Noisy Smoothing Image Source Identification

  • Yuying Liu
  • Yonggang HuangEmail author
  • Jun Zhang
  • Xu Liu
  • Hualei Shen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10581)


Feature based image source identification plays an important role in the toolbox for forensics investigations on images. Conventional feature based identification schemes suffer from the problem of noise, that is, the training dataset contains noisy samples. To address this problem, we propose a new Noisy Smoothing Image Source Identification (NS-ISI) method. NS-ISI address the noise problem in two steps. In step 1, we employ a classifier ensemble approach for noise level evaluation for each training sample. The noise level indicates the probability of being noisy. In step 2, a noise sensitive sampling method is employed to sample training samples from original training set according to the noise level, producing a new training dataset. The experiments carried out on the Dresden image collection confirms the effectiveness of the proposed NS-ISI. When the noisy samples present, the identification accuracy of NS-ISI is significantly better than traditional methods.



This work was supported by the National Natural Science Foundation of China (No. 61300077 & No. 61502319).


  1. 1.
    Stamm, M.C., Liu, K.J.R.: Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 5(3), 492–506 (2010)CrossRefGoogle Scholar
  2. 2.
    Celiktutan, O., Sankur, B., Avcibas, I.: Blind identification of source cell-phone model. IEEE Trans. Inf. Forensics Secur. 3(3), 553–566 (2008)CrossRefGoogle Scholar
  3. 3.
    Jain, L.C., Pan, J.S.: [1]. In: Cox, I.J., Miller, M.L., Bloom, J.A. (eds.) Digital Watermarking and Fundamentals. Morgan Kaufmann, San Francisco (2002)Google Scholar
  4. 4.
    Schyndel, R.G.V., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of IEEE International Conference on Image Processing, ICIP-94, vol. 2, pp. 86–90 (2002)Google Scholar
  5. 5.
    Committee, C.: Exchangeable image file format for digital still cameras: Exif version 2.3. (2010)Google Scholar
  6. 6.
    Bayram, S., Sencar, H., Memon, N., Avcibas, I.: Source camera identification based on CFA interpolation. In: IEEE International Conference on Image Processing, vol. 3, pp. 69–72 (2009)Google Scholar
  7. 7.
    Kharrazi, M., Sencar, H.T., Memon, N.: Blind source camera identification (2004)Google Scholar
  8. 8.
    Peng, F., Shi, J., Long, M.: Comparison and analysis of the performance of PRNU extraction methods in source camera identification. J. Comput. Inf. Syst. 9(14), 5585–5592 (2013)Google Scholar
  9. 9.
    Castiglione, A., Cattaneo, G., Cembalo, M., Petrillo, U.F.: Experimentations with source camera identification and online social networks. J. Ambient Intell. Humanized Comput. 4(2), 265–274 (2013)CrossRefGoogle Scholar
  10. 10.
    Cortes, C., Vapnik, V.: Support-Vector Networks. Kluwer Academic Publishers, Boston (1995)zbMATHGoogle Scholar
  11. 11.
    Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Revised Papers from the International Workshop on Information Hiding, pp. 340–354 (2002)Google Scholar
  12. 12.
    Wahid, A., Wahab, A., Ho, A.T.S., Li, S.: Inter-camera model image source identification with conditional probability features. In: Proceedings of IIEEJ Image Electronics & Visual Computing Workshop (2012)Google Scholar
  13. 13.
    Wang, B., Kong, X., You, X.: Source camera identification using support vector machines. In: Peterson, G., Shenoi, S. (eds.) DigitalForensics 2009. IAICT, vol. 306, pp. 107–118. Springer, Heidelberg (2009). doi: 10.1007/978-3-642-04155-6_8 CrossRefGoogle Scholar
  14. 14.
    Roychowdhury, A., Lin, T.Y., Maji, S., Learnedmiller, E.: Face identification with bilinear CNNs, pp. 1–9 (2015)Google Scholar
  15. 15.
    Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)CrossRefGoogle Scholar
  16. 16.
    Sutcu, Y., Bayram, S., Sencar, H.T., Memon, N.: Improvements on sensor noise based source camera identification. In: IEEE International Conference on Multimedia and Expo, pp. 24–27 (2007)Google Scholar
  17. 17.
    Li, C.T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 5(2), 280–287 (2010)CrossRefGoogle Scholar
  18. 18.
    Li, C.T., Li, Y.: Color-decoupled photo response non-uniformity for digital image forensics. IEEE Trans. Circ. Syst. Video Technol. 22(2), 260–271 (2012)CrossRefMathSciNetGoogle Scholar
  19. 19.
