Browse > Article
http://dx.doi.org/10.3837/tiis.2015.12.019

Classifier Combination Based Source Identification for Cell Phone Images  

Wang, Bo (School of Information and Communication Engineering, Dalian University of Technology Dalian)
Tan, Yue (School of Information and Communication Engineering, Dalian University of Technology Dalian)
Zhao, Meijuan (School of Information and Communication Engineering, Dalian University of Technology Dalian)
Guo, Yanqing (School of Information and Communication Engineering, Dalian University of Technology Dalian)
Kong, Xiangwei (School of Information and Communication Engineering, Dalian University of Technology Dalian)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.12, 2015 , pp. 5087-5102 More about this Journal
Abstract
Rapid popularization of smart cell phone equipped with camera has led to a number of new legal and criminal problems related to multimedia such as digital image, which makes cell phone source identification an important branch of digital image forensics. This paper proposes a classifier combination based source identification strategy for cell phone images. To identify the outlier cell phone models of the training sets in multi-class classifier, a one-class classifier is orderly used in the framework. Feature vectors including color filter array (CFA) interpolation coefficients estimation and multi-feature fusion is employed to verify the effectiveness of the classifier combination strategy. Experimental results demonstrate that for different feature sets, our method presents high accuracy of source identification both for the cell phone in the training sets and the outliers.
Keywords
Image forensics; cell phone source identification; classifier combination; interpolation coefficient;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Y. Long, Y. Huang, “Image based source camera identification using demosaicking,” in Proc. of IEEE 8th Workshop on Multimedia Signal Processing, pp.419-424, October 4-6, 2006. Article (CrossRef Link)
2 S. Lyu, H. Farid, “How realistic is photorealistic?” IEEE Transaction on Signal Processing, vol. 53, no. 2, pp. 845-850, February, 2005. Article (CrossRef Link)   DOI
3 P. Pudil, J. Ferri, J. Novovicova, “Floating search methods for feature selection with nonmonotonic criterion functions,” in Proc. of 12th International Conference on Pattern Recognition, pp. 279-283, October 9-13, 1994. Article (CrossRef Link)
4 B. E. Boser, I. Guyon, V. Vapnik, “A training algorithm for optimal margin classifiers,” in Proc. of the Fifth Annual Workshop on Computational Learning Theory, pp. 144-152, 1992. Article (CrossRef Link)
5 B. Schölkopf, J. C. Platt, J. S. Taylor, A. J. Smola, R. C. Williamson, “Estimating the support of a high-dimensional distribution,” Neural Computation, vol. 13, no. 7, pp. 1443-1471, July, 2001. Article (CrossRef Link)   DOI
6 S. Bayram, H. Sencar, N. Memon, “Identifying digital cameras using CFA interpolation,” in Proc. of IFIP WG 11.9 International Conference on Digital Forensics, 2006. Article (CrossRef Link)
7 A. Swaminathan, W. Min, K. J. R. Liu, “Non-intrusive forensic analysis of visual sensors using output images,” inProc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. V-V, May 14-19, 2006. Article (CrossRef Link)
8 I. Avcıbaş, N. Memon, B. Sankur, “Steganalysis using image quality metrics,” IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 221-229, February, 2003. Article (CrossRef Link)   DOI
9 A. Swaminathan, W. Min, K.J.R. Liu, “Nonintrusive component forensics of visual sensors using output images,” IEEE Transaction on Information Forensics and Security, vol. 2, no. 1, pp. 91-106, March, 2007. Article (CrossRef Link)   DOI
10 J. Park, J. Chong, “Edge-preserving Demosaicing method for digital cameras with bayer-like W-RGB color filter array,” KSII Transaction on Internet and Information Systems, vol. 8, no. 3, pp. 1011-1025, March, 2014. Article (CrossRef Link)   DOI
11 D. Sung, H. Tsao, “Demosaicing using subband-based classifiers,” Electronics Letters, vol. 51, no. 3, pp. 228-330, February, 2015. Article (CrossRef Link)   DOI
12 Y. Li, B. Wang, X. Kong, Y. Guo, “Image tampering detection using no-reference image quality metrics,” Journal of Harbin Institute of Technology, vol. 21, no. 6, pp. 51-56, 2014. Article (CrossRef Link)
13 X. Sun, L. Dong, B. Wang, X. Kong, X. You, “Source Cell-phone Identification Based on Multi-feature Fusion,” in Proc. of International Conference on Image Processing, Computer Vision, and Pattern Recognition, pp. 590-596, 2010. Article (CrossRef Link)
14 V. Lanh, S. Emmanuel, M. S. Kankanhalli, “Identifying source cell phone using chromatic aberration,” in Proc. of IEEE International Conference on Multimedia and Expo, pp. 883-886, July 2-5, 2007. Article (CrossRef Link)
15 W. Chuang, W. Min, “Semi non-intrusive training for cell-phone camera model linkage,” in Proc. of IEEE International Workshop on Information Forensics and Security, pp. 1-6, December 12-15, 2010. Article (CrossRef Link)
16 K. S. Choi, E. Y. Lam, K. Y. Wong, “Automatic source camera identification using the intrinsic lens radial distortion,” Optics Express, vol.14, no. 24, pp. 11551-11565, 2006. Article (CrossRef Link)   DOI
17 F. Meng, X. Kong, X. You, “A new feature-based method for source camera identification,” in Proc. of IFIP WG 11.9 International Conference on Digital Forensics, pp.702-705, September 12-14, 2008. Article (CrossRef Link)
18 G. Gökhan, I. Avcibas, “Source cell phone camera identification based on singular value decomposition,” in Proc. of IEEE International Workshop on Information Forensics and Security, pp. 171-175, December 6-9, 2009. Article (CrossRef Link)
19 M. Kharrazi, H. Sencar, N. Memon, “Blind source camera identification,” in Proc. of IEEE International Conference on Image Processing, October 24-27, pp. 709-712, 2004. Article (CrossRef Link)
20 S. Bayram, H. Sencar, N. Memon, I. Avcibas, “Source camera identification based on CFA interpolation,” in Proc. of IEEE International Conference on Image Processing, pp. 69-72, September 11-14, 2005. Article (CrossRef Link)
21 J. Lukáš, J Fridrich, M. Goljan, “Digital “bullet scratches” for images,” in Proc. of IEEE International Conference on Image Processing, pp.III-65-68, September 11-14, 2005. Article (CrossRef Link)
22 J. Fridrich. “Digital image forensic using sensor noise,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 26-37, 2009. Article (CrossRef Link)   DOI
23 M. Steinebach, M. Ouariachi, H. Liu, S. Katzenbeisser, "Cell phone camera ballistics: attacks and countermeasures," in Proc. of Electronic Imaging, Multimedia on Mobile Devices, vol.7542, pp. B1-9, January, 2010. Article (CrossRef Link)
24 O. Celiktutan, I. Avcibas, B. Sankur, N. P. Ayerden, C. Capar, “Source cell-phone identification,” in Proc. of IEEE 14th Signal Processing and Communications Applications, pp. 1-3, April 17-19, 2006. Article (CrossRef Link)
25 O. Celiktutan, B. Sankur, I. Avcibas, “Blind identification of source cell-phone model,” IEEE Transaction on Information Forensics and Security, vol. 3, no. 3, pp. 553-566, August, 2008. Article (CrossRef Link)   DOI
26 M. Steinebach, M. Ouariachi, H. Liu, S. Katzenbeisser, “On the reliability of cell phone camera fingerprint recognition,” Ditital Forensics and Cyber Crime, pp. 69-76, September 30-October 2, 2009. Article (CrossRef Link)
27 X. Kang, Y. Li, Z. Qu, J. Huang, “Enhancing source camera identification performance with a camera reference phase sensor pattern noise,” IEEE Transaction on Information Forensics and Security, vol. 7, no. 2, pp. 393-402, March, 2012. Article (CrossRef Link)   DOI
28 M. Tsai, C. Wang, J. Liu, J. Yin, “Using decision fusion of feature selection in digital forensics for camera source model identification,” Computer Standards & Interfaces, vol. 34, no. 3 pp. 292-304, March, 2012. Article (CrossRef Link)   DOI
29 http://www.idc.com/getdoc.jsp?containerId=prUS24645514
30 H. Farid, “Digital image forensics,” Scientific American, vol. 6, no. 298, pp. 66-71, 2008. Article (CrossRef Link)   DOI
31 A. Swanminathan, M. Wu, K. J. R. Liu, “Nonintrusive component forensics of visual sensors using output images,” IEEE Transaction on Information Forensics and Security, vol. 2, no. 1, pp. 91-106, March, 2007. Article (CrossRef Link)   DOI