access icon free Acquisition source identification through a blind image classification

Image forensics, besides understanding if a digital image has been forged, often aims at determining information about image origin. In particular, it could be worthy to individuate which is the kind of source (digital camera, scanner or computer graphics software) that has generated a certain photo. Such an issue has already been studied in literature, but the problem of doing that in a blind manner has not been faced so far. It is easy to understand that in many application scenarios information at disposal is usually very limited; this is the case when, given a set of L images, the authors want to establish if they belong to K different classes of acquisition sources, without having any previous knowledge about the number of specific types of generation processes. The proposed system is able, in an unsupervised and fast manner, to blindly classify a group of photos without neither any initial information about their membership nor by resorting at a trained classifier. Experimental results have been carried out to verify actual performances of the proposed methodology and a comparative analysis with two SVM-based clustering techniques has been performed too.

Inspec keywords: pattern clustering; image classification; image forensics

Other keywords: image forensics; acquisition source identification; SVM-based clustering techniques; generation processes; blind image classification; image origin; digital image; acquisition sources; initial information

Subjects: Optical, image and video signal processing; Computer vision and image processing techniques

References

    1. 1)
      • 12. Liu, B.B., Lee, H.-K., Hu, Y., Choi, C.-H.: ‘On classification of source cameras: A graph based approach, in: Information Forensics and Security (WIFS)’. 2010 IEEE Int. Workshop on, 2010, pp. 15.
    2. 2)
      • 14. Zhang, R., Wang, R.-D., Ng, T.-T.: ‘Distinguishing photographic images and photorealistic computer graphics using visual vocabulary on local image edges’, in Shi, Y., Kim, H.-J., Perez-Gonzalez, F. (Eds.): ‘Digital forensics and watermarking, Vol. 7128 of lecture notes in computer science’ (Springer, Berlin Heidelberg, 2012), pp. 292305.
    3. 3)
      • 13. Pan, F., Huang, J.: ‘Discriminating computer graphics images and natural images using hidden markov tree model’, in Kim, H.-J., Shi, Y., Barni, M. (Eds.): ‘Digital watermarking, Vol. 6526 of Lecture Notes in Computer Science’ (Springer, Berlin Heidelberg, 2011), pp. 2328.
    4. 4)
      • 15. Farid, H.: ‘Creating and detecting doctored and virtual images: Implications to the child pornography prevention act’, Technical Report, 2004.
    5. 5)
      • 4. McKay, C., Swaminathan, A., Gou, H., Wu, M.: ‘Image acquisition forensics: Forensic analysis to identify imaging source’. ICASSP'08, 2008, pp. 16571660.
    6. 6)
    7. 7)
    8. 8)
      • 3. Khanna, N., Chiu, G.T.-C., Allebach, J.P., Delp, E.J.: ‘Forensic techniques for classifying scanner, computer generated and digital camera images’, Proc. IEEE ICASSP, Las Vegas, NV, USA, March 2008, pp. 16531656.
    9. 9)
      • 17. Mihcak, M., Kozintsev, I., Ramchandran, K.: ‘Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising’. ICASSP, IEEE Int. Conf. on Acoustics, Speech and Signal Processing Proc., 1999, vol. 6, pp. 32533256.
    10. 10)
      • 11. Caldelli, R., Amerini, I., Picchioni, F., Innocenti, M.: ‘Fast image clustering of unknown source images, in: Information Forensics and Security (WIFS)’. 2010 IEEE Int. Workshop on’, 2010, pp. 15.
    11. 11)
    12. 12)
      • 18. Kaufman, L., Rousseeuw, P.: ‘Finding groups in data an introduction to cluster analysis’ (Wiley Interscience, New York, 1990).
    13. 13)
    14. 14)
    15. 15)
      • 9. Khanna, N., Mikkilineni, A.K., Martone, A.F., et al: ‘A survey of forensic characterisation methods for physical devices, Digital Investigation 3’. Proc. Sixth Annual Digital Forensic Research Workshop (DFRWS’06), 2006, pp. 1728.
    16. 16)
      • 2. Mahdian, B., Saic, S.: ‘A bibliography on blind methods for identifying image forgery’, Signal Process.: Image Commun., 2010, 25, (6), pp. 389399.
    17. 17)
    18. 18)
      • 10. Li, C.-T.: ‘Unsupervised classification of digital images enhanced sensor pattern noise’. IEEE Int. Symp. on Circuits and Systems (ISCAS'10), 2010.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2014.0316
Loading

Related content

content/journals/10.1049/iet-ipr.2014.0316
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading