Identification of smartphone-image source and manipulation

  • Authors:
  • Qingzhong Liu;Xiaodong Li;Lei Chen;Hyuk Cho;Peter A. Cooper;Zhongxue Chen;Mengyu Qiao;Andrew H. Sung

  • Affiliations:
  • Department of Computer Science, Sam Houston State University, Huntsville, TX;Department of Computer Science, Sam Houston State University, Huntsville, TX;Department of Computer Science, Sam Houston State University, Huntsville, TX;Department of Computer Science, Sam Houston State University, Huntsville, TX;Department of Computer Science, Sam Houston State University, Huntsville, TX;Biostatistics Epidemiology Research Design Core, Center for Clinical and Translational Sciences, University of Texas Health Science Center at Houston, Houston, TX;Department of Mathematics and Computer Science, South Dakota School of Mines and Technology, Rapid City, SD;Department of Computer Science and Engineering & Institute for, Complex Additive Systems Analysis, New Mexico Tech, Socorro, NM

  • Venue:
  • IEA/AIE'12 Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

As smartphones are being widely used in daily lives, the images captured by smartphones become ubiquitous and may be used for legal purposes. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. In this paper, we propose a method to determine the smartphone camera source of a particular image and operations that may have been performed on that image. We first take images using different smartphones and purposely manipulate the images, including different combinations of double JPEG compression, cropping, and rescaling. Then, we extract the marginal density in low frequency coordinates and neighboring joint density features on intra-block and inter-block as features. Finally, we employ a support vector machine to identify the smartphone source as well as to reveal the operations. Experimental results show that our method is very promising for identifying both smartphone source and manipulations. Our study also indicates that applying unsupervised clustering and supervised classification together (clustering first, followed by classification) leads to improvement in identifying smartphone sources and manipulations and thus provides a means to address the complexity issue of intentional manipulation.