Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches

被引:0
作者
Sameer, Venkata Udaya [1 ]
Sugumaran, S. [1 ]
Naskar, Ruchira [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela 769008, Orissa, India
来源
INFORMATION SYSTEMS SECURITY | 2016年 / 10063卷
关键词
Classification; Cybercrime; Digital forensics; Feature extraction; Feature selection; Genetic Algorithm; Source camera identification;
D O I
10.1007/978-3-319-49806-5_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital Forensics is the branch of science dealing with investigation of evidences recovered from digital devices, to safeguard against rapidly increasing cyber crimes in today's digital world. The Source Camera Identification (SCI) problem is to map an image under question correctly to its source device. Following a Digital Forensic approach, the source of an image is detected by post-priori investigation of traces left behind in the image, by the camera. Such traces are generated due to the post-processing operations an image undergoes inside a digital camera, after being captured. In this paper, we model the SCI problem as a machine learning classification problem and focus on the most crucial component of a learning model, i.e. feature selection. We propose three different techniques for feature selection: Filter based approach, Wrapper based approach using Genetic Algorithm (GA), and also a hybrid approach with both Filter and Wrapper methods combined together. We investigate the source detection accuracy that each technique succeeds to achieve. Our experimental results suggest that the proposed methods produced a much compact feature set, hence considerably improve the source detection accuracy and minimize the training time of the learning model, as compared to the state-of-the-art.
引用
收藏
页码:409 / 425
页数:17
相关论文
共 32 条
[1]  
[Anonymous], 2006, WORK GROUP 119 INT C
[2]  
[Anonymous], INT C IM PROC ICIP
[3]   Steganalysis using image quality metrics [J].
Avcibas, I ;
Memon, N ;
Sankur, B .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) :221-229
[4]  
Avcibas I., 2002, INT C IM PROC ICIP, V3
[5]   Image manipulation detection [J].
Bayram, Sevinc ;
Avcibas, Ismail ;
Sankur, Bulent ;
Memon, Nasir .
JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
[6]  
Bhasin V., 2014, INT C ADV COMP COMM
[7]  
Biney A. G., 2013, INT C IM PROC ICIP
[8]   Blind identification of source cell-phone model [J].
Celiktutan, Oya ;
Sankur, Buelent ;
Avcibas, Ismail .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) :553-566
[9]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[10]  
Chen Y. -H., 2014, INT C MACH LEARN CYB