Skip to main content

2014 | OriginalPaper | Buchkapitel

Camera Source Identification Game with Incomplete Information

verfasst von : Hui Zeng, Xiangui Kang

Erschienen in: Digital-Forensics and Watermarking

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Image forensics with the presence of an adversary has raised more and more attention recently. A typical case is the interplay between the sensor-based camera source identification and fingerprint-copy attack. This paper gives a game theory analysis in such an adversarial environment. We use a counter anti-forensic method based on noise level estimation to detect the possible forgery (forgery test). Next, we introduce a game theory model to evaluate the ultimate performance when both the investigator and the forger have complete information. Finally, for a more practical scenario that one of the parties has incomplete information, a Bayesian game is introduced and the ultimate performance is compared with that of complete information game.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)CrossRef Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)CrossRef
2.
Zurück zum Zitat Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74–90 (2008)CrossRef Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74–90 (2008)CrossRef
3.
Zurück zum Zitat Li, C.-T., Li, Y.: Color-decoupled photo response non-uniformity for digital image forensics. IEEE Trans. Circ. Syst. Video Technol. 22(2), 260–271 (2012)CrossRef Li, C.-T., Li, Y.: Color-decoupled photo response non-uniformity for digital image forensics. IEEE Trans. Circ. Syst. Video Technol. 22(2), 260–271 (2012)CrossRef
4.
Zurück zum Zitat Bayram, S., Sencar, H.T., Memon, N.D.: Efficient sensor fingerprint matching through fingerprint binarization. IEEE Trans. Inf. Forensics Secur. 7(4), 1404–1413 (2012)CrossRef Bayram, S., Sencar, H.T., Memon, N.D.: Efficient sensor fingerprint matching through fingerprint binarization. IEEE Trans. Inf. Forensics Secur. 7(4), 1404–1413 (2012)CrossRef
5.
Zurück zum Zitat Li, C.-T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans.Inf. Forensics Secur. 5(2), 280–287 (2010)CrossRef Li, C.-T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans.Inf. Forensics Secur. 5(2), 280–287 (2010)CrossRef
6.
Zurück zum Zitat Chuang, W., Su, H., Wu, M.: Exploring compression effects for improved source camera identification using strongly compressed video. In: IEEE International Conference on Image Processing, Brussels, Belgium, pp. 1953–1956 (2011) Chuang, W., Su, H., Wu, M.: Exploring compression effects for improved source camera identification using strongly compressed video. In: IEEE International Conference on Image Processing, Brussels, Belgium, pp. 1953–1956 (2011)
7.
Zurück zum Zitat Wu, G., Kang, X., Liu, K.J.R.: A context adaptive predictor of sensor pattern noise for camera source identification. In: IEEE International Conference on Image Processing, Orlando, USA, pp. 237–240 (2012) Wu, G., Kang, X., Liu, K.J.R.: A context adaptive predictor of sensor pattern noise for camera source identification. In: IEEE International Conference on Image Processing, Orlando, USA, pp. 237–240 (2012)
8.
Zurück zum Zitat Kang, X., Li, Y., Qu, Z., Huang, J.: Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 7(2), 393–402 (2012)CrossRef Kang, X., Li, Y., Qu, Z., Huang, J.: Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 7(2), 393–402 (2012)CrossRef
9.
Zurück zum Zitat Gloe, T., Kirchner, M., Winkler, A., Bohme, R.: Can we trust digital image forensics? Multimedia ’07. In: Proceedings of the 15th international conference on Multimedia, pp. 78–86 (2007) Gloe, T., Kirchner, M., Winkler, A., Bohme, R.: Can we trust digital image forensics? Multimedia ’07. In: Proceedings of the 15th international conference on Multimedia, pp. 78–86 (2007)
10.
Zurück zum Zitat Steinebach, M., Liu, H., Fan, P., Katzenbeisser, S.: Cell phone camera ballistics: attacks and countermeasures. In: SPIE 2010, Multimedia on Mobile Devices, vol. 7542, pp. 0B–0C (2010) Steinebach, M., Liu, H., Fan, P., Katzenbeisser, S.: Cell phone camera ballistics: attacks and countermeasures. In: SPIE 2010, Multimedia on Mobile Devices, vol. 7542, pp. 0B–0C (2010)
11.
Zurück zum Zitat Goljan, M., Fridrich, J., Chen, M.: Defending against fingerprint-copy attack in sensor-based camera identification. IEEE Trans. Inf. Forensics Secur. 6(1), 227–236 (2011)CrossRef Goljan, M., Fridrich, J., Chen, M.: Defending against fingerprint-copy attack in sensor-based camera identification. IEEE Trans. Inf. Forensics Secur. 6(1), 227–236 (2011)CrossRef
12.
