ABC: Enabling Smartphone Authentication with Built-in Camera

Size: px
Start display at page:

Download "ABC: Enabling Smartphone Authentication with Built-in Camera"

Transcription

1 ABC: Enabling Smartphone Authentication with Built-in Camera Zhongjie Ba, Sixu Piao, Xinwen Fu f, Dimitrios Koutsonikolas, Aziz Mohaisen f and Kui Ren f 1

2 Camera Identification: Hardware Distortion Manufacturing imperfection leads to pattern noise: Photo Response Non-Uniformity (PRNU)[1] Non-Uniform Pixel Unique Fingerprint! [1] LUKAS, J., FRIDRICH, J., AND GOLJAN, M. Digital camera identifi- cation from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1, 2 (2006),

3 Camera Identification: Fingerprint Matching Given an image, determine if it is captured by a camera of interest Filter Threshold Query image Noise Residue Similarity (PCE) Compare Extract The final identification accuracy is mainly determined by the quality of each fingerprint (target & reference). Training images Reference Fingerprint Image source: 3

4 From Camera Identification to Smartphone Identification Smartphone cameras have displaced the conventional digital camera Smartphones are widely used in security sensitive tasks 4 Image source:

5 Smartphone Camera VS Digital Camera 5

6 Smartphone Camera: Stronger Non-Uniformity The reduction in dimension amplifies the pixels non-uniformity Same level of manufacturing imperfection Stronger non-uniformity 6

7 Smartphone Camera: Higher Identification Accuracy One image alone can uniquely identify a smartphone camera 30 iphone 6 and 10 Galaxy Note 5 16,000 images collected from Amazon Mechanical Turk 7

8 Smartphone Authentication Scenario The user proves her identity to the verifier using her smartphone as a security token The verifier authenticates the user s smartphone by checking the fingerprint of its built-in camera 1. VLC Channel 2. Wireless Channel User with a smartphone Verifier 8

9 A Strawman Solution I m Bob, give me $100 Send me an image Who Yes, taken you are by are Bob s you? camera Bob Verifier Matching Image source: 9

10 Security Risk 1: Fingerprint Leakage Images captured by smartphone cameras, in most cases, are available to the public Facebook Instagram Wechat 10 Image source:

11 Fingerprint Leakage: The Replay Attack Send me an image Who arebyare taken Bob s Yes, you Bob you? camera I m Bob, give me $100 Download Bob s Facebook Adversary Verifier Matching 11

12 Solution: Randomized QR Code Liveness detection: Challenge the user to capture a freshly generated QR code Accurate Efficient Easy to randomize Easy to align Image submitted to the authentication system should match the challenge Image source: 12

13 Security Risk 2: Fingerprint Forgery An adversary can manipulate an image s fingerprint and fabricate forged images Fingerprint Injection Image source: Fingerprint Removal 13

14 Fingerprint Forgery: The Injection Attack Capture this image Who are are using camera Yes, Bob s you Bob you? and send it to me. I m Bob, give me $100 Capture Download Extract Bob s Facebook Injection Adversary Verifier Matching 14

15 Injection Detection Detect forged images that carry injected fingerprints Image source: 15

16 Normal Image VS Forged Image The generation of normal images Environmental noise (Random noise) Captured image Legitimate smartphone Target image 16

17 Normal Image VS Forged Image The generation of forged images Legitimate fingerprint Environmental noise Fingerprint injection Photographing Forged image Captured image Adversary s smartphone Target image 17

18 Normal Image VS Forged Image Forged images carry the foreign fingerprint of the adversary s smartphone camera 18

19 Solution: Correlation Test Revised challenge response process: Challenge the user to capture and upload two freshly generated QR codes. I m Bob, give me $100 Capture these images using Bob s camera and send them to me. Bob Verifier 19

20 Solution: Correlation Test Reference Fingerprint Extract Correlation 2 (PCE2) Extract Captured image 1 Noise residue 1 Noise residue 2 Captured image 2 20

21 Injection Detection: Normal Image Pair PCE1 PCE2 Correlation 2 (PCE2) 21

22 Injection Detection: Forged Image Pair PCE1 << PCE2 Correlation 2 (PCE2) 22

23 Effectiveness of Injection Detection 16,000 images from Amazon Mechanical Turk iphone 6: 400 forged image pairs and 450 normal image pairs Galaxy Note 5: 1600 forged image pairs and 1400 normal image pairs iphone 6 Galaxy Note 5 23

24 Authentication Work Flow What if the adversary removes his camera fingerprint? 24

25 Removal Detection Detect forged images that have been sanitized (fingerprint removal) Image source 25

26 Normal Image VS Forged Image All white Gaussian noise components will be removed in the process of fingerprint removal 26

27 Solution: Probe Signal Embed a probe signal that will be removed by the fingerprint removal process Environmental noise (Random noise) Probe signal (a white Gaussian noise) Embedding Captured image Legitimate smartphone Target image 27

28 Solution: Probe Signal Detect removal attacks by checking the existence of the probe signal 28

29 Solution: Probe Signal Detect removal attacks through checking the existence of the probe signal Filter Threshold Captured Image Noise Residue Similarity (PCE) Compare Filter Challenged scene Probe Signal 29

30 Effectiveness of Removal Detection Setting 1: Target scene have no probe signal. Setting 2: Target scene have a probe signal. Normal Image. Setting 3: Target scene have a probe signal. Removal Attack. 1. The probe signal is preserved in legitimate image tokens. (Setting 1 VS Setting 2) 2. The probe signal is suppressed in forged images. (Setting 2 VS Setting 3) Forged images can be easily detected 30

31 Full-fledged Authentication Protocol I m Bob, give me $100 Capture these images Who are using Bob s Yes, you are Bob camera you? and send them to me. Bob Verifier Image Content Matching Embed probe signal Fingerprint Verify Matching Injection Detection Removal Detection 31

32 The Attack Detection Flow Fingerprint leakage resilience Reliable camera identification Removal attack Fingerprint forgery Resilience Injection attack 32

33 Efficiency Image Content Matching: Determined by the version of the applied QR code. Normally can be finished within 0.1 second. Fingerprint Matching: Determined by the resolution of the captured image. This is the most time consuming part. Injection Detection: Determined by the resolution of the captured image. Normally can be finished within 0.5 second. Removal Detection: Determined by the resolution of the probe signal. It takes at most 0.9 second. 33

34 Efficiency Fingerprint Matching Overall Efficiency 34

35 What Factors can Influence PRNU? Does PRNU change over time? No Will the ambient environment affect the fingerprint on an image? Only ambient light intensity. What is the relationship between an image s resolution and the strength of its fingerprint? Positively correlated 35

36 Conclusion The first work to enable smartphone authentication using built-in camera Accurate and efficient identification Resilient to fingerprint leakage and forgery Thank you! Questions? 36

37 Reinforced Fingerprint Forgery: the Removal Attack Extract Capture Extract Download Bob s Facebook Removal Adversary Verifier Injection Injection 37

Retrieval of Large Scale Images and Camera Identification via Random Projections

Retrieval of Large Scale Images and Camera Identification via Random Projections Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management

More information

Camera identification from sensor fingerprints: why noise matters

Camera identification from sensor fingerprints: why noise matters Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Fragile Sensor Fingerprint Camera Identification

Fragile Sensor Fingerprint Camera Identification Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera

More information

Camera identification by grouping images from database, based on shared noise patterns

Camera identification by grouping images from database, based on shared noise patterns Camera identification by grouping images from database, based on shared noise patterns Teun Baar, Wiger van Houten, Zeno Geradts Digital Technology and Biometrics department, Netherlands Forensic Institute,

More information

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick

More information

TECHNICAL DOCUMENTATION

TECHNICAL DOCUMENTATION TECHNICAL DOCUMENTATION NEED HELP? Call us on +44 (0) 121 231 3215 TABLE OF CONTENTS Document Control and Authority...3 Introduction...4 Camera Image Creation Pipeline...5 Photo Metadata...6 Sensor Identification

More information

SPTF: Smart Photo-Tagging Framework on Smart Phones

SPTF: Smart Photo-Tagging Framework on Smart Phones , pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,

More information

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic

More information

Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science

Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science FORENSIC SCIENCE JOURNAL SINCE 2002 Forensic Science Journal 2017;16(1):19-42 fsjournal.cpu.edu.tw DOI:10.6593/FSJ.2017.1601.03 Applying the Sensor Noise based Camera Identification Technique to Trace

More information

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008 Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright

More information

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L. A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS Yu Chen and Vrizlynn L. L. Thing Institute for Infocomm Research, 1 Fusionopolis Way, 138632,

More information

Impeding Forgers at Photo Inception

Impeding Forgers at Photo Inception Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth

More information

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge 2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge This competition is sponsored by the IEEE Signal Processing Society Introduction The IEEE Signal Processing Society s 2018

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

PHOTO ANALYSIS SOFTWARE

PHOTO ANALYSIS SOFTWARE The problems with social media images As a general rule, there are three basic ways of authenticating an image prior to trial. The first way involves the photographer attesting to the image s authenticity.

