Review of Device Fingerprint Extraction Techniques in Image

被引:0
|
作者
Zhang Mingwang [1 ]
Xiao Yanhui [2 ]
Tian Huawei [2 ]
Hao Xinze [2 ]
Li Lihua [2 ]
机构
[1] Sichuan Police Coll, Inst Res, Luzhou 646000, Sichuan, Peoples R China
[2] Peoples Publ Secur Univ China, Sch Natl Secur & Counter Terrorism, Beijing 100038, Peoples R China
关键词
image processing; image recognition; image forensics; device fingerprint; image source identification; sensor pattern noise; DIGITAL CAMERA IDENTIFICATION; WATERMARKING; FORGERIES; FORENSICS;
D O I
10.3788/LOP57.220003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous improvement of the convenience of image acquisition and transmission and the rapid popularization of image editing tools, a malicious users can easily shoot, spread, edit and modify digital images to achieve the purpose of malicious behavior or crime. It becomes the key evidence for investigation and collection of evidence and judicial proceedings. The illumination response inconsistency (PRNU) causes by the defects of the image sensor manufacturing process and the unevenness of the silicon wafer is unique and stable for each camera, so it can be used as an effective device fingerprint for image source forensics. First, a comprehensive review of digital image forensics technologies including device fingerprint technology is conducted, and the main application scenarios of device fingerprints arc introduced. Then, the basic technical principles of device fingerprint extraction in images is introduced, and the development of device fingerprint extraction technology is summarized. Finally, the problems to be solved and the technology development trend of the device fingerprint extraction technology arc discussed.
引用
收藏
页数:10
相关论文
共 55 条
  • [1] On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation
    Al-Ani, Mustafa
    Khelifi, Fouad
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1067 - 1081
  • [2] Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images
    Alles, Erwin J.
    Geradts, Zeno J. M. H.
    Veenman, Cor J.
    [J]. JOURNAL OF FORENSIC SCIENCES, 2009, 54 (03) : 628 - 638
  • [3] [Anonymous], 2006, PROC SPIE
  • [4] Bayram S, 2005, IEEE IMAGE PROC, P2793
  • [5] Bayram S, IEEE T INFORM FORENS
  • [6] Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
    Bayram, Sevinc
    Sencar, Husrev Taha
    Memon, Nasir
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1404 - 1413
  • [7] Blind identification of source cell-phone model
    Celiktutan, Oya
    Sankur, Buelent
    Avcibas, Ismail
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) : 553 - 566
  • [8] Determining image origin and integrity using sensor noise
    Chen, Mo
    Fridrich, Jessica
    GoIjan, Miroslav
    Lukas, Jan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) : 74 - 90
  • [9] Image splicing detection using 2-D phase congruency and statistical moments of characteristic function
    Chen, Wen
    Shi, Yun Q.
    Su, Wei
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
  • [10] Chierchia G, 2011, 2011 17 INT C DIG SI