Blind image clustering based on the Normalized Cuts criterion for camera identification

被引:35
作者
Amerini, I. [1 ]
Caldelli, R. [1 ,3 ]
Crescenzi, P. [2 ]
Del Mastio, A. [1 ]
Marino, A. [4 ]
机构
[1] Univ Florence, MICC, Florence, Italy
[2] Univ Florence, DINFO Dept Informat Engn, Florence, Italy
[3] CNIT Natl Interuniv Consortium Telecommun, Parma, Italy
[4] Univ Milan, DI Dept Comp Sci, Milan, Italy
关键词
Image forensics; Source identification; Clustering; Normalized Cuts; FORENSICS;
D O I
10.1016/j.image.2014.07.003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Camera identification is a well known problem in image forensics, addressing the issue to identify the camera a digital image has been shot by. In this paper, we pose our attention to the task of clustering images, belonging to a heterogenous set, in groups coming from the same camera and of doing this in a blind manner; this means that side information neither about the sources nor, above all, about the number of expected clusters is requested. A novel methodology based on Normalized Cuts (NC) criterion is presented and evaluated in comparison with other state-of-the-art techniques, such as Multi-Class Spectral Clustering (MCSC) and Hierarchical Agglomerative Clustering (HAC). The proposed method well fits the problem of blind image clustering because it does not a priori require the knowledge of the amount of classes in which the dataset has to be divided but it needs only a stop threshold; such a threshold has been properly defined by means of a ROC curves approach by relying on the goodness of cluster aggregation. Several experimental tests have been carried out in different operative conditions and the proposed methodology globally presents superior performances in terms of clustering accuracy and robustness as well as a reduced computational burden. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:831 / 843
页数:13
相关论文
共 26 条
[1]  
[Anonymous], P 5 ACM INT C WEB SE
[2]  
[Anonymous], STORAGE RETRIEVAL IM
[3]  
[Anonymous], INT J DIGIT CRIME FO
[4]  
[Anonymous], IEEE INT C COMM ICC
[5]  
[Anonymous], P SPIE
[6]   The use of the area under the roc curve in the evaluation of machine learning algorithms [J].
Bradley, AP .
PATTERN RECOGNITION, 1997, 30 (07) :1145-1159
[7]  
Caldelli Roberto., 2010, 2010 IEEE International Workshop on Information Forensics and Security, P1
[8]   Determining image origin and integrity using sensor noise [J].
Chen, Mo ;
Fridrich, Jessica ;
GoIjan, Miroslav ;
Lukas, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) :74-90
[9]  
Costa Filipe de O., 2012, 2012 XXV SIBGRAPI - Conference on Graphics, Patterns and Images (SIBGRAPI 2012), P71, DOI 10.1109/SIBGRAPI.2012.19
[10]   Digital Image Forensics Introducing methods that estimate and detect sensor fingerprint [J].
Fridrich, Jessica .
IEEE SIGNAL PROCESSING MAGAZINE, 2009, 26 (02) :26-37