Smartphone Camera De-identification while Preserving Biometric Utility
- URL: http://arxiv.org/abs/2009.08511v1
- Date: Thu, 17 Sep 2020 19:48:43 GMT
- Title: Smartphone Camera De-identification while Preserving Biometric Utility
- Authors: Sudipta Banerjee and Arun Ross
- Abstract summary: Photo Response Non Uniformity (PRNU) is often exploited to deduce the identity of the smartphone device whose camera or sensor was used to acquire a certain image.
In this work, we design an algorithm that perturbs a face image acquired using a smartphone camera such that (a) sensor-specific details pertaining to the smartphone camera are suppressed (sensor anonymization); (b) the sensor pattern of a different device is incorporated (sensor spoofing); and (c) biometric matching using the perturbed image is not affected (biometric utility).
Experiments conducted on the MICHE-I and OULU-NPU datasets
- Score: 13.164846772893455
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The principle of Photo Response Non Uniformity (PRNU) is often exploited to
deduce the identity of the smartphone device whose camera or sensor was used to
acquire a certain image. In this work, we design an algorithm that perturbs a
face image acquired using a smartphone camera such that (a) sensor-specific
details pertaining to the smartphone camera are suppressed (sensor
anonymization); (b) the sensor pattern of a different device is incorporated
(sensor spoofing); and (c) biometric matching using the perturbed image is not
affected (biometric utility). We employ a simple approach utilizing Discrete
Cosine Transform to achieve the aforementioned objectives. Experiments
conducted on the MICHE-I and OULU-NPU datasets, which contain periocular and
facial data acquired using 12 smartphone cameras, demonstrate the efficacy of
the proposed de-identification algorithm on three different PRNU-based sensor
identification schemes. This work has application in sensor forensics and
personal privacy.
Related papers
- Web Photo Source Identification based on Neural Enhanced Camera
Fingerprint [9.606477062236499]
Source camera identification of web photos aims to establish a reliable linkage from the captured images to their source cameras.
This paper presents an innovative and practical source identification framework that employs neural-network enhanced sensor pattern noise.
By incorporating metric learning and frequency consistency into the deep network design, our proposed fingerprint extraction algorithm achieves state-of-the-art performance on modern smartphone photos.
arXiv Detail & Related papers (2023-02-18T04:14:45Z) - Drone Detection and Tracking in Real-Time by Fusion of Different Sensing
Modalities [66.4525391417921]
We design and evaluate a multi-sensor drone detection system.
Our solution integrates a fish-eye camera as well to monitor a wider part of the sky and steer the other cameras towards objects of interest.
The thermal camera is shown to be a feasible solution as good as the video camera, even if the camera employed here has a lower resolution.
arXiv Detail & Related papers (2022-07-05T10:00:58Z) - Mobile Behavioral Biometrics for Passive Authentication [65.94403066225384]
This work carries out a comparative analysis of unimodal and multimodal behavioral biometric traits.
Experiments are performed over HuMIdb, one of the largest and most comprehensive freely available mobile user interaction databases.
In our experiments, the most discriminative background sensor is the magnetometer, whereas among touch tasks the best results are achieved with keystroke.
arXiv Detail & Related papers (2022-03-14T17:05:59Z) - PRNU Based Source Camera Identification for Webcam and Smartphone Videos [137.6408511310322]
This communication is about an application of image forensics where we use camera sensor fingerprints to identify source camera (SCI: Source Camera Identification) in webcam/smartphone videos.
arXiv Detail & Related papers (2022-01-27T18:57:14Z) - Improving the Authentication with Built-in Camera Protocol Using
Built-in Motion Sensors: A Deep Learning Solution [16.72680081620203]
We propose an enhanced version of the Authentication with Built-in Camera protocol by employing a deep learning solution based on built-in motion sensors.
The protocol is vulnerable to forgery attacks when the attacker can compute the camera fingerprint from external photos.
In this context, we propose an enhancement for the ABC protocol based on motion sensor data, as an additional and passive authentication layer.
arXiv Detail & Related papers (2021-07-22T09:26:53Z) - Privacy-Preserving Image Acquisition Using Trainable Optical Kernel [50.1239616836174]
We propose a trainable image acquisition method that removes the sensitive identity revealing information in the optical domain before it reaches the image sensor.
As the sensitive content is suppressed before it reaches the image sensor, it does not enter the digital domain therefore is unretrievable by any sort of privacy attack.
arXiv Detail & Related papers (2021-06-28T11:08:14Z) - One-shot Representational Learning for Joint Biometric and Device
Authentication [14.646962064352577]
We propose a method to simultaneously perform (i.e., identify the individual) and device recognition from a single biometric image.
Such a joint recognition scheme can be useful in devices such as smartphones for enhancing security as well as privacy.
arXiv Detail & Related papers (2021-01-02T22:29:29Z) - Face recognition using PCA integrated with Delaunay triangulation [0.0]
The research examines the integration of Principal Component Analysis with Delaunay Triangulation.
The method triangulates a set of face landmark points and obtains eigenfaces of the provided images.
It compares the algorithm with traditional PCA and discusses the inclusion of different face landmark points to deliver an effective recognition rate.
arXiv Detail & Related papers (2020-11-25T14:46:08Z) - Face Anti-Spoofing by Learning Polarization Cues in a Real-World
Scenario [50.36920272392624]
Face anti-spoofing is the key to preventing security breaches in biometric recognition applications.
Deep learning method using RGB and infrared images demands a large amount of training data for new attacks.
We present a face anti-spoofing method in a real-world scenario by automatic learning the physical characteristics in polarization images of a real face.
arXiv Detail & Related papers (2020-03-18T03:04:03Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.