Zurück zum Zitat Caldelli, R., Amerini, I. Novi, A.: An analysis on attacker actions in fingerprint-copy attack in source camera identification. In: 2011 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6 (2011) Caldelli, R., Amerini, I. Novi, A.: An analysis on attacker actions in fingerprint-copy attack in source camera identification. In: 2011 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6 (2011)
13.
Zurück zum Zitat Liu, X., Tanaka, M., Okutomi,M.: Noise level estimation using weak textured patches of a single noisy image. In: IEEE International Conference on Image Processing, Orlando, USA, pp. 665–668 (2012) Liu, X., Tanaka, M., Okutomi,M.: Noise level estimation using weak textured patches of a single noisy image. In: IEEE International Conference on Image Processing, Orlando, USA, pp. 665–668 (2012)
14.
Zurück zum Zitat Barni, M.: A game theoretic approach to Source Identification with known statistics. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, pp. 1745–1748 (2012) Barni, M.: A game theoretic approach to Source Identification with known statistics. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, pp. 1745–1748 (2012)
15.
Zurück zum Zitat Barni, M., Tondi, B.: Optimum forensic and counter-forensic strategies for source identification with training data. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 199–204 (2012) Barni, M., Tondi, B.: Optimum forensic and counter-forensic strategies for source identification with training data. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 199–204 (2012)
16.
Zurück zum Zitat Barni, M., Tondi, B.: The source identification game: An information theoretic perspective. IEEE Trans. Inf. Forensics Secur. 8(3), 450–463 (2013)CrossRef Barni, M., Tondi, B.: The source identification game: An information theoretic perspective. IEEE Trans. Inf. Forensics Secur. 8(3), 450–463 (2013)CrossRef
17.
Zurück zum Zitat Stamm, M.C., Lin, W.S., Liu, K.J.R.: Forensics vs. anti-forensics: a decision and game theoretic framework. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, pp. 1749–1752 (2012) Stamm, M.C., Lin, W.S., Liu, K.J.R.: Forensics vs. anti-forensics: a decision and game theoretic framework. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, pp. 1749–1752 (2012)
18.
Zurück zum Zitat Chen, Y., Lin, W.S., Liu, K.J.R.: Risk-distortion analysis for video collusion attacks: a mouse-and-cat game. IEEE Trans. Image Process. 19(7), 1798–1807 (2010)CrossRefMathSciNet Chen, Y., Lin, W.S., Liu, K.J.R.: Risk-distortion analysis for video collusion attacks: a mouse-and-cat game. IEEE Trans. Image Process. 19(7), 1798–1807 (2010)CrossRefMathSciNet
19.
Zurück zum Zitat Zeng, H., Kang, X., Huang, J.: Mixed-strategy Nash equilibrium in the camera source identification game.In: IEEE International Conference on Image Processing, Melbourne, Australia (2013) Zeng, H., Kang, X., Huang, J.: Mixed-strategy Nash equilibrium in the camera source identification game.In: IEEE International Conference on Image Processing, Melbourne, Australia (2013)
20.
Zurück zum Zitat Goljan, M.: Digital camera identification from images – estimating false acceptance probability. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 454–468. Springer, Heidelberg (2009)CrossRef Goljan, M.: Digital camera identification from images – estimating false acceptance probability. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 454–468. Springer, Heidelberg (2009)CrossRef
21.
Zurück zum Zitat Zeng, H., Jiang, Y., Kang, X., Liu, L.: Game theoretic analysis of camera source identification. In: APSIPA Annual Summit and Conference, Kaohsiung, Taiwan (2013) Zeng, H., Jiang, Y., Kang, X., Liu, L.: Game theoretic analysis of camera source identification. In: APSIPA Annual Summit and Conference, Kaohsiung, Taiwan (2013)
22.
Zurück zum Zitat Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991) Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)
23.
Zurück zum Zitat Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)MATH Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)MATH
25.
Zurück zum Zitat Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)CrossRef Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)CrossRef
26.
Zurück zum Zitat Gloe, T., Bohme, R.: The dresden image database for benchmarking digital image forensics. J. Digit. Forensic Pract. 3(2–4), 150–159 (2010)CrossRef Gloe, T., Bohme, R.: The dresden image database for benchmarking digital image forensics. J. Digit. Forensic Pract. 3(2–4), 150–159 (2010)CrossRef
Metadaten
Titel
Camera Source Identification Game with Incomplete Information
verfasst von
Hui Zeng
Xiangui Kang
Copyright-Jahr
2014
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-43886-2_14

Premium Partner