Camera-Model Identification Using Markovian Transition Probability Matrix

  • Guanshuo Xu
  • Shang Gao
  • Yun Qing Shi
  • RuiMin Hu
  • Wei Su
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5703)

Abstract

Detecting the (brands and) models of digital cameras from given digital images has become a popular research topic in the field of digital forensics. As most of images are JPEG compressed before they are output from cameras, we propose to use an effective image statistical model to characterize the difference JPEG 2-D arrays of Y and Cb components from the JPEG images taken by various camera models. Specifically, the transition probability matrices derived from four different directional Markov processes applied to the image difference JPEG 2-D arrays are used to identify statistical difference caused by image formation pipelines inside different camera models. All elements of the transition probability matrices, after a thresholding technique, are directly used as features for classification purpose. Multi-class support vector machines (SVM) are used as the classification tool. The effectiveness of our proposed statistical model is demonstrated by large-scale experimental results.

Keywords

Camera Identification Markov Process Transition Probability Matrix 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Choi, K.S., Lam, E.Y., Wong, K.K.Y.: Source Camera Identification Using Footprints from Lens Aberration. In: Proc. of SPIE, pp. 172–179 (2006)Google Scholar
  2. 2.
    Filler, T., Fridrich, J., Goljan, M.: Using Sensor Pattern Noise for Camera Model Identification. In: Proc. of ICIP, pp. 1296–1299 (2008)Google Scholar
  3. 3.
    Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1(2), 205–214 (2006)CrossRefGoogle Scholar
  4. 4.
    Swaminathan, A., Wu, M., Ray Liu, K.J.: Non-Intrusive Forensics Analysis of Visual Sensors Using Output Images. In: Proc. of ICASSP, pp. 401–404 (2006)Google Scholar
  5. 5.
    Long, Y., Huang, Y.: Image Based Source Camera Identification Using Demosaicing. In: Proc. of IEEE MMSP, pp. 419–424 (2006)Google Scholar
  6. 6.
    Bayram, S., Sencar, H.T., Memon, N.: Improvements on Source Camera-Model Identification Based on CFA Interpolation. In: Proc. of WG 11.9 Int. Conf. on Digital Forensics (2006)Google Scholar
  7. 7.
    Choi, K.S., Lam, E.Y., Wong, K.K.Y.: Source Camera Identification by JPEG Compression Statistics for Image Forensics. In: TENCON, pp. 1–4 (2006)Google Scholar
  8. 8.
    Kharrazi, M., Sencar, H.T., Memon, N.: Blind Source Camera Identification. In: Proc. of IEEE ICIP, pp. 709–712 (2004)Google Scholar
  9. 9.
    Farid, H.: Digital image ballistics from JPEG quantization. Technical Report TR2006-583, Department of Computer Science, Dartmouth College (2006)Google Scholar
  10. 10.
    Arnia, F., Fujiyoshi, M., Kiya, H.: The use of DCT coefficient sign for content-based copy detection. In: International Symposium on Communications and Information Technologies, pp. 1476–1481 (2007)Google Scholar
  11. 11.
    Tu, C., Tran, T.D.: Context-based entropy coding of block transform coefficients for image compression. IEEE Transactions on Image Processing 11(11), 1271–1283 (2002)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Shi, Y.Q., Chen, C., Chen, W.: A Markov Process Based Approach to Effective Attacking JPEG Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    Leon-Garcia, A.: Probability and random processes for electrical engineering, 2nd edn. Addison-Wesley Publishing Company, Reading (1994)MATHGoogle Scholar
  14. 14.
    Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/unicode/~cjlin/libsvm.

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Guanshuo Xu
    • 1
  • Shang Gao
    • 1
    • 2
  • Yun Qing Shi
    • 1
  • RuiMin Hu
    • 2
  • Wei Su
    • 3
  1. 1.New Jersey Institute of TechnologyNewarkUSA
  2. 2.Wuhan UniversityWuhan, HubeiChina
  3. 3.US Army CERDECFort Monmouth

Personalised recommendations