Abstract
Advances in digital technology have brought us numerous cheap yet good-quality imaging devices to capture the visionary signals into discrete form, i.e., digital images and videos. With their fast proliferation and growing popularity, a security concern arises since electronic alteration on digital multimedia data for deceiving purposes becomes incredibly easy. As an effort to restore the traditional trust on the acquired media, multimedia forensics has emerged to address mainly the challenges concerning the origin and integrity of multimedia data. As one important branch, source class identification designs the methodologies to identify the source classes and software tools based on its content. Through investigating and detecting the source features of various forms, a large number of identification methodologies have been developed in recent years and some achieved very good results. In this chapter, we review the history and major development in image and video source class identification. By first establishing an overall picture of multimedia forensics, we discuss the role of source identification in relation with other forensic fields and elaborate the existing methodologies for identification of different source types.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Brugioni DA (1999) Photo fakery: the history and techniques of photographic deception and manipulation. Brassey’s, Dulles
Spanish MP’s photo used for Osama Bin Laden poster. In: BBC News (16 Jan, 2009)
Israel: women photoshopped from cabinet picture to cater to the ultra-orthodox. In: The Huffington Post (18 Jul, 2009)
Farid H, Photo tampering throughout the history. In: http://www.cs.dartmouth.edu/farid/research/digitaltampering/
Mosleh F (Kodak) (2008) Cameras in handsets evolving from novelty to DSC performance, despite constraints. In: Embedded.com
Douglas T (2005) Shaping the media with mobiles. In: BBC News
Lewis J (2007) Don’t just stand and stare, shoot it, too. In: The Singapore Straits, Times, (28 April, 2007)
Cyranoski D (2006) Verdict: Hwang’s human stem cells were all fakes. Nature 439:122–123
Pearson H (2006) Forensic software traces tweaks to images. Nature 439:520–521
Friedman GL (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consumer Electron 39:905–910
Blythe P, Fridrich J (2004) Secure digital camera. In: Proceedings of the digital forensic research workshop (DFRWS)
Cox J, Miller ML, Bloom JA (2001) Digital watermarking. Morgan Kaufmann, San Francisco
Cao H, Kot AC (2010) Lossless data embedding in electronic Inks. IEEE Trans Inf Forensics Secur 5(2):314–323
Sencar HT, Memon N (2008) Overview of state-of-the-art in digital image forensics. In: Part of indian statistical institute platinum jubilee monograph series titled ‘Statistical Science and Interdisciplinary Research’. World Scientific Press, Singapore
Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25(6):389–399
Choi S, Lam EY, Wong KKY (2006) Automatic source camera identification using the intrinsic lens radial distortion. Opt Express 14(24):11551–11565
Van LT, Emmanuel S, Kankanhalli MS (2007) Identifying source cell phone using chromatic aberration. In: Proceedings of the ICME, pp 883–886
Kurosawa K, Kuroki K, Saitoh N (1999) CCD fingerprint method-identification of a video camera from videotaped images. In: Proceedings of the IEEE international conference on image processing, pp 537–540
Geradts ZJ, Bijhold J, Kieft M, Kurosawa K, Kuroki K, Saitoh N (2001) Methods for identification of images acquired with digital cameras. In: Proceedings of the SPIE, vol 4232, p 505
Kurosawa K, Kuroki K, Saitoh N (2002) An approach to individual video camera identification. J Forensic Sci 47(1):97–102
Saitoh N, Kurosawa K, Kuroki K, Akiba N, Geradts ZJ, Bijhold J (2002) CCD fingerprint method for digital still cameras. In: Proceedings of the SPIE, vol 4709, pp 37–48
Kurosawa K, Saitoh N (2003) Fundamental study on identification of CMOS cameras. In: Proceedings of the SPIE, vol 5108, p 202
Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205–214
Chen M, Fridrich J, Goljan M, Lukas J (2008) Determining image origin and integrity using sensor noise. IEEE Trans Inf Forensics Secur 3(1):74–89
Khanna N, Mikkilineni AK (2007) Scanner identification using sensor pattern noise. In: Proceedings of the SPIE, vol 6505, p 65051K
Sutcu Y, Bayram S, Sencar HT, Memon N (2007) Improvements on sensor noise based source camera identification. In: Proceedings of the international conference on multimedia Expo, pp 24–27
Goljan M, Fridrich J (2008) Camera identification from cropped and scaled images. In: Proceedings of the SPIE, vol 6819, p 68190E
