Skip to main content

Image and Video Source Class Identification

  • Chapter
  • First Online:
Book cover Digital Image Forensics

Abstract

Advances in digital technology have brought us numerous cheap yet good-quality imaging devices to capture the visionary signals into discrete form, i.e., digital images and videos. With their fast proliferation and growing popularity, a security concern arises since electronic alteration on digital multimedia data for deceiving purposes becomes incredibly easy. As an effort to restore the traditional trust on the acquired media, multimedia forensics has emerged to address mainly the challenges concerning the origin and integrity of multimedia data. As one important branch, source class identification designs the methodologies to identify the source classes and software tools based on its content. Through investigating and detecting the source features of various forms, a large number of identification methodologies have been developed in recent years and some achieved very good results. In this chapter, we review the history and major development in image and video source class identification. By first establishing an overall picture of multimedia forensics, we discuss the role of source identification in relation with other forensic fields and elaborate the existing methodologies for identification of different source types.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Brugioni DA (1999) Photo fakery: the history and techniques of photographic deception and manipulation. Brassey’s, Dulles

    Google Scholar 

  2. Spanish MP’s photo used for Osama Bin Laden poster. In: BBC News (16 Jan, 2009)

    Google Scholar 

  3. Israel: women photoshopped from cabinet picture to cater to the ultra-orthodox. In: The Huffington Post (18 Jul, 2009)

    Google Scholar 

  4. Farid H, Photo tampering throughout the history. In: http://www.cs.dartmouth.edu/farid/research/digitaltampering/

  5. Mosleh F (Kodak) (2008) Cameras in handsets evolving from novelty to DSC performance, despite constraints. In: Embedded.com

    Google Scholar 

  6. Douglas T (2005) Shaping the media with mobiles. In: BBC News

    Google Scholar 

  7. Lewis J (2007) Don’t just stand and stare, shoot it, too. In: The Singapore Straits, Times, (28 April, 2007)

    Google Scholar 

  8. Cyranoski D (2006) Verdict: Hwang’s human stem cells were all fakes. Nature 439:122–123

    Article  Google Scholar 

  9. Pearson H (2006) Forensic software traces tweaks to images. Nature 439:520–521

    Article  Google Scholar 

  10. Friedman GL (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consumer Electron 39:905–910

    Article  Google Scholar 

  11. Blythe P, Fridrich J (2004) Secure digital camera. In: Proceedings of the digital forensic research workshop (DFRWS)

    Google Scholar 

  12. Cox J, Miller ML, Bloom JA (2001) Digital watermarking. Morgan Kaufmann, San Francisco

    Google Scholar 

  13. Cao H, Kot AC (2010) Lossless data embedding in electronic Inks. IEEE Trans Inf Forensics Secur 5(2):314–323

    Article  Google Scholar 

  14. Sencar HT, Memon N (2008) Overview of state-of-the-art in digital image forensics. In: Part of indian statistical institute platinum jubilee monograph series titled ‘Statistical Science and Interdisciplinary Research’. World Scientific Press, Singapore

    Google Scholar 

  15. Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25(6):389–399

    Article  Google Scholar 

  16. Choi S, Lam EY, Wong KKY (2006) Automatic source camera identification using the intrinsic lens radial distortion. Opt Express 14(24):11551–11565

    Article  Google Scholar 

  17. Van LT, Emmanuel S, Kankanhalli MS (2007) Identifying source cell phone using chromatic aberration. In: Proceedings of the ICME, pp 883–886

    Google Scholar 

  18. Kurosawa K, Kuroki K, Saitoh N (1999) CCD fingerprint method-identification of a video camera from videotaped images. In: Proceedings of the IEEE international conference on image processing, pp 537–540

    Google Scholar 

  19. Geradts ZJ, Bijhold J, Kieft M, Kurosawa K, Kuroki K, Saitoh N (2001) Methods for identification of images acquired with digital cameras. In: Proceedings of the SPIE, vol 4232, p 505

    Google Scholar 

  20. Kurosawa K, Kuroki K, Saitoh N (2002) An approach to individual video camera identification. J Forensic Sci 47(1):97–102

    Google Scholar 

  21. Saitoh N, Kurosawa K, Kuroki K, Akiba N, Geradts ZJ, Bijhold J (2002) CCD fingerprint method for digital still cameras. In: Proceedings of the SPIE, vol 4709, pp 37–48

    Google Scholar 

  22. Kurosawa K, Saitoh N (2003) Fundamental study on identification of CMOS cameras. In: Proceedings of the SPIE, vol 5108, p 202

    Google Scholar 

  23. Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205–214

    Article  Google Scholar 

  24. Chen M, Fridrich J, Goljan M, Lukas J (2008) Determining image origin and integrity using sensor noise. IEEE Trans Inf Forensics Secur 3(1):74–89

    Article  Google Scholar 

  25. Khanna N, Mikkilineni AK (2007) Scanner identification using sensor pattern noise. In: Proceedings of the SPIE, vol 6505, p 65051K

    Google Scholar 

  26. Sutcu Y, Bayram S, Sencar HT, Memon N (2007) Improvements on sensor noise based source camera identification. In: Proceedings of the international conference on multimedia Expo, pp 24–27

    Google Scholar 

  27. Goljan M, Fridrich J (2008) Camera identification from cropped and scaled images. In: Proceedings of the SPIE, vol 6819, p 68190E

    Google Scholar 

  28. Zhang C, Zhang H (2008) Digital camera identification based on canonical correlation analysis. In: Proceedings of the IEEE workshop on MSP, pp 769–773

    Google Scholar 

  29. Zhang C, Zhang H (2010) Identifying color image origin using curvelet transform. In: Proceedings of the IEEE international conference on image processing, pp 2125–2128

    Google Scholar 

  30. Hu Y, Yu B, Jian C (2009) Source camera identification using large components of sensor pattern noise. In: Proceedings of the international conference on computer science and its applications, pp 1–5

    Google Scholar 

  31. Hu Y, Jian C, Li C-T (2010) Using improved imaging sensor pattern noise for source camera identification. In: Proceedings of the IEEE international conference on multimedia and Expo, pp 1481–1486

    Google Scholar 

  32. Li C-T (2010) Source camera identification using enhanced sensor pattern noise. IEEE Trans Inf Forensics Secur 5(2):280–287

    Article  Google Scholar 

  33. Liu BB, Lee H-K, HuY, Choi C-H (2010) On classification of source cameras: a graph based approach. In: Proceedings of the IEEE international workshop on information forensics and security, pp 1–5

    Google Scholar 

  34. Liu B-B, Hu Y, LeeH-K (2010) Source camera identification from significant noise residual regions. In: Proceedings of the IEEE international conference on image processing, pp 1749–1752

    Google Scholar 

  35. Goljan M, Fridrich J (2009) Large scale test of sensor fingerprint camera identification. In: Proceedings of the SPIE electronic imaging, forensics, security, steganography, and watermarking of multimedia contents X, vol 7254, pp 0I–0J

    Google Scholar 

  36. Goljan M, Fridrich J, Chen M (2010) Sensor noise camera identification: countering counter forensics. In: Proceedings of the SPIE, electronic imaging, media forensics and security XII, pp 0S-01–0S-12

    Google Scholar 

  37. Goljan M, Chen M, Fridrich J (2007) Identifying common source digital camera from image pairs. In: Proceedings of the international conference on image processing, pp 125–128

    Google Scholar 

  38. Bloy J (2008) Blind camera fingerprinting and image clustering. IEEE Trans Pattern Anal Mach Intell 30(3):532–534

    Article  Google Scholar 

  39. Alles EJ, Geradts ZJMH, Veenman CJ (2008) Source camera identification for low resolution heavily compressed images. In: Proceedings of the ICCSA, pp 557–567

    Google Scholar 

  40. Chen M, Fridrich J, Goljan M, Lukas J (2007) Source digital camcorder identification using sensor photo response non-uniformity. In: Proceedings of the SPIE, vol 6505

    Google Scholar 

  41. Choi C-H, Lee M-J, Lee H-K (2010) Scanner identification using spectral noise in the frequency domain. In: Proceedings of the IEEE international conference on image processing (ICIP’10), pp 2121–2124

    Google Scholar 

  42. Houten WV, Geradts Z (2009) Source video camera identification for multiply compressed videos originating from YouTube. Digit Investig 6(1–2):48–60

    Google Scholar 

  43. Gou H, Swaminathan A, Wu M (2007) Robust scanner identification based on noise features. In: Proceedings of the SPIE, vol 6505, p 65050S

    Google Scholar 

  44. Gou H, Swaminathan A, Wu M (2009) Intrinsic sensor noise features for forensic analysis on scanners and scanned images. IEEE Trans Inf Forensics Secur 4(3):476–491

    Article  Google Scholar 

  45. Khanna N, Mikkilineni AK, Chiu GTC, Allebach JP, Delp EJ (2007) Forensic classification of imaging sensor types. In: Proceedings of the SPIE, vol 6505, p 65050U

    Google Scholar 

  46. Filler T, Fridrich J, Goljan M (2008) Using sensor pattern noise for camera model identification. In: Proceedings of the international conference on image processing, pp 1296–1299

    Google Scholar 

  47. McKay C, Swaminathan A, Gou H, Wu M (2008) Image acquisition forensics: forensic analysis to identify imaging source. In: Proceedings of the ICASSP, pp 1657–1660

    Google Scholar 

  48. Dirik AE, Sencar HT, Memon N (2008) Digital single lens reflex camera identification from traces of sensor dust. IEEE Trans Inf Forensics Secur 3:539–552

    Article  Google Scholar 

  49. Dirik AE, Sencar HT, Memon N (2009) Flatbed scanner identification based on dust and scratches over scanner platen. In: Proceedings of the international conference on acoustics, speech and signal processing (ICASSP), pp 1385–1388

    Google Scholar 

  50. Popescu C, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948–3959

    Article  MathSciNet  Google Scholar 

  51. Bayram S, Sencar HT, Memon N, Avcibas I (2005) Source camera identification based on CFA interpolation. In: Proceedings of the international conference on image processing, vol 3, pp 69–72

    Google Scholar 

  52. Bayram S, Sencar HT, Memon N (2006) Improvements on source camera-model identification based on CFA interpolation. In: Proceedings of the WG 11.9 international conference on digital forensics

    Google Scholar 

  53. Long Y, Huang Y (2006) Image based source camera identification using demosaicking. In: Proceedings of the IEEE 8th workshop on multimedia, signal processing, pp 419–424

    Google Scholar 

  54. Swaminathan A, Wu M, Liu KJR (2007) Nonintrusive component forensics of visual sensors using output images. IEEE Trans Inf Forensics Secur 2(1):91–106

    Article  Google Scholar 

  55. Bayram S, Sencar HT, Memon N (2008) Classification of digital camera-models based on demosaicing artifacts. Digit Investig 5(1–2):49–59

    Article  Google Scholar 

  56. Cao H, Kot AC (2008) A generalized model for detection of demosaicing characteristics. In: Proceedings of the international conference on multimedia expo, pp 1513–1516

    Google Scholar 

  57. Cao H, Kot AC (2009) RAW-tool identification through detected demosaicing regularity. In: Proceedings of the international conference on image processing, pp 2885–2888

    Google Scholar 

  58. Cao H, Kot AC (2010) Mobile camera identification using demosaicing features. In: Proceedings of the ISCAS, pp 1683–1686

    Google Scholar 

  59. Cao H, Kot AC (2009) Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans Inf Forensics Secur 4(4):899–910

    Article  Google Scholar 

  60. Cao H, Kot AC (2011) Similar DSLR processor identification using compact model template. In: Asia-Pacific signal and information processing association annual summit and conference (APSIPA ASC’11)

    Google Scholar 

  61. Kharrazi M, Sencar HT, Memon N (2004) Blind source camera identification. In: Proceedings of the international conference on image processing, vol 1, pp 709–712

    Google Scholar 

  62. Tsai M-J, Wu G-H (2006) Using image features to identify camera sources. In: Proceedings of the ICASSP, vol 2, pp 297–300

    Google Scholar 

  63. Celiktutan O, Sankur B, Avcibas I (2008) Blind identification of source cell-phone model. IEEE Trans Inf Forensics Secur 3(3):553–566

    Article  Google Scholar 

  64. Xu G, Shi YQ, Xu W (2009) Camera brand and model identification using moments of 1-D and 2-D characteristic functions. In: Proceedings of the international conference image processing, pp 2917–2920

    Google Scholar 

  65. Gloe T, Borowka K, Winkler A (2009) Feature-based camera model identification works in practice. Lecture Notes in Computer Science, vol 5806, pp 262–276

    Google Scholar 

  66. Khanna N, Delp EJ (2009) Source scanner identification for scanned documents. In: Proceedings of the IEEE international workshop on information forensics and security (WIFS’09), pp 166–170

    Google Scholar 

  67. Khanna N, Delp EJ (2010) Intrinsic signatures for scanned documents forensics: effect of font shape and size. In: Proceedings of the IEEE international symposium on circuits and systems (ISCAS’10), pp 3060–3063

    Google Scholar 

  68. Fang Y, Dirik AE, Sun X, Memon N (2009) Source class identification for DSLR and compact cameras. In: Proceedings of the multimedia signal processing (MMSP), pp 1–5

    Google Scholar 

  69. Lin WS, Tjoa SK, Zhao HV, Liu K (2009) Digital image source coder forensics via intrinsic fingerprints. IEEE Trans Inf Forensics Secur 4(2):460–475

    Article  Google Scholar 

  70. Luo W, Wang Y, Huang J (2010) Detection of quantization artifacts and its applications to transform encoder identification. IEEE Trans Inf Forensics Secur 5(4):810–815

    Article  Google Scholar 

  71. Su Y, Xu J, Dong B (2009) A source video identification algorithm based on motion vectors. In: Proceedings of the international workshop on computer science and engineering (WCSE’09), vol 2, pp 312–316

    Google Scholar 

  72. Chen M, Fridrich J, Goljan M, Lukas J (2007) Source digital camcorder identification using sensor photo response non-uniformity. In: Proceedings of the SPIE, vol 6505, pp 65051G-1–65051G-12

    Google Scholar 

  73. Ramanath R, Snyder WE, Yoo Y, Drew MS (Jan 2005) Color image processing pipeline. IEEE Signal Process Mag 22(1):34–43

    Article  Google Scholar 

  74. Li X, Gunturk B, Zhang L (2008) Image demosaicing: a systematic survey. In: Proceedings of the SPIE, vol 6822

    Google Scholar 

  75. Jiang X, Mandal B, Kot AC (2008) Eigenfeature regularization and extraction in face recognition. IEEE Trans Pattern Anal Mach Intell 30(3):383–394

    Article  Google Scholar 

  76. Pudil P, Ferri FJ, Novovicova J, Kittler J (1994) Floating search methods for feature selection with nonmonotonic criterion functions. In: Proceedings of the international conference on pattern recognition, vol 2, pp 279–283

    Google Scholar 

  77. Vapnik VN (1999) The nature of statistical learning theory, 2nd edn. Springer, New York

    Google Scholar 

  78. Scholkopf B, Platt JC, Talor JS, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Neural Comput 13(7):1443–1471

    Article  Google Scholar 

  79. Freund Y, Schapire R (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119–139

    Article  MathSciNet  MATH  Google Scholar 

  80. Schapire RE, Singer Y (1999) Improved boosting algorithms using confidence-rated predictions. Mach Learn 37(3):297–336

    Article  MATH  Google Scholar 

  81. Li SZ, Zhang Z (2004) FloatBoost learning and statistical face detection. IEEE Trans Pattern Anal Mach Intell 26(9):1112–1123

    Article  Google Scholar 

  82. Gloe T, Kirchner M, Winkler A, Bohme R (2007) Can we trust digital image forensics? In: Proceedings of the international conference on multimedia, pp 78–86

    Google Scholar 

  83. Kirchner M, Bohme R (2009) Synthesis of color filter array pattern in digital images. In: Proceedings of the SPIE, vol 7254, p 72540K

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alex C. Kot .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Kot, A.C., Cao, H. (2013). Image and Video Source Class Identification. In: Sencar, H., Memon, N. (eds) Digital Image Forensics. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0757-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-0757-7_5

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-0756-0

  • Online ISBN: 978-1-4614-0757-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics