A Framework of Camera Source Identification Bayesian Game

被引:9
|
作者
Zeng, Hui [1 ]
Liu, Jingxian [1 ]
Yu, Jingjing [1 ]
Kang, Xiangui [1 ]
Shi, Yun Qing [2 ]
Wang, Z. Jane [3 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangdong Key Lab Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
[2] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
[3] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC, Canada
基金
中国国家自然科学基金;
关键词
Anti-forensics; Bayesian game; camera source identification (CSI); complete information game; counter anti-forensics; forensics; game theory; ANTI-FORENSICS;
D O I
10.1109/TCYB.2016.2557802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image forensics with the presence of an adversary, such as the interplay between the sensor-based camera source identification (CSI) and the fingerprint-copy attack, has attracted increasing attention recently. In this paper, we propose a framework of CSI game with both complete information and incomplete information. A noise level-based counter antiforensic method is presented to detect the potential fingerprint-copy attack, and unlike the state-of-the-art countermeasure of the triangle test, it does not need to collect the candidate image set. With the existence of countermeasure, a rational forger needs to balance the tradeoff between synthesizing source information and leaving new detectable evidence of raising the noise level of a forged image. The mixed-strategy other than the sequential-move assumption is adopted to solve the games. The Bayesian game is introduced to address the information asymmetry in practice. The Nash equilibrium of both the complete information game and Bayesian game are theoretically analyzed, and the expected Nash equilibrium payoff of a Bayesian game is obtained. Nash equilibrium receiver operating characteristic curves are adopted to evaluate the detection performance. Simulation results show that the information asymmetry can remarkably affect the final detection performance. To our knowledge, this paper is the first attempt in analyzing a Bayesian forensic game with practical information asymmetry.
引用
下载
收藏
页码:1757 / 1768
页数:12
相关论文
共 50 条
  • [31] RANDOM SUBSPACE METHOD FOR SOURCE CAMERA IDENTIFICATION
    Li, Ruizhe
    Kotropoulos, Constantine
    Li, Chang-Tsun
    Guan, Yu
    2015 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING, 2015,
  • [32] Source camera identification with imbalanced training dataset
    Huang, Yonggang
    Zhang, Jun
    Lan, Xinkai
    International Journal of Database Theory and Application, 2016, 9 (02): : 205 - 214
  • [33] Achieving efficient source camera identification on Hadoop
    Cattaneo, Giuseppe
    Petrillo, Umberto Ferraro
    Abate, Andrea F.
    Narducci, Fabio
    Barra, Silvio
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) : 32999 - 33021
  • [34] Source camera identification based on CFA interpolation
    Bayram, S
    Sencar, HT
    Memon, N
    Avcibas, I
    2005 International Conference on Image Processing (ICIP), Vols 1-5, 2005, : 2793 - 2796
  • [35] SOURCE IDENTIFICATION OF CAMERA PHONES USING SVD
    Soobhany, Ahmad Ryad
    Lam, K. P.
    Fletcher, Peter
    Collins, David
    2013 20TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2013), 2013, : 4497 - 4501
  • [36] Bayesian source identification using local priors
    Aucejo, M.
    De Smet, O.
    MECHANICAL SYSTEMS AND SIGNAL PROCESSING, 2016, 66-67 : 120 - 136
  • [37] A Bayesian Framework for Power System Components Identification
    Mikhalev, Artem
    Emchinov, Alexander
    Chevalier, Samuel
    Maximov, Yury
    Vorobev, Petr
    2020 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2020,
  • [38] Two-stage surrogate model-assisted Bayesian framework for groundwater contaminant source identification
    Jiang, Xue
    Ma, Rui
    Wang, Yanxin
    Gu, Wenlong
    Lu, Wenxi
    Na, Jin
    JOURNAL OF HYDROLOGY, 2021, 594
  • [39] A Bayesian Probabilistic Framework for Identification of Individuals with Dyslexia
    Wagner, Richard K. K.
    Moxley, Jerad
    Schatschneider, Chris
    Zirps, Fotena A. A.
    SCIENTIFIC STUDIES OF READING, 2023, 27 (01) : 67 - 81
  • [40] Adversarial Source Identification Game With Corrupted Training
    Barni, Mauro
    Tondi, Benedetta
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (05) : 3894 - 3915