A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.

Size: px
Start display at page:

Download "A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L."

Transcription

1 A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS Yu Chen and Vrizlynn L. L. Thing Institute for Infocomm Research, 1 Fusionopolis Way, , Singapore {ychen, vriz}@i2r.a-star.edu.sg ABSTRACT In this paper, we study Photo Response Non-Uniformity (PRNU) based image tampering detection methods and their applicability in real-world image tampering detection applications. Experiments using current PRNU based image forensic methods were conducted to evaluate the performance of existing methods in the realistic applications. The PRNU based forensic approach was tested on the images taken by cameras including current and popular DSLR/sub-DSLR models which have rarely been tested and reported. In our experiments, over 800 PRNU noise patterns are generated from 80 authentic photos and the biometric-like experiments have been conducted to study the similarities between intra-class and inter-class PRNU noise patterns. The analysis for the performance of current methods and the suggestions for the further research and development towards PRNU based image forensic approach are presented. Index Terms Photo response non-uniformity; Image forensics; Image tampering detection; Image identity 1. THE RESEARCH BACKGROUND With the progress of information technology, more and more of our activities are recorded in electronic formats, e.g. digital images, videos, and sound records. Among these formats, the digital image plays an important role as a popular information carrier. Thus, there is an increasing security concern on the integrity of images. The original photos may be tampered to serve as manipulated evidences to support an inexistent fact. Therefore, a robust image tampering detection or identity verification approach is thus in requests[1]. The expectation of an image tampering detection approach is to be able to verify the integrity of an image and detect the tampered region if the image is forged. The challenges faced when designing such an approach are 1) there are plenty of image forgery methods; and the design is expected to detect targeted images generated by different kinds of tampering processes. 2) There should be no restrictions on the formats of the targeted images, and the design is expected to be reliable for most of popularly used image formats. The PRNU based image integrity verification method can be considered as a promising candidate technique for developing such an image forgery detection system. Because the PRNU based algorithm utilizes the device/camera identity for image verification, it can work for different image tampering methods and for different image formats as well [3][4] [5] [6][7]. The fundamental design idea of the PRNU verification method is that each camera bears a unique noise pattern, like each person has unique fingerprints and iris patterns, and the PRNU noise patterns are identical in all of the photos taken by this camera. Thus, the integrity of an image can be verified if the following two conditions can be met: 1) the noise pattern can be extracted from the image/images and 2) the camera PRNU noise pattern has been obtained. We believe image identity verification may be possible by using the PRNU method because it is possible to obtain multiple photos from a target camera. Those images can be obtained from existing photos or by taking new photos with the camera. However, for further design and development regarding a practical image forensic approach, the PRNU based technique must be tested for its robustness against the lower noise levels of recent consumer digital cameras. The improved noise deduction schemes of the recent cameras may affect the performance of PRNU based methods. It would be very difficult to extract the reliable PRNU patterns from the cameras which embed more advanced noise control features. Few reported works have tested the PRNU based methods for the images/photos taken by current mid-end and high-end camera models. In this work, we conduct an investigation and evaluation which are supported by newly designed experiments to discover the feasibility and possible design directions of a practical PRNU based image forensics approach for current real world applications. In the rest of this paper, a review of the existing PRNU based methods is given in Section 2. In section 3, the conducted experiments are demonstrated. Analysis and sug-

