Skip to main content

Camera-Model Identification Using Markovian Transition Probability Matrix

  • Conference paper
Book cover Digital Watermarking (IWDW 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5703))

Included in the following conference series:

Abstract

Detecting the (brands and) models of digital cameras from given digital images has become a popular research topic in the field of digital forensics. As most of images are JPEG compressed before they are output from cameras, we propose to use an effective image statistical model to characterize the difference JPEG 2-D arrays of Y and Cb components from the JPEG images taken by various camera models. Specifically, the transition probability matrices derived from four different directional Markov processes applied to the image difference JPEG 2-D arrays are used to identify statistical difference caused by image formation pipelines inside different camera models. All elements of the transition probability matrices, after a thresholding technique, are directly used as features for classification purpose. Multi-class support vector machines (SVM) are used as the classification tool. The effectiveness of our proposed statistical model is demonstrated by large-scale experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Choi, K.S., Lam, E.Y., Wong, K.K.Y.: Source Camera Identification Using Footprints from Lens Aberration. In: Proc. of SPIE, pp. 172–179 (2006)

    Google Scholar 

  2. Filler, T., Fridrich, J., Goljan, M.: Using Sensor Pattern Noise for Camera Model Identification. In: Proc. of ICIP, pp. 1296–1299 (2008)

    Google Scholar 

  3. Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1(2), 205–214 (2006)

    Article  Google Scholar 

  4. Swaminathan, A., Wu, M., Ray Liu, K.J.: Non-Intrusive Forensics Analysis of Visual Sensors Using Output Images. In: Proc. of ICASSP, pp. 401–404 (2006)

    Google Scholar 

  5. Long, Y., Huang, Y.: Image Based Source Camera Identification Using Demosaicing. In: Proc. of IEEE MMSP, pp. 419–424 (2006)

    Google Scholar 

  6. Bayram, S., Sencar, H.T., Memon, N.: Improvements on Source Camera-Model Identification Based on CFA Interpolation. In: Proc. of WG 11.9 Int. Conf. on Digital Forensics (2006)

    Google Scholar 

  7. Choi, K.S., Lam, E.Y., Wong, K.K.Y.: Source Camera Identification by JPEG Compression Statistics for Image Forensics. In: TENCON, pp. 1–4 (2006)

    Google Scholar 

  8. Kharrazi, M., Sencar, H.T., Memon, N.: Blind Source Camera Identification. In: Proc. of IEEE ICIP, pp. 709–712 (2004)

    Google Scholar 

  9. Farid, H.: Digital image ballistics from JPEG quantization. Technical Report TR2006-583, Department of Computer Science, Dartmouth College (2006)

    Google Scholar 

  10. Arnia, F., Fujiyoshi, M., Kiya, H.: The use of DCT coefficient sign for content-based copy detection. In: International Symposium on Communications and Information Technologies, pp. 1476–1481 (2007)

    Google Scholar 

  11. Tu, C., Tran, T.D.: Context-based entropy coding of block transform coefficients for image compression. IEEE Transactions on Image Processing 11(11), 1271–1283 (2002)

    Article  MathSciNet  Google Scholar 

  12. Shi, Y.Q., Chen, C., Chen, W.: A Markov Process Based Approach to Effective Attacking JPEG Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Leon-Garcia, A.: Probability and random processes for electrical engineering, 2nd edn. Addison-Wesley Publishing Company, Reading (1994)

    MATH  Google Scholar 

  14. Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/unicode/~cjlin/libsvm.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xu, G., Gao, S., Shi, Y.Q., Hu, R., Su, W. (2009). Camera-Model Identification Using Markovian Transition Probability Matrix. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds) Digital Watermarking. IWDW 2009. Lecture Notes in Computer Science, vol 5703. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03688-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03688-0_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03687-3

  • Online ISBN: 978-3-642-03688-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics