Source Camera Identification Using Support Vector Machines

  • Bo Wang
  • Xiangwei Kong
  • Xingang You
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 306)


Source camera identification is an important branch of image forensics. This paper describes a novel method for determining image origin based on color filter array (CFA) interpolation coefficient estimation. To reduce the perturbations introduced by a double JPEG compression, a covariance matrix is used to estimate the CFA interpolation coefficients. The classifier incorporates a combination of one-class and multi-class support vector machines to identify camera models as well as outliers that are not in the training set. Classification experiments demonstrate that the method is both accurate and robust for double-compressed JPEG images.


Camera identification CFA interpolation support vector machine 


  1. 1.
    S. Bayram, H. Sencar and N. Memon, Improvements on source camera model identification based on CFA interpolation, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 289–299, 2006.CrossRefGoogle Scholar
  2. 2.
    B. Boser, I. Guyon and V. Vapnik, A training algorithm for optimal margin classifiers, Proceedings of the Fifth Annual Workshop on Computational Learning Theory, pp. 144–152, 1992.Google Scholar
  3. 3.
    C. Chang and C. Lin, LIBSVM: A Library for Support Vector Machines, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan (www.csie Scholar
  4. 4.
    K. Choi, E. Lam and K. Wong, Automatic source camera identification using intrinsic lens radial distortion, Optics Express, vol. 14(24), pp. 11551–11565, 2006.CrossRefGoogle Scholar
  5. 5.
    Z. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki and N. Saitoh, Methods for identification of images acquired with digital cameras, Proceedings of the SPIE, vol. 4232, pp. 505–512, 2001.Google Scholar
  6. 6.
    C. Hsu, C. Chang and C. Lin, A Practical Guide to Support Vector Classification, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan (www, 2003.Google Scholar
  7. 7.
    N. Khanna, A. Mikkilineni, A. Martone, G. Ali, G. Chiu, J. Allebach and E. Delp, A survey of forensic characterization methods for physical devices, Digital Investigation, vol. 3(S1), pp. 17–18, 2006.CrossRefGoogle Scholar
  8. 8.
    M. Kharrazi, H. Sencar and N. Memon, Blind source camera identification, Proceedings of the International Conference on Image Processing, vol. 1, pp. 709–712, 2004.Google Scholar
  9. 9.
    Y. Long and Y. Huang, Image based source camera identification using demosaicking, Proceedings of the Eighth IEEE Workshop on Multimedia Signal Processing, pp. 419–424, 2006.Google Scholar
  10. 10.
    J. Lukas, J. Fridrich and M. Goljan, Detecting digital image forgeries using sensor pattern noise, Proceedings of the SPIE, vol. 6072, pp. 362–372, 2006.Google Scholar
  11. 11.
    F. Meng, X. Kong and X. You, A new feature-based method for source camera identification, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 207–218, 2008.CrossRefGoogle Scholar
  12. 12.
    T. Ng and S. Chang, Passive-blind image forensics, in Multimedia Security Technologies for Digital Rights, W. Zeng, H. Yu and C. Lin (Eds.), Academic Press, New York, pp. 383–412, 2006.CrossRefGoogle Scholar
  13. 13.
    B. Scholkopf, A. Smola, R. Wiliamson and P. Bartlett, New support vector algorithms, Neural Computation, vol. 12(5), pp. 1207–1245, 2000.CrossRefGoogle Scholar
  14. 14.
    A. Swaminathan, M. Wu and K. Liu, Component forensics of digital cameras: A non-intrusive approach, Proceedings of the Fortieth Annual Conference on Information Sciences and System, pp. 1194–1199, 2006.Google Scholar
  15. 15.
    A. Swaminathan, M. Wu and K. Liu, Non-intrusive component forensics of visual sensors using output images, IEEE Transactions on Information Forensics and Security, vol. 2(1), pp. 91–106, 2007.CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Bo Wang
  • Xiangwei Kong
  • Xingang You

There are no affiliations available

Personalised recommendations