Skip to main content

Identification of Smartphone-Image Source and Manipulation

  • Conference paper
Advanced Research in Applied Artificial Intelligence (IEA/AIE 2012)

Abstract

As smartphones are being widely used in daily lives, the images captured by smartphones become ubiquitous and may be used for legal purposes. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. In this paper, we propose a method to determine the smartphone camera source of a particular image and operations that may have been performed on that image. We first take images using different smartphones and purposely manipulate the images, including different combinations of double JPEG compression, cropping, and rescaling. Then, we extract the marginal density in low frequency coordinates and neighboring joint density features on intra-block and inter-block as features. Finally, we employ a support vector machine to identify the smartphone source as well as to reveal the operations. Experimental results show that our method is very promising for identifying both smartphone source and manipulations. Our study also indicates that applying unsupervised clustering and supervised classification together (clustering first, followed by classification) leads to improvement in identifying smartphone sources and manipulations and thus provides a means to address the complexity issue of intentional manipulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alles, E.J., Geradts, J.M.H., Veenman, C.J.: Source camera identification for heavily JPEG compressed low resolution still images. Journal of Forensic Sciences 54(3), 628–638 (2009)

    Article  Google Scholar 

  2. Celiktutan, O., Sankur, B., Avcibas, I.: Blind identification of source cell-phone model. IEEE Trans. Information Forensics and Security 3(3), 553–566 (2008)

    Article  Google Scholar 

  3. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm

  4. Choi, K.S., Lam, E.Y., Wong, K.K.Y.: Source camera identification using footprints from lens aberration. In: Proc. SPIE, vol. 6069, pp. 172–179 (2008)

    Google Scholar 

  5. Dirik, A.E., Sencar, H.T., Memon, N.: Source camera identification based on sensor dust characteristics. In: Proc. IEEE Workshop on Signal Processing Applications for Public Security and Forensics, pp. 1–6 (2007)

    Google Scholar 

  6. Farid, H.: Image forgery detection, a survey. IEEE Signal Processing Magazine, 16–25 (March 2009)

    Google Scholar 

  7. Gul, G., Avcibas, I.: Source cell phone camera identification based on signular value decomposition. In: Proc. 1st IEEE Inernational Workshop on Informaiton Forensics and Security, pp. 171–175 (2009)

    Google Scholar 

  8. Kharrazi, M., Sencar, H.T., Memon, N.: Blind source camera idetification. In: Proc. of ICIP 2004, pp. 709–712 (2004)

    Google Scholar 

  9. Li, C.T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans. Information Forensics and Security 5(2), 280–287 (2010)

    Article  Google Scholar 

  10. Liu, Q., Sung, A.H., Chen, Z., Xu, J.: Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognition 41(1), 56–66 (2008)

    Article  MATH  Google Scholar 

  11. Liu, Q., Sung, A.H.: A new approach for JPEG resize and image splicing detection. In: Proc 1st ACM Workshop on Multimedia in Forensics, pp. 43–48 (2009)

    Google Scholar 

  12. Liu, Q., Sung, A.H., Qiao, M., Chen, Z., Ribeiro, B.: An improved approach to steganalysis of JPEG images. Information Sciences 180(9), 1643–1655 (2010)

    Article  Google Scholar 

  13. Liu, Q., Sung, A.H., Qiao, M.: Neighboring joint density-based JPEG steganalysis. ACM Transaction on Intelligent System and Technology 2(2), article 16 (2011)

    Google Scholar 

  14. Liu, Q., Sung, A.H., Qiao, M.: A Method to Detect JPEG-Based Double Compression. In: Liu, D., Zhang, H., Polycarpou, M., Alippi, C., He, H. (eds.) ISNN 2011, Part II. LNCS, vol. 6676, pp. 466–476. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  15. Liu, Q.: Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery. In: Proc.of 3rd ACM Workshop on Multimedia in Forensics and Intelligence, pp. 25–30 (2011)

    Google Scholar 

  16. Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Information Security and Forensic 1(2), 205–214 (2006)

    Article  Google Scholar 

  17. Pevny, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Information Forensics and Security 3(2), 247–258 (2008)

    Article  Google Scholar 

  18. Tsai, M., Lai, C., Liu, J.: Camera/mobile phone source identification for digital forensics. In: Proc. ICASSP 2007, vol. 2, pp. 221–224 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Q. et al. (2012). Identification of Smartphone-Image Source and Manipulation. In: Jiang, H., Ding, W., Ali, M., Wu, X. (eds) Advanced Research in Applied Artificial Intelligence. IEA/AIE 2012. Lecture Notes in Computer Science(), vol 7345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31087-4_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31087-4_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31086-7

  • Online ISBN: 978-3-642-31087-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics