ABSTRACT
Check-in on location-based social network services have become a popular trend recently. Meanwhile, people may deceive their location to seek illegal violence. Making the data reliability of location-based social networks negatively affected. Hence, it is important to identify the authenticity of location. However, methods in literature rely heavily on user-generated content and check-in data, and these methods may be invalidated due to missing prior information or lacking rich training samples. To address this challenge, this paper proposes an innovative method for detecting the location spoofing based on the source of the image for specific scenarios. Specifically, we first extract the camera sensor fingerprint based on the images posted by an inquiry user via the well-designed denoising filter. Second, the authenticity of the location is tested by comparing the consistency of the residual noise from newly-posted images with location check-in and the unique camera sensor fingerprint from an inquiry user. Finally, we conducted wide experiments on the image database, which empirically showed that the method we proposed is effective and simple, that is, it need no prior information, but only sample images from the social networks.
- B. Carbunar and R. Potharaju. You unlocked the mt. everest badge on foursquare! countering location fraud in geosocial networks. In 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), pages 182--190. IEEE, 2012.Google ScholarDigital Library
- M. Chen, J. Fridrich, M. Goljan, and J. Lukás. Determining image origin and integrity using sensor noise. IEEE Transactions on information forensics and security, 3(1):74--90, 2008.Google ScholarDigital Library
- C. Ding, T. Wu, T. Qiao, N. Zheng, M. Xu, Y. Wu, and W. Xia. A location spoofing detection method for social networks (short paper). In International Conference on Collaborative Computing: Networking, Applications and Worksharing, pages 138--150. Springer, 2018.Google Scholar
- H. Efstathiades, D. Antoniades, G. Pallis, and M. D. Dikaiakos. Identification of key locations based on online social network activity. In 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 218--225. IEEE, 2015.Google ScholarDigital Library
- P. Georgiev, A. Noulas, and C. Mascolo. The call of the crowd: Event participation in location-based social services. arXiv preprint arXiv:1403.7657, 2014.Google Scholar
- M. Goljan, J. Fridrich, and T. Filler. Large scale test of sensor fingerprint camera identification. In Media forensics and security, volume 7254, page 72540I. International Society for Optics and Photonics, 2009.Google Scholar
- X. Jiang, S. Wei, R. Zhao, R. Liu, Y. Zhao, and Y. Zhao. A visual perspective for user identification based on camera fingerprint. In International Conference on Image and Graphics, pages 52--63. Springer, 2019.Google ScholarCross Ref
- R. Jurdak, K. Zhao, J. Liu, M. AbouJaoude, M. Cameron, and D. Newth. Understanding human mobility from twitter. PloS one, 10(7):e0131469, 2015.Google ScholarCross Ref
- S. M. Kay. Fundamentals of statistical signal processing. Prentice Hall PTR, 1993.Google ScholarDigital Library
- M. K. Mihcak, I. Kozintsev, and K. Ramchandran. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. In 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No. 99CH36258), volume 6, pages 3253--3256. IEEE, 1999.Google ScholarDigital Library
- T. Qiao and F. Retraint. Identifying individual camera device from raw images. IEEE Access, 6:78038--78054, 2018.Google ScholarCross Ref
- T. Qiao, F. Retraint, R. Cogranne, and T. H. Thai. Individual camera device identification from jpeg images. Signal Processing: Image Communication, 52:74--86, 2017.Google ScholarDigital Library
- G. Wang, S. Y. Schoenebeck, H. Zheng, and B. Y. Zhao. " will check-in for badges": Understanding bias and misbehavior on location-based social networks. In ICWSM, pages 417--426, 2016.Google Scholar
- Z. Zhang, L. Zhou, X. Zhao, G. Wang, Y. Su, M. Metzger, H. Zheng, and B. Y. Zhao. On the validity of geosocial mobility traces. In Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, pages 1--7, 2013.Google ScholarDigital Library
- B. Zhao and D. Z. Sui. True lies in geospatial big data: detecting location spoofing in social media. Annals of GIS, 23(1):1--14, 2017.[1]Google ScholarCross Ref
- Y. Zhao, N. Zheng, T. Qiao, and M. Xu. Source camera identification via low dimensional prnu features. Multimedia Tools and Applications, 78(7):8247--8269, 2019Google ScholarDigital Library
Index Terms
- Location Spoofing Detection for Social Network Service using Camera Fingerprint
Recommendations
Geographical position spoofing detection based on camera sensor fingerprint
AbstractCurrently, position check-in on mobile devices has become a fashionable social activity. Meanwhile, criminals probably tamper the geographical position (geo-position) information to provide an alibi. Therefore, it is of importance to ...
Highlights- A new method is proposed to solve the problem of geo-position spoofing detection.
Venue attacks in location-based social networks
GeoPrivacy '14: Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and AnalysisLocation-Based Social Networks (LBSNs), such as Foursquare, Yelp and Facebook Place, have attracted many people, including business owners who use LBSNs to promote their businesses. A physical location is called a venue or a place of interest in an ...
Personality and location-based social networks
We investigate personality and use of location based social networks.We examine the five-factor personality model against places that users check-in at.Conscientiousness positively correlates with the number of venues visited.Openness positively ...
Comments