2 gestions for further research and development regarding the PRNU based image tampering detection approach is presented in the last section. 2. THE REVIEW OF EXISTING PRNU NOISE PATTERN BASED IMAGE FORENSICS METHODS Some algorithms and approaches that have been proposed to extract the camera PRNU noise pattern with single or multiple images. Based on the reported results, the existing methods are robust and reliable in image integrity verification as well as tampered region detection for previously introduced lowend camera models. This section would give a brief review to the current approaches, and more details of this approach can be found in [3][8]. The PRNU pattern is one kind of Fixed Pattern Noise (FPN). The FPN is a constant pattern that identifies nonuniformity noises in an imaging device/camera. The uniqueness of FPN is due to the differences caused by the small manufactory variations or defects for each device. The FPN consists of dark signal non-uniformity (DSNU) which is the noise response pattern obtained without external illuminations and the PRNU which refers to the ratio of the illumination intensity on a pixel to the output signal. The DSNU is only present in images without external illuminations e.g. taking image with lenses covers on. It is difficult to obtain such images for some of image tampering detection cases, e.g. the camera is not accessible. Obviously, the PRNU based method is more applicable for most of realworld image forensic applications, as the pattern is present in most of images with external illuminations. An existing well recognized PRNU method is proposed by[8]. Here we give a brief introduction. The image with PRNU noise would be an output of the camera sensor to the input illumination. This output can be modeled as: I = I (0) + I (0) K + θ (1) I (0) is the noise-free response, the θ is a combination of independent random noises and the I (0) K is the PRNU term. A de-noised output Î(0) can be obtained by a de-noising filter, then, W = I Î(0) = IK + I (0) Î(0) + (I (0) I)K + θ = IK + ε (2) The noise ε is the sum of θ and two additional terms introduced by the de-noising filter. The image content is significantly deducted in the noise residual W, thus the PRNU pattern can be better computed from W than from original image I. The estimator of the PRNU factor K can be derived from N images from the camera, for k = 1, 2,...N as W k I k = K + ε k I k, W k = I k Î(0) k, Î(0) k = F (I k ) (3) Then, from N images, the likelihood of K factor can obtained as: N/2 log(2πσ 2 /(Ik)) 2 L(K) = (W k /I k K) 2 2σ 2 /(I k ) 2 (4) The ML estimate ˆK for the expected PRNU fact is obtained by taking partial derivatives of (5) as: ˆK = W k I k / (I k ) 2 (5) A matrix of K can be obtained as a PRNU noise pattern of a given picture. The filter they used to obtain the noise-less I (0) is a frequency selective filter [2]. Further research and studies have been conducted to improve the PRNU based methods and investigate the methods in various applications. The authors from [9] studied the PRNU based image forensics method on video identification, and from the reported results, the PRNU based method works well for the videos with low resolutions. The work in [11] discovered that the minimum average correlation energy (MACE) filter is better than the normalized cross correlations (NCC) filter in calculating the similarity scores for camcorder identification. In [10], the Block-matching and 3D (BM3D) filter is used to obtain de-noised image and thus to get the PRNU noise pattern. Their reported results show that better PRNU patterns can be generated by using BM3D than using the wavelet selective filter [2]. 3. EXPERIMENTS OF PRNU APPROACH The purpose of our experiments is to test the PRNU based method on the images with lower noise levels. Because the designs of imaging devices/cameras improve rapidly with only several months for a new generation of models to arrive, the inherited noise is getting less obvious and more difficult to be estimated. We need to find out if the PRNU noise patterns can be still detectable for the recent mid-end or high-end camera models, and how well the detection performance is. In our experiments, we adopt BM3D denoising filter[12] to obtain the denoised image I denoised. The BM3D filter is considered as one of most advanced image denoising filters [10] and is proven to outperform the wavelet denoising filter [2] which is applied in the most of previous works. To eliminate the artefacts given by the sensor design and the colour interpolation which are identical for each brand and

