Abstract
Camera model identification has great relevance for many forensic applications, and is receiving growing attention in the literature. Virtually all techniques rely on the traces left in the image by the long sequence of in-camera processes which are specific of each model. They differ in the prior assumptions, if any, and in how such evidence is gathered in expressive features. In this work we study a class of blind features, based on the analysis of the image residuals of all color bands. They are extracted locally, based on co-occurrence matrices of selected neighbors, and then used to train a classifier. A number of experiments are carried out on the well-known Dresden Image Database. Besides the full-knowledge case, where all models of interest are known in advance, other scenarios with more limited knowledge and partially corrupted images are also investigated. Experimental results show these features to provide a state-of-the-art performance.
Similar content being viewed by others
References
Amerini I, Becarelli R, Bertini B, Caldelli R (2015) Acquisition source identification through a blind image classification. IET Image Process 9(4):329–337
Avcibaş I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229
Bayram S, Sencar H, Memon N (2006) Improvements on source camera-model identification based on CFA. In: Advances in Digital Forensics II, IFIP international conference on digital Forensics, pp 289–299
Bayram S, Sencar H, Memon N, Avcibas I (2005) Source camera identification based on CFA interpolation. In: IEEE Int. conference on image processing, pp 69–72
Cao H, Kot A (2009) Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans Inf Forensics Secur 4(4):899–910
Çeliktutan O, Sankur B, Avcibaş I (2008) Blind identification of source cell-phone model. IEEE Trans Inf Forensics Secur 3(3):553–566
Chang CC, Lin CJ (2011) LIBSVM: A library for support vector machines. ACM Trans Intell Syst Technol 2:27:1–27:27. Software available at http://www.csie.ntu.edu.tw/cjlin/libsvm
Chen C, Stamm M (2015) Camera model identification framework using an ensemble of demosaicing features. In: IEEE workshop on information forensics and security, pp 1–6
Chen M, Fridrich J, Goljan M, Lukás J (2008) Determining image origin and integrity using sensor noise. IEEE Trans Inf Forensics Secur 3(1):74–90
Chierchia G, Parrilli S, Poggi G, Sansone C, Verdoliva L (2010) On the influence of denoising in PRNU based forgery detection. In: 2nd ACM workshop on multimedia in forensics, security and intelligence, pp 117–122
Chierchia G, Poggi G, Sansone C, Verdoliva L (2014) A Bayesian-MRF approach for PRNU-based image forgery detection. IEEE Trans Inf Forensics Secur 9 (4):554–567
Cogranne R, Fridrich JJ (2015) Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory. IEEE Trans Inf Forensics Secur 10(12):2627–2642
Costa F, Silva E, Eckmann M, Scheirer W, Rocha A (2014) Open set source camera attribution and device linking. Pattern Recogn Lett 39:92–101
Cozzolino D, Gragnaniello D, Verdoliva L (2014) Image forgery detection through residual-based local descriptors and block-matching. In: IEEE conference on image processing (ICIP), pp 5297–5301
Duda RO, Hart PE, Stork D (2001) Pattern Classification, 2nd edn. Wiley, New York
Fan N, ** C, Huang Y (2006) Source camera identification by JPEG compression statistics for image forensics. In: TENCON, pp 1–4
Filler T, Fridrich J, Goljan M (2008) Using sensor pattern noise for camera model identification. In: IEEE international conference on image processing, pp 1296–1299
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7:868–882
Galdi C, Nappi M, Dugelay JL (2015) Multimodal authentication on Smartphones: combining iris and sensor recognition for a double check of user identity. Pattern Recogn Lett
Gloe T (2012) Feature-based forensic camera model identification. In: LNCS transactions on data hiding and multimedia security VIII, vol. 7228, pp 42–62
Gloe T, Böhme R (2010) The Dresden image database for benchmarking digital image forensics. J Digital Forensic Practice 3(2–4):150–159
Goljan M, Cogranne R, Fridrich J (2014) Rich model for steganalysis of color images. In: Sixth IEEE international workshop on information forensics and security
Goljan M, Fridrich J (2015) CFA-aware features for steganalysis of color images. In: SPIE, electronic imaging, media watermarking, security and Forensics XVII, vol. 9409
Goyal K, Panwar R, Khanna N (2014) Evaluation of iqms effectiveness for cell phone identification using captured videos and images. In: International conference on power, control and embedded systems, pp 1–6
Gragnaniello D, Poggi G, Sansone C, Verdoliva L (2015) An investigation of local descriptors for biometric spoofing detection. IEEE Transactions on Information Forensics and Security 10(4):849–863
Huang Y, Zhang J, Huang H (2015) Camera model identification with unknown models. IEEE Trans Inf Forensics Secur 10(12):2692–2704
Kharrazi M, Sencar H, Memon N (2004) Blind source camera identification. In: IEEE international conference on image processing, pp 709–712
Kirchner M, Fridrich J (2010) On detection of median filtering in images. In: SPIE, Electronic Imaging, Media Forensics and Security XII, pp 101–112
Kirchner M, Gloe T (2015) Forensic camera model identification. In: Ho T, Li S (eds) Handbook of digital forensics of multimedia data and devices. Wiley-IEEE Press
Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444
Lukàš J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205–214
Lyu S, Farid H (2006) Steganalysis using higher-order image statistics. IEEE Trans Inf Forensics Secur 1(1):111–119
Marra F, Poggi G, Sansone C, Verdoliva L (2015) Evaluation of residual-based local features for camera model identification. In: New trends in image analysis and processing – ICIAP 2015 Workshops, vol. 9281, pp 11–18
Mihcak M, Kozintsev I, Ramchandran K (1999) Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. In: IEEE international conference on acoustics, speech and signal processing, pp 3253–3256
Ojala T, Pietikäinen M, Mäenpää T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987
Pevnỳ T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224
Popescu A, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758–767
Qiu X, Li H, Luo W, Huang J (2014) A universal image forensic strategy based on steganalytic model. In: ACM Workshop on Information Hiding and Multimedia Security, pp 165–170
Razzazi F, Seyedabadi A (2014) A robust feature for single image camera identification using local binary patterns. In: IEEE International Symposium on Signal Processing and Information Technology, pp 462–467
Sandoval Orozco AL, Corripio JR, Garcia Villalba LJ, Hernandez Castro JC (2015) Image source acquisition identification of mobile devices based on the use of features. Multi Tools Appl
Shi Y, Chen C, Xuan G, Su W (2008) Steganalysis versus splicing detection. In: International workshop on digital-forensics and watermarking, pp 158–172
Swaminathan A, Wu M, Liu KJR (2007) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 2(1):91–105
Thai T, Cogranne R, Retraint F (2014) Camera model identification based on the heteroscedastic noise model. IEEE Trans Image Process 23(1):250–263
Thai T, Retraint F, Cogranne R (2015) Camera model identification based on DCT coefficient statistics. Digital Signal Process 4:88–100
Tuama A, Comby F, Chaumont M (2015) Source camera model identification using features from contaminated sensor noise. In: International Workshop on Digital-forensics and Watermarking
Van L, Emmanuel S, Kankanhalli M (2007) Identifying source cell phone using chromatic aberration. In: IEEE international conference on multimedia and expo, pp 883–886
Verdoliva L, Cozzolino D, Poggi G (2014) A feature-based approach for image tampering detection and localization. In: IEEE Workshop on Information Forensics and Security, pp 149–154
Xu G, Gaon S, Shi Y, Hu R, Su W (2009) Camera-model identification using markovian transition probability matrix. In: Digital watermarking, LNCS, vol. 5703, pp 294–307
Xu G, Shi Y (2012) Camera model identification using local binary patterns. In: IEEE international conference on multimedia and expo, pp 392–397
Acknowledgment
This work was partially funded by the Italian Ministry of Education, University and Research (MIUR) within the framework of the project PAC02L1_00050 AETERNUUM.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Marra, F., Poggi, G., Sansone, C. et al. A study of co-occurrence based local features for camera model identification. Multimed Tools Appl 76, 4765–4781 (2017). https://doi.org/10.1007/s11042-016-3663-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3663-0