Abstract
AbstractCamera fingerprints based on sensor PhotoResponse Non-Uniformity (PRNU) have gained broad popularity in forensic applications due to their ability to univocally identify the camera that captured a certain image. The fingerprint of a given sensor is extracted through some estimation method that requires a few images known to be taken with such sensor. In this paper, we show that the fingerprints extracted in this way leak a considerable amount of information from those images used in the estimation, thus constituting a potential threat to privacy. We propose to quantify the leakage via two measures: one based on the Mutual Information, and another based on the output of a membership inference test. Experiments with practical fingerprint estimators on a real-world image dataset confirm the validity of our measures and highlight the seriousness of the leakage and the importance of implementing techniques to mitigate it. Some of these techniques are presented and briefly discussed.
Funder
Agencia Estatal de Investigaci?n
Conseller?a de Cultura, Educaci?n e Ordenaci?n Universitaria, Xunta de Galicia
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Signal Processing
Reference29 articles.
1. M. Chen, J. Fridrich, M. Goljan, J. Lukas, Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur.3(1), 74–90 (2008).
2. K. Rosenfeld, H. T. Sencar, in Media Forensics and Security, vol. 7254. A study of the robustness of PRNU-based camera identification (International Society for Optics and PhotonicsSPIE, 2009), p. 72540M.
3. S. Taspinar, M. Mohanty, N. Memon, in 2016 IEEE International Workshop on Information Forensics and Security (WIFS). Source camera attribution using stabilized video, (2016), pp. 1–6.
4. P. Korus, J. Huang, Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. IEEE Trans. Inf. Forensics Secur.12(4), 809–824 (2017).
5. D. Cozzolino, L. Verdoliva, Noiseprint: A CNN-Based Camera Model Fingerprint. IEEE Trans. Inf. Forensics Secur.15:, 144–159 (2020).
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献