3 model, as suggested in [8], the noise pattern is zero-meaned by subtracting the mean value of each row from each pixel in the row and then subtracting the mean value of each column from each pixel in the column. N = M i=1 N i I ori i / M (Ii ori ) 2 (6) i=1 Multiple images from the same camera have been used to estimate a PRNU noise pattern [3]. Although there are some exiting methods to estimate the PRNU noise from a single image, using multiple images would get very reliable and accurate results. As in Equation (7), to obtain the PRNU noise pattern, the noise from each image contribute with different weights regarding the intensity of the pixel in the original image to the final estimation of PRNU pattern. We treat the three channels of images separately and add one channel as the summation of RGB channels. Thus, four PRNU patterns can be extracted for one camera. To calculate the similarity between each pair of PRNU patterns P a and P b, we use the cross-correlation corr(p a, P b ). The experiments are carried out with the relatively new generations of mid-end and high-end camera models including Canon EOS 60D, NIKON J1, NIKON D90, and SONY NEX-5N. The reason we chose these camera models for our experiments is that they are currently popular consumer digital cameras with advanced noise detection features and little information or experimental result has been analyzed or reported for the camera models like those. We also believe that if a practical and reliable image forensics approach is achievable; such an approach should be able to work stably for most of the current on the market camera models as well as the new models which can be expected in the near future. With the rapid improvement of techniques, the noise levels in the newly introduced low-end and mid-end camera models could be even better than some high-end models introduced years ago. Thus, if an image forensic algorithm lacks the capabilities required for some relatively new mid-end or high-end camera models, it cannot be expected to be reliable for upcoming camera models in practical applications for a reasonable period of time e.g. two or three years. As the definition of the high-end camera model includes those professional and rarely sold in the market ones, for a convincing evaluation, we chose those four models which are currently popular and were sold at reasonable prices. The cost for each of four models camera body with one or two lenses is less than US$1,000, as in early 12. We use four cameras of those four models in our experiments. photos with natural scenes were collected for each camera. The photos were taken by our colleagues who have confirmed that none of the collected photos has been postprocessed after being transmitted out from the cameras. Some example photos we use in our experiments are illustrated in Fig.1. We randomly chose 10 photos taken from each camera to generate the reference patterns and use the rest of the photos to generate our query patterns. To generate the regional PRNU noise patterns, we divided 35 non-overlapping regions with the same dimensions of 512x512 from the top left region with the target region size of 3584x2560 for each photo. Thus, each camera can have 35 PRNU reference patterns from 10 chosen images and there are 140 reference patterns in total in our study. To illustrate the effects of image quantity to the PRNU pattern estimation, two sets of query patterns have been generated. Each of the first set of query patterns is obtained by using a pair of photos from the same camera. Thus, for each camera, there are 175 query patterns and 700 query patterns in total. Each of the second set of query cases is generated by using 5 photos from the same camera. Thus, there are 70 query patterns for each camera and we have 280 query cases in the experiment. The experiments are designed to test each of query patterns against every reference pattern by measuring the similarity scores. For the first experiment which uses the set of 700 queries, there are (700 *140) comparisons for each of four channels, among those, 700 belong to intra-class comparisons and the rest refer to inter-class comparisons. For the second experiment which uses the set of the 280 queries, there are 390 (280 *140) comparisons in total for each of four channels, among those, 280 are intra-class comparisons and the rest 389 comparisons refer to inter-class. The distributions in percentages of the similarity scores of inter-class and intra-class for two sets of experiments are illustrated in the Fig.2. The four figures on the left side of Fig.2 illustrate the similarity distributions for the first experiment with each query pattern generated from 2 images, and the four figures on the right illustrate the second experiment with each query pattern generated from 5 images. The first three rows of figures refer to the red, green and blue channel respectively and the fourth row refer to the summation channel with each similarity score is the summation of the scores of RGB channels. The horizontal axis of each figure indicates different similarity scores calculated by cross correlation, and the vertical axis of each figure indicates the different distributions of the comparisons in percentage which is obtained by dividing the total number of comparisons with a certain score from each class by the total number of comparisons conducted in the same class. From Fig.2, it can be seen from both experiments, the similarity scores for a majority of inter-class (blue bins) occupy within the small similarity scores while the similarity scores for intra-class (red bins) expand for a wider range on the horizontal axis. The similarity distributions for the second experiment are better separated between inter-class and intra-class than the first experiment. This is because the PRNU noise pattern can be better estimated with more images, each of the

4 Table 1. The cameras used in the experiment, with corresponding model features Attributes Canon EOS 60D NIKON J1 SONY NEX-5N NIKON D90 Resolutions (as default) 5184 x x x x 2848 Introduced in Output formant Number of images Camera type DSLR Sub-DSLR Sub-DSLR DSLR Fig. 1. the example photos used in our experiments query patterns for the first experiment is generated from 2 images which is less than 5 images used for the second experiment. The ROC curves for each experiment are generated and shown in Fig.3 for a further analysis. In Fig.3, the four figures on the left side refer the first experiment and the other four figures on the right refer to the second experiment. The figures from the first to fourth row demonstrate the ROC curves for the red, green, blue and the summation channel, respectively. The red curves show the corresponding false acceptance rate (FAR) and the green curves refer to the corresponding false rejected rate (FRR). The horizontal axis from each figure in Fig.3 illustrates different thresholds on the similarity scores and the vertical axis refers to the corresponding FAR and FRR rates. It is shown clearly that with the increasing of the threshold on the similarity scores, the FAR rate drops, which means fewer comparisons from inter-class are classified as identical. Meanwhile, the FRR rate increases as more comparisons from the intra-class are classified as non-identical. To better illustrate the classification capability for the tested PRNU method, the equal error rate (EER) on each channel for each experiment is given in Table 2. In Table 2, it is clearly shown that the second experiment with better PRNU estimation yields better classification performance than the first experiment. In our experiments, the best result we got is from the second experiment which utilizes 5 images to estimate each query PRNU pattern. 4. CONCLUSION AND FUTURE WORKS The results from our experiments show that the PRNU based methods are able to provide a certain level of capability in terms of verifying the integrity of the photos, even in challenging cases when using photos taken by the current midend and high-end camera models as targets, and the number of images used to estimate the PRNU pattern is limited. The experimental results support the feasibility for further design and development of a PRNU based practical and reliable image tampering detection approach for real-world applications. The lowest EER rate we obtained is at the level of 10 2 at which is given by the summation channel of our second experiment. However, a reliable biometric approach such as finger print or iris recognition system usually yields an EER rate well below the level of Increasing the quantity of images used for the PRNU pattern estimation would certainly improve the performance but would also make the approach less applicable for many realistic applications when the number of photos we can obtain from the target camera is limited. Considering that the consumer digital cameras are still improving fast and the images are expected to get more noiseless, we suggest not taking the PRNU based image forensic approach as a reliable and standalone image tampering detection system but as an integrated supporting module works with other image forensic approaches to increase the decision confidence and improve the robustness of the whole system. Regarding future work, we plan to work on further testing

