Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School...

19
1 1 ity Chang-Tsun Li Multimedia Forensics and Security through Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick UK

Transcript of Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School...

Page 1: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

1

1

ity

Chang-Tsun Li

Multimedia Forensics and Security through

Provenance Inference

School of Computing and Mathematics

Charles Sturt University

Australia

Department of Computer Science

University of Warwick

UK

Page 2: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

2

2

Outline

● Device Fingerprints● Multimedia Forensic Applications

– Source Device Verification– Source Device Identification– Common Source Inference– Content Authentication– Source-Oriented Image Clustering

● Conclusions ● Future Works

Page 3: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

3

3

Why not Use Metadata - EXIF File● Metadata is easily removable and replaceable.

Page 4: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

4

4

Device Fingerprints

• Lens aberrations (accurate to device models)• CFA + demosaicking artefacts (accurate to models)• Quantisation table of JPEG (accurate to models)

• Sensor pattern noise (accurate to individual devices)

ScenePost-

Processing

Lens Sensor

Demosaicking Photo

ColorFilter Array

Page 5: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

5

5

● SPN is the invisible artifacts left in the images by the sensors of devices.

● SPN is mainly caused by

– manufacturing imperfection of silicon wafers and

– different sensitivity of pixels to light.

● Sensors made from the same silicon wafer produce unique SPN

● SPN can differentiate cameras of the same model.

Sensor Pattern Noise (SPN)

Page 6: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

6

6

SPN Extraction

● Lukáš et al’s model for SPN extraction (IEEE TIFS 2006)

– I is the original image– I’ is the low-pass filtered

version of I

● SPN is the high-frequency component of the image.

)(_' IfilterWeinerI =

),('),( jiIjiIn -=SPN:

Page 7: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

7

7

Interference from Scene Details● Scene details also contribute to the high-frequency

components of images.

● C.-T. Li, "Source Camera Identification Using Enhanced Sensor Pattern Noise," IEEE Trans. on Information Forensics and Security, 2010

contaminated SPN

natural images

SPN

clean SPN

Page 8: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

8

8

Other Sources of Interference• Periodical operation: e.g., JPEG, demosaicking

• X. Lin and C.-T. Li, "Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization," IEEE Trans. on Information Forensics and Security, 2016

• C.-T. Li and Y. Li, "Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics," IEEE Trans. on Circuits and Systems for Video Technology, 2012

Periodical artefacts before enhancement after enhancement

Page 9: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

9

9

Other Sources of Interference• Filters used in SPN extraction

• X. Lin and C.-T. Li, "Enhancing Sensor Pattern Noise via Filtering Distortion Removal," IEEE Signal Processing Letter, 2016

)(_' IfilterWeinerI =

),('),( jiIjiIn -=SPN:

Page 10: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

10

10

Source Device Verification

?● Task: Determine

whether a given image is taken with a particular device based on device “fingerprints”

● Similarity: Normalized Cross Correlation

Sensor pattern noise Sensor pattern noise

SPN extractor

=?

SPN extractor

)()(),(

jjii

jjii

nnnnnnnn

ji-×-

-×-=r

Page 11: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

11

11

● Task: Given an image and the reference SPNs of k cameras, identify the camera that has taken the image

Source Device Identification

?

Page 12: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

12

12

● Task: determine whether two images are taken by the same camera or not without possessing the camera

Common Source Inference

?

unavailable

Page 13: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

13

13

Real-World Applications

● Sussex Police (UK)– Linking child pornography to an offender’s mobile

phone – Leading to a 9-year prison sentence using SPN in

2014

● Guildford Crown Court (UK)– Linking a set of voyeuristic videos in the disk of a

spy camera to another video store in the defendant’s mobile phone original produced by the defendant’s spy camera

– Defendant pleading guilty for installing spy camera in June 2016

Page 14: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

14

14

Content Authentication

Reference fingerprint of Camera C

fingerprint of the forged image

Authentication Map

• True positives • False positives• False negatives

Images by the same camera C

Forged image

Page 15: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

15

15

Source-Oriented Image Clustering

Image Database

Clustering Module

unavailable

● Objective: each formed group contains only images taken by the same camera

● Significance: establishing relationship among images

● Delivered to INTERPOL (Lyon, France)

Page 16: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

16

16

Novelty of Our Clustering Alg

X. Lin and C.-T. Li, "Large-Scale Image Clustering based on Camera Fingerprint,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 793 –808, April 2017

Page 17: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

17

17

Conclusions● Device fingerprint can facilitate

– Source Device Verification– Source Device Identification– Common Source Inference– Content Authentication– Source-Oriented Image Clustering

● Multimedia forensics through device fingerprint analysis is of great interest to law enforcement.

● The most promising fingerprint is SPN at the moments

● Many future works to be done

Page 18: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

18

18

Future Works • We have the following now:

─ Lens aberrations─ Colour filter array (CFA) interpolation artefacts ─ Camera Response Function (CRF)─ Quantisation table of JPEG compression ─ Sensor pattern noise

• Any other modalities?• Any way to fuse them?

Page 19: Multimedia Forensics and Security through Provenance Inference€¦ · Provenance Inference School of Computing and Mathematics Charles Sturt University Australia Department of Computer

19

19

Issues surrounding SPN:

● A compact representation of SPN is needed for fast search and clustering: SPN is as big as the host image

● SPN is removable: sensitive to compression, transcoding, blurring, etc.

● SPN is replaceable!

Future Works