skip to main content
10.1145/3383972.3384037acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlcConference Proceedingsconference-collections
research-article

Review of Imaging Device Identification Based on Machine Learning

Authors Info & Claims
Published:26 May 2020Publication History

ABSTRACT

Imaging device recognition is an important research hotspot in image tampering analysis. In recent years, it has received extensive research and rapid development. Image tampering analysis based on imaging devices is an important field in image tampering, and the recognition of imaging devices has also become important. In order to promote the recognition research based on imaging equipment, this paper summarizes and discusses the current main methods and representative work of imaging equipment identification. This article compares the similarities and differences of traditional methods and related deep learning methods, respectively, and details the current The main principles and methods of imaging device recognition based on deep learning are discussed. Finally, the problems that need to be solved for imaging device recognition based on deep learning and the future research trends are discussed.

References

  1. A. Rocha, W. Scheirer, T. Boult, and S. Goldenstein, "Vision of the unseen: Current trends and challenges in digital image and video forensics," ACM Computing Surveys (CSUR), vol.43, pp. 26:1--26:42, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Bayram, H. Sencar, N. Memon, and I. Avcibas, "Source camera identification based on CFA interpolation," in IEEE International Conference on Image Processing (ICIP), 2005.Google ScholarGoogle Scholar
  3. S. Milani, P. Bestagini, M. Tagliasacchi, and S. Tubaro, "Demosaicing strategy identification via eigenalgorithms," in IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP), 2014.Google ScholarGoogle Scholar
  4. Geradts Z, Bijhold J, Kieft M, Kurosawa K, Kuroki K, Saitoh, N. Methods foridentification of images aequired with digital cameras[A]. Proc of SPIE, Enabling Tehnologies for Law Enfor cement and Security[C]. Stockholm, Sweden: Springer-Verlag, 2001: 505--512.Google ScholarGoogle ScholarCross RefCross Ref
  5. Hany Farid. Blind Inverse Gamma Correction[J]. IEEE Transactions on Image Proeessing, 2001, 10: 1428--1433.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ng T T, Chang S F, Tsui M P. Camera response function estimation from a single-channel image using differential invariants[J]. 2006.Google ScholarGoogle Scholar
  7. Kharrazi M, Sencar H T, Memon N. Blind source camera identification[C]. International Conference on Image Processing. IEEE, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  8. Min-Jen, Guan-Hui Wu. Using image features to identify camera sources[A]. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference[C]. Toulouse, France: IEEE, 2006, 2: 297--300.Google ScholarGoogle Scholar
  9. Sevinc Bayram, Husrev T Senear, Nasir Memon. Source camera identification based on CFA interpolation[C]. IEEE Intemational Conference on Image Processing. Genoa, Italy:IEEE, 2005: 69--72.Google ScholarGoogle Scholar
  10. S. Bayram, H. T. Sencar, and N. Memon, "Improvements on source camera-model identification based on CFA interpolation," presented at the Working Group 11.9 Int. Conf. Digital Forensics, Orlando, FL, Jan. 2006.Google ScholarGoogle Scholar
  11. Long Y, Huang Y. Image based source camera identification using demosaicking. Proceedings of the 8th Workshop on Multimedia Signal Processing. Washington, DC:IEEE Computer Society, 2006, 419--424.Google ScholarGoogle Scholar
  12. Swaminathan A, Wu M, Liu K J R. Nonintrusive component forensics of visual sensors output images[J]. IEEE Trans. on Information Forensics and Security, 2007, 2(1):91--106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Wang Bo, Kong XW, HX Fu. Image source forensics based on OC-SVM and MC-SVM [J]. Computer research and development, 2009, 46(9): 1456--1461.Google ScholarGoogle Scholar
  14. X.G. Kang, Y. Li, Z. Qu, and J.W. Huang. Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans. On Information Forensics and Security, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Goljan M, Fridrich J, Lukas J. Camera identification from printed images. Proceedings ofSPIE, Electronic Imaging Forensics, Security, Steganography, and Watermarking ofMultimedia Contents X. San Jose, CA:SPIE, 2008:68190I.1 -- 68190I.12.Google ScholarGoogle Scholar
  16. C.-T. Li. Source camera identification using enhanced sensor pattern noise. IEEE Trans. on Information Forensics and Security, 2010.Google ScholarGoogle Scholar
  17. Camera model identification based on the characteristic of CFA and interpolation. In: IWDW'11 Proceedings of the 10th International Conference on Digital-Forensics and Watermarking; 2011 Oct 23--26; Atlantic City, NJ, USA. Berlin: Springer-Verlag;Google ScholarGoogle Scholar
