Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science

Similar documents
Camera identification from sensor fingerprints: why noise matters

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Forensic Classification of Imaging Sensor Types

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

Survey On Passive-Blind Image Forensics

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

Scanner Identification Using Sensor Pattern Noise

Fragile Sensor Fingerprint Camera Identification

Open Set Source Camera Attribution

arxiv: v1 [cs.cv] 15 Mar 2017

Camera identification by grouping images from database, based on shared noise patterns

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Source Camera Model Identification Using Features from contaminated Sensor Noise

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Automatic source camera identification using the intrinsic lens radial distortion

Survey on Source Camera Identification Using SPN with PRNU

Exposing Image Forgery with Blind Noise Estimation

Retrieval of Large Scale Images and Camera Identification via Random Projections

Efficient Estimation of CFA Pattern Configuration in Digital Camera Images

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

Introduction to Video Forgery Detection: Part I

TECHNICAL DOCUMENTATION

Source Camera Identification Forensics Based on Wavelet Features

Laser Printer Source Forensics for Arbitrary Chinese Characters

On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier

GIVEN the fast and widespread penetration of multimedia

Digital Image Authentication from Thumbnails

Smartphone image acquisition forensics using sensor fingerprint

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

Colour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics

Chapter 2-Digital Components

Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection

Methods for identification of images acquired with Digital cameras

A survey of forensic characterization methods for physical devices 5

CERIAS Tech Report Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance

Footwear & Tire Tread Photography A comparison of digital resolution vs. 35mm film

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Can We Trust Digital Image Forensics?

Source Camera Identification Using Enhanced Sensor Pattern Noise

Canon Digital Manual Camera Price In India Below 5000 >>>CLICK HERE<<<


A Novel Multi-size Block Benford s Law Scheme for Printer Identification

Multimedia Forensics

Implementation of the Likelihood Ratio framework for camera identification based

Forensic Hash for Multimedia Information

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

PoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2

Using sensor noise to identify low resolution compressed videos from YouTube

Literature Survey on Image Manipulation Detection

Forensic Image and Video Processing. Dallas, AAFS, 17 February 2004.

From Image to Sensor: Comparative Evaluation of Multiple PRNU Estimation Schemes for Identifying Sensors from NIR Iris Images

A Study of Slanted-Edge MTF Stability and Repeatability

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

According to the proposed AWB methods as described in Chapter 3, the following

Image De-Noising Using a Fast Non-Local Averaging Algorithm

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES

89% Gold Award. Sep 14, 2016 Oct 16, Aug 25, 2016 Jul 25, 2017 Oct 25, Mid-size SLR Mid-size SLR SLR-style mirrorless

Forgery Detection using Noise Inconsistency: A Review

WITH the rapid development of image processing technology,

Canon Digital-Ixus V Jun 2001

Camera Image Processing Pipeline

ABC: Enabling Smartphone Authentication with Built-in Camera

Exposing Digital Forgeries from JPEG Ghosts

>--- UnSorted Tag Reference [ExifTool -a -m -u -G -sort ] ExifTool Ver: 10.07

VISUAL sensor technologies have experienced tremendous

Camera Image Processing Pipeline: Part II

Windows. DxO Optics Pro v8.5 Release notes. System requirements

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns

Kent Academic Repository

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

S SNR 10log. peak peak MSE. 1 MSE I i j

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

Canon Digital Manual Camera Models With Price In India

Image acquisition. In both cases, the digital sensing element is one of the following: Line array Area array. Single sensor

Camera Image Processing Pipeline: Part II

USING SENSOR DIRT FOR TOOLMARK ANALYSIS OF DIGITAL PHOTOGRAPHS

A Reversible Data Hiding Scheme Based on Prediction Difference

Prices of digital cameras

SURVEILLANCE SYSTEMS WITH AUTOMATIC RESTORATION OF LINEAR MOTION AND OUT-OF-FOCUS BLURRED IMAGES. Received August 2008; accepted October 2008

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

Blind Verification of Digital Image Originality: A Statistical Approach

Mobile Camera Source Identification with SVD

Does Nikon Coolpix L310 Have Manual Mode

Digital Imaging with the Nikon D1X and D100 cameras. A tutorial with Simon Stafford

