Image provenance inference through content-based device fingerprint analysis

Lin, Xufeng and Li, Chang-Tsun 2018, Image provenance inference through content-based device fingerprint analysis. In Ismail Awad, Ali and Fairhurst, Michael (ed), Information security: foundations, technologies and applications, Institution of Engineering and Technology, London, Eng., pp.279-310, doi: 10.1049/pbse001e_ch12.

Attached Files
Name Description MIMEType Size Downloads

Title Image provenance inference through content-based device fingerprint analysis
Author(s) Lin, XufengORCID iD for Lin, Xufeng orcid.org/0000-0002-3400-8700
Li, Chang-TsunORCID iD for Li, Chang-Tsun orcid.org/0000-0003-4735-6138
Title of book Information security: foundations, technologies and applications
Editor(s) Ismail Awad, Ali
Fairhurst, Michael
Publication date 2018
Chapter number 12
Total chapters 15
Start page 279
End page 310
Total pages 32
Publisher Institution of Engineering and Technology
Place of Publication London, Eng.
Keyword(s) interpolation
data compression
image coding
aberrations
Summary We have introduced different intrinsic device fingerprints and their applications in image provenance inference. Although with varying levels of accuracy, the device fingerprints arising from optical aberration, CFA interpolation, CRF, and in-device image compression are effective in differentiating devices of different brands or models. Although they cannot uniquely identify the source device of an image, they do provide useful information about the image provenance and are effective at narrowing down the image source to a smaller set of possible devices. More than half of the chapter was spent on SPN, which is the only fingerprint that distinguishes devices of the same model. Because of its merits, such as the uniqueness to individual device and the robustness against common image operations, it has attracted much attention from researches and been successfully used for source device identification, device linking, source-oriented image clustering, and image forgery detection. In spite of the effectiveness of SPN, it is by nature a very weak signal and may have been contaminated by image content and other interferences. Its successful application requires jointly processing a large number of pixels, which results in very high dimensionality of SPN. This may bring huge difficulties in practice, e.g., in large-scale source-oriented image clustering based on SPN, so it is essential to conduct research on the compact representation of SPN for fast search and clustering.
ISBN 9781849199742
Language eng
DOI 10.1049/pbse001e_ch12
Indigenous content off
HERDC Research category B1.1 Book chapter
Persistent URL http://hdl.handle.net/10536/DRO/DU:30143166

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 13 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Thu, 24 Sep 2020, 14:31:52 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.