Determination of Stop-Criterion for Incremental Methods Constructing Camera Sensor Fingerprint

This paper aims to find the minimum sample size of the camera reference image set that is needed to build a sensor fingerprint of a high performance. Today’s methods for building sensor fingerprints do rely on having a sufficient number of camera reference images. But, there is no clear answer to the question of how many camera reference images are really needed? In this paper, we will analyze and find out how to determine the minimum needed number of reference images to remove the mentioned uncertainty. We will introduce a quantitative measure (a stop-criterion) stating how many photos should be used to create a high-performance sensor fingerprint. This stop-criterion will directly reflect the confidence level that we would like to achieve. By considering that the number of digital images used to construct the camera sensor fingerprint can have a direct impact on performance of the sensor fingerprint, it is apparent that this, so far underestimated, topic is of major importance.

[1]  D. M. Hutton,et al.  Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia , 2005 .

[2]  Mo Chen,et al.  Source digital camcorder identification using sensor photo response non-uniformity , 2007, Electronic Imaging.

[3]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[4]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[5]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[6]  Babak Mahdian,et al.  Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .

[7]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[8]  Vito Cappellini,et al.  Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification , 2009, 2009 16th International Conference on Digital Signal Processing.

[9]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[10]  Yongjian Hu,et al.  Source Camera Identification Using Large Components of Sensor Pattern Noise , 2009, 2009 2nd International Conference on Computer Science and its Applications.

[11]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[12]  Nasir D. Memon,et al.  New Features to Identify Computer Generated Images , 2007, 2007 IEEE International Conference on Image Processing.

[13]  J. Fridrich,et al.  Detection of double-compression for applications in steganography , 2007 .

[14]  Mo Chen,et al.  Digital imaging sensor identification (further study) , 2007, Electronic Imaging.

[15]  Zeno J M H Geradts,et al.  Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images * , 2009, Journal of forensic sciences.

[16]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[17]  Chang-Tsun Li,et al.  Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis , 2009, e-Forensics.

[18]  Stephen D. Wolthusen,et al.  Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.

[19]  Chang-Tsun Li,et al.  Using improved imaging sensor pattern noise for source camera identification , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[20]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[21]  Babak Mahdian,et al.  A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..

[22]  David Williams,et al.  Accelerating colonic polyp detection using commodity graphics hardware , 2013, 2013 International Conference on Computer Medical Applications (ICCMA).

[23]  E. Delp,et al.  Security, steganography, and watermarking of multimedia contents , 2004 .

[24]  Xia Zhao,et al.  Evaluation of Autoparallelization Toolkits for Commodity GPUs , 2013, PPAM.

[25]  Xia Zhao,et al.  Evaluation of autoparallelization toolkits for commodity graphics hardware , 2013 .

[26]  Ali N. Akansu,et al.  Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia , 2004 .

[27]  Tian-Tsong Ng,et al.  Camera response function signature for digital forensics - Part I: Theory and data selection , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).