Game theoretic analysis of camera source identification

Sensor pattern noise (SPN) is recognized as a reliable device fingerprint for camera source identification (CSI). However, source identification method (source test) ignores whether the fingerprint is forged and anti-forensic techniques seldom consider traces they leave behind. Therefore, the performance of above techniques needs to be evaluated again by assuming the existence of both parties of a forensic investigator and an anti-forensic forger. In this paper, we propose a novel counter anti-forensic method based on noise level estimation to detect the possible forgery (forgery test). Furthermore, we evaluate the Nash equilibrium performance when investigator performs both source test and forgery test, and identify the optimal strategies of both parties with the game theory. The experimental results show that our proposed method can achieve good performance without collecting the candidate image set in the existing triangle test method especially when the false alarm rate is held low (e.g. Pfa <; 5%).

[1]  Nasir D. Memon,et al.  Efficient Sensor Fingerprint Matching Through Fingerprint Binarization , 2012, IEEE Transactions on Information Forensics and Security.

[2]  K. J. Ray Liu,et al.  Forensics vs. anti-forensics: A decision and game theoretic framework , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[4]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[5]  Miroslav Goljan,et al.  Digital Camera Identification from Images - Estimating False Acceptance Probability , 2008, IWDW.

[6]  Rainer Böhme,et al.  Can we trust digital image forensics? , 2007, ACM Multimedia.

[7]  Mo Chen,et al.  Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Transactions on Information Forensics and Security.

[8]  Rainer Böhme,et al.  Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.

[9]  Xinhao Liu,et al.  Noise level estimation using weak textured patches of a single noisy image , 2012, 2012 19th IEEE International Conference on Image Processing.

[10]  Min Wu,et al.  Exploring compression effects for improved source camera identification using strongly compressed video , 2011, 2011 18th IEEE International Conference on Image Processing.

[11]  Roberto Caldelli,et al.  An analysis on attacker actions in fingerprint-copy attack in source camera identification , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[12]  Oscar C. Au,et al.  Alternative Anti-Forensics Method for Contrast Enhancement , 2011, IWDW.

[13]  K. J. Ray Liu,et al.  A context adaptive predictor of sensor pattern noise for camera source identification , 2012, 2012 19th IEEE International Conference on Image Processing.

[14]  Jiwu Huang,et al.  Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Stefan Katzenbeisser,et al.  Cell phone camera ballistics: attacks and countermeasures , 2010, Electronic Imaging.

[16]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[17]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.