Retrieval of Large Scale Images and Camera Identification via Random Projections

Similar documents
Camera identification from sensor fingerprints: why noise matters

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis

Fragile Sensor Fingerprint Camera Identification

Camera identification by grouping images from database, based on shared noise patterns

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Introduction to Video Forgery Detection: Part I

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Local prediction based reversible watermarking framework for digital videos

ABC: Enabling Smartphone Authentication with Built-in Camera

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Quality Measure of Multicamera Image for Geometric Distortion

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

TECHNICAL DOCUMENTATION

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

Source Camera Model Identification Using Features from contaminated Sensor Noise

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Survey on Source Camera Identification Using SPN with PRNU

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

Image Forgery Identification Using JPEG Intrinsic Fingerprints

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

International Journal of Advance Research in Computer Science and Management Studies

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Automated inspection of microlens arrays

Main Subject Detection of Image by Cropping Specific Sharp Area

IEEE Signal Processing Letters: SPL Distance-Reciprocal Distortion Measure for Binary Document Images

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

Image Forgery Detection Using Svm Classifier

Exposing Image Forgery with Blind Noise Estimation

A New Compression Method for Encrypted Images

Segmentation using Saturation Thresholding and its Application in Content-Based Retrieval of Images

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods

3D Face Recognition System in Time Critical Security Applications

A Novel Multi-size Block Benford s Law Scheme for Printer Identification

Image Extraction using Image Mining Technique

Improved Detection of LSB Steganography in Grayscale Images

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter

Literature Survey on Image Manipulation Detection

Effects of Basis-mismatch in Compressive Sampling of Continuous Sinusoidal Signals

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Content Based Image Retrieval Using Color Histogram

Supplementary Materials for

Enhanced DCT Interpolation for better 2D Image Up-sampling

Method for Real Time Text Extraction of Digital Manga Comic

Improved SIFT Matching for Image Pairs with a Scale Difference

Iris Recognition using Hamming Distance and Fragile Bit Distance

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

An Implementation of LSB Steganography Using DWT Technique

Dynamic Collage Steganography on Images

License Plate Localisation based on Morphological Operations

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Scanner Identification Using Sensor Pattern Noise

Image Denoising Using Statistical and Non Statistical Method

Automatic Licenses Plate Recognition System

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Auto-tagging The Facebook

Lossless Image Watermarking for HDR Images Using Tone Mapping

RESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT DETECTION IN VIDEO IMAGES USING CONNECTED COMPONENT ANALYSIS

A new quad-tree segmented image compression scheme using histogram analysis and pattern matching

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee

Forensic Hash for Multimedia Information

A Study on Image Enhancement and Resolution through fused approach of Guided Filter and high-resolution Filter

Effective and Efficient Fingerprint Image Postprocessing

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

Pose Invariant Face Recognition

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets

A SURVEY ON HAND GESTURE RECOGNITION

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Evaluation of Visual Cryptography Halftoning Algorithms

FACE RECOGNITION USING NEURAL NETWORKS

Multimodal Face Recognition using Hybrid Correlation Filters

Decoding Distance-preserving Permutation Codes for Power-line Communications

Automatic source camera identification using the intrinsic lens radial distortion

DESIGN & IMPLEMENTATION OF FIXED WIDTH MODIFIED BOOTH MULTIPLIER

Lossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques

Recognition Of Vehicle Number Plate Using MATLAB

On the efficiency of luminance-based palette reordering of color-quantized images

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS

Real-Time Face Detection and Tracking for High Resolution Smart Camera System

A Novel Technique or Blind Bandwidth Estimation of the Radio Communication Signal

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Stamp detection in scanned documents

Performance comparison of convolutional and block turbo codes

SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS

Transcription:

Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management Jalgaon, Maharashtra, India Abstract- Retrieving of large size images from a huge collection is a relevant and a difficult task. And matching those images with the source camera is tedious and time consuming. There are Sensor imperfections in the form of Photo Response Non Uniformity (PRNU) patterns is a wellestablished fingerprinting technique to link pictures to the camera sensors that acquired them and can be used for this purpose, but due to noise like characteristics present in them and large size of PRNU makes it difficult to compress the objects and increases the complexity of the matching operational tasks. Thus an efficient technique is been proposed called as Random Projections for the retrieval of images on a large scale which not only compress the images but also match them according to the source camera through which they have acquired. Circulant matrices are used in this technique to address the complexity of implementing Random Projections. KeyWords: Sensor imperfections, Photo Response Non Uniformity, Camera sensors, Random Projections, Circulant matrices. 1. INTRODUCTION Every day, millions of pictures are uploaded, shared, and browsed by Internet users, which results in very large collections of images that require an efficient solutions for their management [1].Imaging sensor imperfections can be considered as a unique camera fingerprint identifying a specific acquisition device, which enables various important forensic tasks, such as camera identification, camera linking, recovery of processing history, detection of digital forgeries. In this sense, a technology called contentbased image retrieval has received a lot of attention in recent years [2].The most common camera fingerprint is the photo-response nonuniformity (PRNU)[3] of the digital imaging sensor which is due to slight or minor variations in the properties of individual pixels, which produce a noise-like, yet deterministic pattern affecting every image taken by a sensor. In the case of PRNU, the camera fingerprint is essentially a pattern with the same size as the imaging sensor. Thus it requires a large database to store those camera fingerprints in uncompressed format. In addition, the complexity of a particular fingerprint in a large database is also very high, typically requiring the computation of a correlation with each fingerprint in the database. The large scale problems, such as image classification, clustering or image retrieval problems based on camera identities, involve a huge number of PRNU patterns. Hence, these problems requires the techniques to efficiently store and query such databases. Another problem with PRNU fingerprints is that the test image 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1421

should be geometrically aligned with the camera fingerprint stored in the database. Using the PRNU for large-scale image retrieval is an extremely challenging task. A possible solution is to provide several versions of the same fingerprint with different scale however at the cost of managing an even larger database. In this paper, a novel technique is propose to reduce the size of camera fingerprints based on random projections. The technique is motivated by the Johnson- Lindenstrauss (JL) lemma [4], stating that a small set of points in a high dimensional space can be embedded into a lower dimensional space approximately preserving the distances between the points, and the recent results shows that random linear projections can provide such embeddings with high probability. In the case of PRNU fingerprints, it is easy to show that preserving the distance between two fingerprints is equivalent to preserving the angle between them. Since PRNU fingerprints of different sensors are known to be highly uncorrelated, and thus to form wide angles. As a consequence, in this paper the standard correlation detector is adapted to solve fingerprint matching and camera identification problems in the compressed domain. As to practical issues, the complexity of randomly projecting a large fingerprint is greatly reduced by employing partial circulant matrices [5], which are known to be almost as good as fully random matrices. A binary version of the compressed fingerprint is proposed that further reduces storage and computational requirements. pictures matching a specific criterion, that can be used for searching pictures of interest or for classifying similar photos. In this sense, content- based image retrieval is a technology that has received a lot of attention in recent years [2]. In a nutshell, it consists in extracting a set of representative features that allow to find pictures having similar content with respect to a query image. However, the content of a picture is not the sole criterion for performing image retrieval. Another very interesting task consists in looking for pictures that have been acquired by a specific device. Let us imagine a search engine that, given a specific camera as a query, returns all the web pages containing photos acquired by that camera. Such a technology could be very useful for detecting improper usage of images. The professional and expert photographers could use it to prevent improper diffusion and usage of their photos, large web sites could avoid being sued for redistributing unlicensed photographs, police investigators who have come across a digital camera or even the pictures which are linked to an unlawful act, e.g., child pornography, could look for other pictures taken by the same camera in either public databases or large internal databases managed by the police. The authors propose a so-called fingerprint digest,[6] which works by keeping only a fixed number of the largest fingerprint values and their positions, so that the resulting database is independent of the sensor resolution. An improved search strategy based on fingerprint digest is proposed in [7]. An alternative solution is to represent sensor fingerprints in binary-quantized form [8]: even 2. BACKGROUND There are large number of pictures uploaded, shared, and browsed by Internet users, resulting in very large though the size of binary fingerprints scales with sensor resolution, binarization can considerably speed-up the fingerprint matching process. collections of images that requires an efficient solutions for their management. An important task is the retrieval of 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1422

3. PROPOSED TECHNIQUE The system is modeled as in Fig. 1. A collection of most similar to a test fingerprint ˆk R n that is presented to the system. photos is gathered, e.g., by means of an automatic web crawler, and an estimate of the fingerprint is extracted from each photo. This estimate is compressed by means of binary random projections and stored. Fig.2. Camera Fingerprint Estimate To this purpose, one of the most used similarity Fig.1. Block Diagram of the Proposed System. criteria is the correlation coefficient defined as follows: PRNU databases can rapidly grow in size. For this reason, a method to compress them is required, with slight or ideally no information loss. One possible option is represented by Random Projections (RP), a low complexity ρ(ˆk, di ) =(ˆk, di ), i = 1,..., N ˆk 2 di 2 To compress the database and test fingerprint representing them through a small number of random and yet powerful method for dimensionality reduction. projections. This operation can be seen as the product The idea of RP is to project the original n dimensional data to an m dimensional subspace, with m < n, using a random matrix ɸ Rm n. Hence, a collection of N n dimensional data D Rn N is reduced to an m dimensional subspace A Rm N by A = ɸD. The steps involved in this technique are : 3.1 Fingerprint Matching In the fingerprint matching problem, a dictionary of fingerprints of N known cameras is constructed, which can be represented as a matrix D R n N. The goal of the classic fingerprint matching problem is finding the column that is times an m n sensing matrix ɸ : A = ɸD y = ɸ ^K Random projections can effectively reduce the dimension of the space the fingerprints live in thanks to the fact that they approximately preserve the geometry of the point cloud composed of the fingerprints. Since random projections approximately preserve the angle between any two fingerprints and since this angle is wide thanks to their incoherent nature, we can expect a compressive system to exhibit robust performance, while dramatically reducing the problem size. The system has to store the compressed dictionary A and a way to generate 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1423

the compressed fingerprint whenever a test pattern is presented, using the same ɸ. The first system design challenge is the choice of the sensing matrix: the most studied sensing matrices are made of realizations of independent and identically distributed (i.i.d.) Partial circulant matrices generate the first row φ at random and all the other rows are just circularly shifted versions of the first row. Circulant matrices provide great advantages because only the first matrix to both noise residual and fingerprint to translate this detector to the compressed domain. ρ(w, di ) ρ(ɸw, ɸdi ) The second simplified detector considers the use of a fingerprint estimate k extracted from the single test image instead of the noise residual. The detector then correlates this test fingerprint estimate with the fingerprint stored in the dictionary. ρ(ˆk, di ) ρ(ɸˆk,ɸdi ). row must be generated at random, and because fast multiplication is available through the FFT. Thanks to the use of the FFT, the product ɸD can be implemented with O(Nn log n) operations instead of O(Nmn). Consider the case of binary random measurements obtained as: A = sign(ɸd) 3.2 Camera Identification The camera identification problem is conceptually very similar to the fingerprint matching scenario. The main difference is that a single test image is available instead of a set of them. Chen et al. [9] showed that the optimal detector for this problem correlates the noise residual of the image with a modulated version of the fingerprint stored in the database, where the modulating term is the test image. Extending this detector to the compressed domain is not possible because of the element wise product between test image and the fingerprint in the database. Instead, we investigate the performance of two simplified detectors that can be readily mapped to the compressed domain. The first simplified detector correlates the noise residual w of the test image with the camera fingerprint stored in the database. Essentially this system is capable of eliminates the modulating effect of the test image, thus it will be sub-optimal unless the test image is a constant pattern. It is sufficient to apply the sensing 3.3 Detection Metrics The matching problem is concerned with finding the column of the dictionary that best matches a test compressed pattern. The test compressed fingerprint undergoes a binary hypothesis test for each column of the compressed dictionary. The two hypotheses are defined as: H0: the compressed test fingerprint and the reference are not from the same camera H1: the compressed test fingerprint and the reference are from the same camera Reject the null hypothesis whenever the correlation coefficient is above a predefined threshold τ. The following events, referring to a single instance of the hypothesis testing problem, i.e.,a single column of the dictionary. These are standard definitions, used for example in [10]. False Alarm: the null hypothesis was incorrectly rejected. Detection: the null hypothesis was correctly rejected. False alarm corresponds to the case in which the current column of the dictionary is the compressed fingerprint of a different camera with respect to the compressed fingerprint under test, but a match is incorrectly declared. On the other hand, detection occurs when the current 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1424