    Kang, X., Li, Y., Qu, Z., Huang, J.: Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 7(2), 393–402 (2012)CrossRefGoogle Scholar
  20. 20.
    Kang, X., Chen, J., Lin, K., Peng, A.: A context-adaptive spn predictor for trustworthy source camera identification. EURASIP J. Image Video Process. 2014(1), 19 (2014)CrossRefGoogle Scholar
  21. 21.
    Tsai, M.J., Wang, C.S., Liu, J., Yin, J.S.: Using decision fusion of feature selection in digital forensics for camera source model identification. Comput. Stand. Interfaces 34(3), 292–304 (2012)CrossRefGoogle Scholar
  22. 22.
    Choi, K.S., Lam, E.Y., Wong, K.K.: Automatic source camera identification using the intrinsic lens radial distortion. Opt. Express 14(24), 11551–11565 (2006)CrossRefGoogle Scholar
  23. 23.
    Kai, S.C., Lam, E.Y., Wong, K.K.Y.: Source camera identification using footprints from lens aberration. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 6069, pp. 60690J–60690J-8 (2006)Google Scholar
  24. 24.
    Min, G.H., Har, D.H., Park, H.J.: Source camera identification based on interpolation via lens distortion correction. Aust. J. Forensic Sci. 46(1), 98–110 (2014)CrossRefGoogle Scholar
  25. 25.
    Van, L.T., Emmanuel, S., Kankanhalli, M.S.: Identifying source cell phone using chromatic aberration. In: IEEE International Conference on Multimedia and Expo, pp. 883–886 (2007)Google Scholar
  26. 26.
    Dirik, A.E., Sencar, H.T., Memon, N.: Digital single lens reflex camera identification from traces of sensor dust. IEEE Trans. Inf. Forensics Secur. 3(3), 539–552 (2008)CrossRefGoogle Scholar
  27. 27.
    Dirik, A.E., Sencar, H.T., Memon, N.: Source camera identification based on sensor dust characteristics. In: IEEE Workshop on Signal Processing Applications for Public Security and Forensics, SAFE 2007, pp. 1–6 (2007)Google Scholar
  28. 28.
    Li, C.T., Li, Y.: Digital camera identification using colour-decoupled photo response non-uniformity noise pattern. In: IEEE International Symposium on Circuits and Systems, pp. 3052–3055 (2010)Google Scholar
  29. 29.
    Liu, B.B., Lee, H.K., Hu, Y., Choi, C.H.: On classification of source cameras: a graph based approach. In: IEEE International Workshop on Information Forensics and Security, pp. 1–5 (2010)Google Scholar
  30. 30.
    Li, C.T.: Unsupervised classification of digital images using enhanced sensor pattern noise. In: IEEE International Symposium on Circuits and Systems, pp. 3429–3432 (2010)Google Scholar
  31. 31.
    Tuama, A., Comby, F., Chaumont, M.: Camera model identification with the use of deep convolutional neural networks. In: IEEE International Workshop on Information Forensics and Security (2016)Google Scholar
  32. 32.
    Chen, Y.N., Han, C.C., Wang, C.T., Jeng, B.S., Fan, K.C.: The application of a convolution neural network on face and license plate detection. In: International Conference on Pattern Recognition, pp. 552–555 (2006)Google Scholar
  33. 33.
    Wang, B., Zhang, J., Zhang, Z., Luo, W., Xia, D.: Robust traffic classification with mislabelled training samples. In: IEEE International Conference on Parallel and Distributed Systems, pp. 328–335 (2015)Google Scholar
  34. 34.
    Pyun, K., Lim, J., Gray, R.M.: A robust hidden Markov Gauss mixture vector quantizer for a noisy source. IEEE Trans. Image Process. 18(7), 1385–1394 (2009). IEEE Signal Processing SocietyCrossRefzbMATHMathSciNetGoogle Scholar
  35. 35.
    Breiman, L.: Random forest. Mach. Learn. 45, 5–32 (2001)CrossRefzbMATHGoogle Scholar
  36. 36.
    Chatterjee, S., Dash, A., Bandopadhyay, S.: Ensemble support vector machine algorithm for reliability estimation of a mining machine. Qual. Reliab. Eng. Int. 31(8), 1503–1516 (2016)CrossRefGoogle Scholar
  37. 37.
    Gloe, T.: The ‘Dresden image database’ for benchmarking digital image forensics. In: ACM Symposium on Applied Computing, pp. 1584–1590 (2010)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Yuying Liu
    • 1
  • Yonggang Huang
    • 1
    Email author
  • Jun Zhang
    • 2
  • Xu Liu
    • 1
  • Hualei Shen
    • 3
  1. 1.School of Computer Science and Technology, Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing ApplicationsBeijing Institute of TechnologyBeijingChina
  2. 2.School of Information TechnologyDeakin UniversityMelbourneAustralia
  3. 3.College of Computer and Information EngineeringHenan Normal UniversityXinxiangChina

Personalised recommendations