Device-based Image Matching with Similarity Learning by Convolutional
Neural Networks that Exploit the Underlying Camera Sensor Pattern Noise
- URL: http://arxiv.org/abs/2004.11443v1
- Date: Thu, 23 Apr 2020 20:03:40 GMT
- Title: Device-based Image Matching with Similarity Learning by Convolutional
Neural Networks that Exploit the Underlying Camera Sensor Pattern Noise
- Authors: Guru Swaroop Bennabhaktula, Enrique Alegre, Dimka Karastoyanova and
George Azzopardi
- Abstract summary: We propose a two-part network to quantify the likelihood that a given pair of images have the same source camera.
To the best of our knowledge, we are the first ones addressing the challenge of device-based image matching.
This work is part of the EU-funded project 4NSEEK concerned with forensics against child sexual abuse.
- Score: 6.6602878519516135
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: One of the challenging problems in digital image forensics is the capability
to identify images that are captured by the same camera device. This knowledge
can help forensic experts in gathering intelligence about suspects by analyzing
digital images. In this paper, we propose a two-part network to quantify the
likelihood that a given pair of images have the same source camera, and we
evaluated it on the benchmark Dresden data set containing 1851 images from 31
different cameras. To the best of our knowledge, we are the first ones
addressing the challenge of device-based image matching. Though the proposed
approach is not yet forensics ready, our experiments show that this direction
is worth pursuing, achieving at this moment 85 percent accuracy. This ongoing
work is part of the EU-funded project 4NSEEK concerned with forensics against
child sexual abuse.
Related papers
- Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - Digital Image Forensics using Deep Learning [0.0]
The aim of our project is to build an algorithm that identifies which camera was used to capture an image using traces of information left intrinsically in the image.
Solving this problem would have a big impact on the verification of evidence used in criminal and civil trials and even news reporting.
arXiv Detail & Related papers (2022-10-14T02:27:34Z) - One-Shot Object Affordance Detection in the Wild [76.46484684007706]
Affordance detection refers to identifying the potential action possibilities of objects in an image.
We devise a One-Shot Affordance Detection Network (OSAD-Net) that estimates the human action purpose and then transfers it to help detect the common affordance from all candidate images.
With complex scenes and rich annotations, our PADv2 dataset can be used as a test bed to benchmark affordance detection methods.
arXiv Detail & Related papers (2021-08-08T14:53:10Z) - Privacy-Preserving Image Acquisition Using Trainable Optical Kernel [50.1239616836174]
We propose a trainable image acquisition method that removes the sensitive identity revealing information in the optical domain before it reaches the image sensor.
As the sensitive content is suppressed before it reaches the image sensor, it does not enter the digital domain therefore is unretrievable by any sort of privacy attack.
arXiv Detail & Related papers (2021-06-28T11:08:14Z) - Illumination Estimation Challenge: experience of past two years [57.13714732760851]
The 2nd Illumination estimation challenge( IEC#2) was conducted.
The challenge had several tracks: general, indoor, and two-illuminant with each of them focusing on different parameters of the scenes.
Other main features of it are a new large dataset of images (about 5000) taken with the same camera sensor model, a manual markup accompanying each image, diverse content with scenes taken in numerous countries under a huge variety of illuminations extracted by using the SpyderCube calibration object, and a contest-like markup for the images from the Cube+ dataset that was used in IEC#1.
arXiv Detail & Related papers (2020-12-31T17:59:19Z) - Video Camera Identification from Sensor Pattern Noise with a Constrained
ConvNet [7.229968041355052]
We propose a method to identify the source camera of a video based on camera specific noise patterns that we extract from video frames.
Our system is designed to classify individual video frames which are in turn combined by a majority vote to identify the source camera.
This work is part of the EU-funded project 4NSEEK focused on forensics against child sexual abuse.
arXiv Detail & Related papers (2020-12-11T12:17:30Z) - The Forchheim Image Database for Camera Identification in the Wild [10.091921099426294]
Forchheim Image Database (FODB) consists of more than 23,000 images of 143 scenes by 27 smartphone cameras.
Each image is provided in 6 different qualities: the original camera-native version, and five copies from social networks.
General-purpose EfficientNet remarkably outperforms several dedicated forensic CNNs both on clean and compressed images.
arXiv Detail & Related papers (2020-11-04T11:54:54Z) - A leak in PRNU based source identification. Questioning fingerprint
uniqueness [75.33542585238497]
Photo Response Non-Uniformity (PRNU) is considered the most effective trace for the image source attribution task.
Recent devices may introduce non-unique artifacts that may reduce PRNU noise's distinctiveness.
We show that the primary cause of high false alarm rates cannot be directly related to specific camera models, firmware, or image contents.
arXiv Detail & Related papers (2020-09-10T14:18:38Z) - Warwick Image Forensics Dataset for Device Fingerprinting In Multimedia
Forensics [19.98488085122803]
Device fingerprints like sensor pattern noise (SPN) are widely used for provenance analysis and image authentication.
The flexibility of camera parameter settings and the emergence of multi-frame photography algorithms bring new challenges to device fingerprinting.
We present the Warwick Image Forensics dataset of more than 58,600 images captured using 14 digital cameras with various exposure settings.
arXiv Detail & Related papers (2020-04-22T09:54:27Z) - Camera Trace Erasing [86.15997461603568]
We address a new low-level vision problem, camera trace erasing, to reveal the weakness of trace-based forensic methods.
We propose Siamese Trace Erasing (SiamTE), in which a novel hybrid loss is designed on the basis of Siamese architecture for network training.
arXiv Detail & Related papers (2020-03-16T00:09:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.