Beyond PRNU: Learning Robust Device-Specific Fingerprint for Source
Camera Identification
- URL: http://arxiv.org/abs/2111.02144v1
- Date: Wed, 3 Nov 2021 11:25:19 GMT
- Title: Beyond PRNU: Learning Robust Device-Specific Fingerprint for Source
Camera Identification
- Authors: Manisha, Chang-Tsun Li, Xufeng Lin, Karunakar A. Kotegar
- Abstract summary: Source camera identification tools assist image forensic investigators to associate an image in question with a suspect camera.
Photo Response Non Uniformity (PRNU) noise pattern caused by sensor imperfections has been proven to be an effective way to identify the source camera.
PRNU is susceptible to camera settings, image content, image processing operations, and counter-forensic attacks.
New device fingerprint is extracted from the low and mid-frequency bands, which resolves the fragility issue that the PRNU is unable to contend with.
- Score: 14.404497406560104
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Source camera identification tools assist image forensic investigators to
associate an image in question with a suspect camera. Various techniques have
been developed based on the analysis of the subtle traces left in the images
during the acquisition. The Photo Response Non Uniformity (PRNU) noise pattern
caused by sensor imperfections has been proven to be an effective way to
identify the source camera. The existing literature suggests that the PRNU is
the only fingerprint that is device-specific and capable of identifying the
exact source device. However, the PRNU is susceptible to camera settings, image
content, image processing operations, and counter-forensic attacks. A forensic
investigator unaware of counter-forensic attacks or incidental image
manipulations is at the risk of getting misled. The spatial synchronization
requirement during the matching of two PRNUs also represents a major limitation
of the PRNU. In recent years, deep learning based approaches have been
successful in identifying source camera models. However, the identification of
individual cameras of the same model through these data-driven approaches
remains unsatisfactory. In this paper, we bring to light the existence of a new
robust data-driven device-specific fingerprint in digital images which is
capable of identifying the individual cameras of the same model. It is
discovered that the new device fingerprint is location-independent, stochastic,
and globally available, which resolve the spatial synchronization issue. Unlike
the PRNU, which resides in the high-frequency band, the new device fingerprint
is extracted from the low and mid-frequency bands, which resolves the fragility
issue that the PRNU is unable to contend with. Our experiments on various
datasets demonstrate that the new fingerprint is highly resilient to image
manipulations such as rotation, gamma correction, and aggressive JPEG
compression.
Related papers
- Web Photo Source Identification based on Neural Enhanced Camera
Fingerprint [9.606477062236499]
Source camera identification of web photos aims to establish a reliable linkage from the captured images to their source cameras.
This paper presents an innovative and practical source identification framework that employs neural-network enhanced sensor pattern noise.
By incorporating metric learning and frequency consistency into the deep network design, our proposed fingerprint extraction algorithm achieves state-of-the-art performance on modern smartphone photos.
arXiv Detail & Related papers (2023-02-18T04:14:45Z) - PRNU Based Source Camera Identification for Webcam and Smartphone Videos [137.6408511310322]
This communication is about an application of image forensics where we use camera sensor fingerprints to identify source camera (SCI: Source Camera Identification) in webcam/smartphone videos.
arXiv Detail & Related papers (2022-01-27T18:57:14Z) - A leak in PRNU based source identification. Questioning fingerprint
uniqueness [75.33542585238497]
Photo Response Non-Uniformity (PRNU) is considered the most effective trace for the image source attribution task.
Recent devices may introduce non-unique artifacts that may reduce PRNU noise's distinctiveness.
We show that the primary cause of high false alarm rates cannot be directly related to specific camera models, firmware, or image contents.
arXiv Detail & Related papers (2020-09-10T14:18:38Z) - On the Reliability of the PNU for Source Camera Identification Tasks [2.885175627590247]
The PNU is an essential tool to perform SCI and, during the years, became a standard de-facto for this task in the forensic field.
We show that, although strategies exist that aim to cancel, modify, replace the PNU traces in a digital camera image, it is still possible, through our experimental method, to find residual traces of the noise produced by the sensor used to shoot the photo.
arXiv Detail & Related papers (2020-08-28T15:15:31Z) - Artificial Fingerprinting for Generative Models: Rooting Deepfake
Attribution in Training Data [64.65952078807086]
Photorealistic image generation has reached a new level of quality due to the breakthroughs of generative adversarial networks (GANs)
Yet, the dark side of such deepfakes, the malicious use of generated media, raises concerns about visual misinformation.
We seek a proactive and sustainable solution on deepfake detection by introducing artificial fingerprints into the models.
arXiv Detail & Related papers (2020-07-16T16:49:55Z) - A Modified Fourier-Mellin Approach for Source Device Identification on
Stabilized Videos [72.40789387139063]
multimedia forensic tools usually exploit characteristic noise traces left by the camera sensor on the acquired frames.
This analysis requires that the noise pattern characterizing the camera and the noise pattern extracted from video frames under analysis are geometrically aligned.
We propose to overcome this limitation by searching scaling and rotation parameters in the frequency domain.
arXiv Detail & Related papers (2020-05-20T12:06:40Z) - Warwick Image Forensics Dataset for Device Fingerprinting In Multimedia
Forensics [19.98488085122803]
Device fingerprints like sensor pattern noise (SPN) are widely used for provenance analysis and image authentication.
The flexibility of camera parameter settings and the emergence of multi-frame photography algorithms bring new challenges to device fingerprinting.
We present the Warwick Image Forensics dataset of more than 58,600 images captured using 14 digital cameras with various exposure settings.
arXiv Detail & Related papers (2020-04-22T09:54:27Z) - Camera Trace Erasing [86.15997461603568]
We address a new low-level vision problem, camera trace erasing, to reveal the weakness of trace-based forensic methods.
We propose Siamese Trace Erasing (SiamTE), in which a novel hybrid loss is designed on the basis of Siamese architecture for network training.
arXiv Detail & Related papers (2020-03-16T00:09:55Z) - Towards Precise Intra-camera Supervised Person Re-identification [54.86892428155225]
Intra-camera supervision (ICS) for person re-identification (Re-ID) assumes that identity labels are independently annotated within each camera view.
Lack of inter-camera labels makes the ICS Re-ID problem much more challenging than the fully supervised counterpart.
Our approach performs even comparable to state-of-the-art fully supervised methods in two of the datasets.
arXiv Detail & Related papers (2020-02-12T11:56:30Z) - Combining PRNU and noiseprint for robust and efficient device source
identification [18.560458309179204]
PRNU-based image processing is a key asset in digital multimedia forensics.
Image noiseprint is a recently proposed camera-model fingerprint that has proved effective for several forensic tasks.
arXiv Detail & Related papers (2020-01-17T17:32:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.