First Steps Toward Camera Model Identification With Convolutional Neural Networks

被引:195
作者
Bondi, Luca [1 ]
Baroffio, Luca [1 ]
Gueera, David [2 ]
Bestagini, Paolo [1 ]
Delp, Edward J. [2 ]
Tubaro, Stefano [1 ]
机构
[1] Politecn Milan, Dipartimento Elettron Informaz & Bioingn, I-20133 Milan, Italy
[2] Purdue Univ, Sch Elect & Comp Engn, Video & Image Proc Lab, W Lafayette, IN 47907 USA
关键词
Camera model identification; convolutional neural networks (CNN); image forensics;
D O I
10.1109/LSP.2016.2641006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Detecting the camera model used to shoot a picture enables to solve a wide series of forensic problems, from copyright infringement to ownership attribution. For this reason, the forensic community has developed a set of camera model identification algorithms that exploit characteristic traces left on acquired images by the processing pipelines specific of each camera model. In this letter, we investigate a novel approach to solve camera model identification problem. Specifically, we propose a data-driven algorithm based on convolutional neural networks, which learns features characterizing each camera model directly from the acquired pictures. Results on a well-known dataset of 18 camera models show that: 1) the proposed method outperforms up-to-date state-of-the-art algorithms on classification of 64x64 color image patches; 2) features learned by the proposed network generalize to camera models never used for training.
引用
收藏
页码:259 / 263
页数:5
相关论文
共 31 条
[11]   Automatic source camera identification using the intrinsic lens radial distortion [J].
Choi, Kai San ;
Lam, Edmund Y. ;
Wong, Kenneth K. Y. .
OPTICS EXPRESS, 2006, 14 (24) :11551-11565
[12]  
Cozzolino D, 2014, IEEE IMAGE PROC, P5302, DOI 10.1109/ICIP.2014.7026073
[13]  
Da Luo, 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P2669, DOI 10.1109/ICASSP.2014.6854084
[14]   Digital single lens reflex camera identification from traces of sensor dust [J].
Dirik, Ahmet Emir ;
Sencar, Husrev Taha ;
Memon, Nasir .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) :539-552
[15]  
Filler T, 2008, IEEE IMAGE PROC, P1296
[16]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[17]  
Gaborini L, 2014, IEEE INT WORKS INFOR, P125, DOI 10.1109/WIFS.2014.7084315
[18]  
Gloe Thomas, 2012, Transactions on Data Hiding and Multimedia Security VIII. Pattern Recognition for IT Security, P42, DOI 10.1007/978-3-642-31971-6_3
[19]  
Gloe T., 2010, P 2010 ACM S APPL CO, V2, P1585, DOI [DOI 10.1145/1774088.1774427, DOI 10.1080/15567281.2010.531500]
[20]  
Guanshuo Xu, 2012, 2012 IEEE International Conference on Multimedia and Expo (ICME), P392, DOI 10.1109/ICME.2012.87