More information

Colour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics

Colour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics Colour-Decoupled Photo Response Non-Uniformity for Digital mage Forensics Chang-Tsun Li 1 and Yue Li 2 1 Department of Computer Science, University of arwick, Coventry CV4 7AL, UK c-t.li@warwick.ac.uk

More information

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence

More information

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ A REVIEW OF TRENDS IN DIGITAL IMAGE PROCESSING FOR FORENSIC CONSIDERATION Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ Department of Forensic Science Sam Higginbottom Institute of agriculture Technology

More information

Original citation: Li, C-T. (2012). Color-Decoupled Photo Response Non-Uniformity for Digital mage Forensics. EEE Transactions on Circuits and Systems for Video Technology, 22(2), pp. 260-271 Permanent

More information

Secure Digital Camera

Secure Digital Camera Secure Digital Camera Paul Blythe and Jessica Fridrich Department of Electrical and Computer Engineering SUNY Binghamton, Binghamton, NY 13902-6000 {pblythe, fridrich}@binghamton.edu ABSTRACT In this paper,

More information

Survey On Passive-Blind Image Forensics

Survey On Passive-Blind Image Forensics Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal

More information

PRNU-Based Image Alignment for Defective Pixel Detection

PRNU-Based Image Alignment for Defective Pixel Detection PRNU-Based Image Alignment for Defective Pixel Detection Christof Kauba, Andreas Uhl Department of Computer Sciences, University of Salzburg, AUSTRIA {ckauba,uhl}@cosy.sbg.ac.at Abstract Image alignment

More information

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Roberto Caldelli, Irene Amerini, and Francesco Picchioni Media Integration and Communication Center - MICC, University of

More information

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.

More information

DOTTORATO DI RICERCA IN INFORMATICA IX CICLO UNIVERSITA DEGLI STUDI DI SALERNO. Forensic Analysis for Digital Images.

DOTTORATO DI RICERCA IN INFORMATICA IX CICLO UNIVERSITA DEGLI STUDI DI SALERNO. Forensic Analysis for Digital Images. DOTTORATO DI RICERCA IN INFORMATICA IX CICLO UNIVERSITA DEGLI STUDI DI SALERNO Forensic Analysis for Digital Images Maurizio Cembalo November, 2010 PhD Program Chair Prof.ssa Margherita Napoli Supervisor

More information

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS Hui Su, Ravi Garg, Adi Hajj-Ahmad, and Min Wu {hsu, ravig, adiha, minwu}@umd.edu University of Maryland, College Park ABSTRACT Electric Network (ENF) based forensic

More information

Detection of Hue Modification Using Photo Response Non-Uniformity

Detection of Hue Modification Using Photo Response Non-Uniformity The final version of record is available at http://dx.doi.org/.9/tcsvt.6.53988 Detection of Hue Modification Using Photo Response Non-Uniformity Jong-Uk Hou, Student Member, IEEE, and Heung-Kyu Lee Abstract

More information

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Department of Computer Science and Engineering The Chinese University of Hong Kong. Year Final Year Project

Department of Computer Science and Engineering The Chinese University of Hong Kong. Year Final Year Project Digital Interactive Game Interface Table Apps for ipad Supervised by: Professor Michael R. Lyu Student: Ng Ka Hung (1009615714) Chan Hing Faat (1009618344) Year 2011 2012 Final Year Project Department

More information

Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography

Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography Xi Luo Stanford University 450 Serra Mall, Stanford, CA 94305 xluo2@stanford.edu Abstract The project explores various application

More information

Exposing Image Forgery with Blind Noise Estimation

Exposing Image Forgery with Blind Noise Estimation Exposing Image Forgery with Blind Noise Estimation Xunyu Pan Computer Science Department University at Albany, SUNY Albany, NY 12222, USA xypan@cs.albany.edu Xing Zhang Computer Science Department University

More information

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif

More information

On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts

On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts Riccardo Satta and Pasquale Stirparo,2 Institute for the Protection and Security of the Citizen Joint

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

Interframe Coding of Global Image Signatures for Mobile Augmented Reality

Interframe Coding of Global Image Signatures for Mobile Augmented Reality Interframe Coding of Global Image Signatures for Mobile Augmented Reality David Chen 1, