Abstract
In this digital world, digitized documents can be considered original or a piece of evidence; checking the authenticity of any suspicious image has become an unavoidable concern to preserve the trust in its legitimacy. However, identifying the source of a digital image without any prior embedded information is a very challenging task. This paper proposes a novel one-dimensional convolutional neural network (1D-CNN) model to solve the source scanner identification (SSI) problem blindly. Unlike traditional methods based on handcrafted features, the proposed framework can dynamically learn and extract scanner device-specific features. This work, comprised of the 1D-CNN and a support vector machine (SVM) as a classifier, was trained on nine scanners of different brands and models. The experimental result shows that our model achieves 98.15% accuracy on full images and overall accuracy of 93.13% on segments from test images, outperforming other state-of-art approaches. Our model also proves to be able to distinguish between scanners of the same model. Furthermore, the SVM classifier improved the 1D-CNN accuracy by approximately 3% compared to its original configuration.
Similar content being viewed by others
References
Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M, Ghemawat S, Irving G, Isard M, et al (2016) Tensorflow: a system for large-scale machine learning. In: 12th {USENIX} symposium on operating systems design and implementation ({OSDI} 16), pp 265–283
Al Banna MH, Haider MA, Al Nahian MJ, Islam MM, Taher KA, Kaiser MS (2019) Camera model identification using deep cnn and transfer learning approach. In: 2019 International conference on robotics, electrical and signal processing techniques (ICREST). IEEE, pp 626–630
Alain G, Bengio Y (2018) Understanding intermediate layers using linear classifier probes. 1610.01644
Arkah ZM, Alzubaidi L, Ali AA, Abdulameer AT (2018) Digital color documents authentication using qr code based on digital watermarking. In: International conference on intelligent systems design and applications. Springer, pp 1093–1101
Barni M, Costanzo A, Nowroozi E, Tondi B (2018) Cnn-based detection of generic contrast adjustment with jpeg post-processing. In: 2018 25th IEEE international conference on image processing (ICIP). IEEE, pp 3803–3807
Bondi L, Lameri S, Güera D, Bestagini P, Delp EJ, Tubaro S (2017) Tampering detection and localization through clustering of camera-based cnn features. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW). IEEE, pp 1855–1864
Cu VL, Burie JC, Ogier JM (2018) Watermarking for security issue of handwritten documents with fully convolutional networks. In: 2018 16th international conference on frontiers in handwriting recognition (ICFHR). IEEE, pp 303–308
Damshenas M, Dehghantanha A, Mahmoud R (2014) A survey on digital forensics trends. International Journal of Cyber-Security and Digital Forensics 3(4):209–235
Ding X, Chen Y, Tang Z, Huang Y (2019) Camera identification based on domain knowledge-driven deep multi-task learning. IEEE Access 7:25878–25890
Foi A, Katkovnik V, Egiazarian K (2006) Pointwise shape-adaptive dct denoising with structure preservation in luminance-chrominance space. In: Proc. of the 2nd international workshop on video processing and quality metrics for consumer electronics, VPQM
Fowler JE (2005) The redundant discrete wavelet transform and additive noise. IEEE Signal Processing Letters 12(9):629–632
Freire-Obregón D, Narducci F, Barra S, Castrillón-Santana M (2019) Deep learning for source camera identification on mobile devices. Pattern Recogn Lett 126:86–91
Gao S, Liao X, Liu X (2019) Real-time detecting one specific tampering operation in multiple operator chains. J Real-Time Image Proc 16(3):741–750
Gloe T, Franz E, Winkler A (2007) Forensics for flatbed scanners. In: Security, steganography, and watermarking of multimedia contents IX, vol 6505. International Society for Optics and Photonics, p 65051I
Gumilang M, Purwarianti A (2018) Experiments on character and word level features for text classification using deep neural network. In: 2018 third international conference on informatics and computing (ICIC). IEEE, pp 1–6
Gumilang M, Purwarianti A (2018) Experiments on character and word level features for text classification using deep neural network. In: 2018 Third international conference on informatics and computing (ICIC). IEEE, pp 1–6
Haddad S, Coatrieux G, Moreau-Gaudry A, Cozic M (2020) Joint watermarking-encryption-jpeg-ls for medical image reliability control in encrypted and compressed domains. IEEE Transactions on Information Forensics and Security 15:2556–2569
Holst GC (1998) CCD arrays, cameras, and displays
Joshi S, Gupta G, Khanna N (2017) Source classification using document images from smartphones and flatbed scanners. In: National conference on computer vision, pattern recognition, image processing, and graphics. Springer, pp 281–292
Keras CF (2015) Github
Khanna N, Mikkilineni AK, Chiu GT, Allebach JP, Delp EJ (2007) Scanner identification using sensor pattern noise. In: Security, steganography, and watermarking of multimedia contents IX, vol 6505. International Society for Optics and Photonics, p 65051K