Michigan Technological University. Characterization of Unpaved Road Condition Through the Use of Remote Sensing

Best Camera Manual Lens For Canon Eos 60d Twin

Sony Cybershot Manual 12.1 Megapixel Digital Camera Price In Pakistan

Exposing Image Splicing with Inconsistent Local Noise Variances

Transcription:

FORENSIC SCIENCE JOURNAL SINCE 2002 Forensic Science Journal 2017;16(1):19-42 fsjournal.cpu.edu.tw DOI:10.6593/FSJ.2017.1601.03 Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science Wen-Chao Yang 1*, Ph.D. ; Long-Huang Tsai 1, B.S. ; Chung-Hao Chen 2, Ph.D. 1 Department of Forensic Science, National Central Police University, Taoyuan City, Taiwan 2 Electrical and Computer Engineering Department, Old Dominion University, Norfolk, VA, U.S.A. Received: August 28, 2017; Accepted: September 30, 2017. Abstract With the rapid development of digital technologies, cameras and video recorders play an important role in our life, such as cell phones, cameras, or vehicle recorders. As a result, the easier we can access to those imaging devices, the more likely a perpetrator can use it to commit a crime, such as the invasion of privacy. Therefore, in recent years digital images and videos often play an important role as an evidence for coming a crime in court. Due to the rapid development of cloud and network technologies, we can easily spread digital images and videos via email or social media. However, it is difficult for us to trace the origin of the digital image/video contents. In many crime events, such as spreading national secrecy or maliciously spreading privacy cases, the ability of determining the source of the digital image/ video contents is important. In this paper, an origin-tracing method based on sensor noise is proposed to tackle this issue. The experiment result shows that the classification accuracy is close to 100 percent in some cases. Keywords: digital image/video evidence, tracing origin, authentication, sensor noise Introduction Due to the rapid development of computer science and technology, the use of digital imaging devices has incredibly become popular. Digital imaging devices, such as cell phones, cameras, or vehicle recorders, have become commodity for everyone. It lets the offenders easily commit crimes, such as intrusion of privacy or cyber bullying using digital cameras or mobile phone cameras. In addition, due to the lack the appropriate method of tracing origin of digital images/videos, it is difficult for us to identify the original imaging device when the offenders use to spread digital images and videos using email or social network methods. As a result, it becomes a challenging problem to use those images/videos as a legitimate evidence in court. Camera model identification is a technique to determine the camera model used to acquire a digital image of unknown provenance. It is based on the * Corresponding author: Wen-Chao Yang, Department of Forensic Science, National Central Police University, Taoyuan City, Taiwan. E-mail: una135@mail.cpu.edu.tw

20 Forensic Science Journal 2017; 16(1) premise that images acquired by the same camera model share common characteristics. In this paper, we illustrate our proposed method based on sensor noise can trace the origin. More than 2000 photos acquired by six cameras and seven mobile phone cameras are used in our experiment to demonstrate the effectiveness of our proposed method. Related Works and Proposed Methods The researches of camera model identification can be divided into two categories based on whether embedded information is active or passive. For an active embedding method, it embeds the distinguishing characteristics in images (videos). Metadata analysis [1] and data hiding methods [2,3] belong to this. The Color Filter Array (CFA) interpolation artifacts [4,5], sensor dust [6], and PRNU [7-13] are considered as a passive detection method. For a metadata analysis, the JPEG or TIFF images in current digital cameras usually follow standards like TU-T T.81, JETF, EXIF, CIFF and DCF [1]. Thus, the resulting images can be used to describe imaging equipment, such as shooting conditions (Fig. 1) or GPS information (Fig. 2). However, there exists risk using metadata analysis to trace the source, because the metadata record of images is easy to be removed or modified, which has to carefully confirm the accuracy and integrity of the description. Fig. 1 A shooting condition example in EXIF file header [1].

