Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Image provenance inference through content-based device fingerprint analysis

Image provenance inference through content-based device fingerprint analysis

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Information Security: Foundations, Technologies and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

We have introduced different intrinsic device fingerprints and their applications in image provenance inference. Although with varying levels of accuracy, the device fingerprints arising from optical aberration, CFA interpolation, CRF, and in-device image compression are effective in differentiating devices of different brands or models. Although they cannot uniquely identify the source device of an image, they do provide useful information about the image provenance and are effective at narrowing down the image source to a smaller set of possible devices. More than half of the chapter was spent on SPN, which is the only fingerprint that distinguishes devices of the same model. Because of its merits, such as the uniqueness to individual device and the robustness against common image operations, it has attracted much attention from researches and been successfully used for source device identification, device linking, source-oriented image clustering, and image forgery detection. In spite of the effectiveness of SPN, it is by nature a very weak signal and may have been contaminated by image content and other interferences. Its successful application requires jointly processing a large number of pixels, which results in very high dimensionality of SPN. This may bring huge difficulties in practice, e.g., in large-scale source-oriented image clustering based on SPN, so it is essential to conduct research on the compact representation of SPN for fast search and clustering.

Chapter Contents:

  • 12.1 Introduction
  • 12.2 Why not digital watermark?
  • 12.3 Why not metadata?
  • 12.4 Device fingerprints
  • 12.4.1 Optical aberrations
  • 12.4.2 CFA and demosaicing
  • 12.4.3 Camera response function
  • 12.4.4 Quantization table
  • 12.4.5 Image thumbnail
  • 12.5 Sensor pattern noise
  • 12.5.1 Estimation of SPN
  • 12.5.2 Source device identification
  • 12.5.3 Device linking
  • 12.5.4 Source-oriented image clustering
  • 12.5.5 Image forgery detection
  • 12.6 Summary and outlook
  • References

Inspec keywords: interpolation; data compression; image coding; aberrations

Other keywords: device linking; source device identification; optical aberration; in-device image compression; CFA interpolation; image provenance inference; image forgery detection; CRF; device fingerprints; source-oriented image clustering; SPN; content-based device fingerprint analysis

Subjects: Interpolation and function approximation (numerical analysis); Interpolation and function approximation (numerical analysis); Image and video coding; Computer vision and image processing techniques

Preview this chapter:
Zoom in
Zoomout

Image provenance inference through content-based device fingerprint analysis, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch12-1.gif /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch12-2.gif

Related content

content/books/10.1049/pbse001e_ch12
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address