Signal, Image and Video Processing

, Volume 11, Issue 5, pp 785–792 | Cite as

A new Zernike moments based technique for camera identification and forgery detection

  • O. M. Fahmy
Original Paper


In multimedia forensics, it is important to identify those images that were captured by a specific camera from a given set of N data images as well as detecting the tampered region in these images if forged. This paper presents a new technique based on Zernike moments feature extraction for blindly classifying correlated PRNU images as well as locating the tampered regions in image under investigation. The proposed clustering algorithm is based on estimating the Zernike moments and applying a hierarchical clustering for classification. The forgery detection algorithm is based on picking up the peak Euclidean distance between the Zernike moments vector of blocks of the scaled-down forged image and its corresponding ones in the capturing camera PRNU. As Zernike moments are scale and rotational invariant, its feature when computed using scaled-down PRNU images lead to considerable computation time saving. Simulation examples are given to verify the effectiveness of the proposed techniques when compared to other state-of-the-art techniques even in case of very weakly correlated PRNU.


Camera identification Forgery detection Camera fingerprint Zernike moments 



Omar M. Fahmy acknowledges the support from Prof. M. F. Fahmy, Professor of Electrical Engneering Dept., Faculty of Engineering, Assiut University, Egypt.


  1. 1.
    Fridrich, J.: Digital image forensics. IEEE Signal Process. Mag. 26, 26–37 (2009)CrossRefGoogle Scholar
  2. 2.
    Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 2(26), 16–25 (2009)CrossRefGoogle Scholar
  3. 3.
    Li, C.-T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 5(2), 280–287 (2010)CrossRefGoogle Scholar
  4. 4.
    Bloy, G.J.: Blind camera fingerprinting and image clustering. IEEE Trans. Pattern Anal. Mach. Intell. 30(3), 532–535 (2008)CrossRefGoogle Scholar
  5. 5.
    Liu, B.B., Hu, Y., Lee, H.: Source Camera Identification from Significant Noise Residual Regions. In: 17th IEEE ICIP, pp. 26–29 (2010)Google Scholar
  6. 6.
    Li, C.-T.: Unsupervised classification of digital images enhanced sensor pattern noise. In: IEEE International Symposium on Circuits and Systems (ISCAS 10), (2010)Google Scholar
  7. 7.
    Parsi, A., Ghanbari Sorkhi, A., Zahedi, M.: Improving the unsupervised LBG clustering algorithm performance in image segmentation using principal component analysis. SIVP 10(2), 301–309 (2016)Google Scholar
  8. 8.
    Caldelli, R., Amerini, I., Picchioni, F., Innocenti, M.: Fast Image Clustering of Unknown Source Images. In: IEEE International workshop on Information Forensics and Security (WIFS), pp. 12–15 (2010)Google Scholar
  9. 9.
    Shahbaba, M., Beheshti, S.: Signature test as statistical testing in clustering. SIViP 10(7), 1343–1351 (2016)CrossRefGoogle Scholar
  10. 10.
    Liu, B.B., Lee, H.K., Hu, Y., Choi, C.H.: On Classification of Source Cameras: a graph Based Approach. In: IEEE International workshop on Information Forensics and Security (WIFS), pp. 1–5, 12–15 (2010)Google Scholar
  11. 11.
    Amerini, I., Caldelli, R., Crescenzi, P., Del Mastio, A., Marino, A.: Blind image clustering based on the normalized cuts criterion for camera identification. Image Commun. 29, 1–13 (2014)Google Scholar
  12. 12.
    Fahmy, O.M.: An Efficient Clustering Technique for Cameras Identification using Sensor Pattern Noise. In: IEEE International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 10–12 (2015)Google Scholar
  13. 13.
    Solomon, C., Breckon, T.: Fundaments of Digital Image Processing. Wiley-Black Well, ISBN 9780470689776 (2011)Google Scholar
  14. 14.
    Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74–90 (2008)CrossRefGoogle Scholar
  15. 15.
    Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy and move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRefGoogle Scholar
  16. 16.
    Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10, 2284–2297 (2015)CrossRefGoogle Scholar
  17. 17.
    Chierchia, G., Poggi, G., Sansone, C., Verdoliva, L.: A Bayesian-MRF approach for PRNU-based image forgery detection. IEEE Trans. Inf. Forensics Secur. 9(4), 554–567 (2014)CrossRefGoogle Scholar
  18. 18.
    Kohale, T., Chede, D., Lakhe, P.R.: Forgery detection technique based on block and feature based method. Int. J. Adv. Res. Comput. Commun. Eng. 3(6), 7334–7335 (2014)Google Scholar
  19. 19.
    Fahmy, M.F., Fahmy, O.M.: A Natural Preserving Transform Based Forgery Detection Scheme. In: IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 7–10 (2015)Google Scholar
  20. 20.
    Day, D.D., Ahmed, A.M.: A Modified Natural Preserving Transform for data hiding and Image Watermarking. In: Proceedings of JCIS 7th Joint Conf. of IASTED Int. Conf. on Signal and Image Processing, pp. 44-48 (2003)Google Scholar
  21. 21.
    Fahmy, M.F., Abd Raheem, G., Thabet, M.A.: A Zernike Moment Based Rotational Invariant Watermarking Scheme. In: IEEE National Radio Science Conference (NRSC), pp. 16–18 (2013)Google Scholar
  22. 22.
    Liao, S.X., Pawlak, M.: Image Analysis with Zernike Moments Descriptors. In: IEEE Electrical and Computer Engineering, 1997. Engineering Innovation: Voyage of Discovery, vol. 2, pp. 700–703 (1998)Google Scholar
  23. 23.
    Tran, T.T., Pham, V.T., Shyu, K.K.: Zernike moment and local distribution fitting fuzzy energy-based active contours for image segmentation. SIVP 8(1), 11–25 (2014)Google Scholar
  24. 24.
  25. 25.
    Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRefGoogle Scholar
  26. 26.
    Image Manipulation Data set, (

Copyright information

© Springer-Verlag London 2016

Authors and Affiliations

  1. 1.Electrical Engineering DepartmentFuture University in EgyptCairoEgypt

Personalised recommendations