  18. Bloy G J. Blind camera fingerprinting and image clustering[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 30(3): 532--534.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Caldelli R, Amerini I, Picchioni F, et al. Fast image clustering of unknown source images[C]. In: Proceedings of IEEE International Workshop on Information Forensics and Security. Piscataway, NJ, USA: IEEE Press, 2010: 371--375.Google ScholarGoogle ScholarCross RefCross Ref
  20. Li C T. Unsupervised classification of digital images using enhanced sensor pattern noise[C]. In: Proceedings of IEEE International Symposium on Circuits and Systems. Piscataway, NJ, USA: IEEE Press, 2010: 3429--3432.Google ScholarGoogle ScholarCross RefCross Ref
  21. García Villalba L J, Sandoval Orozco A L, Corripio J R. Smartphone image clustering[J]. Expert Systems with Applications, 2015, 42(4): 1927--1940.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Caldelli R, Amerini I, Picchioni F, et al. Fast image clustering of unknown source images[C]. In: Proceedings of IEEE International Workshop on Information Forensics and Security. Piscataway, NJ, USA: IEEE Press, 2010: 371--375.Google ScholarGoogle ScholarCross RefCross Ref
  23. Fahmy O. An efficient clustering technique for cameras identification using sensor pattern noise[C]. In: Proceedings of International Conference on Systems, Signals and Image Processing. Piscataway, NJ, USA: IEEE Press, 2015: 249--252.Google ScholarGoogle ScholarCross RefCross Ref
  24. Yann LeCun, Leon Bottou, Yoshua Bengio, et al. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 1998, 86(11):2278--2324Google ScholarGoogle ScholarCross RefCross Ref
  25. Xuefeng Jiang, Yikun Wang, Wenbo Liu, et al. CapsNet, CNN, FCN: Comparative Performance Evaluation for Image Classification. International Journal of Machine Learning and Computing, 2019, 9(6):840--848.Google ScholarGoogle Scholar
  26. Bondi L, Baroffio L, Güera, David, et al. First Steps Toward Camera Model Identification with Convolutional Neural Networks[J]. IEEE Signal Processing Letters, 2016, 24(3):259--263.Google ScholarGoogle ScholarCross RefCross Ref
  27. Tuama A, Frédéric Comby, Chaumont M. Camera Model Identification With The Use of Deep Convolutional Neural Networks[C]. WIFS'2016, IEEE International Workshop on Information Forensics and Security. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  28. Baroffio, Luca & Bondi, Luca & Bestagini, Paolo & Tubaro, Stefano. (2016). Camera identification with deep convolutional networks.Google ScholarGoogle Scholar
  29. Bayar, Belhassen & Stamm, Matthew. Augmented convolutional feature maps for robust CNN-based camera model identification. 4098--4102. 10.1109/ICIP.2017.8297053.Google ScholarGoogle Scholar
  30. X. Kang, M. C. Stamm, A. Peng, and K. R. Liu, "Robust median filtering forensics using an autoregressive model," IEEE Transactions on Information Forensics and Security, vol. 8, no. 9, pp. 1456--1468, 2013Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. B. Bayar and M. C. Stamm, "A deep learning approach to universalimage manipulation detection using a new convolutionallayer," in Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. ACM, 2016, pp. 5--10.Google ScholarGoogle Scholar
  32. Yang P, Zhao W, Ni R, et al. Source Camera Identification Based On Content-Adaptive Fusion Network[J]. Pattern Recognition Letters, 2017.Google ScholarGoogle Scholar
  33. Freire-Obregon, D., narducci, F., Barra, S., & Castrillon-Santana, M.(2017). Deep learning for source camera identification on mobile devices. Eprint arXiv:1710.01257.Google ScholarGoogle Scholar
  34. Sameer V U, Naskar R, Musthyala N, et al. Deep Learning Based Counter--Forensic Image Classification for Camera Model Identification[C]. International Workshop on Digital Watermarking. 2017.Google ScholarGoogle ScholarCross RefCross Ref
  35. Bondi L, Lameri S, David Güera, et al. Tampering Detection and Localization Through Clustering of Camera-Based CNN Features[C]. Computer Vision & Pattern Recognition Workshops. IEEE, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  36. Luca B, Güera David, Luca B, et al. A Preliminary Study on Convolutional Neural Networks for Camera Model Identification[C]. 2017:67--76.Google ScholarGoogle Scholar
  37. B. Bayar and M. C. Stamm. Towards open set camera model identification using a deep learning framework. In The 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Ding X, Chen Y, Tang Z, et al. Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning[J]. IEEE Access, 2019, 7:25878--25890Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Review of Imaging Device Identification Based on Machine Learning

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICMLC '20: Proceedings of the 2020 12th International Conference on Machine Learning and Computing
      February 2020
      607 pages
      ISBN:9781450376426
      DOI:10.1145/3383972

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 May 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader