Overview of State-of-the-Art in Digital Image Forensics——Image Source Identification Author: H. T. SENCAR and N. MEMON Reporter: Yao Ge 1 Motivation 1/2 • In today’s digital age, the creation and manipulation of digital images is made simple by low-cost hardware and software tools. • As a result, we are rapidly reaching a situation where one can no longer take the authenticity and integrity of digital images for granted (and more) . 2 Motivation 2/2 • The Image Forensics can help us to evaluate the reality and integrity of a given digital image • Eg. evidence • One of the most popular research directions is Image Source Identification (ISI) What is Image Source Identification (ISI)? • Purpose – To identify the characteristics of digital data acquisition device (e.g. Digital camera) • Aspects: – Source mode Identification – Individual Source Identification 4 Image Acquisition Pipeline 1/3 Lens Filter(s) Color Filter Array Sensor Camera Processing 5 Image Acquisition Pipeline 2/3 • Lens system – composed of a lens and the mechanisms to control exposure, focusing, and image stabilization to collect and control the light from the scene. • Filters – includes the infra-red and anti-aliasing filters to ensure maximum visible quality. • Image sensor – An image sensor is an array of rows and columns of photodiode elements, or pixels. When light strikes the pixel array, each pixel generates an analog signal proportional to the intensity of light, which is then converted to digital signal and processed by the DIP. • CFA – Since the sensor pixels are not sensitive to color, to produce a color image, a color filter array (CFA) is used in front of the sensor so that each pixel records the light intensity for a single color only. Image Acquisition Pipeline 3/3 • DIP – The output from the sensor with a Bayer (RGB) filter (assume) is a mosaic of red, green and blue pixels of different intensities. Each pixel contains the information of only one color. The digital image processor implements interpolation (demosaicing) algorithms to recover the missing information of the other two colors for each pixel. – The DIP also performs further processing such as white balancing, noise reduction, matrix manipulation, image sharpening, aperture correction, and gamma correction to produce a good quality image. Source Model Identification • Image Features • CFA and Demosaicing Artifacts • Lens Distortions Image Features 1/4 • Principle – Features extracting + Classifiers (criterion) training procedure Images (Model 1) features Images (Model 2) features Images (Model 3) features classifer testing procedure classifer Test Image (Model ?) features Model 1 Model 2 Model 3 9 Image Features 2/4 • E.g. – Defines a set of 34 features inspired by universal steganalysis techniques – Features: Color features, wavelet coefficient statistics, image quality metrics *M. Kharrazi, H. T. Sencar, and N. Memon, Blind Source Camera Identification, Proc. of IEEE ICIP (2004) Image Features 3/4 • Experimental Results – 2 cameras case (average accuracy=98.73%) – 5 cameras case (average accuracy=88.02%) *M. Kharrazi, H. T. Sencar, and N. Memon, Blind Source Camera Identification, Proc. of IEEE ICIP (2004) Image Features 4/4 • Weakness – an overall decision. What specific features contribute much during the process are still unknown – this method may not give a satisfactory result with the increasing of the number of cameras • Conclusion – this approach is more suitable as a pre-processing technique to cluster images taken by cameras with similar components and processing algorithms *M. Kharrazi, H. T. Sencar, and N. Memon, Blind Source Camera Identification, Proc. of IEEE ICIP (2004) CFA and Demosaicing Artifacts 1/7 • Choice of CFA Bayer Pattern (RGB) CMYK • Demosaicing 13 CFA and Demosaicing Artifacts 2/7 • Principle – As the interpolation algorithms differ from each other in different camera models. • E.g. – The author uses the outputs of Expectation/Maximization (EM) algorithm as features to detect different interpolation. S. Bayram, H. T. Sencar and N. Memon, Source Camera Identification Based on CFA Interpolation, Proc. of IEEE ICIP (2005) 14 CFA and Demosaicing Artifacts 3/7 • Expectation/Maximization (EM) Algorithm – EM algorithm is originally used to detect whether a signal has been re-sampled or not. – It generates two outputs • The probability map. The value of each point on the probability map indicates the probability that the point is correlated with its neighbors. • The estimate of the weighting coefficients which represent the amount of contribution from each pixel in the interpolation kernel. S. Bayram, H. T. Sencar and N. Memon, Source Camera Identification Based on CFA Interpolation, Proc. of IEEE ICIP (2005) CFA and Demosaicing Artifacts 4/7 • several examples of the periodic patterns that emerged due to re-sampling S. Bayram, H. T. Sencar and N. Memon, Source Camera Identification Based on CFA Interpolation, Proc. of IEEE ICIP (2005) CFA and Demosaicing Artifacts 5/7 • Frequency spectrum of probability maps obtained by three types of digital cameras S. Bayram, H. T. Sencar and N. Memon, Source Camera Identification Based on CFA Interpolation, Proc. of IEEE ICIP (2005) CFA and Demosaicing Artifacts 6/7 • Experimental results – The set of weighting coefficients obtained from an image, and the peak location and magnitudes in frequency spectrum are used as features. An SVM classifier is used. S. Bayram, H. T. Sencar and N. Memon, Source Camera Identification Based on CFA Interpolation, Proc. of IEEE ICIP (2005) CFA and Demosaicing Artifacts 7/7 S. Bayram, H. T. Sencar and N. Memon, Source Camera Identification Based on CFA Interpolation, Proc. of IEEE ICIP (2005) Lens Distortions Radial distortion Rectified Image • Radial distortion is due to the change in the image magnification with increasing distance from the optical axis • Compensation for radial distortion induces unique artifacts in the images • Choi et al. introduces a second order radial symmetric distortion model – Model parameters are used as classification features – Accuracy ~91% K. S. Choi, E. Y. Lam and K. K. Y. Wong, Source Camera Identification Using Footprints from Lens Aberration, Proc. of SPIE (2006). 20 Conclusion • Even the initial experiment results of previous methods are encouraging, some technique limitation still exist in different real situation. • There is a long distance to achieve the application level. Thank you! Dec. 2008
© Copyright 2026 Paperzz