skip to main content
10.1145/3576915.3616600acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

FITS: Matching Camera Fingerprints Subject to Software Noise Pollution

Authors Info & Claims
Published:21 November 2023Publication History

ABSTRACT

Physically unclonable hardware fingerprints can be used for device authentication. The photo-response non-uniformity (PRNU) is the most reliable hardware fingerprint of digital cameras and can be conveniently extracted from images. However, we find image post-processing software may introduce extra noise into images. Part of this noise remains in the extracted PRNU fingerprints and is hard to be eliminated by traditional approaches, such as denoising filters. We define this noise as software noise, which pollutes PRNU fingerprints and interferes with authenticating a camera armed device. In this paper, we propose novel approaches for fingerprint matching, a critical step in device authentication, in the presence of software noise. We calculate the cross correlation between PRNU fingerprints of different cameras using a test statistic such as the Peak to Correlation Energy (PCE) so as to estimate software noise correlation. During fingerprint matching, we derive the ratio of the test statistic on two PRNU fingerprints of interest over the estimated software noise correlation. We denote this ratio as the <u>fi</u>ngerprint <u>t</u>o <u>s</u>oftware noise ratio (FITS), which allows us to detect the PRNU hardware noise correlation component in the test statistic for fingerprint matching. Extensive experiments over 10,000 images taken by more than 90 smartphones are conducted to validate our approaches, which outperform the state-of-the-art approaches significantly for polluted fingerprints. We are the first to study fingerprint matching with the existence of software noise.