Camera Identification Technique 21 Fig. 2 A GPS information example in EXIF file header [1]. The use of watermarking technology for imaging equipment to trace origin or verify the integrity is widely studied [2]. Blythe and Fridrich [3] proposed a lossless watermarking combined with photographer s iris information to verify the photographer and ensure the integrity of images. However, this technology is limited to patent rights and market demand, and are not widely applicable to all digital imaging devices. The work of passive detection methods, in contrast to active embedding methods, is recently developed. In 1999, Kurosawa et al. [7] first proposed that the nonuniformity or defects can be retained in the chargecoupled devices (CCDs) in the photosensitive element manufacturing process. It can be used like a fingerprint feature to identify the image of the lens in the study. This situation is as identical as bullet scratches allowing forensic analysts to match a bullet to a particular barrel or gun for tracing the gun owner. They used 9 video recorders which have four kinds of labels in the experiment. The results found that 8 of the video clips produced by the video camera can get the source of the lens. In addition, the image noise obtained by the experimental video recorder is different. In 2011, they [8] used the Bayesian framework to establish the approximate proportion of the ratio (likelihood ratio) based on the noise characteristics of the recorders. Lukas et al. conducted a series of studies on analysis of digital cameras based on PRNU in 2005 [9,10] and 2006 [11]. In [9] and [10], they used the Daubechies 8 wavelet (db8) filter to estimate noise and used the correlation coefficient for digital camera sources to make a comparison of 9 different digital cameras (see Table 1) and 2 file formats (TIFF and JPEG), the results are shown in Fig. 3 and Fig. 4.

22 Forensic Science Journal 2017; 16(1) Table 1 Cameras and properties used in experiments [9]. Camera brand Sensor Maximal resolution Image format Canon PowerShot A10 1/2.7-inch CCD 1280 960 JPEG Canon PowerShot G2 1/1.8-inch CCD 2272 1704 CRW, JPEG Canon PowerShot S40 1/1.8-inch CCD 2272 1704 CRW, JPEG Kodak DC 290 1792 1200 TIFF, JPEG Olympus Camedia C765 UZ-1 1/2.5-inch CCD 2288 1712 TIFF, JPEG Olympus Camedia C765 UZ-2 1/2.5-inch CCD 2288 1712 TIFF, JPEG Nikon D100 23.7 15.5mm Nikon DX CCD 3008 2000 NEF-RAW, TIFF, JPEG Sigma SD9 20.7 13.8mm CMOS-Foveon X3 2268 1512 X3F-RAW Olympus Camedia C3030 1/1.8-inch CCD 2048 1536 TIFF, JPEG Fig. 3 Noise correlation from Olympus C765 (left) TIFF and Olympus C3030 (right) JPEG images with 9 reference patterns [9]. Fig. 4 Noise correlation from Canon G2 (left) and Nikon D100 (right) TIFF images with 9 reference patterns [9].

Camera Identification Technique 23 In both [9] and [10], they divided the noise into two main components [11], the fixed pattern noise (FPN) caused by dark currents and the photoresponse nonuniformity noise (PRNU) caused by pixel nonuniformity primarily. FPN primarily refers to the pixel-to-pixel difference when the sensor array is not exposed to light and its relationship to the exposure time and temperature. PRNU is caused by the inhomogeneity of the response of the light-sensitive element itself. They also proposed the mathematical model of image acquisition, according to the digital camera traceability analysis, the formula is shown as follows: y ij = f ij ( x ij + η ij )+c ij + ε ij (1) where i, j denote the coordinates of the image, i = 1,, m, j = 1,, n, m n is the resolution image, y ij and x ij respectively denotes the output and input of the capture sensor, η ij denotes the shot noise, c ij denotes the dark current, ε ij denotes the additive random noise, and the factors f ij are typically close to 1. In [11], they used the wavelet filter proposed in [12] as the denoise filter, and used different Garmma correction coefficients and compression ratios to analyze the sensor pattern noise in 9 different digital cameras (shown as Table 1). The experimental result is shown in Table 2. In Table 2, t denotes the correlation coefficient threshold used to distinguish the origin of images. FAR denotes the false acceptance rate and FRR denotes the false rejection rate. Table 2 Experimental results with FAR=10-3 [11]. Processing Camera None Gamma 0.7 Gamma 1.4 t FRR t FRR t FRR Nikon 0.0449 4.68 10-3 0.0443 1.09 10-2 0.0435 6.33 10-3 C765-1 0.0170 3.79 10-4 0.0163 3.88 10-4 0.0172 3.85 10-4 C765-2 0.0080 5.75 10-11 0.0076 2.57 10-11 0.0081 2.83 10-10 G2 0.0297 2.31 10-4 0.0271 3.23 10-4 0.0313 4.78 10-5 S40 0.0322 1.42 10-4 0.0298 1.64 10-4 0.0343 1.02 10-4 Sigma 0.0063 2.73 10-4 0.0060 2.93 10-4 0.0064 2.76 10-4 Kodak 0.0097 1.14 10-11 0.0096 1.08 10-8 0.0094 3.73 10-13 C3030 0.0209 1.87 10-3 0.0216 1.58 10-3 0.0195 2.67 10-3 A10 0.0166 7.59 10-5 0.0162 4.71 10-5 0.0160 2.93 10-4 Processing Camera JPEG 90 JPEG 70 JPEG 50 t FRR t FRR t FRR Nikon 0.0225 3.71 10-3 0.0231 5.83 10-2 0.0210 1.63 10-1 C765-1 0.0122 5.36 10-6 0.0064 1.55 10-6 0.0060 1.17 10-4 C765-2 0.0061 0 0.0065 9.53 10-14 0.0065 2.14 10-6 G2 0.0097 8.99 10-11 0.0079 4.85 10-11 0.0076 5.13 10-4 S40 0.0133 3.96 10-11 0.0085 4.41 10-14 0.0083 9.48 10-5 Sigma 0.0050 3.44 10-6 0.0055 9.16 10-6 0.0059 6.57 10-5 Kodak 0.0107 2.27 10-9 0.0127 4.53 10-4 0.0131 4.65 10-3

24 Forensic Science Journal 2017; 16(1) In 2009, Khanna et al. [13] used Daubechies 8 wavelet (Db8) filter as the denoise filter to estimate the imaging sensor pattern noise in 10 different cameras (shown in Table 3). They also use different size coefficients and file format conditions (see Table 3) to analyze the imaging sensor pattern noise. The experimental results are shown in Fig. 5 and Fig. 6. Table 3 Devices with respective setups for experiment[13]. Device Brand CCD Sensor Sensor Resolution Max. Picture Size Image Format c1 Canon PowerShot SD200-1 1/2.5 inch 3.2 MP 2048 1536 JPEG c2 Canon PowerShot SD200-2 1/2.5 inch 3.2 MP 2048 1536 JPEG c3 Nikon Coolpix 7600 1/1.8 inch 7.1 MP 3072 2304 JPEG c4 Panasonic DMC-FZ20 1/2.5 inch 5 MP 2560 1920 JPEG/TIFF c5 Nikon Coolpix 4100 1/2.5 inch 4 MP 2288 1712 JPEG c6 Nokia 6630 (3G smartphone) 1280 960 JPEG c7 Olympus E-10 2/3 inch 4 MP 2240 1680 JPEG/TIFF c8 Olympus D-360L 1280 960 JPEG/TIFF c9 Panasonic Lumix DMC-FZ4-1 1/2.5 inch 4 MP 2304 1728 JPEG/TIFF c10 Panasonic Lumix DMC-FZ4-2 1/2.5 inch 4 MP 2304 1728 JPEG/TIFF Fig. 5 Identification of low resolution (1024*768) c1 Canon SD200-1 images [13]. Fig. 6 The correlation values for various denoised images from c2 Canon SD200-2 images: the original images (left), the denoise images (right) [13].

Camera Identification Technique 25 In this paper, we apply the camera identification technique based on sensor noise in forensic science and propose an origin-tracing method based on foregoing research. The mathematic model is proposed as following: Y i = X i +Φ i + C i + ε i, (2) where Y i denotes the i-th output image, X i denotes the light information inputs for sensor in the i-th image, Φ i denotes the sensor noise (includes PRNU) in the i-th image, C i denotes the dark current in the i-th image, ε i denotes the random noise in the i-th image. We extract the noise pattern template as follows: Y' i = f d ( Y i ), (3) Y ' i denotes the i-th output image after denoise processing, f d (.) denotes the denoise function. N i = Y' i - Y i = Φ i + C i + ε i, (4) where N i denotes the noise in the i-th image. Because the ε i denotes the random noise in the i-th image, we assume it as a Gaussian random noise with zero mean, E ( ε i ) =0. Therefore, we obtain the noise pattern template N. N= E ( N i )=E ( Y' i - Y i )=Φ+C. (5) Experimental Results This section presents the experimental result of the camera identification technique based on sensor noise in different imaging devices. Digital cameras and mobile phones are used to verify the performance of our proposed camera identification technique. The list of digital cameras in the forensic science laboratory in Central Police University is shown as Table 4. The list of mobile phones is shown as Table 5. The noise pattern analysis algorithms were developed using Matlab 7. The Pearson correlation measure is used to as an evaluation measure to trace origin of digital photos. The testing platform is Microsoft Windows 7, Intel Core Duo 1.66 GHz with 2 GB memory. Table 4 The list of digital cameras in the experiment. Cameras No. Label Serial Number D80-1 Nikon D80 Digital SLR Camera 6134673 D80-2 Nikon D80 Digital SLR Camera 6134956 D90-1 Nikon D90 Digital SLR Camera 8339895 D90-2 Nikon D90 Digital SLR Camera 8339516 D7000-1 Nikon D7000 Digital SLR Camera 8245720 D7000-2 Nikon D7000 Digital SLR Camera 8246338 Camera Lens Serial Number Nikon 28-85mm f/3.5-4.5 AF Nikkor 3199726 Table 5 The list of mobile phones in the experiment. Label ASUS ZenFone 2 Laser (ZE550KL) ASUS ZenFone 2 ZE551ML-1 ASUS ZenFone 2 ZE551ML-2 HTC butterfly X920D Oppo r7sf Sony Xperia Z5 Sony Xperia Z5P Serial Number GCAZCY004318KMK F9AZFG011679 F9AZFG015590 FA33CPN06653 25c0cec4 BH903M6L4Z CB5A29R5F7

26 Forensic Science Journal 2017; 16(1) Digital cameras Six DSLR cameras with 3 focal length types (28mm, 50mm, and 85mm of the same camera lens) are combined into 18 different experiment samples (shown as Table 6) used in this experiment. We use the same shooting conditions, auto-mode, ISO 400, and Large JPEG (FINE) store format, to take more than 200 pictures for each experimental sample. The themes includes portrait and landscape shots. Afterwards, those photos are randomly divided into two groups, one for training noise pattern template, and the other group is used to validate the performance of our proposed method. We use the Daubechies 8 wavelet (Db8) filter and the Wiener filter as the denoise filter to extract the sensor noises. The experimental results are given in Appendix A. Table 6 The list of samples for digital cameras. Cameras No. Focus Length Experiment Samples ID D80-1 28 mm D8028-1 D80-1 50 mm D8050-1 D80-1 85 mm D8085-1 D80-2 28 mm D8028-2 D80-2 50 mm D8050-2 D80-2 85 mm D8085-2 D90-1 28 mm D9028-1 D90-1 50 mm D9050-1 D90-1 85 mm D9085-1 D90-2 28 mm D9028-2 D90-2 50 mm D9050-2 D90-2 85 mm D9085-2 D7000-1 28 mm D700028-1 D7000-1 50 mm D700050-1 D7000-1 85 mm D700085-1 D7000-2 28 mm D700028-2 D7000-2 50 mm D700050-2 D7000-2 85 mm D700085-2 From the experimental result, we find out the Wiener filter is a better tool as a denoise filter for our proposed method to extract the sensor noise pattern. In addition, the focus length is also a factor to trace origin based on sensor noise pattern. In conclusion, according to the experimental result, the performance of the proposed is able to trace each origin based on sensor noise pattern with the threshold of 0.075 correlation coefficient value. Mobile phones As the foregoing description, 7 different mobile phones (shown as Table 5) are used in this experiment. We use the shooting conditions, auto-mode and JPEG file format, to take more than 80 pictures for each device. Those themes include portrait and landscape shots. Then, we use the Wiener filter as the denoise filter to

