Skip to main content
Log in

A new Zernike moments based technique for camera identification and forgery detection

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

In multimedia forensics, it is important to identify those images that were captured by a specific camera from a given set of N data images as well as detecting the tampered region in these images if forged. This paper presents a new technique based on Zernike moments feature extraction for blindly classifying correlated PRNU images as well as locating the tampered regions in image under investigation. The proposed clustering algorithm is based on estimating the Zernike moments and applying a hierarchical clustering for classification. The forgery detection algorithm is based on picking up the peak Euclidean distance between the Zernike moments vector of blocks of the scaled-down forged image and its corresponding ones in the capturing camera PRNU. As Zernike moments are scale and rotational invariant, its feature when computed using scaled-down PRNU images lead to considerable computation time saving. Simulation examples are given to verify the effectiveness of the proposed techniques when compared to other state-of-the-art techniques even in case of very weakly correlated PRNU.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Fridrich, J.: Digital image forensics. IEEE Signal Process. Mag. 26, 26–37 (2009)

    Article  Google Scholar 

  2. Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 2(26), 16–25 (2009)

    Article  Google Scholar 

  3. Li, C.-T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 5(2), 280–287 (2010)

    Article  Google Scholar 

  4. Bloy, G.J.: Blind camera fingerprinting and image clustering. IEEE Trans. Pattern Anal. Mach. Intell. 30(3), 532–535 (2008)

    Article  Google Scholar 

  5. Liu, B.B., Hu, Y., Lee, H.: Source Camera Identification from Significant Noise Residual Regions. In: 17th IEEE ICIP, pp. 26–29 (2010)

  6. Li, C.-T.: Unsupervised classification of digital images enhanced sensor pattern noise. In: IEEE International Symposium on Circuits and Systems (ISCAS 10), (2010)

  7. Parsi, A., Ghanbari Sorkhi, A., Zahedi, M.: Improving the unsupervised LBG clustering algorithm performance in image segmentation using principal component analysis. SIVP 10(2), 301–309 (2016)

    Google Scholar 

  8. Caldelli, R., Amerini, I., Picchioni, F., Innocenti, M.: Fast Image Clustering of Unknown Source Images. In: IEEE International workshop on Information Forensics and Security (WIFS), pp. 12–15 (2010)

  9. Shahbaba, M., Beheshti, S.: Signature test as statistical testing in clustering. SIViP 10(7), 1343–1351 (2016)

    Article  Google Scholar 

  10. Liu, B.B., Lee, H.K., Hu, Y., Choi, C.H.: On Classification of Source Cameras: a graph Based Approach. In: IEEE International workshop on Information Forensics and Security (WIFS), pp. 1–5, 12–15 (2010)

  11. Amerini, I., Caldelli, R., Crescenzi, P., Del Mastio, A., Marino, A.: Blind image clustering based on the normalized cuts criterion for camera identification. Image Commun. 29, 1–13 (2014)

    Google Scholar 

  12. Fahmy, O.M.: An Efficient Clustering Technique for Cameras Identification using Sensor Pattern Noise. In: IEEE International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 10–12 (2015)

  13. Solomon, C., Breckon, T.: Fundaments of Digital Image Processing. Wiley-Black Well, ISBN 9780470689776 (2011)

  14. Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74–90 (2008)

    Article  Google Scholar 

  15. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy and move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)

    Article  Google Scholar 

  16. Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10, 2284–2297 (2015)

    Article  Google Scholar 

  17. Chierchia, G., Poggi, G., Sansone, C., Verdoliva, L.: A Bayesian-MRF approach for PRNU-based image forgery detection. IEEE Trans. Inf. Forensics Secur. 9(4), 554–567 (2014)

    Article  Google Scholar 

  18. Kohale, T., Chede, D., Lakhe, P.R.: Forgery detection technique based on block and feature based method. Int. J. Adv. Res. Comput. Commun. Eng. 3(6), 7334–7335 (2014)

    Google Scholar 

  19. Fahmy, M.F., Fahmy, O.M.: A Natural Preserving Transform Based Forgery Detection Scheme. In: IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 7–10 (2015)

  20. Day, D.D., Ahmed, A.M.: A Modified Natural Preserving Transform for data hiding and Image Watermarking. In: Proceedings of JCIS 7th Joint Conf. of IASTED Int. Conf. on Signal and Image Processing, pp. 44-48 (2003)

  21. Fahmy, M.F., Abd Raheem, G., Thabet, M.A.: A Zernike Moment Based Rotational Invariant Watermarking Scheme. In: IEEE National Radio Science Conference (NRSC), pp. 16–18 (2013)

  22. Liao, S.X., Pawlak, M.: Image Analysis with Zernike Moments Descriptors. In: IEEE Electrical and Computer Engineering, 1997. Engineering Innovation: Voyage of Discovery, vol. 2, pp. 700–703 (1998)

  23. Tran, T.T., Pham, V.T., Shyu, K.K.: Zernike moment and local distribution fitting fuzzy energy-based active contours for image segmentation. SIVP 8(1), 11–25 (2014)

    Google Scholar 

  24. Dresden Image database, (http://forensics.inf.tu-dresden.de/ddimgdb/)

  25. Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)

    Article  Google Scholar 

  26. Image Manipulation Data set, (http://www5.cs.fau.de/)

Download references

Acknowledgements

Omar M. Fahmy acknowledges the support from Prof. M. F. Fahmy, Professor of Electrical Engneering Dept., Faculty of Engineering, Assiut University, Egypt.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to O. M. Fahmy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fahmy, O.M. A new Zernike moments based technique for camera identification and forgery detection. SIViP 11, 785–792 (2017). https://doi.org/10.1007/s11760-016-1023-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-016-1023-1

Keywords

Navigation