References

  1. Mustafa Al-Ani and Fouad Khelifi. 2016. On the SPN estimation in image forensics: a systematic empirical evaluation. IEEE Transactions on Information Forensics and Security 12, 5 (2016), 1067--1081.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Omar Al Shaya, Pengpeng Yang, Rongrong Ni, Yao Zhao, and Alessandro Piva. 2018. A new dataset for source identification of high dynamic range images. Sensors 18, 11 (2018), 3801.Google ScholarGoogle ScholarCross RefCross Ref
  3. Enes Altinisik and Hüsrev Taha Sencar. 2020. Source camera verification for strongly stabilized videos. IEEE Transactions on Information Forensics and Security 16 (2020), 643--657.Google ScholarGoogle ScholarCross RefCross Ref
  4. Enes Altinisik, Kasim Tasdemir, and Husrev Taha Sencar. 2019. Mitigation of H. 264 and H. 265 video compression for reliable PRNU estimation. IEEE Transactions on information forensics and security 15 (2019), 1557--1571.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Altinisik, K. Tasdemir, and H. T. Sencar. 2020. Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation. IEEE transactions on information forensics and security 15 (2020), 1557--1571.Google ScholarGoogle Scholar
  6. Irene Amerini, Roberto Caldelli, Andrea Del Mastio, Andrea Di Fuccia, Cristiano Molinari, and Anna Paola Rizzo. 2017. Dealing with video source identification in social networks. signal processing: Image communication 57 (2017), 1--7.Google ScholarGoogle Scholar
  7. Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, and Kui Ren. 2018. ABC: Enabling smartphone authentication with built-in camera. In 25th Annual Network and Distributed System Security Symposium, NDSS.Google ScholarGoogle ScholarCross RefCross Ref
  8. Zhongjie Ba, Zhan Qin, Xinwen Fu, and Kui Ren. 2019. CIM: Camera in Motion for Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 14, 11 (2019), 2987--3002. https://doi.org/10.1109/TIFS.2019.2911173Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Zhongjie Ba, Xinyu Zhang, Zhan Qin, and Kui Ren. 2019. CFP: Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 1094--1105.Google ScholarGoogle Scholar
  10. Sevinç Bayram, Hüsrev Taha Sencar, and Nasir Memon. 2012. Efficient sensor fingerprint matching through fingerprint binarization. IEEE Transactions on Information Forensics and Security 7, 4 (2012), 1404--1413.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sevinc Bayram, Husrev Taha Sencar, and Nasir Memon. 2014. Sensor fingerprint identification through composite fingerprints and group testing. IEEE Transactions on information forensics and security 10, 3 (2014), 597--612.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Walter Bender, Daniel Gruhl, Norishige Morimoto, and Anthony Lu. 1996. Techniques for data hiding. IBM systems journal 35, 3.4 (1996), 313--336.Google ScholarGoogle Scholar
  13. Luca Bondi, Paolo Bestagini, Fernando Perez-Gonzalez, and Stefano Tubaro. 2018. Improving PRNU compression through preprocessing, quantization, and coding. IEEE Transactions on Information Forensics and Security 14, 3 (2018), 608--620.Google ScholarGoogle ScholarCross RefCross Ref
  14. Mo Chen, Jessica Fridrich, and Miroslav Goljan. 2007. Digital imaging sensor identification (further study). In Security, steganography, and watermarking of multimedia contents IX, Vol. 6505. SPIE, 258--270.Google ScholarGoogle Scholar
  15. Mo Chen, Jessica Fridrich, Miroslav Goljan, and Jan Lukás. 2008. Determining image origin and integrity using sensor noise. IEEE Transactions on information forensics and security 3, 1 (2008), 74--90.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Shaxun Chen, Amit Pande, Kai Zeng, and Prasant Mohapatra. 2014. Live video forensics: Source identification in lossy wireless networks. IEEE Transactions on Information Forensics and Security 10, 1 (2014), 28--39.Google ScholarGoogle ScholarCross RefCross Ref
  17. Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, and Yi-Chao Chen. 2019. Demicpu: Device fingerprinting with magnetic signals radiated by cpu. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1149--1170.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Giovanni Chierchia, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2014. A Bayesian-MRF approach for PRNU-based image forgery detection. IEEE Transactions on Information Forensics and Security 9, 4 (2014), 554--567.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Morteza Darvish Morshedi Hosseini and Miroslav Goljan. 2019. Camera identification from HDR images. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 69--76.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Anupam Das, Nikita Borisov, and Matthew Caesar. 2014. Do you hear what I hear? Fingerprinting smart devices through embedded acoustic components. In Proceedings of the 2014 ACMSIGSAC Conference on Computer and Communications Security. 441--452.Google ScholarGoogle Scholar
  21. Anupam Das, Nikita Borisov, and Matthew Caesar. 2016. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.. In NDSS.Google ScholarGoogle Scholar
  22. Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, and Srihari Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.. In NDSS, Vol. 14. Citeseer, 23--26.Google ScholarGoogle ScholarCross RefCross Ref
  23. Marco Fanfani, Alessandro Piva, and Carlo Colombo. 2022. PRNU registration under scale and rotation transform based on Convolutional Neural Networks. Pattern Recognition 124 (2022), 108413.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Miroslav Goljan. 2008. Digital camera identification from images-estimating false acceptance probability. In International workshop on digital watermarking. Springer, 454--468.Google ScholarGoogle Scholar
  25. Miroslav Goljan and Jessica Fridrich. 2008. Camera identification from cropped and scaled images. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Vol. 6819. SPIE, 154--166.Google ScholarGoogle Scholar
  26. Miroslav Goljan, Jessica Fridrich, and Mo Chen. 2010. Defending against fingerprint-copy attack in sensor-based camera identification. IEEE Transactions on Information Forensics and Security 6, 1 (2010), 227--236.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Miroslav Goljan, Jessica Fridrich, and Tomá? Filler. 2009. Large scale test of sensor fingerprint camera identification. In Media forensics and security, Vol. 7254. International Society for Optics and Photonics, 72540I.Google ScholarGoogle Scholar
  28. C Holt. 1987. Two-channel likelihood detectors for arbitrary linear channel distortion. IEEE Transactions on Acoustics, Speech, and Signal Processing 35, 3 (1987), 267--273.Google ScholarGoogle ScholarCross RefCross Ref
  29. Massimo Iuliani, Marco Fontani, Dasara Shullani, and Alessandro Piva. 2019. Hybrid reference-based video source identification. Sensors 19, 3 (2019), 649.Google ScholarGoogle ScholarCross RefCross Ref
  30. Xiangui Kang, Yinxiang Li, Zhenhua Qu, and Jiwu Huang. 2011. Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Transactions on Information Forensics and Security 7, 2 (2011), 393--402.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. AK Karunakar, Chang-Tsun Li, et al. 2021. Identification of source social network of digital images using deep neural network. Pattern Recognition Letters 150 (2021), 17--25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Blossom Kaur, Amandeep Kaur, and Jasdeep Singh. 2011. Steganographic approach for hiding image in DCT domain. International Journal of Advances in Engineering & Technology 1, 3 (2011), 72.Google ScholarGoogle Scholar
  33. Marissa Koopman, Andrea Macarulla Rodriguez, and Zeno Geradts. 2018. Detection of deepfake video manipulation. In The 20th Irish machine vision and image processing conference (IMVIP). 133--136.Google ScholarGoogle Scholar
  34. Paweŀ Korus and Jiwu Huang. 2016. Multi-scale analysis strategies in PRNUbased tampering localization. IEEE Transactions on Information Forensics and Security 12, 4 (2016), 809--824.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom. 2022. DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting. arXiv preprint arXiv:2201.09956 (2022).Google ScholarGoogle Scholar
  36. Ashref Lawgaly and Fouad Khelifi. 2016. Sensor pattern noise estimation based on improved locally adaptive DCT filtering and weighted averaging for source camera identification and verification. IEEE Transactions on Information Forensics and Security 12, 2 (2016), 392--404.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Chang-Tsun Li. 2010. Source camera identification using enhanced sensor pattern noise. IEEE Transactions on Information Forensics and Security 5, 2 (2010), 280--287.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Chang-Tsun Li and Yue Li. 2011. Color-decoupled photo response non-uniformity for digital image forensics. IEEE Transactions on Circuits and Systems for Video Technology 22, 2 (2011), 260--271.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Jian Li, Yang Lv, Bin Ma, Meihong Yang, Chunpeng Wang, and Yang Zheng. 2020. Video source identification algorithm based on 3D geometric transformation. Computer Systems Science and Engineering 35, 6 (2020), 513--521.Google ScholarGoogle ScholarCross RefCross Ref
  40. Ruizhe Li, Chang-Tsun Li, and Yu Guan. 2018. Inference of a compact representation of sensor fingerprint for source camera identification. Pattern Recognition 74 (2018), 556--567.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Xufeng Lin and Chang-Tsun Li. 2015. Preprocessing reference sensor pattern noise via spectrum equalization. IEEE Transactions on Information Forensics and Security 11, 1 (2015), 126--140.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Liu Liu, Hanlin Yu, Zhongjie Ba, Li Lu, Feng Lin, and Kui Ren. 2021. PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting. In ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021. IEEE, 1--6. https://doi.org/10.1109/ICC42927.2021. 9501053Google ScholarGoogle ScholarCross RefCross Ref
  43. Raquel Ramos López, Ana Lucila Sandoval Orozco, and Luis Javier García Villalba. 2021. Compression effects and scene details on the source camera identification of digital videos. Expert Systems with Applications 170 (2021), 114515.Google ScholarGoogle ScholarCross RefCross Ref
  44. Jan Lukas, Jessica Fridrich, and Miroslav Goljan. 2006. Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 205--214.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Bin Ma, Yuanyuan Hu, Jian Li, ChunpengWang, Meihong Yang, and Yang Zheng. 2021. PRNU Extraction from Stabilized Video: A Patch Maybe Better than a Bunch. COMPUTER SYSTEMS SCIENCE AND ENGINEERING 36, 1 (2021), 189--200.Google ScholarGoogle ScholarCross RefCross Ref
  46. Sara Mandelli, Paolo Bestagini, Luisa Verdoliva, and Stefano Tubaro. 2019. Facing device attribution problem for stabilized video sequences. IEEE Transactions on Information Forensics and Security 15 (2019), 14--27.Google ScholarGoogle ScholarCross RefCross Ref
  47. Sara Mandelli, Davide Cozzolino, Paolo Bestagini, Luisa Verdoliva, and Stefano Tubaro. 2020. CNN-based fast source device identification. IEEE Signal Processing Letters 27 (2020), 1285--1289.Google ScholarGoogle ScholarCross RefCross Ref
  48. Francesco Marra, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2017. Blind PRNU-based image clustering for source identification. IEEE Transactions on Information Forensics and Security 12, 9 (2017), 2197--2211.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Forensic Pathways. 2022. New forensic image technology achieves success in major child abuse case. https://www.forensic-pathways.com/new-forensicimage- technology-achieves-success-in-major-child-abuse-case/Google ScholarGoogle Scholar
  50. Yijun Quan and Chang-Tsun Li. 2020. On addressing the impact of ISO speed upon PRNU and forgery detection. IEEE Transactions on Information Forensics and Security 16 (2020), 190--202.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Erwin Quiring and Matthias Kirchner. 2015. Fragile sensor fingerprint camera identification. In 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  52. R Satta, J Galbally, and L Beslay. 2013. State-of-theart review: Video analytics for fight against on-line child abuse. Technical Report. Technical Report JRC85864, European Commission-Joint Research Centre.Google ScholarGoogle Scholar
  53. Samet Taspinar, Manoranjan Mohanty, and Nasir Memon. 2020. Camera identification of multi-format devices. Pattern Recognition Letters 140 (2020), 288--294.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Diego Valsesia, Giulio Coluccia, Tiziano Bianchi, and Enrico Magli. 2015. Compressed fingerprint matching and camera identification via random projections. IEEE Transactions on Information Forensics and Security 10, 7 (2015), 1472--1485.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Diego Valsesia, Giulio Coluccia, Tiziano Bianchi, and Enrico Magli. 2017. User authentication via PRNU-based physical unclonable functions. IEEE Transactions on Information Forensics and Security 12, 8 (2017), 1941--1956.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Yue Zheng, Yuan Cao, and Chip-Hong Chang. 2019. APUF-based data-device hash for tampered image detection and source camera identification. IEEE Transactions on information forensics and security 15 (2019), 620--634.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, and Wenyuan Xu. 2019. Nauth: Secure face-to-face device authentication via nonlinearity. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 2080--2088.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Zhe Zhou, Wenrui Diao, Xiangyu Liu, and Kehuan Zhang. 2014. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In Proceedings of the 2014 ACMSIGSAC Conference on Computer and Communications Security. 429--440.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. FITS: Matching Camera Fingerprints Subject to Software Noise Pollution

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
        November 2023
        3722 pages
        ISBN:9798400700507
        DOI:10.1145/3576915

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 November 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA
      • Article Metrics

        • Downloads (Last 12 months)213
        • Downloads (Last 6 weeks)25

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader