Canopy approach of image clustering based on camera fingerprints

被引:1
作者
Khan, Sahib [1 ]
机构
[1] Univ Engn & Technol, Dept Telecommun Engn, Mardan, Pakistan
关键词
Image forensics; Clustering; Camera fingerprints; Computational cost; IDENTIFICATION; ALGORITHM;
D O I
10.1007/s11042-022-12463-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents a canopy based image clustering algorithm using normalized cross-correlation among the camera fingerprints as a decision criterion. The proposed framework uses two levels of the threshold at two different stages to cluster images based on camera fingerprints. Initially, fingerprints are sorted in descending order of their goodness, and then raw clusters are constructed using a relaxed threshold followed by fine clustering with a hard threshold. The raw and fine clustering process results in non-overlapping clusters, which avoids assigning a fingerprint to multiple raw or fine clusters. The fine clusters are further processed in the attraction phase to improve the cluster's quality at the cost of some computation. The CIC algorithm results in high-quality clusters with a reduced computational cost. The results show that the computational complexity per fingerprint, with respect to the reference complexity of n(n - 1)/2, decreases as the size of the dataset increases. The proposed algorithm also does not suffer from the problem when the number of cameras is larger than the average number of images taken with a camera, i.e., NC >> SC. Hence, the algorithm is suitable for large scale clustering and solving different scenarios of NC >> SC.
引用
收藏
页码:21591 / 21618
页数:28
相关论文
共 52 条
  • [1] Database-friendly random projections: Johnson-Lindenstrauss with binary coins
    Achlioptas, D
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2003, 66 (04) : 671 - 687
  • [2] Is Normalized Mutual Information a Fair Measure for Comparing Community Detection Methods?
    Amelio, Alessia
    Pizzuti, Clara
    [J]. PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, : 1584 - 1585
  • [3] A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery
    Amerini, Irene
    Ballan, Lamberto
    Caldelli, Roberto
    Del Bimbo, Alberto
    Serra, Giuseppe
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 1099 - 1110
  • [4] [Anonymous], 2011, ENCY MACHINE LEARNIN
  • [5] [Anonymous], 2012, P MULT SEC
  • [6] [Anonymous], 2017, PROC 2 INT WORKSHOP
  • [7] Blind camera fingerprinting and image clustering
    Bloy, Greg J.
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2008, 30 (03) : 532 - U1
  • [8] Caldelli R, 2010, IEEE INT WORKS INFOR
  • [9] Determining image origin and integrity using sensor noise
    Chen, Mo
    Fridrich, Jessica
    GoIjan, Miroslav
    Lukas, Jan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) : 74 - 90
  • [10] Digital imaging sensor identification (further study)
    Chen, Mo
    Fridrich, Jessica
    Goljan, Miroslav
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505