Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Machine learning techniques for forensic camera model identification and anti-forensic attacks

View through CrossRef
The goal of camera model identification is to determine the manufacturer and model of an image's source camera. Camera model identification is an important task in multimedia forensics because it helps verify the origin of an image and uncover possible image forgeries. Forensic camera model identification is generally performed by searching an image for model-specific traces left by a camera's internal image processing components. Many techniques, including recent data-driven deep learning algorithms, have been developed to perform camera model identification. In the meantime, forensic researchers have discovered that existing camera model identification algorithms can be maliciously attacked by altering images without leaving visually distinguishable artifacts. These anti-forensic attacks arouse concerns about the robustness of camera model identification techniques and urge the need for effective defense strategies. In this thesis, we propose new algorithms to perform forensic camera model identification, and new anti-forensic attacks. We first introduce a highly accurate and robust camera model identification framework developed by fully exploiting demosaicing traces left by cameras' internal demosaicing process. In light of the complexity of demosaicing traces, we build an ensemble of statistical models to capture diverse demosaicing information in the form of content-dependent color value correlations. Diversity among these statistical models is critical for each model to capture a unique set of color correlations introduced by the demosaicing process. We obtain a diverse set of linear and non-linear demosaicing residuals and extract both intra-channel and inter-channel color correlations following a variety of geometric structures. The ensemble of collect diverse color correlations forms a comprehensive representation of the sophisticated demosaicing process inside a camera. This proposed framework not only achieves high camera model identification accuracy, but more importantly, it is robust to image post-processing operations and anti-forensic camera model attacks. Given recent popularity of deep learning algorithms, forensic researchers have started to build deep neural networks, especially convolutional neural networks, to perform camera model identification. In this thesis, we investigate the robustness of deep learning based camera model identification algorithms by developing anti-forensic camera model attacks to expose vulnerability of these algorithms. We propose a generative adversarial attack to perform targeted camera model falsification. Given full access to the camera model identification networks, this attack has been proven to be able to falsify camera models of images from arbitrary sources. Under black-box scenarios where no information about the camera model identification networks is available, we train a substitute network which mimics the camera model identification networks and provides gradient information to craft adversarial images.
Drexel University Libraries
Title: Machine learning techniques for forensic camera model identification and anti-forensic attacks
Description:
The goal of camera model identification is to determine the manufacturer and model of an image's source camera.
Camera model identification is an important task in multimedia forensics because it helps verify the origin of an image and uncover possible image forgeries.
Forensic camera model identification is generally performed by searching an image for model-specific traces left by a camera's internal image processing components.
Many techniques, including recent data-driven deep learning algorithms, have been developed to perform camera model identification.
In the meantime, forensic researchers have discovered that existing camera model identification algorithms can be maliciously attacked by altering images without leaving visually distinguishable artifacts.
These anti-forensic attacks arouse concerns about the robustness of camera model identification techniques and urge the need for effective defense strategies.
In this thesis, we propose new algorithms to perform forensic camera model identification, and new anti-forensic attacks.
We first introduce a highly accurate and robust camera model identification framework developed by fully exploiting demosaicing traces left by cameras' internal demosaicing process.
In light of the complexity of demosaicing traces, we build an ensemble of statistical models to capture diverse demosaicing information in the form of content-dependent color value correlations.
Diversity among these statistical models is critical for each model to capture a unique set of color correlations introduced by the demosaicing process.
We obtain a diverse set of linear and non-linear demosaicing residuals and extract both intra-channel and inter-channel color correlations following a variety of geometric structures.
The ensemble of collect diverse color correlations forms a comprehensive representation of the sophisticated demosaicing process inside a camera.
This proposed framework not only achieves high camera model identification accuracy, but more importantly, it is robust to image post-processing operations and anti-forensic camera model attacks.
Given recent popularity of deep learning algorithms, forensic researchers have started to build deep neural networks, especially convolutional neural networks, to perform camera model identification.
In this thesis, we investigate the robustness of deep learning based camera model identification algorithms by developing anti-forensic camera model attacks to expose vulnerability of these algorithms.
We propose a generative adversarial attack to perform targeted camera model falsification.
Given full access to the camera model identification networks, this attack has been proven to be able to falsify camera models of images from arbitrary sources.
Under black-box scenarios where no information about the camera model identification networks is available, we train a substitute network which mimics the camera model identification networks and provides gradient information to craft adversarial images.

Related Results

Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
The pandemic Covid-19 currently demands teachers to be able to use technology in teaching and learning process. But in reality there are still many teachers who have not been able ...
THEORY OF FORENSIC EXPERTOLOGY IN THE SYSTEM OF LAW
THEORY OF FORENSIC EXPERTOLOGY IN THE SYSTEM OF LAW
The article deals with the concept of a general theory of forensic expertology, the conditions for its creation, the place of forensic expert science in the system of legal science...
REGARDING RELATION BETWEEN CLASSIFICATION OF FORENSIC SCIENCE GENERAL THEORY TASKS AND PRACTICAL FORENSIC ACTIVITY (Review Article)
REGARDING RELATION BETWEEN CLASSIFICATION OF FORENSIC SCIENCE GENERAL THEORY TASKS AND PRACTICAL FORENSIC ACTIVITY (Review Article)
The article analyzes conceptual foundations, views and ideas as to understanding of the essence of the classification of forensic science general theory tasks. The main views of sc...
CORRELATION AND STRUCTURE OF A FORENSIC TECHNIQUE AND FORENSIC SCIENCE
CORRELATION AND STRUCTURE OF A FORENSIC TECHNIQUE AND FORENSIC SCIENCE
A historical analysis of forensic techniques and forensic science emergence as scientific branches is outlined, their interconnection, differences are considered, the subject, obje...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Pregnancy and Challenging Transient Anti-GAD65 Positivity: A Case Report with Literature Review
Pregnancy and Challenging Transient Anti-GAD65 Positivity: A Case Report with Literature Review
Abstract Introduction During pregnancy, women may develop blood glucose abnormalities like gestational diabetes mellitus (GDM) or, rarely, type 1 diabetes (T1D), which can lead to ...
Forensic Pathology Fellowship Training Positions and Subsequent Forensic Pathology Work Effort of past Forensic Pathology Fellows
Forensic Pathology Fellowship Training Positions and Subsequent Forensic Pathology Work Effort of past Forensic Pathology Fellows
The purpose of this study is to document the number of accredited, funded, and filled forensic pathology fellowship positions in the United States and to document the subsequent wo...

Back to Top