Camera Identification Technique 27 extract the sensor noises. The experimental results are given in Appendix B. From the experimental result, we find out the performance of our proposed is able to trace each origin in mobile phone cameras with the threshold of 0.05 correlation coefficient value. Moreover, from the experimental result (Fig. B-6 and Fig. B-7), we can see that the sensor noise patterns in Sony Xperia Z5 and Sony Xperia Z5P have the same classification characteristics. Conclusions In this paper, the noise extraction mathematic model of sensor noise based camera identification technique is proposed. We also apply the sensor noise based camera identification technique to trace origin of digital photos in forensic science. Six DSLR cameras and seven mobile phone cameras are used in the experiment. The experimental results are shown that the proposed method has a good performance to trace origin of the experimental photos. In other word, we can find out the linkage between the photo and its capture device using just photo content by the proposed method. In our future work, we will add large devices to make an experiment to verify the generality of the proposed method. In addition, we will extend the proposed method to video evidence. Acknowledgements The authors would like to thank the anonymous reviewers for their insightful comments and valuable suggestions. This work was supported by National Science Council, Taiwan (MOST 106-2218-E-015-001-). References 1. Cohen K. Digital still camera forensics. Small Scale Digital Device Forensics Journal 2007;1(1):1-8. 2. Cox I, Miller M, Bloom J, Fridrich J, Kalker T. Digital watermarking and steganography. Morgan Kaufmann Publisher, 2008. 3. Blythe P, Fridrich J. Secure digital camera. Digital Forensic Research Workshop, Baltimore, 11-13 Aug 2004. 4. Popescu AC, Farid H. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing 2005;53(10):3948-59. 5. Swaminathan A, Wu M, Liu KJ-R. Non-intrusive forensic analysis of visual sensors using output images. IEEE Transactions of Information Forensics and Security 2007;2(1):91-106. 6. Dirik AE, Sencar HT, Memon N. Digital single lens reflex camera identification from traces of sensor dust. IEEE Transactions on Information Forensics and Security 2008;3(3):539-52. 7. Kurosawa K, Kuroki K, Saitoh N. CCD fingerprint method-identification of a video camera from videotaped images. Proc ICIP, 24-28 October 1999. 8. Geradts ZJ, Bijhold J, Kieft M, Kurosawa K, Kuroki K, Saitoh N. Methods for identification of images acquired with digital cameras. Proc SPIE Enabling Technologies for Law Enforcement and Security, 4232:505-12, 21 February 2001. 9. Lukas J, Fridrich J, Goljan M. Determining digital image origin using sensor imperfections. Proc SPIE Electronic Imaging:249-60, San Jose, CA, 16-20 January 2005. 10. Lukas J, Fridrich J, Goljan M. Digital bullet scratches for images. Proc ICIP, Genova, Italy, 11-14 September 2005. 11. Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor noise. IEEE Transactions on Information Security and Forensics 2006;1(2):205-14. 12. Mihcak MK, Kozintsev I, Ramchandran K. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. Proc IEEE Int. Conf. Acoustics, Speech, Signal Processing;6:3253-6, Phoenix, AZ, 15-19 March 1999. 13. Khanna N, Mikkilineni AK, Delp EJ. Forensic camera classification: verification of sensor pattern noise approach. Forensic Science Communications 2009;11(1).

28 Forensic Science Journal 2017; 16(1) Appendix A Fig. A-1 The tracing origin result of photos acquired by D8028-1 with the Db8 filter. Fig. A-2 The tracing origin result of photos acquired by D8028-1 with the Wiener filter. Fig. A-3 The tracing origin result of photos acquired by D8050-1 with the Db8 filter.

Camera Identification Technique 29 Fig. A-4 The tracing origin result of photos acquired by D8050-1 with the Wiener filter. Fig. A-5 The tracing origin result of photos acquired by D8085-1 with the Db8 filter. Fig. A-6 The tracing origin result of photos acquired by D8085-1 with the Wiener filter.