Zhang C, Zhang H (2008) Digital camera identification based on canonical correlation analysis. In: Proceedings of the IEEE workshop on MSP, pp 769–773
Zhang C, Zhang H (2010) Identifying color image origin using curvelet transform. In: Proceedings of the IEEE international conference on image processing, pp 2125–2128
Hu Y, Yu B, Jian C (2009) Source camera identification using large components of sensor pattern noise. In: Proceedings of the international conference on computer science and its applications, pp 1–5
Hu Y, Jian C, Li C-T (2010) Using improved imaging sensor pattern noise for source camera identification. In: Proceedings of the IEEE international conference on multimedia and Expo, pp 1481–1486
Li C-T (2010) Source camera identification using enhanced sensor pattern noise. IEEE Trans Inf Forensics Secur 5(2):280–287
Liu BB, Lee H-K, HuY, Choi C-H (2010) On classification of source cameras: a graph based approach. In: Proceedings of the IEEE international workshop on information forensics and security, pp 1–5
Liu B-B, Hu Y, LeeH-K (2010) Source camera identification from significant noise residual regions. In: Proceedings of the IEEE international conference on image processing, pp 1749–1752
Goljan M, Fridrich J (2009) Large scale test of sensor fingerprint camera identification. In: Proceedings of the SPIE electronic imaging, forensics, security, steganography, and watermarking of multimedia contents X, vol 7254, pp 0I–0J
Goljan M, Fridrich J, Chen M (2010) Sensor noise camera identification: countering counter forensics. In: Proceedings of the SPIE, electronic imaging, media forensics and security XII, pp 0S-01–0S-12
Goljan M, Chen M, Fridrich J (2007) Identifying common source digital camera from image pairs. In: Proceedings of the international conference on image processing, pp 125–128
Bloy J (2008) Blind camera fingerprinting and image clustering. IEEE Trans Pattern Anal Mach Intell 30(3):532–534
Alles EJ, Geradts ZJMH, Veenman CJ (2008) Source camera identification for low resolution heavily compressed images. In: Proceedings of the ICCSA, pp 557–567
Chen M, Fridrich J, Goljan M, Lukas J (2007) Source digital camcorder identification using sensor photo response non-uniformity. In: Proceedings of the SPIE, vol 6505
Choi C-H, Lee M-J, Lee H-K (2010) Scanner identification using spectral noise in the frequency domain. In: Proceedings of the IEEE international conference on image processing (ICIP’10), pp 2121–2124
Houten WV, Geradts Z (2009) Source video camera identification for multiply compressed videos originating from YouTube. Digit Investig 6(1–2):48–60
Gou H, Swaminathan A, Wu M (2007) Robust scanner identification based on noise features. In: Proceedings of the SPIE, vol 6505, p 65050S
Gou H, Swaminathan A, Wu M (2009) Intrinsic sensor noise features for forensic analysis on scanners and scanned images. IEEE Trans Inf Forensics Secur 4(3):476–491
Khanna N, Mikkilineni AK, Chiu GTC, Allebach JP, Delp EJ (2007) Forensic classification of imaging sensor types. In: Proceedings of the SPIE, vol 6505, p 65050U
Filler T, Fridrich J, Goljan M (2008) Using sensor pattern noise for camera model identification. In: Proceedings of the international conference on image processing, pp 1296–1299
McKay C, Swaminathan A, Gou H, Wu M (2008) Image acquisition forensics: forensic analysis to identify imaging source. In: Proceedings of the ICASSP, pp 1657–1660
Dirik AE, Sencar HT, Memon N (2008) Digital single lens reflex camera identification from traces of sensor dust. IEEE Trans Inf Forensics Secur 3:539–552
Dirik AE, Sencar HT, Memon N (2009) Flatbed scanner identification based on dust and scratches over scanner platen. In: Proceedings of the international conference on acoustics, speech and signal processing (ICASSP), pp 1385–1388
Popescu C, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948–3959
Bayram S, Sencar HT, Memon N, Avcibas I (2005) Source camera identification based on CFA interpolation. In: Proceedings of the international conference on image processing, vol 3, pp 69–72
Bayram S, Sencar HT, Memon N (2006) Improvements on source camera-model identification based on CFA interpolation. In: Proceedings of the WG 11.9 international conference on digital forensics
Long Y, Huang Y (2006) Image based source camera identification using demosaicking. In: Proceedings of the IEEE 8th workshop on multimedia, signal processing, pp 419–424
Swaminathan A, Wu M, Liu KJR (2007) Nonintrusive component forensics of visual sensors using output images. IEEE Trans Inf Forensics Secur 2(1):91–106
Bayram S, Sencar HT, Memon N (2008) Classification of digital camera-models based on demosaicing artifacts. Digit Investig 5(1–2):49–59
