Compression effects and scene details on the source camera identification of digital videos
- URL: http://arxiv.org/abs/2402.06669v1
- Date: Wed, 7 Feb 2024 09:14:18 GMT
- Title: Compression effects and scene details on the source camera identification of digital videos
- Authors: Raquel Ramos López, Ana Lucila Sandoval Orozco, Luis Javier García Villalba,
- Abstract summary: It is essential to introduce forensic analysis mechanisms to guarantee the authenticity or integrity of a certain digital video.
A technique that performs the identification of the source of acquisition of digital videos from mobile devices is presented.
- Score: 14.105727639288316
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The continuous growth of technologies like 4G or 5G has led to a massive use of mobile devices such as smartphones and tablets. This phenomenon, combined with the fact that people use mobile phones for a longer period of time, results in mobile phones becoming the main source of creation of visual information. However, its reliability as a true representation of reality cannot be taken for granted due to the constant increase in editing software. This makes it easier to alter original content without leaving a noticeable trace in the modification. Therefore, it is essential to introduce forensic analysis mechanisms to guarantee the authenticity or integrity of a certain digital video, particularly if it may be considered as evidence in legal proceedings. This paper explains the branch of multimedia forensic analysis that allows to determine the identification of the source of acquisition of a certain video by exploiting the unique traces left by the camera sensor of the mobile device in visual content. To do this, a technique that performs the identification of the source of acquisition of digital videos from mobile devices is presented. It involves 3 stages: (1) Extraction of the sensor fingerprint by applying the block-based technique. (2) Filtering the strong component of the PRNU signal to improve the quality of the sensor fingerprint. (3) Classification of digital videos in an open scenario, that is, where the forensic analyst does not need to have access to the device that recorded the video to find out the origin of the video. The main contribution of the proposed technique eliminates the details of the scene to improve the PRNU fingerprint. It should be noted that these techniques are applied to digital images and not to digital videos.
Related papers
- Authentication and integrity of smartphone videos through multimedia
container structure analysis [9.781421596580298]
This work presents a novel technique to detect possible attacks against MP4, MOV, and 3GP format videos that affect their integrity and authenticity.
The objectives of the proposal are to verify the integrity of videos, identify the source of acquisition and distinguish between original and manipulated videos.
arXiv Detail & Related papers (2024-02-05T22:34:24Z) - Digital Video Manipulation Detection Technique Based on Compression Algorithms [8.345872075633498]
This paper proposes a forensic technique by analysing compression algorithms used by the H.264 coding.
A Vector Support Machine is used to create the model that allows to accurately detect if a video has been recompressed.
arXiv Detail & Related papers (2024-02-03T16:05:27Z) - Source Camera Identification and Detection in Digital Videos through
Blind Forensics [3.4546761246181696]
We present a blind forensic technique of video source authentication and identification, based on feature extraction, feature selection and subsequent source classification.
The main aim is to determine whether a claimed source for a video is actually its original source. If not, we identify its original source. Our experimental results prove the efficiency of the proposed method compared to traditional fingerprint based technique.
arXiv Detail & Related papers (2023-09-06T20:36:17Z) - Web Photo Source Identification based on Neural Enhanced Camera
Fingerprint [9.606477062236499]
Source camera identification of web photos aims to establish a reliable linkage from the captured images to their source cameras.
This paper presents an innovative and practical source identification framework that employs neural-network enhanced sensor pattern noise.
By incorporating metric learning and frequency consistency into the deep network design, our proposed fingerprint extraction algorithm achieves state-of-the-art performance on modern smartphone photos.
arXiv Detail & Related papers (2023-02-18T04:14:45Z) - Fighting Malicious Media Data: A Survey on Tampering Detection and
Deepfake Detection [115.83992775004043]
Recent advances in deep learning, particularly deep generative models, open the doors for producing perceptually convincing images and videos at a low cost.
This paper provides a comprehensive review of the current media tampering detection approaches, and discusses the challenges and trends in this field for future research.
arXiv Detail & Related papers (2022-12-12T02:54:08Z) - PRNU Based Source Camera Identification for Webcam and Smartphone Videos [137.6408511310322]
This communication is about an application of image forensics where we use camera sensor fingerprints to identify source camera (SCI: Source Camera Identification) in webcam/smartphone videos.
arXiv Detail & Related papers (2022-01-27T18:57:14Z) - A New Approach for Image Authentication Framework for Media Forensics
Purpose [0.0]
This paper introduces a novel digital forensic security framework for digital image authentication and originality identification.
The approach depends on implanting secret code into RGB images that should indicate any unauthorized modification on the image under investigation.
arXiv Detail & Related papers (2021-10-03T18:31:37Z) - Privacy-Preserving Image Acquisition Using Trainable Optical Kernel [50.1239616836174]
We propose a trainable image acquisition method that removes the sensitive identity revealing information in the optical domain before it reaches the image sensor.
As the sensitive content is suppressed before it reaches the image sensor, it does not enter the digital domain therefore is unretrievable by any sort of privacy attack.
arXiv Detail & Related papers (2021-06-28T11:08:14Z) - Efficient video integrity analysis through container characterization [77.45740041478743]
We introduce a container-based method to identify the software used to perform a video manipulation.
The proposed method is both efficient and effective and can also provide a simple explanation for its decisions.
It achieves an accuracy of 97.6% in distinguishing pristine from tampered videos and classifying the editing software.
arXiv Detail & Related papers (2021-01-26T14:13:39Z) - A leak in PRNU based source identification. Questioning fingerprint
uniqueness [75.33542585238497]
Photo Response Non-Uniformity (PRNU) is considered the most effective trace for the image source attribution task.
Recent devices may introduce non-unique artifacts that may reduce PRNU noise's distinctiveness.
We show that the primary cause of high false alarm rates cannot be directly related to specific camera models, firmware, or image contents.
arXiv Detail & Related papers (2020-09-10T14:18:38Z) - A Modified Fourier-Mellin Approach for Source Device Identification on
Stabilized Videos [72.40789387139063]
multimedia forensic tools usually exploit characteristic noise traces left by the camera sensor on the acquired frames.
This analysis requires that the noise pattern characterizing the camera and the noise pattern extracted from video frames under analysis are geometrically aligned.
We propose to overcome this limitation by searching scaling and rotation parameters in the frequency domain.
arXiv Detail & Related papers (2020-05-20T12:06:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.