Skip to main content
Log in

A study of co-occurrence based local features for camera model identification

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Camera model identification has great relevance for many forensic applications, and is receiving growing attention in the literature. Virtually all techniques rely on the traces left in the image by the long sequence of in-camera processes which are specific of each model. They differ in the prior assumptions, if any, and in how such evidence is gathered in expressive features. In this work we study a class of blind features, based on the analysis of the image residuals of all color bands. They are extracted locally, based on co-occurrence matrices of selected neighbors, and then used to train a classifier. A number of experiments are carried out on the well-known Dresden Image Database. Besides the full-knowledge case, where all models of interest are known in advance, other scenarios with more limited knowledge and partially corrupted images are also investigated. Experimental results show these features to provide a state-of-the-art performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Amerini I, Becarelli R, Bertini B, Caldelli R (2015) Acquisition source identification through a blind image classification. IET Image Process 9(4):329–337

    Article  Google Scholar 

  2. Avcibaş I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229

    Article  MathSciNet  Google Scholar 

  3. Bayram S, Sencar H, Memon N (2006) Improvements on source camera-model identification based on CFA. In: Advances in Digital Forensics II, IFIP international conference on digital Forensics, pp 289–299

  4. Bayram S, Sencar H, Memon N, Avcibas I (2005) Source camera identification based on CFA interpolation. In: IEEE Int. conference on image processing, pp 69–72

  5. Cao H, Kot A (2009) Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans Inf Forensics Secur 4(4):899–910

    Article  Google Scholar 

  6. Çeliktutan O, Sankur B, Avcibaş I (2008) Blind identification of source cell-phone model. IEEE Trans Inf Forensics Secur 3(3):553–566

    Article  Google Scholar 

  7. Chang CC, Lin CJ (2011) LIBSVM: A library for support vector machines. ACM Trans Intell Syst Technol 2:27:1–27:27. Software available at http://www.csie.ntu.edu.tw/cjlin/libsvm

    Article  Google Scholar 

  8. Chen C, Stamm M (2015) Camera model identification framework using an ensemble of demosaicing features. In: IEEE workshop on information forensics and security, pp 1–6

  9. Chen M, Fridrich J, Goljan M, Lukás J (2008) Determining image origin and integrity using sensor noise. IEEE Trans Inf Forensics Secur 3(1):74–90

    Article  Google Scholar 

  10. Chierchia G, Parrilli S, Poggi G, Sansone C, Verdoliva L (2010) On the influence of denoising in PRNU based forgery detection. In: 2nd ACM workshop on multimedia in forensics, security and intelligence, pp 117–122

  11. Chierchia G, Poggi G, Sansone C, Verdoliva L (2014) A Bayesian-MRF approach for PRNU-based image forgery detection. IEEE Trans Inf Forensics Secur 9 (4):554–567

    Article  Google Scholar 

  12. Cogranne R, Fridrich JJ (2015) Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory. IEEE Trans Inf Forensics Secur 10(12):2627–2642

    Article  Google Scholar 

  13. Costa F, Silva E, Eckmann M, Scheirer W, Rocha A (2014) Open set source camera attribution and device linking. Pattern Recogn Lett 39:92–101

    Article  Google Scholar 

  14. Cozzolino D, Gragnaniello D, Verdoliva L (2014) Image forgery detection through residual-based local descriptors and block-matching. In: IEEE conference on image processing (ICIP), pp 5297–5301

  15. Duda RO, Hart PE, Stork D (2001) Pattern Classification, 2nd edn. Wiley, New York

    MATH  Google Scholar 

  16. Fan N, Jin C, Huang Y (2006) Source camera identification by JPEG compression statistics for image forensics. In: TENCON, pp 1–4

  17. Filler T, Fridrich J, Goljan M (2008) Using sensor pattern noise for camera model identification. In: IEEE international conference on image processing, pp 1296–1299

  18. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7:868–882

    Article  Google Scholar 

  19. Galdi C, Nappi M, Dugelay JL (2015) Multimodal authentication on Smartphones: combining iris and sensor recognition for a double check of user identity. Pattern Recogn Lett

  20. Gloe T (2012) Feature-based forensic camera model identification. In: LNCS transactions on data hiding and multimedia security VIII, vol. 7228, pp 42–62

  21. Gloe T, Böhme R (2010) The Dresden image database for benchmarking digital image forensics. J Digital Forensic Practice 3(2–4):150–159

    Article  Google Scholar 

  22. Goljan M, Cogranne R, Fridrich J (2014) Rich model for steganalysis of color images. In: Sixth IEEE international workshop on information forensics and security

  23. Goljan M, Fridrich J (2015) CFA-aware features for steganalysis of color images. In: SPIE, electronic imaging, media watermarking, security and Forensics XVII, vol. 9409

  24. Goyal K, Panwar R, Khanna N (2014) Evaluation of iqms effectiveness for cell phone identification using captured videos and images. In: International conference on power, control and embedded systems, pp 1–6

  25. Gragnaniello D, Poggi G, Sansone C, Verdoliva L (2015) An investigation of local descriptors for biometric spoofing detection. IEEE Transactions on Information Forensics and Security 10(4):849–863

    Article  Google Scholar 

  26. Huang Y, Zhang J, Huang H (2015) Camera model identification with unknown models. IEEE Trans Inf Forensics Secur 10(12):2692–2704

    Article  Google Scholar 

  27. Kharrazi M, Sencar H, Memon N (2004) Blind source camera identification. In: IEEE international conference on image processing, pp 709–712

  28. Kirchner M, Fridrich J (2010) On detection of median filtering in images. In: SPIE, Electronic Imaging, Media Forensics and Security XII, pp 101–112

  29. Kirchner M, Gloe T (2015) Forensic camera model identification. In: Ho T, Li S (eds) Handbook of digital forensics of multimedia data and devices. Wiley-IEEE Press

  30. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444

    Article  Google Scholar 

  31. Lukàš J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205–214

    Article  Google Scholar 

  32. Lyu S, Farid H (2006) Steganalysis using higher-order image statistics. IEEE Trans Inf Forensics Secur 1(1):111–119

    Article  Google Scholar 

  33. Marra F, Poggi G, Sansone C, Verdoliva L (2015) Evaluation of residual-based local features for camera model identification. In: New trends in image analysis and processing – ICIAP 2015 Workshops, vol. 9281, pp 11–18

  34. Mihcak M, Kozintsev I, Ramchandran K (1999) Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. In: IEEE international conference on acoustics, speech and signal processing, pp 3253–3256

  35. Ojala T, Pietikäinen M, Mäenpää T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987

    Article  MATH  Google Scholar 

  36. Pevnỳ T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224

    Article  Google Scholar 

  37. Popescu A, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758–767

    Article  MathSciNet  Google Scholar 

  38. Qiu X, Li H, Luo W, Huang J (2014) A universal image forensic strategy based on steganalytic model. In: ACM Workshop on Information Hiding and Multimedia Security, pp 165–170

  39. Razzazi F, Seyedabadi A (2014) A robust feature for single image camera identification using local binary patterns. In: IEEE International Symposium on Signal Processing and Information Technology, pp 462–467

  40. Sandoval Orozco AL, Corripio JR, Garcia Villalba LJ, Hernandez Castro JC (2015) Image source acquisition identification of mobile devices based on the use of features. Multi Tools Appl

  41. Shi Y, Chen C, Xuan G, Su W (2008) Steganalysis versus splicing detection. In: International workshop on digital-forensics and watermarking, pp 158–172

  42. Swaminathan A, Wu M, Liu KJR (2007) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 2(1):91–105

    Article  Google Scholar 

  43. Thai T, Cogranne R, Retraint F (2014) Camera model identification based on the heteroscedastic noise model. IEEE Trans Image Process 23(1):250–263

    Article  MathSciNet  Google Scholar 

  44. Thai T, Retraint F, Cogranne R (2015) Camera model identification based on DCT coefficient statistics. Digital Signal Process 4:88–100

    Article  MathSciNet  Google Scholar 

  45. Tuama A, Comby F, Chaumont M (2015) Source camera model identification using features from contaminated sensor noise. In: International Workshop on Digital-forensics and Watermarking

  46. Van L, Emmanuel S, Kankanhalli M (2007) Identifying source cell phone using chromatic aberration. In: IEEE international conference on multimedia and expo, pp 883–886

  47. Verdoliva L, Cozzolino D, Poggi G (2014) A feature-based approach for image tampering detection and localization. In: IEEE Workshop on Information Forensics and Security, pp 149–154

  48. Xu G, Gaon S, Shi Y, Hu R, Su W (2009) Camera-model identification using markovian transition probability matrix. In: Digital watermarking, LNCS, vol. 5703, pp 294–307

  49. Xu G, Shi Y (2012) Camera model identification using local binary patterns. In: IEEE international conference on multimedia and expo, pp 392–397

Download references

Acknowledgment

This work was partially funded by the Italian Ministry of Education, University and Research (MIUR) within the framework of the project PAC02L1_00050 AETERNUUM.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giovanni Poggi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Marra, F., Poggi, G., Sansone, C. et al. A study of co-occurrence based local features for camera model identification. Multimed Tools Appl 76, 4765–4781 (2017). https://doi.org/10.1007/s11042-016-3663-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3663-0

Keywords

Navigation