Abstract: The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects, of unevenness of the responses in the charge-coupled device sensor, black current noise, and may originate from proprietary interpolation algorithms involved in color filter array. Various imaging device (camera, scanner, etc.) identification methods are based on the analysis of these artifacts. In this paper, we set to explore three sets of forensic features, namely binary similarity measures, image-quality measures, and higher order wavelet statistics in conjunction with SVM classifiers to identify the originating camera. We demonstrate that our camera model identification algorithm achieves more accurate identification, and that it can be made robust to a host of image manipulations. The algorithm has the potential to discriminate camera units within the same model.

@article{Celiktutan:2008aa,
  author       = {Oya \c{C}eliktutan and B\"{u}lent Sankur and İsmail Avcıbaş},
  url          = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4579758},
  number       = {3},
  pages        = {553--566},
  volume       = {3},
  title        = {Blind identification of source cell-phone model},
  year         = {2008},
  keywords     = {Image Forensics; Source Identification},
  journal      = {IEEE Transactions on Information Forensics and Security},
}