Abstract
Just as human fingerprints or skin blemishes can be used for forensic purposes, imperfections of digital imaging sensors can serve as unique identifiers in numerous forensic applications, such as matching an image to a specific camera, revealing malicious image manipulation and processing, and determining an approximate age of a digital photograph. There exist several different types of defects that are of interest to the forensic analysts caused by imperfections in manufacturing, physical processes occurring inside the camera, and by environmental factors. This chapter begins with analyzing the pixel defects, while pointing out their forensic potential. Then, specific problems are formulated as tasks involving detection or matching of defects and noise patterns. Practical algorithms for these tasks are developed within the framework of parameter estimation and signal detection theory. The performance of the algorithms is demonstrated in real world examples.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Amerini I, Caldelli R, Cappellini V, Picchioni F, Piva A (2009) Analysis of denoising filters for photo-response non-uniformity noise extraction in source camera identification. In: Proceedings of the 16th international conference on Digital Signal Processing, pp 511–517
Bayram S, Sencar HT, Memon N (2010) Efficient techniques for sensor fingerprint matching in large image and video databases. In: Memon N, Dittmann J (eds) Proceeedings of SPIE electronic media forensics and security XII, vol 7541, pp 09-01–09-12
Bloy GJ (March 2008) Blind camera fingerprinting and image clustering. IEEE Transactions on Pattern Analysis and Machine Intelligence 30(3):532–534
Böhme R, Kirchner M (2009) Synthesis of color filter array pattern in digital images. In: Memon N, Dittmann J (eds) Proceedings of SPIE media forensics and security XI, vol 7254. San Jose, CA, pp 0K–0L
Caldelli R, Amerini I, Novi A (2011) An analysis on attacker actions in fingerprint-copy attack in source camera identification. In: Proceedings of IEEE WIFS, Iguazu Falls, Brazil
Çeliktutan O, Avcibas I, Sankur B (2007) Blind identification of cellular phone cameras. In: Delp EJ, Wong PW (eds) Proceedings of SPIE electronic imaging, steganography, security, and watermarking of multimedia contents IX, vol 6505, pp H1–H12
Celiktutan OB, Sankur B, Avcibas I (2008) Blind identification of source cell-phone model. IEEE Transactions on Information Forensics and Security 3(3):553–566
Chen M, Fridrich J, Goljan M (2007) Digital imaging sensor identification (further study). In: Delp EJ, Wong PW (eds) Proceedings of SPIE electronic imaging, steganography, security, and watermarking of multimedia contents IX, vol 6505, pp 0P–0Q
Chen M, Fridrich J, Goljan M (2007) Imaging sensor noise as digital x-ray for revealing forgeries. In: Furon T et al (eds.) Proceedings of ninth information hiding workshop, vol 4567 of LNCS, Springer-Verlag, Saint Malo, France, pp 342–358
Chen M, Fridrich J, Goljan M (2007) Source digital camcorder identification using ccd photo response nonuniformity. In: Delp EJ Wong PW (eds) Proceedings of SPIE electronic imaging, steganography, security, and watermarking of multimedia contents IX, vol 6505, pp 1G–1H
Chen M, Fridrich J, Goljan M (March 2008) Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 1(1):74–90
Chen M, Fridrich J, Goljan M (2010) Defending against fingerprint-copy attack in sensor-based camera identification. IEEE Trans Inform Security Forensics, submitted
Dudas J, Wu LM, Jung C, Chapman GH, Koren Z, Koren I (2007) In: Martin RA, DiCarlo JM, Sampat N (eds) Identification of in-field defect development in digital image sensors, vol 6502. SPIE, pp 65020Y
Filler T, Fridrich J, Goljan M (2008) Using sensor pattern noise for camera model identification. In: Proceedings of IEEE international conference on image processing (ICIP)
El Gamal A, Fowler B, Min H, Liu X (1998) Modeling and estimation of FPN components in CMOS image sensors. In: Proceedings of SPIE solid state sensor arrays: development and applications II, vol 3301-20, pp 168–177
Gloe T, Franz E, Winkler A (2007) Forensics for flatbed scanners. In Delp EJ, Wong PW (eds) Proceedings of SPIE electronic imaging, steganography, security, and watermarking of multimedia contents IX, vol 6505, pps 1I–1J
Gloe T, Kirchner M, Winkler A, Boehme R (2007) Can we trust digital image forensics? In: Proceedings of the fifteenthth international conference on multimedia, Multimedia ’07, ACM, pp 78–86
Goljan M, Chen M, Fridrich J (2007) Identifying common source digital camera from image pairs. In: Proceedings of IEEE international conference on image processing (ICIP)
Goljan M, Filler T, Fridrich J (2009) Camera identification-large scale test. In: Memon N, Dittmann J (eds) Proceeedings of SPIE electronic media forensics and security XI, vol 7254, pp 0I-01–0I-12
Goljan M, Fridrich J (2008) Camera identification from printed images. In: Delp EJ, Wong PW, Memon N, Dittmann J (eds) Proceeedings of SPIE electronic imaging, security, forensics, steganography, and watermarking of multimedia contents X, vol 6819, pp OI1-OI12
Goljan M, Fridrich J (2008) Camera identification from scaled and cropped images. In: Delp E, Wong PW, Memon N, Dittmann J (eds) Proceeedings of SPIE electronic imaging, security, forensics, steganography, and watermarking of multimedia contents X, vol 6819, pp OE1-OE13
Goljan M, Fridrich J (2012) Sensor-fingerprint based identification of images corrected for lens distortion. In: Memon ND, Alattar A, Delp EJ (eds) Proceedings SPIE electronic imaging, media watermarking, security and forensics January 22–26, 2012
Goljan M, Fridrich J, Chen M (2010) Sensor noise camera identification: Countering counter-forensics. In: Memon N, Dittmann J, Alattar A (eds) Proceedings of SPIE electronic imaging, steganography, security, and watermarking of multimedia contents XII, vol 7541, pp 0S-01–0S-12, January 17–21 2010
Goljan M, Fridrich J, Filler T (2010) Managing a large database of camera fingerprints. In Memon N, Dittmann J, Alattar A (eds) Proceeedings of SPIE electronic media forensics and security XII, vol 7541, pp 08-01–08-12, January 2010
Gou H, Swaminathan A, Wu M (2007) Robust scanner identification based on noise features. In Delp EJ, Wong PW (eds) Proceedings of SPIE electronic imaging, steganography, security, and watermarking of multimedia contents IX, vol 6505, pp 0S–0T
Healey G, Kondepudy R. Radiometric CCD camera calibration and noise estimation
Healey GE, Kondepudy R (March 1994) Radiometric CCD camera calibration and noise estimation. IEEE Trans Pattern Anal Mach Intell 16(3):267–276
Holst GC (1998) CCD Arrays, Cameras, and Displays, 2nd edn. JCD Publishing& SPIE Press, USA
Holt CR (1987) Two-channel detectors for arbitrary linear channel distortion. IEEE Trans Acoust Speech Signal Process ASSP-35(3):267–273
Janesick JR (2001) Scientific charge-coupled devices, vol PM83. SPIE Press Monograph
Kay SM (1998) Fundamentals of statistical signal processing, vol I: Estimation Theory, vol II. Prentice Hall, Upper Saddle River, NJ
Kay SM (1998) Fundamentals of statistical signal processing, Detection Theory, vol II. Prentice Hall, Englewood Cliffs
Khanna N, Mikkilineni AK, Chiu GTC, Allebach JP, Delp EJ (2007) Forensic classification of imaging sensor types. In: Delp EJ, Wong PW (eds) Proceedings of SPIE electronic imaging, steganography, security, and watermarking of multimedia contents IX, vol 6505, pp U1–U9
Khanna N, Mikkilineni AK, Chiu GTC, Allebach JP, Delp EJ Scanner identification using sensor pattern noise. In: Delp EJ, Wong PW (eds) Proceedings of SPIE electronic imaging, security, steganography, and watermarking of multimedia contents IX, vol 6505
Kurosawa K, Kuroki K, Saitoh N (1999) CCD fingerprint method - identification of a video camera from videotaped images. In: Proceedings of IEEE international conference on image processing (ICIP), pp 537–540
Leung J, Chapman GH, Koren I, Koren Z (2008) Automatic detection of in-field defect growth in image sensors. In: DFT ’08: Proceedings of the 2008 IEEE international symposium on defect and fault tolerance of VLSI systems, IEEE Computer Society, Washington, DC, pp 305–313
Leung J, Chapman GH, Koren I, Koren Z (2009) Characterization of gain enhanced in-field defects in digital imagers. In: IEEE international symposium on defect and fault-tolerance in VLSI systems, pp 155–163
Leung J, Dudas J, Chapman GH, Koren I, Koren Z (2007) Quantitative analysis of in-field defects in image sensor arrays. In: 22nd IEEE international symposium on defect and fault-tolerance in VLSI systems, 2007. DFT ’07, pp 526–534
Li C-T (2009) Source camera identification using enhanced sensor pattern noise. In: Proceedings of IEEE ICIP, pp 7–11
Lukáš J, Fridrich J, Goljan M (2005) Determining digital image origin using sensor imperfections. In: Delp EJ, Wong PW (eds) Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents VII, San Jose, CA, pp 249–260
Lukáš J, Fridrich J, Goljan M (June 2006) Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1(2):205–214
Mao J, Bulan O, Sharma G, Datta S (2009) Device temporal forensics: an information theoretic approach. In: Proceedings of IEEE international conference on image processing (ICIP), vol 1
Mihcak MK, Kozintsev I, Ramchandran K, Moulin P (1999) Low-complexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Process Lett 6(12):300–303
Rosa AD, Uccheddu F, Costanzo A, Piva A, Barni M (2010) Exploring image dependencies: a new challange in image forensics. In: Memon N, Dittmann J, Alattar A (eds) Proceeedings of SPIE electronic media forensics and security XII, vol 7541, pp 0X-1–0X-12
Rosenfeld K, Sencar HT (2009) A study of the robustness of PRNU-based camera identification. In : Memon N, Dittmann J, Alattar A (eds) Proceedings of SPIE electronic imaging, steganography, security, and watermarking of multimedia contents XI, vol 7254, pp 0M–0N
Steinebach M, Liu H, Fan P, Katzenbeisser S (2010) Cell phone camera ballistics: attacks and countermeasures. In: Proceedings of SPIE, multimedia on mobile devices 2010, vol 7542, San Jose CA, pp 0B–0C
Sutcu Y, Bayram S, Sencar HT, Memon N (2007) Improvements on sensor noise based source camera identification. In: IEEE international conference on multimedia and expo, pp 24–27
Acknowledgments
The work on this chapter was partially supported by the NSF grant number CNF-0830528. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation there on. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of Air Force Office of Scientific Research or the U.S. Government. The author would like to thank Miroslav Goljan for useful discussions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Fridrich, J. (2013). Sensor Defects in Digital Image Forensic. In: Sencar, H., Memon, N. (eds) Digital Image Forensics. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0757-7_6
Download citation
DOI: https://doi.org/10.1007/978-1-4614-0757-7_6
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-0756-0
Online ISBN: 978-1-4614-0757-7
eBook Packages: EngineeringEngineering (R0)