Cao H, Kot AC (2008) A generalized model for detection of demosaicing characteristics. In: Proceedings of the international conference on multimedia expo, pp 1513–1516
Cao H, Kot AC (2009) RAW-tool identification through detected demosaicing regularity. In: Proceedings of the international conference on image processing, pp 2885–2888
Cao H, Kot AC (2010) Mobile camera identification using demosaicing features. In: Proceedings of the ISCAS, pp 1683–1686
Cao H, Kot AC (2009) Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans Inf Forensics Secur 4(4):899–910
Cao H, Kot AC (2011) Similar DSLR processor identification using compact model template. In: Asia-Pacific signal and information processing association annual summit and conference (APSIPA ASC’11)
Kharrazi M, Sencar HT, Memon N (2004) Blind source camera identification. In: Proceedings of the international conference on image processing, vol 1, pp 709–712
Tsai M-J, Wu G-H (2006) Using image features to identify camera sources. In: Proceedings of the ICASSP, vol 2, pp 297–300
Celiktutan O, Sankur B, Avcibas I (2008) Blind identification of source cell-phone model. IEEE Trans Inf Forensics Secur 3(3):553–566
Xu G, Shi YQ, Xu W (2009) Camera brand and model identification using moments of 1-D and 2-D characteristic functions. In: Proceedings of the international conference image processing, pp 2917–2920
Gloe T, Borowka K, Winkler A (2009) Feature-based camera model identification works in practice. Lecture Notes in Computer Science, vol 5806, pp 262–276
Khanna N, Delp EJ (2009) Source scanner identification for scanned documents. In: Proceedings of the IEEE international workshop on information forensics and security (WIFS’09), pp 166–170
Khanna N, Delp EJ (2010) Intrinsic signatures for scanned documents forensics: effect of font shape and size. In: Proceedings of the IEEE international symposium on circuits and systems (ISCAS’10), pp 3060–3063
Fang Y, Dirik AE, Sun X, Memon N (2009) Source class identification for DSLR and compact cameras. In: Proceedings of the multimedia signal processing (MMSP), pp 1–5
Lin WS, Tjoa SK, Zhao HV, Liu K (2009) Digital image source coder forensics via intrinsic fingerprints. IEEE Trans Inf Forensics Secur 4(2):460–475
Luo W, Wang Y, Huang J (2010) Detection of quantization artifacts and its applications to transform encoder identification. IEEE Trans Inf Forensics Secur 5(4):810–815
Su Y, Xu J, Dong B (2009) A source video identification algorithm based on motion vectors. In: Proceedings of the international workshop on computer science and engineering (WCSE’09), vol 2, pp 312–316
Chen M, Fridrich J, Goljan M, Lukas J (2007) Source digital camcorder identification using sensor photo response non-uniformity. In: Proceedings of the SPIE, vol 6505, pp 65051G-1–65051G-12
Ramanath R, Snyder WE, Yoo Y, Drew MS (Jan 2005) Color image processing pipeline. IEEE Signal Process Mag 22(1):34–43
Li X, Gunturk B, Zhang L (2008) Image demosaicing: a systematic survey. In: Proceedings of the SPIE, vol 6822
Jiang X, Mandal B, Kot AC (2008) Eigenfeature regularization and extraction in face recognition. IEEE Trans Pattern Anal Mach Intell 30(3):383–394
Pudil P, Ferri FJ, Novovicova J, Kittler J (1994) Floating search methods for feature selection with nonmonotonic criterion functions. In: Proceedings of the international conference on pattern recognition, vol 2, pp 279–283
Vapnik VN (1999) The nature of statistical learning theory, 2nd edn. Springer, New York
Scholkopf B, Platt JC, Talor JS, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Neural Comput 13(7):1443–1471
Freund Y, Schapire R (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119–139
Schapire RE, Singer Y (1999) Improved boosting algorithms using confidence-rated predictions. Mach Learn 37(3):297–336
Li SZ, Zhang Z (2004) FloatBoost learning and statistical face detection. IEEE Trans Pattern Anal Mach Intell 26(9):1112–1123
Gloe T, Kirchner M, Winkler A, Bohme R (2007) Can we trust digital image forensics? In: Proceedings of the international conference on multimedia, pp 78–86
Kirchner M, Bohme R (2009) Synthesis of color filter array pattern in digital images. In: Proceedings of the SPIE, vol 7254, p 72540K
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Kot, A.C., Cao, H. (2013). Image and Video Source Class Identification. In: Sencar, H., Memon, N. (eds) Digital Image Forensics. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0757-7_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-0757-7_5
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-0756-0
Online ISBN: 978-1-4614-0757-7
eBook Packages: EngineeringEngineering (R0)