Classifier Combination Based Source Identification for Cell Phone Images |
Wang, Bo
(School of Information and Communication Engineering, Dalian University of Technology Dalian)
Tan, Yue (School of Information and Communication Engineering, Dalian University of Technology Dalian) Zhao, Meijuan (School of Information and Communication Engineering, Dalian University of Technology Dalian) Guo, Yanqing (School of Information and Communication Engineering, Dalian University of Technology Dalian) Kong, Xiangwei (School of Information and Communication Engineering, Dalian University of Technology Dalian) |
1 | Y. Long, Y. Huang, “Image based source camera identification using demosaicking,” in Proc. of IEEE 8th Workshop on Multimedia Signal Processing, pp.419-424, October 4-6, 2006. Article (CrossRef Link) |
2 | S. Lyu, H. Farid, “How realistic is photorealistic?” IEEE Transaction on Signal Processing, vol. 53, no. 2, pp. 845-850, February, 2005. Article (CrossRef Link) DOI |
3 | P. Pudil, J. Ferri, J. Novovicova, “Floating search methods for feature selection with nonmonotonic criterion functions,” in Proc. of 12th International Conference on Pattern Recognition, pp. 279-283, October 9-13, 1994. Article (CrossRef Link) |
4 | B. E. Boser, I. Guyon, V. Vapnik, “A training algorithm for optimal margin classifiers,” in Proc. of the Fifth Annual Workshop on Computational Learning Theory, pp. 144-152, 1992. Article (CrossRef Link) |
5 | B. Schölkopf, J. C. Platt, J. S. Taylor, A. J. Smola, R. C. Williamson, “Estimating the support of a high-dimensional distribution,” Neural Computation, vol. 13, no. 7, pp. 1443-1471, July, 2001. Article (CrossRef Link) DOI |
6 | S. Bayram, H. Sencar, N. Memon, “Identifying digital cameras using CFA interpolation,” in Proc. of IFIP WG 11.9 International Conference on Digital Forensics, 2006. Article (CrossRef Link) |
7 | A. Swaminathan, W. Min, K. J. R. Liu, “Non-intrusive forensic analysis of visual sensors using output images,” inProc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. V-V, May 14-19, 2006. Article (CrossRef Link) |
8 | I. Avcıbaş, N. Memon, B. Sankur, “Steganalysis using image quality metrics,” IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 221-229, February, 2003. Article (CrossRef Link) DOI |
9 | A. Swaminathan, W. Min, K.J.R. Liu, “Nonintrusive component forensics of visual sensors using output images,” IEEE Transaction on Information Forensics and Security, vol. 2, no. 1, pp. 91-106, March, 2007. Article (CrossRef Link) DOI |
10 | J. Park, J. Chong, “Edge-preserving Demosaicing method for digital cameras with bayer-like W-RGB color filter array,” KSII Transaction on Internet and Information Systems, vol. 8, no. 3, pp. 1011-1025, March, 2014. Article (CrossRef Link) DOI |
11 | D. Sung, H. Tsao, “Demosaicing using subband-based classifiers,” Electronics Letters, vol. 51, no. 3, pp. 228-330, February, 2015. Article (CrossRef Link) DOI |
12 | Y. Li, B. Wang, X. Kong, Y. Guo, “Image tampering detection using no-reference image quality metrics,” Journal of Harbin Institute of Technology, vol. 21, no. 6, pp. 51-56, 2014. Article (CrossRef Link) |
13 | X. Sun, L. Dong, B. Wang, X. Kong, X. You, “Source Cell-phone Identification Based on Multi-feature Fusion,” in Proc. of International Conference on Image Processing, Computer Vision, and Pattern Recognition, pp. 590-596, 2010. Article (CrossRef Link) |
14 | V. Lanh, S. Emmanuel, M. S. Kankanhalli, “Identifying source cell phone using chromatic aberration,” in Proc. of IEEE International Conference on Multimedia and Expo, pp. 883-886, July 2-5, 2007. Article (CrossRef Link) |
15 | W. Chuang, W. Min, “Semi non-intrusive training for cell-phone camera model linkage,” in Proc. of IEEE International Workshop on Information Forensics and Security, pp. 1-6, December 12-15, 2010. Article (CrossRef Link) |
16 | K. S. Choi, E. Y. Lam, K. Y. Wong, “Automatic source camera identification using the intrinsic lens radial distortion,” Optics Express, vol.14, no. 24, pp. 11551-11565, 2006. Article (CrossRef Link) DOI |
17 | F. Meng, X. Kong, X. You, “A new feature-based method for source camera identification,” in Proc. of IFIP WG 11.9 International Conference on Digital Forensics, pp.702-705, September 12-14, 2008. Article (CrossRef Link) |
18 | G. Gökhan, I. Avcibas, “Source cell phone camera identification based on singular value decomposition,” in Proc. of IEEE International Workshop on Information Forensics and Security, pp. 171-175, December 6-9, 2009. Article (CrossRef Link) |
19 | M. Kharrazi, H. Sencar, N. Memon, “Blind source camera identification,” in Proc. of IEEE International Conference on Image Processing, October 24-27, pp. 709-712, 2004. Article (CrossRef Link) |
20 | S. Bayram, H. Sencar, N. Memon, I. Avcibas, “Source camera identification based on CFA interpolation,” in Proc. of IEEE International Conference on Image Processing, pp. 69-72, September 11-14, 2005. Article (CrossRef Link) |
21 | J. Lukáš, J Fridrich, M. Goljan, “Digital “bullet scratches” for images,” in Proc. of IEEE International Conference on Image Processing, pp.III-65-68, September 11-14, 2005. Article (CrossRef Link) |
22 | J. Fridrich. “Digital image forensic using sensor noise,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 26-37, 2009. Article (CrossRef Link) DOI |
23 | M. Steinebach, M. Ouariachi, H. Liu, S. Katzenbeisser, "Cell phone camera ballistics: attacks and countermeasures," in Proc. of Electronic Imaging, Multimedia on Mobile Devices, vol.7542, pp. B1-9, January, 2010. Article (CrossRef Link) |
24 | O. Celiktutan, I. Avcibas, B. Sankur, N. P. Ayerden, C. Capar, “Source cell-phone identification,” in Proc. of IEEE 14th Signal Processing and Communications Applications, pp. 1-3, April 17-19, 2006. Article (CrossRef Link) |
25 | O. Celiktutan, B. Sankur, I. Avcibas, “Blind identification of source cell-phone model,” IEEE Transaction on Information Forensics and Security, vol. 3, no. 3, pp. 553-566, August, 2008. Article (CrossRef Link) DOI |
26 | M. Steinebach, M. Ouariachi, H. Liu, S. Katzenbeisser, “On the reliability of cell phone camera fingerprint recognition,” Ditital Forensics and Cyber Crime, pp. 69-76, September 30-October 2, 2009. Article (CrossRef Link) |
27 | X. Kang, Y. Li, Z. Qu, J. Huang, “Enhancing source camera identification performance with a camera reference phase sensor pattern noise,” IEEE Transaction on Information Forensics and Security, vol. 7, no. 2, pp. 393-402, March, 2012. Article (CrossRef Link) DOI |
28 | M. Tsai, C. Wang, J. Liu, J. Yin, “Using decision fusion of feature selection in digital forensics for camera source model identification,” Computer Standards & Interfaces, vol. 34, no. 3 pp. 292-304, March, 2012. Article (CrossRef Link) DOI |
29 | http://www.idc.com/getdoc.jsp?containerId=prUS24645514 |
30 | H. Farid, “Digital image forensics,” Scientific American, vol. 6, no. 298, pp. 66-71, 2008. Article (CrossRef Link) DOI |
31 | A. Swanminathan, M. Wu, K. J. R. Liu, “Nonintrusive component forensics of visual sensors using output images,” IEEE Transaction on Information Forensics and Security, vol. 2, no. 1, pp. 91-106, March, 2007. Article (CrossRef Link) DOI |