A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification

被引:34
作者
Zheng, Yue [1 ]
Cao, Yuan [2 ]
Chang, Chip-Hong [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[2] Hohai Univ, Coll Internet Things Engn, Changzhou 213022, Peoples R China
关键词
Camera Identification; Digital Image Forensics; Perceptual Image Hash; Physical Unclonable Function; AUTHENTICATION; WATERMARKING; FORENSICS;
D O I
10.1109/TIFS.2019.2926777
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the increasing prevalent of digital devices and their abuse for digital content creation, forgeries of digital images and video footage are more rampant than ever. Digital forensics is challenged into seeking advanced technologies for forgery content detection and acquisition device identification. Unfortunately, existing solutions that address image tampering problems fail to identify the device that produces the images or footage while techniques that can identify the camera is incapable of locating the tampered content of its captured images. In this paper, a new perceptual data-device hash is proposed to locate maliciously tampered image regions and identify the source camera of the received image data as a non-repudiable attestation in digital forensics. The presented image may have been either tampered or gone through benign content preserving geometric transforms or image processing operations. The proposed image hash is generated by projecting the invariant image features into a physical unclonable function (PUF)-defined Bernoulli random space. The tamper-resistant random PUF response is unique for each camera and can only be generated upon triggered by a challenge, which is provided by the image acquisition timestamp. The proposed hash is evaluated on the modified CASIA database and CMOS image sensor-based PUF simulated using 180 nm TSMC technology. It achieves a high tamper detection rate of 95.42% with the regions of tampered content successfully located, a good authentication performance of above 98.5% against standard content-preserving manipulations, and 96.25% and 90.42%, respectively, for the more challenging geometric transformations of rotation (0 similar to 360 degrees) and scaling (scale factor in each dimension: 0.5). It is demonstrated to be able to identify the source camera with 100% accuracy and is secure against attacks on PUF.
引用
收藏
页码:620 / 634
页数:15
相关论文
共 40 条
[1]  
Baraniuk R., 2006, PREPRINT, V100, P1
[2]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[3]  
Breier J., 2015, P 1 ACM WORKSH CYB P, P99, DOI 10.1145/2732198.2732206
[4]   Smart Meter Data Aggregation Against Wireless Attacks: A Game-Theoretic Approach [J].
Cao, Yang ;
Duan, Dongliang ;
Yang, Liuqing ;
Sun, Zhi ;
Zhang, Haochuan ;
Yu, Rong .
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, :80-85
[5]   CMOS Image Sensor Based Physical Unclonable Function for Coherent Sensor-Level Authentication [J].
Cao, Yuan ;
Zhang, Le ;
Zalivaka, Siarhei S. ;
Chang, Chip-Hong ;
Chen, Shoushun .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2015, 62 (11) :2629-2640
[6]   A Retrospective and a Look Forward: Fifteen Years of Physical Unclonable Function Advancement [J].
Chang, Chip-Hong ;
Zheng, Yue ;
Zhang, Le .
IEEE CIRCUITS AND SYSTEMS MAGAZINE, 2017, 17 (03) :32-62
[7]   Determining image origin and integrity using sensor noise [J].
Chen, Mo ;
Fridrich, Jessica ;
GoIjan, Miroslav ;
Lukas, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) :74-90
[8]  
Cimpanu C., 2019, SECURITY FLAW LETS A
[9]  
Cole S., 2018, REDDIT JUST SHUT DEE
[10]   Perceptual image hashing using center-symmetric local binary patterns [J].
Davarzani, Reza ;
Mozaffari, Saeed ;
Yaghmaie, Khashayar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) :4639-4667