On the Security and Applicability of Fragile Camera Fingerprints

07/09/2019
by   Erwin Quiring, et al.
0

Camera sensor noise is one of the most reliable device characteristics in digital image forensics, enabling the unique linkage of images to digital cameras. This so-called camera fingerprint gives rise to different applications, such as image forensics and authentication. However, if images are publicly available, an adversary can estimate the fingerprint from her victim and plant it into spurious images. The concept of fragile camera fingerprints addresses this attack by exploiting asymmetries in data access: While the camera owner will always have access to a full fingerprint from uncompressed images, the adversary has typically access to compressed images and thus only to a truncated fingerprint. The security of this defense, however, has not been systematically explored yet. This paper provides the first comprehensive analysis of fragile camera fingerprints under attack. A series of theoretical and practical tests demonstrate that fragile camera fingerprints allow a reliable device identification for common compression levels in an adversarial environment.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/25/2017

Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack

The fingerprint-copy attack aims to confuse camera identification based ...
research
08/21/2003

Fingerprint based bio-starter and bio-access

In the paper will be presented a safety and security system based on fin...
research
11/03/2021

Beyond PRNU: Learning Robust Device-Specific Fingerprint for Source Camera Identification

Source camera identification tools assist image forensic investigators t...
research
02/18/2023

Web Photo Source Identification based on Neural Enhanced Camera Fingerprint

With the growing popularity of smartphone photography in recent years, w...
research
01/17/2020

Combining PRNU and noiseprint for robust and efficient device source identification

PRNU-based image processing is a key asset in digital multimedia forensi...
research
06/01/2023

Spying on the Spy: Security Analysis of Hidden Cameras

Hidden cameras, also called spy cameras, are surveillance tools commonly...
research
05/08/2018

An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack

We propose a new statistic to improve the pooled version of the triangle...

Please sign up or login with your details

Forgot password? Click here to reset