Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification

被引:82
作者
Goljan, Miroslav [1 ]
Fridrich, Jessica [1 ]
Chen, Mo [2 ]
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
[2] Jadak LLC, Syracuse, NY 13212 USA
基金
美国国家科学基金会;
关键词
Camera identification; counter-forensics; digital forensics; photoresponse nonuniformity (PRNU); sensor fingerprint;
D O I
10.1109/TIFS.2010.2099220
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sensor photoresponse nonuniformity has been proposed as a unique identifier (fingerprint) for various forensic tasks, including digitalcamera ballistics in which an image is matched to the specific camera that took it. The problem investigated here concerns the situation when an adversary estimates the sensor fingerprint from a set of images and superimposes it onto an image from a different camera to frame an innocent victim. This paper proposes a reliable method for detecting such fake fingerprints under rather mild and general assumptions about the adversary's activity and the means available to the victim. The proposed method is subjected to experiments to evaluate its reliability as well as its limitations. The conclusion that can be made from this study is that planting a sensor fingerprint in an image without leaving a trace is significantly more difficult than previously thought.
引用
收藏
页码:227 / 236
页数:10
相关论文
共 15 条
[1]   Blind camera fingerprinting and image clustering [J].
Bloy, Greg J. .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2008, 30 (03) :532-U1
[2]  
BOHME R, 2009, P SPIE MED FOR SEC 9, V7254
[3]   Blind identification of source cell-phone model [J].
Celiktutan, Oya ;
Sankur, Buelent ;
Avcibas, Ismail .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) :553-566
[4]   Determining image origin and integrity using sensor noise [J].
Chen, Mo ;
Fridrich, Jessica ;
GoIjan, Miroslav ;
Lukas, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) :74-90
[5]   Digital imaging sensor identification (further study) [J].
Chen, Mo ;
Fridrich, Jessica ;
Goljan, Miroslav .
SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
[6]  
Gloe T., 2007, Proceedings of the 15th international conference on Multimedia, P78
[7]  
GOLJAN M, 2009, P SPIE MED FOR SEC 9, V7254
[8]  
GOLJAN M, 2007, P IEEE INT C IM PROC
[9]  
Goljan M, 2009, LECT NOTES COMPUT SC, V5450, P454, DOI 10.1007/978-3-642-04438-0_38
[10]   Detecting digital image forgeries using sensor pattern noise [J].
Lukás, J ;
Fridrich, J ;
Goljan, M .
SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072