5 Fig. 2. the distributions of similarity scores for first (left column of figures) and second experiment (right column)

6 Fig. 3. the ROC curves for the first experiment (left column of figures) and the second experiment (right column)

7 Table 2. the EER rates for the red, green, blue and summation of RGB channels from the first and second experiments Experiments Red channel Green channel Blue channel Summation RGB 1st experiment EER st experiment Threshold nd experiment EER nd experiment Threshold on PRNU based methods with involving more camera models from low-end to high-end and from recent to previous models for a more thorough investigation. Furthermore, we are working on improvements for the PRNU pattern estimation method to obtain better PRNU pattern without involving more images. 5. ACKNOWLEDGMENTS The authors would like to thank our I2R colleagues Mr. Wee- Yong Lim, Mr. Darell J. J. Tan and Mr. Jun-Wen Wong for sharing the photos used in our experiments. 6. REFERENCES [1] A.C., Popescuand and H., Farid: Exposing Digital Forgeries in Color Filter Array Interpolated Images. IEEE Transactions on Signal Processing, vol. 53(10), pp , 05. [2] M. K. Mihcak, I. Kozintsev, and K. Ramchandran, Spatially adaptive statistical modelling of wavelet image coefficients and its application to denoising, in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Phoenix, AZ, Mar. 1999, vol. 6, pp [3] J. Luks, J. Fridrich, and M. Goljan, Digital camera identification from sensor pattern noise, IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 5214, Jun. 06. [4] H. Gou, A. Swaminathan, and M. Wu, Robust scanner identification based on noise features, in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, Jan. 29Feb. 1, 07, vol. 6505, pp. 0S0T [5] N. Khanna, A. K. Mikkilineni, G. T. C. Chiu, J. P. Allebach, and E. J. Delp, III, Forensic classification of imaging sensor types, in Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking Multimedia Contents IX, San Jose, CA, Jan. 29Feb. 1, 07, vol. 6505, pp. 0U0V [6] B. Sankur, O. Celiktutan, and I. Avcibas, Blind identification of cell phone cameras, in Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking Multimedia Contents IX, San Jose, CA, Jan. 29Feb. 1, 07, vol. 6505, pp. 1H1I. [7] T. Gloe, E. Franz, and A. Winkler, Forensics for flatbed scanners, in Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking Multimedia Contents IX, San Jose, CA, Jan. 29Feb. 1, 07, vol. 6505, pp. 1I1J. [8] M. Chen, J. Fridrich, and M. Goljan, and J. Luk, Determining image originand integrity using sensor noise, IEEE Trans. Inform. Sec. Forensics, vol. 3, no.1, pp. 7490, Mar. 08 [9] V. H. Wiger and G. Zeno, Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube in Proc. Computational Forensics, Lecture Notes in Computer Science, Volume ISBN Springer Berlin Heidelberg, 09, p. 104 [10] Chierchia,G.,Parrilli,S., Poggi,G., Sansone,C., Verdoliva, L., On the Influence of Denoising in PRNU based Forgery detection. Proceedings of the 2nd ACM workshop on Multimdia in Forensics,Security and Intelligence 10, pp [11] D.K., Hyun, C.H. Choi, H.K., Lee, Camcorder Identification for Heavily Compressed Low Resolution Videos, Lecture Notes in Electrical Engineering, 12, Volume 114, Part 5, , DOI: / [12] K. Dabov, A. Foi, V. Katkovnik, and K. Egiazarian, Image denoising by sparse 3D transform-domain collaborative filtering, IEEE Trans. Image Process., vol. 16, no. 8, August 07.

Camera identification from sensor fingerprints: why noise matters

Camera identification from sensor fingerprints: why noise matters Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS

More information

Camera identification by grouping images from database, based on shared noise patterns

Camera identification by grouping images from database, based on shared noise patterns Camera identification by grouping images from database, based on shared noise patterns Teun Baar, Wiger van Houten, Zeno Geradts Digital Technology and Biometrics department, Netherlands Forensic Institute,

More information

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Roberto Caldelli, Irene Amerini, and Francesco Picchioni Media Integration and Communication Center - MICC, University of

More information

Scanner Identification Using Sensor Pattern Noise

Scanner Identification Using Sensor Pattern Noise Scanner Identification Using Sensor Pattern Noise Nitin Khanna a, Aravind K. Mikkilineni b George T. C. Chiu b, Jan P. Allebach a, Edward J. Delp a a School of Electrical and Computer Engineering b School

More information

Forensic Classification of Imaging Sensor Types

Forensic Classification of Imaging Sensor Types Forensic Classification of Imaging Sensor Types Nitin Khanna a, Aravind K. Mikkilineni b George T. C. Chiu b, Jan P. Allebach a,edwardj.delp a a School of Electrical and Computer Engineering b School of

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Fragile Sensor Fingerprint Camera Identification

Fragile Sensor Fingerprint Camera Identification Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera

More information

Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science

Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science FORENSIC SCIENCE JOURNAL SINCE 2002 Forensic Science Journal 2017;16(1):19-42 fsjournal.cpu.edu.tw DOI:10.6593/FSJ.2017.1601.03 Applying the Sensor Noise based Camera Identification Technique to Trace

More information

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.

More information

Exposing Image Forgery with Blind Noise Estimation

Exposing Image Forgery with Blind Noise Estimation Exposing Image Forgery with Blind Noise Estimation Xunyu Pan Computer Science Department University at Albany, SUNY Albany, NY 12222, USA xypan@cs.albany.edu Xing Zhang Computer Science Department University

More information

Retrieval of Large Scale Images and Camera Identification via Random Projections

Retrieval of Large Scale Images and Camera Identification via Random Projections Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management

More information

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic

More information

Source Camera Model Identification Using Features from contaminated Sensor Noise

Source Camera Model Identification Using Features from contaminated Sensor Noise Source Camera Model Identification Using Features from contaminated Sensor Noise Amel TUAMA 2,3, Frederic COMBY 2,3, Marc CHAUMONT 1,2,3 1 NÎMES UNIVERSITY, F-30021 Nîmes Cedex 1, France 2 MONTPELLIER

More information

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Mo Chen, Jessica Fridrich, Jan Lukáš, and Miroslav Goljan Dept. of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000,

More information

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models

More information

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the

More information

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

Source Camera Identification Using Enhanced Sensor Pattern Noise

Source Camera Identification Using Enhanced Sensor Pattern Noise T-IFS-011-009 1 Source Camera Identification Using Enhanced Sensor Pattern Noise Chang-Tsun L Member, IEEE Abstract Sensor pattern noises (SPNs), extracted from digital images to serve as the fingerprints

More information

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

PRNU-Based Image Alignment for Defective Pixel Detection

PRNU-Based Image Alignment for Defective Pixel Detection PRNU-Based Image Alignment for Defective Pixel Detection Christof Kauba, Andreas Uhl Department of Computer Sciences, University of Salzburg, AUSTRIA {ckauba,uhl}@cosy.sbg.ac.at Abstract Image alignment

More information

Colour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics

Colour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics Colour-Decoupled Photo Response Non-Uniformity for Digital mage Forensics Chang-Tsun Li 1 and Yue Li 2 1 Department of Computer Science, University of arwick, Coventry CV4 7AL, UK c-t.li@warwick.ac.uk

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge 2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge This competition is sponsored by the IEEE Signal Processing Society Introduction The IEEE Signal Processing Society s 2018

More information

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences Ankita Meenpal*, Shital S Mali. Department of Elex. & Telecomm. RAIT, Nerul, Navi Mumbai, Mumbai, University, India

More information

PRIOR IMAGE JPEG-COMPRESSION DETECTION

PRIOR IMAGE JPEG-COMPRESSION DETECTION Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION

More information

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): 2321-0613 High-Quality Jpeg Compression using LDN Comparison and Quantization Noise Analysis S.Sasikumar

More information

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department

More information

Tampering Detection Algorithms: A Comparative Study

Tampering Detection Algorithms: A Comparative Study International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study