30 Forensic Science Journal 2017; 16(1) Fig. A-7 The tracing origin result of photos acquired by D8028-2 with the Db8 filter. Fig. A-8 The tracing origin result of photos acquired by D8028-2 with the Wiener filter. Fig. A-9 The tracing origin result of photos acquired by D8050-2 with the Db8 filter.

Camera Identification Technique 31 Fig. A-10 The tracing origin result of photos acquired by D8050-2 with the Wiener filter. Fig. A-11 The tracing origin result of photos acquired by D8085-2 with the Db8 filter. Fig. A-12 The tracing origin result of photos acquired by D8085-2 with the Wiener filter.

32 Forensic Science Journal 2017; 16(1) Fig. A-13 The tracing origin result of photos acquired by D9028-1 with the Db8 filter. Fig. A-14 The tracing origin result of photos acquired by D9028-1 with the Wiener filter. Fig. A-15 The tracing origin result of photos acquired by D9050-1 with the Db8 filter.

Camera Identification Technique 33 Fig. A-16 The tracing origin result of photos acquired by D9050-1 with the Wiener filter. Fig. A-17 The tracing origin result of photos acquired by D9085-1 with the Db8 filter. Fig. A-18 The tracing origin result of photos acquired by D9085-1 with the Wiener filter.

34 Forensic Science Journal 2017; 16(1) Fig. A-19 The tracing origin result of photos acquired by D9028-2 with the Db8 filter. Fig. A-20 The tracing origin result of photos acquired by D9028-2 with the Wiener filter. Fig. A-21 The tracing origin result of photos acquired by D9050-2 with the Db8 filter.

Camera Identification Technique 35 Fig. A-22 The tracing origin result of photos acquired by D9050-2 with the Wiener filter. Fig. A-23 The tracing origin result of photos acquired by D9085-2 with the Db8 filter. Fig. A-24 The tracing origin result of photos acquired by D9085-2 with the Wiener filter.

36 Forensic Science Journal 2017; 16(1) Fig. A-25 The tracing origin result of photos acquired by D700028-1 with the Db8 filter. Fig. A-26 The tracing origin result of photos acquired by D700028-1 with the Wiener filter. Fig. A-27 The tracing origin result of photos acquired by D700050-1 with the Db8 filter.

Camera Identification Technique 37 Fig. A-28 The tracing origin result of photos acquired by D700050-1 with the Wiener filter. Fig. A-29 The tracing origin result of photos acquired by D700085-1 with the Db8 filter. Fig. A-30 The tracing origin result of photos acquired by D700085-1 with the Wiener filter.

38 Forensic Science Journal 2017; 16(1) Fig. A-31 The tracing origin result of photos acquired by D700028-2 with the Db8 filter. Fig. A-32 The tracing origin result of photos acquired by D700028-2 with the Wiener filter. Fig. A-33 The tracing origin result of photos acquired by D700050-2 with the Db8 filter.

Camera Identification Technique 39 Fig. A-34 The tracing origin result of photos acquired by D700050-2 with the Wiener filter. Fig. A-35 The tracing origin result of photos acquired by D700085-2 with the Db8 filter. Fig. A-36 The tracing origin result of photos acquired by D700085-2 with the Wiener filter.

40 Forensic Science Journal 2017; 16(1) Appendix B Fig. B-1 The tracing origin result of photos acquired by ASUS Zenfone 2 ZE 550KL. Fig. B-2 The tracing origin result of photos acquired by ASUS Zenfone 2 ZE 551ML1. Fig. B-3 The tracing origin result of photos acquired by ASUS Zenfone 2 ZE 551ML2.

Camera Identification Technique 41 Fig. B-4 The tracing origin result of photos acquired by HTC Butterfly X920D. Fig. B-5 The tracing origin result of photos acquired by Oppo R7SF. Fig. B-6 The tracing origin result of photos acquired by Sony Xperia Z5.

42 Forensic Science Journal 2017; 16(1) Fig. B-7 The tracing origin result of photos acquired by Sony Xperia Z5P.