Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1597817.1597839acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation

Published: 07 September 2009 Publication History

Abstract

Demosaicked images possess spatially periodic inter-pixel correlation, because interpolation strategies at any logically equivalent spatial pixel location are identical. Taking this statistical characteristic, much research on imaging forensics has been done recently. We proposed a generalized neural network framework to simulate the stylized computational rules in demosaicking through bias and weight value adjustment. As experiments show, our framework is effective in recognizing the demosaicking algorithms for raw CFA images, as well as digital photo authentication, compared to the state-of-the-art methods.

References

[1]
Y. Li, J. Sun, C. K. Tang, and H. Y. Shum, Lazy Snapping, Proceedings of ACM Siggraph 2004, pp. 303--308.
[2]
D. L. M. Sacchi, F. Agnoli, and E. F. Loftus, Changing history: Doctored photographs affect memory for past public events, Applied Cognitive Psychology, 21(8): 1005--1022, 2007.
[3]
T. V. Lanh, K. S. Chong, S. Emmanuel, and M. S. Kankanhalli, A survey on digital camera image forensic methods, Proceedings of IEEE International Conference on Multimedia and Expo 2007, pp.16--19.
[4]
P. Nillius, and J. O. Eklundh, Automatic estimation of the projected light source direction, Proceedings of CVPR 2001, pp.1076--1083.
[5]
M. Kharrazi, H. T. Sencar, and N. Memon, Blind Source camera identification, Proceedings of IEEE International Conference on Image Processing 2004, pp.709--712.
[6]
O. Celiktutan, B. Sankur, and I. Avcibas, Blind identification of source cell-phone model, IEEE Transactions on Information Forensics and Security, 3(3): 553--566, 2008.
[7]
C. McKay, A. Swaminathan, H. Gou, and M. Wu, Image acquisition forensics: Forensic analysis to identify imaging source, Proceedings of IEEE International Conference on Acoustic, Speech and Signal Processing 2008, pp. 1657--1660.
[8]
A. Gallagher, and T. Chen, Image authentication by detecting traces of demosaicing, Proceedings of CVPRW 2008.
[9]
Y. Z. Huang, and Y. J. Long, Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model, Proceedings of CVPR 2008, pp.1--8.
[10]
A. Swaminathan, M. Wu, and K. J. Ray Liu, Non-intrusive component forensics of visual sensors using output images, IEEE Transactions on Information Forensics and Security, 2(1): 91--106, 2007.
[11]
M. Kutter, S. Voloshynovskiy, and A. Herrigel, The watermark copy attack, SPIE vol. 3971, Security and Watermarking of Multimedia Contents II 2000, pp. 371--380.
[12]
A. F. Moller, A scaled conjugate gradient algorithm for fast supervised learning, Neural Networks, 6(4): 525--533, 1993.
[13]
C. W. Hsu, and C. J. Lin, A comparison of methods for multi-class support vector machines. IEEE Transactions on Neural Networks, 13: 415--425, 2002.
[14]
L. Lam, and C. Y. Suen, Application of majority voting to pattern recognition: An analysis of its behavior and performance, IEEE Transactions on Systems, Man and Cybernetics, 27(5): 553--568, 1997.
[15]
Y. Z. Huang, Can digital image forgery detection unevadable? A case study: Color filter array interpolation statistical feature recovery, SPIE vol. 5960, Visual Communications and Image Processing 2005, pp. 980--991.
[16]
M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi, Towards second generation watermarking schemes, Proceedings of IEEE International Conference on Image Processing 1999, pp. 320--323.

Cited By

View all
  • (2022)Effective image splicing detection using deep neural networkInternational Journal of Wavelets, Multiresolution and Information Processing10.1142/S021969132250051521:02Online publication date: 19-Dec-2022
  • (2020)A Study on Source Device Attribution Using Still ImagesArchives of Computational Methods in Engineering10.1007/s11831-020-09452-yOnline publication date: 8-Jun-2020
  • (2018)Automatic Detection of Demosaicing Image Artifacts and Its Use in Tampering Detection2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)10.1109/MIPR.2018.00091(424-429)Online publication date: Apr-2018
  • Show More Cited By

Index Terms

  1. A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM&Sec '09: Proceedings of the 11th ACM workshop on Multimedia and security
    September 2009
    186 pages
    ISBN:9781605584928
    DOI:10.1145/1597817
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 September 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. demosaicking
    2. inter-pixel correlation
    3. neural network
    4. photo authentication

    Qualifiers

    • Research-article

    Conference

    MM&Sec '09
    Sponsor:
    MM&Sec '09: Multimedia and Security Workshop
    September 7 - 8, 2009
    New Jersey, Princeton, USA

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 23 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Effective image splicing detection using deep neural networkInternational Journal of Wavelets, Multiresolution and Information Processing10.1142/S021969132250051521:02Online publication date: 19-Dec-2022
    • (2020)A Study on Source Device Attribution Using Still ImagesArchives of Computational Methods in Engineering10.1007/s11831-020-09452-yOnline publication date: 8-Jun-2020
    • (2018)Automatic Detection of Demosaicing Image Artifacts and Its Use in Tampering Detection2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)10.1109/MIPR.2018.00091(424-429)Online publication date: Apr-2018
    • (2018)A Markov based image forgery detection approach by analyzing CFA artifactsMultimedia Tools and Applications10.1007/s11042-018-6075-577:21(28949-28968)Online publication date: 1-Nov-2018
    • (2016)Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?2016 23rd International Conference on Pattern Recognition (ICPR)10.1109/ICPR.2016.7900012(2503-2508)Online publication date: Dec-2016
    • (2015)Sequential computational procedure for remote sensing data forgery detectionPattern Recognition and Image Analysis10.1134/S105466181504013625:4(645-653)Online publication date: 1-Oct-2015
    • (2015)A robust approach to detect digital forgeries by exploring correlation patternsPattern Analysis & Applications10.1007/s10044-013-0319-918:2(351-365)Online publication date: 1-May-2015
    • (2012)Image Forgery Localization via Fine-Grained Analysis of CFA ArtifactsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2012.22022277:5(1566-1577)Online publication date: 1-Oct-2012
    • (2012)Learning images using compositional pattern-producing neural networks for source camera identification and digital demographic diagnosisPattern Recognition Letters10.1016/j.patrec.2011.09.00133:4(381-396)Online publication date: 1-Mar-2012
    • (2010)Robust Symbolic Dual-View Facial Expression Recognition With Skin WrinklesIEEE Transactions on Multimedia10.1109/TMM.2010.205279212:6(536-543)Online publication date: 1-Oct-2010
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media