More information

A Novel Multi-size Block Benford s Law Scheme for Printer Identification

A Novel Multi-size Block Benford s Law Scheme for Printer Identification A Novel Multi-size Block Benford s Law Scheme for Printer Identification Weina Jiang 1, Anthony T.S. Ho 1, Helen Treharne 1, and Yun Q. Shi 2 1 Dept. of Computing, University of Surrey Guildford, GU2 7XH,

More information

Stamp detection in scanned documents

Stamp detection in scanned documents Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,

More information

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Camera Model Identification Framework Using An Ensemble of Demosaicing Features Camera Model Identification Framework Using An Ensemble of Demosaicing Features Chen Chen Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: chen.chen3359@drexel.edu

More information

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008 Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright

More information

Forgery Detection using Noise Inconsistency: A Review

Forgery Detection using Noise Inconsistency: A Review Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

TECHNICAL DOCUMENTATION

TECHNICAL DOCUMENTATION TECHNICAL DOCUMENTATION NEED HELP? Call us on +44 (0) 121 231 3215 TABLE OF CONTENTS Document Control and Authority...3 Introduction...4 Camera Image Creation Pipeline...5 Photo Metadata...6 Sensor Identification

More information

Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier

Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier Journal of Information Systems and Telecommunication, Vol. 1, No. 4, October - December 2013 233 Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM

More information

Can We Trust Digital Image Forensics?

Can We Trust Digital Image Forensics? Can We Trust Digital Image Forensics? ABSTRACT Thomas Gloe Technische Universität Dresden Institute for System Architecture 162 Dresden, Germany thomas.gloe@inf.tu-dresden.de Antje Winkler Technische Universität

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012 A Tailored Anti-Forensic Approach for Digital Image Compression S.Manimurugan, Athira B.Kaimal Abstract- The influence of digital images on modern society is incredible; image processing has now become

More information

Using sensor noise to identify low resolution compressed videos from YouTube

Using sensor noise to identify low resolution compressed videos from YouTube Using sensor noise to identify low resolution compressed videos from YouTube Wiger van Houten and Zeno Geradts Abstract The Photo Response Non-Uniformity acts as a digital fingerprint that can be used

More information

Image Manipulation Detection using Convolutional Neural Network

Image Manipulation Detection using Convolutional Neural Network Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National

More information

Countering Anti-Forensics of Lateral Chromatic Aberration

Countering Anti-Forensics of Lateral Chromatic Aberration IH&MMSec 7, June -, 7, Philadelphia, PA, USA Countering Anti-Forensics of Lateral Chromatic Aberration Owen Mayer Drexel University Department of Electrical and Computer Engineering Philadelphia, PA, USA

More information

Exposing Digital Forgeries from JPEG Ghosts

Exposing Digital Forgeries from JPEG Ghosts 1 Exposing Digital Forgeries from JPEG Ghosts Hany Farid, Member, IEEE Abstract When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person

More information

Original citation: Li, C-T. (2012). Color-Decoupled Photo Response Non-Uniformity for Digital mage Forensics. EEE Transactions on Circuits and Systems for Video Technology, 22(2), pp. 260-271 Permanent

More information

PoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2

PoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2 Based on Cepstral Mixed Features 12 School of Information and Communication Engineering,Dalian University of Technology,Dalian, 116024, Liaoning, P.R. China E-mail:zww110221@163.com Xiangwei Kong, Xingang

More information

Survey On Passive-Blind Image Forensics

Survey On Passive-Blind Image Forensics Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal

More information

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot 24 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY Khosro Bahrami and Alex C. Kot School of Electrical and

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

Multimedia Forensics

Multimedia Forensics Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer

More information

Detection of Hue Modification Using Photo Response Non-Uniformity

Detection of Hue Modification Using Photo Response Non-Uniformity The final version of record is available at http://dx.doi.org/.9/tcsvt.6.53988 Detection of Hue Modification Using Photo Response Non-Uniformity Jong-Uk Hou, Student Member, IEEE, and Heung-Kyu Lee Abstract

More information

ADVANCES in digital imaging technologies have led to

ADVANCES in digital imaging technologies have led to 126 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 1, JANUARY 2016 Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization Xufeng Lin and Chang-Tsun Li, Senior Member,

More information

Global and Local Quality Measures for NIR Iris Video

Global and Local Quality Measures for NIR Iris Video Global and Local Quality Measures for NIR Iris Video Jinyu Zuo and Natalia A. Schmid Lane Department of Computer Science and Electrical Engineering West Virginia University, Morgantown, WV 26506 jzuo@mix.wvu.edu

More information

Distinguishing Identical Twins by Face Recognition

Distinguishing Identical Twins by Face Recognition Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The

More information

Automatic source camera identification using the intrinsic lens radial distortion

Automatic source camera identification using the intrinsic lens radial distortion Automatic source camera identification using the intrinsic lens radial distortion Kai San Choi, Edmund Y. Lam, and Kenneth K. Y. Wong Department of Electrical and Electronic Engineering, University of

More information

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES International Journal of Advanced Technology & Engineering Research (IJATER) 3 rd International e-conference on Emerging Trends in Technology DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES Govindraj

More information

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif

More information

Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise

Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise https://doiorg/12352/issn247-11732177mwsf-332 217, Society for Imaging Science and Technology Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise Chang Liu and Matthias Kirchner Department

More information

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX 77341,

More information

Image Forensics of High Dynamic Range Imaging

Image Forensics of High Dynamic Range Imaging Image Forensics of High Dynamic Range Imaging Philip. J. Bateman, Anthony T. S. Ho, and Johann A. Briffa University of Surrey, Department of Computing, Guildford, Surrey, GU2 7XH, UK {P.Bateman,A.Ho,J.Briffa}@surrey.ac.uk

More information

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,

More information

Simulated Programmable Apertures with Lytro

Simulated Programmable Apertures with Lytro Simulated Programmable Apertures with Lytro Yangyang Yu Stanford University yyu10@stanford.edu Abstract This paper presents a simulation method using the commercial light field camera Lytro, which allows

More information

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,

More information

Literature Survey on Image Manipulation Detection

Literature Survey on Image Manipulation Detection Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,

More information

WITH the rapid development of image processing technology,

WITH the rapid development of image processing technology, 480 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 JPEG Error Analysis and Its Applications to Digital Image Forensics Weiqi Luo, Member, IEEE, Jiwu Huang, Senior

More information

CERIAS Tech Report Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance

CERIAS Tech Report Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance CERIAS Tech Report 29-38 Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 4797-286

More information

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Linear Gaussian Method to Detect Blurry Digital Images using SIFT IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org

More information

arxiv: v1 [cs.cv] 15 Mar 2017

arxiv: v1 [cs.cv] 15 Mar 2017 SOURCE CAMERA IDENTIFICATION BASED ON CONTENT-ADAPTIVE FUSION NETWORK Pengpeng Yang, Wei Zhao, Rongrong Ni, and Yao Zhao arxiv:1703.04856v1 [cs.cv] 15 Mar 2017 Institute of Information Science, & Beijing

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

Artifacts Reduced Interpolation Method for Single-Sensor Imaging System

Artifacts Reduced Interpolation Method for Single-Sensor Imaging System 2016 International Conference on Computer Engineering and Information Systems (CEIS-16) Artifacts Reduced Interpolation Method for Single-Sensor Imaging System Long-Fei Wang College of Telecommunications

More information

Wavelet-Based Multiresolution Matching for Content-Based Image Retrieval

Wavelet-Based Multiresolution Matching for Content-Based Image Retrieval Wavelet-Based Multiresolution Matching for Content-Based Image Retrieval Te-Wei Chiang 1 Tienwei Tsai 2 Yo-Ping Huang 2 1 Department of Information Networing Technology, Chihlee Institute of Technology,

More information

Simultaneous Capturing of RGB and Additional Band Images Using Hybrid Color Filter Array

Simultaneous Capturing of RGB and Additional Band Images Using Hybrid Color Filter Array Simultaneous Capturing of RGB and Additional Band Images Using Hybrid Color Filter Array Daisuke Kiku, Yusuke Monno, Masayuki Tanaka, and Masatoshi Okutomi Tokyo Institute of Technology ABSTRACT Extra

More information

An Improved Bernsen Algorithm Approaches For License Plate Recognition

An Improved Bernsen Algorithm Approaches For License Plate Recognition IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 78-834, ISBN: 78-8735. Volume 3, Issue 4 (Sep-Oct. 01), PP 01-05 An Improved Bernsen Algorithm Approaches For License Plate Recognition

More information

VISUAL sensor technologies have experienced tremendous

VISUAL sensor technologies have experienced tremendous IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 1, MARCH 2007 91 Nonintrusive Component Forensics of Visual Sensors Using Output Images Ashwin Swaminathan, Student Member, IEEE, Min

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea

More information

An Implementation of LSB Steganography Using DWT Technique

An Implementation of LSB Steganography Using DWT Technique An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication

More information

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION SHAOHUI LIU, HONGXUN YAO, XIAOPENG FAN,WEN GAO Vilab, Computer College, Harbin Institute of Technology, Harbin, China, 150001

More information

Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images

Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images Xufeng Lin, Xingjie Wei and Chang-Tsun Li Department of Computer Science, University of Warwick, Coventry, CV4 7AL, UK

More information

Forensic Hash for Multimedia Information

Forensic Hash for Multimedia Information Forensic Hash for Multimedia Information Wenjun Lu, Avinash L. Varna and Min Wu Department of Electrical and Computer Engineering, University of Maryland, College Park, U.S.A email: {wenjunlu, varna, minwu}@eng.umd.edu

More information

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick

More information

Image Forgery Identification Using JPEG Intrinsic Fingerprints

Image Forgery Identification Using JPEG Intrinsic Fingerprints 1 Image Forgery Identification Using JPEG Intrinsic Fingerprints A. Garg, A. Hailu, and R. Sridharan Abstract In this paper a novel method for image forgery detection is presented. he method exploits the

More information

An Algorithm for Fingerprint Image Postprocessing

An Algorithm for Fingerprint Image Postprocessing An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

Mobile Camera Source Identification with SVD

Mobile Camera Source Identification with SVD Mobile Camera Source Identification with SVD A-R Soobhany, KP Lam, P Fletcher, DJ Collins Research Institute for the Environment, Physical Sciences and Applied Mathematics Keele University Keele, Staffordshire,

More information

Image De-Noising Using a Fast Non-Local Averaging Algorithm

Image De-Noising Using a Fast Non-Local Averaging Algorithm Image De-Noising Using a Fast Non-Local Averaging Algorithm RADU CIPRIAN BILCU 1, MARKKU VEHVILAINEN 2 1,2 Multimedia Technologies Laboratory, Nokia Research Center Visiokatu 1, FIN-33720, Tampere FINLAND

More information

Locating Steganographic Payload via WS Residuals

Locating Steganographic Payload via WS Residuals Locating Steganographic Payload via WS Residuals Andrew D. Ker Oxford University Computing Laboratory Parks Road Oxford OX1 3QD, UK adk@comlab.ox.ac.uk ABSTRACT The literature now contains a number of

More information

Improved Correction for Hot Pixels in Digital Imagers

Improved Correction for Hot Pixels in Digital Imagers Improved Correction for Hot Pixels in Digital Imagers Glenn H. Chapman, Rohit Thomas, Rahul Thomas School of Engineering Science Simon Fraser University Burnaby, B.C., Canada, V5A 1S6 glennc@ensc.sfu.ca,

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence

More information

Iterative Joint Source/Channel Decoding for JPEG2000

Iterative Joint Source/Channel Decoding for JPEG2000 Iterative Joint Source/Channel Decoding for JPEG Lingling Pu, Zhenyu Wu, Ali Bilgin, Michael W. Marcellin, and Bane Vasic Dept. of Electrical and Computer Engineering The University of Arizona, Tucson,

More information

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 3, May - June 2018, pp. 177 185, Article ID: IJARET_09_03_023 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=3

More information

Multiple Sound Sources Localization Using Energetic Analysis Method

Multiple Sound Sources Localization Using Energetic Analysis Method VOL.3, NO.4, DECEMBER 1 Multiple Sound Sources Localization Using Energetic Analysis Method Hasan Khaddour, Jiří Schimmel Department of Telecommunications FEEC, Brno University of Technology Purkyňova

More information

Exposing Image Splicing with Inconsistent Local Noise Variances

Exposing Image Splicing with Inconsistent Local Noise Variances Exposing Image Splicing with Inconsistent Local Noise Variances Xunyu Pan Xing Zhang Siwei Lyu Computer Science Department University at Albany, State University of New York {xzhang5,xypan,slyu@albany.edu

More information

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design 2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital

More information

ABC: Enabling Smartphone Authentication with Built-in Camera

ABC: Enabling Smartphone Authentication with Built-in Camera ABC: Enabling Smartphone Authentication with Built-in Camera Zhongjie Ba, Sixu Piao, Xinwen Fu f, Dimitrios Koutsonikolas, Aziz Mohaisen f and Kui Ren f 1 Camera Identification: Hardware Distortion Manufacturing

More information