+ All Categories
Home > Documents > Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School...

Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School...

Date post: 10-Jul-2020
Category:
Upload: others
View: 4 times
Download: 0 times
Share this document with a friend
19
1 1 ity Chang-Tsun Li Multimedia Forensics and Security through Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick UK
Transcript
Page 1: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

1

1

ity

Chang-Tsun Li

Multimedia Forensics and Security through

Provenance Inference

School of Computing and Mathematics

Charles Sturt University

Australia

Department of Computer Science

University of Warwick

UK

Page 2: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

2

2

Outline

● Device Fingerprints● Multimedia Forensic Applications

– Source Device Verification– Source Device Identification– Common Source Inference– Content Authentication– Source-Oriented Image Clustering

● Conclusions ● Future Works

Page 3: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

3

3

Why not Use Metadata - EXIF File● Metadata is easily removable and replaceable.

Page 4: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

4

4

Device Fingerprints

• Lens aberrations (accurate to device models)• CFA + demosaicking artefacts (accurate to models)• Quantisation table of JPEG (accurate to models)

• Sensor pattern noise (accurate to individual devices)

ScenePost-

Processing

Lens Sensor

Demosaicking Photo

ColorFilter Array

Page 5: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

5

5

● SPN is the invisible artifacts left in the images by the sensors of devices.

● SPN is mainly caused by

– manufacturing imperfection of silicon wafers and

– different sensitivity of pixels to light.

● Sensors made from the same silicon wafer produce unique SPN

● SPN can differentiate cameras of the same model.

Sensor Pattern Noise (SPN)

Page 6: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

6

6

SPN Extraction

● Lukáš et al’s model for SPN extraction (IEEE TIFS 2006)

– I is the original image– I’ is the low-pass filtered

version of I

● SPN is the high-frequency component of the image.

)(_' IfilterWeinerI =

),('),( jiIjiIn -=SPN:

Page 7: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

7

7

Interference from Scene Details● Scene details also contribute to the high-frequency

components of images.

● C.-T. Li, "Source Camera Identification Using Enhanced Sensor Pattern Noise," IEEE Trans. on Information Forensics and Security, 2010

contaminated SPN

natural images

SPN

clean SPN

Page 8: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

8

8

Other Sources of Interference• Periodical operation: e.g., JPEG, demosaicking

• X. Lin and C.-T. Li, "Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization," IEEE Trans. on Information Forensics and Security, 2016

• C.-T. Li and Y. Li, "Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics," IEEE Trans. on Circuits and Systems for Video Technology, 2012

Periodical artefacts before enhancement after enhancement

Page 9: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

9

9

Other Sources of Interference• Filters used in SPN extraction

• X. Lin and C.-T. Li, "Enhancing Sensor Pattern Noise via Filtering Distortion Removal," IEEE Signal Processing Letter, 2016

)(_' IfilterWeinerI =

),('),( jiIjiIn -=SPN:

Page 10: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

10

10

Source Device Verification

?● Task: Determine

whether a given image is taken with a particular device based on device “fingerprints”

● Similarity: Normalized Cross Correlation

Sensor pattern noise Sensor pattern noise

SPN extractor

=?

SPN extractor

)()(),(

jjii

jjii

nnnnnnnn

ji-×-

-×-=r

Page 11: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

11

11

● Task: Given an image and the reference SPNs of k cameras, identify the camera that has taken the image

Source Device Identification

?

Page 12: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

12

12

● Task: determine whether two images are taken by the same camera or not without possessing the camera

Common Source Inference

?

unavailable

Page 13: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

13

13

Real-World Applications

● Sussex Police (UK)– Linking child pornography to an offender’s mobile

phone – Leading to a 9-year prison sentence using SPN in

2014

● Guildford Crown Court (UK)– Linking a set of voyeuristic videos in the disk of a

spy camera to another video store in the defendant’s mobile phone original produced by the defendant’s spy camera

– Defendant pleading guilty for installing spy camera in June 2016

Page 14: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

14

14

Content Authentication

Reference fingerprint of Camera C

fingerprint of the forged image

Authentication Map

• True positives • False positives• False negatives

Images by the same camera C

Forged image

Page 15: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

15

15

Source-Oriented Image Clustering

Image Database

Clustering Module

unavailable

● Objective: each formed group contains only images taken by the same camera

● Significance: establishing relationship among images

● Delivered to INTERPOL (Lyon, France)

Page 16: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

16

16

Novelty of Our Clustering Alg

X. Lin and C.-T. Li, "Large-Scale Image Clustering based on Camera Fingerprint,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 793 –808, April 2017

Page 17: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

17

17

Conclusions● Device fingerprint can facilitate

– Source Device Verification– Source Device Identification– Common Source Inference– Content Authentication– Source-Oriented Image Clustering

● Multimedia forensics through device fingerprint analysis is of great interest to law enforcement.

● The most promising fingerprint is SPN at the moments

● Many future works to be done

Page 18: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

18

18

Future Works • We have the following now:

─ Lens aberrations─ Colour filter array (CFA) interpolation artefacts ─ Camera Response Function (CRF)─ Quantisation table of JPEG compression ─ Sensor pattern noise

• Any other modalities?• Any way to fuse them?

Page 19: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

19

19

Issues surrounding SPN:

● A compact representation of SPN is needed for fast search and clustering: SPN is as big as the host image

● SPN is removable: sensitive to compression, transcoding, blurring, etc.

● SPN is replaceable!

Future Works


Recommended