The Video Authentication and Camera Identification Database: A New Database for Video Forensics

Modern technologies have made the capture and sharing of digital video commonplace; the combination of modern smartphones, cloud storage, and social media platforms have enabled video to become a primary source of information for many people and institutions. As a result, it is important to be able to verify the authenticity and source of this information, including identifying the source camera model that captured it. While a variety of forensic techniques have been developed for digital images, less research has been conducted toward the forensic analysis of videos. In part, this is due to a lack of standard digital video databases, which are necessary to develop and evaluate state-of-the-art video forensic algorithms. In this paper, to address this need, we present the video authentication and camera identification (video-ACID) database, a large collection of videos specifically collected for the development of camera model identification algorithms. The video-ACID database contains over 12 000 videos from 46 physical devices representing 36 unique camera models. Videos in this database are hand collected in a diversity of real-world scenarios are unedited and have known and trusted provenance. In this paper, we describe the qualities, structure, and collection procedure of video-ACID, which includes clearly marked videos for evaluating camera model identification algorithms. Finally, we provide baseline camera model identification results on these evaluation videos using the state-of-the-art deep-learning techniques. The Video-ACID database is publicly available at misl.ece.drexel.edu/video-acid.

[1]  Matthew C. Stamm,et al.  Learned Forensic Source Similarity for Unknown Camera Models , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[2]  Mauro Barni,et al.  Improving the security of image manipulation detection through one-and-a-half-class multiple classification , 2019, Multimedia Tools and Applications.

[3]  Min Wu,et al.  Exploring compression effects for improved source camera identification using strongly compressed video , 2011, 2011 18th IEEE International Conference on Image Processing.

[4]  Matthias Kirchner,et al.  Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.

[5]  Mauro Barni,et al.  A video forensic technique for detecting frame deletion and insertion , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  A. Piva An Overview on Image Forensics , 2013 .

[7]  Ahmet Emir Dirik,et al.  PRNU-based source device attribution for YouTube videos , 2019, Digit. Investig..

[8]  Belhassen Bayar,et al.  Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[9]  Paolo Bestagini,et al.  Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[10]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[11]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[12]  Kenji Kurosawa,et al.  CCD fingerprint method-identification of a video camera from videotaped images , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[13]  Nasir D. Memon,et al.  Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.

[14]  Mo Chen,et al.  Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries , 2007, Information Hiding.

[15]  Jiwu Huang,et al.  Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise , 2012, IEEE Transactions on Information Forensics and Security.

[16]  K. J. Ray Liu,et al.  Blind forensics of contrast enhancement in digital images , 2008, 2008 15th IEEE International Conference on Image Processing.

[17]  Jessica J. Fridrich,et al.  Deep Learning for Detecting Processing History of Images , 2018, Media Watermarking, Security, and Forensics.

[18]  Belhassen Bayar,et al.  Towards Order of Processing Operations Detection in JPEG-compressed Images with Convolutional Neural Networks , 2018, Media Watermarking, Security, and Forensics.

[19]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[20]  Matthew C. Stamm,et al.  Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration , 2018, IEEE Transactions on Information Forensics and Security.

[21]  Matthew C. Stamm,et al.  Camera model identification framework using an ensemble of demosaicing features , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[22]  Amit K. Roy-Chowdhury,et al.  Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries , 2019, IEEE Transactions on Image Processing.

[23]  Mauro Barni,et al.  Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[24]  Luisa Verdoliva,et al.  A study of co-occurrence based local features for camera model identification , 2016, Multimedia Tools and Applications.

[25]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[26]  Paolo Bestagini,et al.  Video codec identification , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[27]  A. De Rosa,et al.  Unsupervised fusion for forgery localization exploiting background information , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[28]  Marco Fontani,et al.  VISION: a video and image dataset for source identification , 2017, EURASIP Journal on Information Security.

[29]  Min Wu,et al.  Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.

[30]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[31]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[32]  A. Piva,et al.  overview paper An overview on video forensics , 2012 .

[33]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[34]  Giulia Boato,et al.  Tracking Multiple Image Sharing on Social Networks , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[35]  Matthew C. Stamm,et al.  Computationally efficient demosaicing filter estimation for forensic camera model identification , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[36]  Xinghao Ding,et al.  Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning , 2019, IEEE Access.

[37]  Chang-Tsun Li Source camera identification using enhanced sensor pattern noise , 2010, IEEE Trans. Inf. Forensics Secur..

[38]  Anderson Rocha,et al.  Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.

[39]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[40]  Marc Chaumont,et al.  Camera model identification with the use of deep convolutional neural networks , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[41]  Belhassen Bayar,et al.  A Video Camera Model Identification System Using Deep Learning and Fusion , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[42]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[43]  Jonathan G. Fiscus,et al.  MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation , 2019, 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW).

[44]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[45]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[46]  K. J. Ray Liu,et al.  Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.

[47]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[48]  Belhassen Bayar,et al.  Design Principles of Convolutional Neural Networks for Multimedia Forensics , 2017, Media Watermarking, Security, and Forensics.

[49]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[50]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[51]  Paolo Bestagini,et al.  First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.

[52]  Matthew Brand,et al.  Understanding manipulation in video , 1996, Proceedings of the Second International Conference on Automatic Face and Gesture Recognition.

[53]  Alessandro Piva,et al.  Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.

[54]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.