An Efficient Camera Identification Technique using Krawtchouk Moment Invariants


Megha Borole,Prof. S. R. Kolhe,



Camera identification,photo response non-uniformity (PRNU),Krawtchouk moments,fuzzy min-max neural networkwith compensatory neuron (FMCN),


In late years, camera identification methods have drawn attention in the area of digital forensics. To detect the source camera through which the picture is caught, Photo-Response Non uniformity (PRNU) noise is utilized as a camera, impression, as it is a particular component that recognizes pictures taken from the comparable cameras. This paper introduces a camera identification technique which is based on Krawtchouk Moment invariant features. The Photo Response Non-Uniformity (PRNU) noise is a type of sensor finger impression, which permits to extraordinarily distinguish the camera that took an image. It is estimated from the denoised images using a denoised filter. Then estimate the Krawtchouk Moment invariants from the PRNU noise pattern. The Krawtchouk Moments are invariant to scaling, translation, rotation, and shear. These invariants are fed to Fuzzy Min-Max Neural Network with Compensatory Neuron (FMCN) and by performing ten-fold cross-validation technique, verification is made out. The experimental results show that the proposed technique achieves an average accuracy of 93.3% for first experiment and 98.3% for the second experiment.


I.Alessandro Piva, “Review Article an Overview on Image Forensics”, Hindawi Publishing Corporation ISRN Signal Processing, Volume 2013, Article ID 496701, (2013).

II.A. Tuama, F. CombyandM. Chaumont, “Camera model identification based machine learning approach with high order statistics features”, 24th European Signal Processing Conference (EUSIPCO), Budapest, 2016, pp. 1183-1187.

III.Anass El affar, Khalid Ferdous, AbdeljabbarCherkaoui, Hakim El fadiliand Hassan Qjidaal, “Krawtchouk Moment Feature Extraction for Neural Arabic Handwritten Words Recognition”, IJCSNS International Journal of Computer Science and Network Security, Vol.9 No.1. 2009.

IV.Abhijeet V. Nandedkar, Prabir K. Biswas, “A Fuzzy Min-Max Neural Network Classifier with Compensatory Neuron Architecture”, IEEE Transactions On Neural Networks, Vol. 18. No. 1, 2007.

V.F. Meng, X. Kong and X. You, A new feature-based method for source camera identification, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 207–218, 2008.

VI.F. Razzazi and A. Seyedabadi, “A robust feature for single image camera identification using local binary patterns,” 2014 IEEE International Symposium on SignalProcessing and Information Technology (ISSPIT), Noida, 2014, pp. 000462-000467.

VII.G. Xu, Y. Q. Shi, “Camera model identification using local binary patterns”, Proc. IEEE Int Conference on Multimedia and Expo (ICME), pp. 392-397, 2012.

VIII.I. Amerini, R. Caldelli, P. Crescenzi, A. Del Mastio, A. Marino, “Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification”, Image Communication, ELSEVIER, pp. 1 -13, 2014.

IX.J. Lukas, J. FridrichandM. Goljan, “Digital camera identification from sensor pattern noise,” in IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 205-214, June 2006.

X.K.R. Akshatha, A.K. Karunakar, H. Anitha, U. Raghavendra, Dinesh Shetty, “Digital camera identification using PRNU: A feature basedapproach”, Digital Investigation, Journal, Elsevier, 19 (2016).

XI.M. C. Stamm, M. Wu and K. J. R. Liu, “Information Forensics: An Overview of the First Decade”, in IEEE Access, vol. 1, pp. 167-200, 2013.

XII.M. Kharrazi, H.T. Sencar, N. Memon, “Blind source camera identification”, IEEE International Conference on Image Processing ICIP ’04., vol. 1, pp. 709-712, 2004.

XIII.M. KivancMihcak, I. Kozintsev and K. Ramchandran, “Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising,” 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258), Phoenix, AZ, 1999, pp. 3253-3256 vol.6.

XIV.O. Celiktutan, B. Sankur, I. Avcibas, “Blind identification of source cell-phone model”, IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 553-566, 2008.

XV.P. T. Yap, P. Raveendran and S. H. Ong, “Krawtchouk moments as a new set of discrete orthogonal moments for image reconstruction”, In Neural Networks, 2002. IJCNN’02. Proceedings of the 2002 International Joint Conference on (Vol. 1, pp. 908-912). IEEE, 2002.

XVI.P. T. Yap, R. Paramesran and S. H. Ong, “Image analysis by Krawtchouk moments”, Image Processing, IEEE Transactions on, 12(11), 1367-1377, 2003.

XVII.S. Bayram, H.T. Sencar, N. Memon, “Improvements on source camera model identification based on cfainterpolation”, Advances in Digital Forensics II IFIP International Conference on Digital Forensics, pp. 289-299, 2006.

XVIII.S. Saito, Y. Tomioka and H. Kitazawa, “A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification,” in IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2026-2035, Sept. 2017.

XIX.T. Filler, J. Fridrich, M. Goljan, “Using sensor pattern noise for camera model identification”, Proc. FCIP 15th IEEE International Conference on Image Processing, pp. 1296-1299, 2008.

XX.TechnischeUniversität Dresden, Dresden, Germany. Dresden Image Database, accessed on May 1, 2015. [Online]. Available:

XXI.X. Kang, Y. Li, Z. Qu and J. Huang, “Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise”, in IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 393-402, April 2012.

XXII.Y. Sutcu, S. Bayram, H. T. Sencar and N. Memon, “Improvements on Sensor Noise Based Source Camera Identification,” 2007 IEEE International Conference on Multimedia and Expo, Beijing, 2007, pp. 24-27.

XXIII.Yoichi Tomioka, Yuya Ito, and Hitoshi Kitazawa, “Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise”, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 12, December 2013.

Megha Borole, Prof. S. R. Kolhe View Download