Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School...
Transcript of Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School...
![Page 1: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/1.jpg)
1
1
ity
Chang-Tsun Li
Multimedia Forensics and Security through
Provenance Inference
School of Computing and Mathematics
Charles Sturt University
Australia
Department of Computer Science
University of Warwick
UK
![Page 2: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/2.jpg)
2
2
Outline
● Device Fingerprints● Multimedia Forensic Applications
– Source Device Verification– Source Device Identification– Common Source Inference– Content Authentication– Source-Oriented Image Clustering
● Conclusions ● Future Works
![Page 3: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/3.jpg)
3
3
Why not Use Metadata - EXIF File● Metadata is easily removable and replaceable.
![Page 4: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/4.jpg)
4
4
Device Fingerprints
• Lens aberrations (accurate to device models)• CFA + demosaicking artefacts (accurate to models)• Quantisation table of JPEG (accurate to models)
• Sensor pattern noise (accurate to individual devices)
ScenePost-
Processing
Lens Sensor
Demosaicking Photo
ColorFilter Array
![Page 5: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/5.jpg)
5
5
● SPN is the invisible artifacts left in the images by the sensors of devices.
● SPN is mainly caused by
– manufacturing imperfection of silicon wafers and
– different sensitivity of pixels to light.
● Sensors made from the same silicon wafer produce unique SPN
● SPN can differentiate cameras of the same model.
Sensor Pattern Noise (SPN)
![Page 6: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/6.jpg)
6
6
SPN Extraction
● Lukáš et al’s model for SPN extraction (IEEE TIFS 2006)
– I is the original image– I’ is the low-pass filtered
version of I
● SPN is the high-frequency component of the image.
)(_' IfilterWeinerI =
),('),( jiIjiIn -=SPN:
![Page 7: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/7.jpg)
7
7
Interference from Scene Details● Scene details also contribute to the high-frequency
components of images.
● C.-T. Li, "Source Camera Identification Using Enhanced Sensor Pattern Noise," IEEE Trans. on Information Forensics and Security, 2010
contaminated SPN
natural images
SPN
clean SPN
![Page 8: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/8.jpg)
8
8
Other Sources of Interference• Periodical operation: e.g., JPEG, demosaicking
• X. Lin and C.-T. Li, "Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization," IEEE Trans. on Information Forensics and Security, 2016
• C.-T. Li and Y. Li, "Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics," IEEE Trans. on Circuits and Systems for Video Technology, 2012
Periodical artefacts before enhancement after enhancement
![Page 9: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/9.jpg)
9
9
Other Sources of Interference• Filters used in SPN extraction
• X. Lin and C.-T. Li, "Enhancing Sensor Pattern Noise via Filtering Distortion Removal," IEEE Signal Processing Letter, 2016
)(_' IfilterWeinerI =
),('),( jiIjiIn -=SPN:
![Page 10: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/10.jpg)
10
10
Source Device Verification
?● Task: Determine
whether a given image is taken with a particular device based on device “fingerprints”
● Similarity: Normalized Cross Correlation
Sensor pattern noise Sensor pattern noise
SPN extractor
=?
SPN extractor
)()(),(
jjii
jjii
nnnnnnnn
ji-×-
-×-=r
![Page 11: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/11.jpg)
11
11
● Task: Given an image and the reference SPNs of k cameras, identify the camera that has taken the image
Source Device Identification
?
![Page 12: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/12.jpg)
12
12
● Task: determine whether two images are taken by the same camera or not without possessing the camera
Common Source Inference
?
unavailable
![Page 13: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/13.jpg)
13
13
Real-World Applications
● Sussex Police (UK)– Linking child pornography to an offender’s mobile
phone – Leading to a 9-year prison sentence using SPN in
2014
● Guildford Crown Court (UK)– Linking a set of voyeuristic videos in the disk of a
spy camera to another video store in the defendant’s mobile phone original produced by the defendant’s spy camera
– Defendant pleading guilty for installing spy camera in June 2016
![Page 14: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/14.jpg)
14
14
Content Authentication
Reference fingerprint of Camera C
fingerprint of the forged image
Authentication Map
• True positives • False positives• False negatives
Images by the same camera C
Forged image
![Page 15: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/15.jpg)
15
15
Source-Oriented Image Clustering
Image Database
Clustering Module
unavailable
● Objective: each formed group contains only images taken by the same camera
● Significance: establishing relationship among images
● Delivered to INTERPOL (Lyon, France)
![Page 16: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/16.jpg)
16
16
Novelty of Our Clustering Alg
X. Lin and C.-T. Li, "Large-Scale Image Clustering based on Camera Fingerprint,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 793 –808, April 2017
![Page 17: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/17.jpg)
17
17
Conclusions● Device fingerprint can facilitate
– Source Device Verification– Source Device Identification– Common Source Inference– Content Authentication– Source-Oriented Image Clustering
● Multimedia forensics through device fingerprint analysis is of great interest to law enforcement.
● The most promising fingerprint is SPN at the moments
● Many future works to be done
![Page 18: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/18.jpg)
18
18
Future Works • We have the following now:
─ Lens aberrations─ Colour filter array (CFA) interpolation artefacts ─ Camera Response Function (CRF)─ Quantisation table of JPEG compression ─ Sensor pattern noise
• Any other modalities?• Any way to fuse them?
![Page 19: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer](https://reader030.fdocuments.in/reader030/viewer/2022041122/5f36b73de8a0747f445f5ab7/html5/thumbnails/19.jpg)
19
19
Issues surrounding SPN:
● A compact representation of SPN is needed for fast search and clustering: SPN is as big as the host image
● SPN is removable: sensitive to compression, transcoding, blurring, etc.
● SPN is replaceable!
Future Works