skip to main content
10.1145/3448823.3448843acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicvispConference Proceedingsconference-collections
research-article

Location Spoofing Detection for Social Network Service using Camera Fingerprint

Authors Info & Claims
Published:04 March 2021Publication History

ABSTRACT

Check-in on location-based social network services have become a popular trend recently. Meanwhile, people may deceive their location to seek illegal violence. Making the data reliability of location-based social networks negatively affected. Hence, it is important to identify the authenticity of location. However, methods in literature rely heavily on user-generated content and check-in data, and these methods may be invalidated due to missing prior information or lacking rich training samples. To address this challenge, this paper proposes an innovative method for detecting the location spoofing based on the source of the image for specific scenarios. Specifically, we first extract the camera sensor fingerprint based on the images posted by an inquiry user via the well-designed denoising filter. Second, the authenticity of the location is tested by comparing the consistency of the residual noise from newly-posted images with location check-in and the unique camera sensor fingerprint from an inquiry user. Finally, we conducted wide experiments on the image database, which empirically showed that the method we proposed is effective and simple, that is, it need no prior information, but only sample images from the social networks.

References

  1. B. Carbunar and R. Potharaju. You unlocked the mt. everest badge on foursquare! countering location fraud in geosocial networks. In 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), pages 182--190. IEEE, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Chen, J. Fridrich, M. Goljan, and J. Lukás. Determining image origin and integrity using sensor noise. IEEE Transactions on information forensics and security, 3(1):74--90, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Ding, T. Wu, T. Qiao, N. Zheng, M. Xu, Y. Wu, and W. Xia. A location spoofing detection method for social networks (short paper). In International Conference on Collaborative Computing: Networking, Applications and Worksharing, pages 138--150. Springer, 2018.Google ScholarGoogle Scholar
  4. H. Efstathiades, D. Antoniades, G. Pallis, and M. D. Dikaiakos. Identification of key locations based on online social network activity. In 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 218--225. IEEE, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Georgiev, A. Noulas, and C. Mascolo. The call of the crowd: Event participation in location-based social services. arXiv preprint arXiv:1403.7657, 2014.Google ScholarGoogle Scholar
  6. M. Goljan, J. Fridrich, and T. Filler. Large scale test of sensor fingerprint camera identification. In Media forensics and security, volume 7254, page 72540I. International Society for Optics and Photonics, 2009.Google ScholarGoogle Scholar
  7. X. Jiang, S. Wei, R. Zhao, R. Liu, Y. Zhao, and Y. Zhao. A visual perspective for user identification based on camera fingerprint. In International Conference on Image and Graphics, pages 52--63. Springer, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  8. R. Jurdak, K. Zhao, J. Liu, M. AbouJaoude, M. Cameron, and D. Newth. Understanding human mobility from twitter. PloS one, 10(7):e0131469, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. S. M. Kay. Fundamentals of statistical signal processing. Prentice Hall PTR, 1993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. K. Mihcak, I. Kozintsev, and K. Ramchandran. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. In 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No. 99CH36258), volume 6, pages 3253--3256. IEEE, 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. T. Qiao and F. Retraint. Identifying individual camera device from raw images. IEEE Access, 6:78038--78054, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  12. T. Qiao, F. Retraint, R. Cogranne, and T. H. Thai. Individual camera device identification from jpeg images. Signal Processing: Image Communication, 52:74--86, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Wang, S. Y. Schoenebeck, H. Zheng, and B. Y. Zhao. " will check-in for badges": Understanding bias and misbehavior on location-based social networks. In ICWSM, pages 417--426, 2016.Google ScholarGoogle Scholar
  14. Z. Zhang, L. Zhou, X. Zhao, G. Wang, Y. Su, M. Metzger, H. Zheng, and B. Y. Zhao. On the validity of geosocial mobility traces. In Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, pages 1--7, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Zhao and D. Z. Sui. True lies in geospatial big data: detecting location spoofing in social media. Annals of GIS, 23(1):1--14, 2017.[1]Google ScholarGoogle ScholarCross RefCross Ref
  16. Y. Zhao, N. Zheng, T. Qiao, and M. Xu. Source camera identification via low dimensional prnu features. Multimedia Tools and Applications, 78(7):8247--8269, 2019Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Location Spoofing Detection for Social Network Service using Camera Fingerprint

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing
      December 2020
      366 pages
      ISBN:9781450389532
      DOI:10.1145/3448823

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 March 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      ICVISP 2020 Paper Acceptance Rate60of147submissions,41%Overall Acceptance Rate186of424submissions,44%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader