 (March 2009)
Gul, G., Avcibas, I.: Source cell phone camera identification based on signular value decomposition. In: Proc. 1st IEEE Inernational Workshop on Informaiton Forensics and Security, pp. 171–175 (2009)
Kharrazi, M., Sencar, H.T., Memon, N.: Blind source camera idetification. In: Proc. of ICIP 2004, pp. 709–712 (2004)
Li, C.T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans. Information Forensics and Security 5(2), 280–287 (2010)
Liu, Q., Sung, A.H., Chen, Z., Xu, J.: Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognition 41(1), 56–66 (2008)
Liu, Q., Sung, A.H.: A new approach for JPEG resize and image splicing detection. In: Proc 1st ACM Workshop on Multimedia in Forensics, pp. 43–48 (2009)
Liu, Q., Sung, A.H., Qiao, M., Chen, Z., Ribeiro, B.: An improved approach to steganalysis of JPEG images. Information Sciences 180(9), 1643–1655 (2010)
Liu, Q., Sung, A.H., Qiao, M.: Neighboring joint density-based JPEG steganalysis. ACM Transaction on Intelligent System and Technology 2(2), article 16 (2011)
Liu, Q., Sung, A.H., Qiao, M.: A Method to Detect JPEG-Based Double Compression. In: Liu, D., Zhang, H., Polycarpou, M., Alippi, C., He, H. (eds.) ISNN 2011, Part II. LNCS, vol. 6676, pp. 466–476. Springer, Heidelberg (2011)
Liu, Q.: Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery. In: Proc.of 3rd ACM Workshop on Multimedia in Forensics and Intelligence, pp. 25–30 (2011)
Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Information Security and Forensic 1(2), 205–214 (2006)
Pevny, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Information Forensics and Security 3(2), 247–258 (2008)
Tsai, M., Lai, C., Liu, J.: Camera/mobile phone source identification for digital forensics. In: Proc. ICASSP 2007, vol. 2, pp. 221–224 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Q. et al. (2012). Identification of Smartphone-Image Source and Manipulation. In: Jiang, H., Ding, W., Ali, M., Wu, X. (eds) Advanced Research in Applied Artificial Intelligence. IEA/AIE 2012. Lecture Notes in Computer Science(), vol 7345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31087-4_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-31087-4_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31086-7
Online ISBN: 978-3-642-31087-4
eBook Packages: Computer ScienceComputer Science (R0)