column of the dictionary is the compressed fingerprint of the same camera as the compressed fingerprint under test, and a match is correctly declared. Since previously-defined events are restricted to a single column of the dictionary, global events are introduced considering the dictionary as a whole. False Acceptance: the null hypothesis was rejected for fingerprints and enable fast matching techniques that are suitable for huge collections of photos at a small cost in terms of detection performance. Moreover, the results suggest that the proposed techniques enable image retrieval based on camera identities on unprecedented scales, effectively paving the way to the realization of a camera search engine spanning huge image collections at least one wrong camera. available on the Internet. Random Projections can True Detection: the null hypothesis was rejected only for the correct camera. False acceptance corresponds to the case in which all the columns of the dictionary are tested, and at least one column containing the compressed fingerprint of a different camera with respect to the compressed fingerprint under test is declared as a match. On the other hand, true detection occurs when all the columns of the dictionary are tested, and a match is declared only for the column corresponding to the same camera of the compressed fingerprint under test. effectively preserve the geometry of the database and significantly reduce the dimension of the problem with small penalties. The usage of real-valued and binary random measurements is characterized from a theoretical point of view in terms of the detection and false alarm probabilities. The use of random projections for compression of camera fingerprints paves the way to many interesting applications involving maintaining large databases of fingerprints or applications requiring transmission of fingerprints over band limited channels. From this perspective, random projections are significantly better than the other existing methods 4. Result The performance of the compressed system is tested under various conditions. Experimental tests have confirmed the validity of the proposed method. From this because they can provide higher compression ratios and improved scalability, References perspective, random projections are significantly better than the other existing methods because they can provide higher compression ratios and improved scalability, [1] Diego Valsesia, Student Member, IEEE, Giulio Coluccia, Member, IEEE, Tiziano Bianchi, Member, IEEE, and Enrico Magli, Senior Member, IEEE, Large-Scale Image Retrieval 5. Conclusion In this paper, an image retrieval problem is addressed where the user wants to find all the photos in a collection acquired by a specific device. PRNU fingerprints are an established method for robust camera identification, but their size makes them impractical to use on large scales. Random Projections can effectively compress the Based on Compressed Camera Identification,IEEE Transactions On Multimedia, Vol. 17, No. 9, September 2015. [2] R. Datta, D. Joshi, J. Li, and J. Z. Wang, Image retrieval: Ideas, influences, and trends of the new age, ACM Comput. Surveys, vol. 40, no.2, pp. 5:1 5:60, May 2008. [3] J.Lukáš, J. Fridrich, and M. Goljan, Determining digital image origin using sensor imperfections, in Proc. SPIE 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1425

Electron. Imag., Image Video Commun. Process., 2005, vol. 5685, pp. 249 260. [4[W. B. Johnson and J. Lindenstrauss, Extensions of Lipschitz mappings into a Hilbert space, ContemporaryMath., vol. 26, pp. 189 206, 1984. [5]J. Vybíral, A variant of the Johnson Lindenstrauss lemma for circulant matrices, J. Funct. Anal., vol. 260, no. 4, pp. 1096 1105, 2011. [6]Y. Hu, B. Yu, and C. Jian, Source camera identification using large components of sensor pattern noise, in Proc. 2nd Int. Conf. Comput. Sci. Appl., Dec. 2009, pp. 1 5. [7] Y. Hu, C.-T. Li, Z. Lai, and S. Zhang, Fast camera fingerprint search algorithm for source camera identification, in Proc. 5th Int. Symp. Commun. Control Signal Process., May 2012, pp. 1 5. [8] S. Bayram, H. Sencar, and N. Memon, Efficient sensor fingerprint matching through fingerprint binarization, IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1404 1413, Aug. 2012. [9] M. Chen, J. Fridrich, M. Goljan, and J. Lukas, Determining image origin and integrity using sensor noise, IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74 90, Mar. 2008. [10] M. Goljan, J. Fridrich, and T. Filler, Managing a large database of camera fingerprints, in Proc. SPIE,Media Forensics Security II, 2010, vol. 7541, pp. 754 108 754 108 12. 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1426