Multiple point Android digital image authentication

Digital images have been accepted as evidence in courts of law for a long time. One mandatory aspect for the admission of photographic evidence is the need for authentication. A spontaneous scene is very likely to be photographed with a smartphone rather than a classical camera. Android powered devices count for around 80% of smartphones worldwide. There is a high probability that an image used as evidence has been captured with this type of device. Android uses JPEG format for storing captured images. JPEG header's embedded information exhibits a wide variation across different models and manufacturers. By taking advantage of this variation, the authentication method described in this article employs a multiple point verification of both intrinsic and extrinsic properties of the analyzed image. The extrinsic properties are being obtained from a 185 entries database of Android powered devices. Authentication is performed straight-forward, allowing the authenticity decision to be made at different points in the process, without the need of a full analysis to be employed beforehand.

[1]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[2]  Bogdan-Mihai G. Gavriloaia,et al.  Exposing copy-move image tampering using forensic method based on SURF , 2013, Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013.

[3]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[5]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[6]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[7]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[8]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[9]  Hany Farid,et al.  Digital image authentication from thumbnails , 2010, Electronic Imaging.

[10]  Paul Alvarez,et al.  Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis , 2004, Int. J. Digit. EVid..

[11]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[12]  Hany Farid,et al.  Digital Image Ballistics from JPEG Quantization , 2006 .

[13]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.