Khanna N, Mikkilineni AK, Delp EJ (2009) Scanner identification using feature-based processing and analysis. IEEE Transactions on Information Forensics and Security 4(1):123–139
Kim DG, Hou JU, Lee HK (2019) Learning deep features for source color laser printer identification based on cascaded learning. Neurocomputing 365:219–228
Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv:arXiv:14126980
Kiranyaz S, Avci O, Abdeljaber O, Ince T, Gabbouj M, Inman DJ (2019) 1d convolutional neural networks and applications: a survey. arXiv:190503554
Krasnyanskiy M, Obukhov A, Voyakina A, Skvortsov V, Khvorov V (2018) The algorithm of document routing in the electronic document management system using machine learning methods. International Multidisciplinary Scientific GeoConference: SGEM 18(2.1):765–772
Kullback S, Leibler RA (1951) On information and sufficiency. The Annals of Mathematical Statistics 22(1):79–86
Li Y, Baidoo C, Cai T, Kusi GA (2019) Speech emotion recognition using 1d cnn with no attention. In: 2019 23rd international computer science and engineering conference (ICSEC)
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimedia Tools and Applications 76(20):20739–20753
Liu A, Zhao Z, Zhang C, Su Y (2019) Smooth filtering identification based on convolutional neural networks. Multimed Tools Applic 78(19):26851–26865
Mallat S (1999) A wavelet tour of signal processing. Elsevier, Amsterdam
Mazumdar A, Singh J, Tomar YS, Bora PK (2019) Detection of image manipulations using siamese convolutional neural networks. In: International conference on pattern recognition and machine intelligence. Springer, pp 226–233
Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V et al (2011) Scikit-learn: machine learning in python. The Journal of Machine Learning Research 12:2825–2830
Rabah CB, Coatrieux G, Abdelfattah R (2020) Boosting up source scanner identification using wavelets and convolutional neural networks. Traitement du signal 37(6)
Rabah CB, Coatrieux G, Abdelfattah R (2019) Semi-blind source scanner identification. In: 2019 International conference on internet of things, embedded systems and communications (IINTEC). IEEE, pp 220–225
Rabah CB, Coatrieux G, Abdelfattah R (in press) Boosting up source scanner identification using wavelets and convolutional neural networks. Traitement du Signal
Rahim N, Foozy CFM (2020) Source camera identification for online social network images using texture feature. In: International conference on soft computing and data mining. Springer, pp 283–296
Salau AO, Olowoyo TD, Akinola SO (2020) Accent classification of the three major nigerian indigenous languages using 1d cnn lstm network model. In: Advances in computational intelligence techniques. Springer, pp 1–16
Sameer VU, Naskar R (2020) Deep siamese network for limited labels classification in source camera identification. Multimedia Tools and Applications 79 (37):28079–28104
Sameer VU, Sarkar A, Naskar R (2017) Source camera identification model: classifier learning, role of learning curves and their interpretation. In: 2017 International conference on wireless communications, signal processing and networking (WiSPNET). IEEE, pp 2660–2666
Singh M, Kaur H, Kakkar A (2015) Digital signature verification scheme for image authentication. In: 2015 2nd international conference on recent advances in engineering & computational sciences (RAECS). IEEE, pp 1–5
Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research 15(1):1929–1958
Sugawara S (2014) Identification of scanner models by comparison of scanned hologram images. Forensic Science International 241:69–83
Tang Y (2015) Deep learning using linear support vector machines. 1306.0239
Tsai MJ, Tao YH, Yuadi I (2019) Deep learning for printed document source identification. Signal Processing: Image Communication 70:184–198
Wikipedia Contributors (2020) Radial basis function kernel — Wikipedia, the free encyclopedia. https://en.wikipedia.org/w/index.php?title=Radial_basis_function_kernel&oldid=993555025. [Online; Accessed 18 Dec 2020]
Zhao J, Mao X, Chen L (2019) Speech emotion recognition using deep 1d & 2d cnn lstm networks. Biomedical Signal Processing and Control 47:312–323
Zou Z, Liu Y, Zhang W, Chen Y (2019) Camera model identification based on residual extraction module and squeezenet. In: Proceedings of the 2nd international conference on big data technologies, pp 211–215
Acknowledgements
This work was financially supported by the “PHC Utique” program of the French Ministry of Foreign Affairs and Ministry of higher education and research and the Tunisian Ministry of higher education and scientific research in the CMCU project number 17G1405.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interests
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ben Rabah, C., Coatrieux, G. & Abdelfattah, R. Automatic source scanner identification using 1D convolutional neural network. Multimed Tools Appl 81, 22789–22806 (2022). https://doi.org/10.1007/s11042-021-10973-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10973-2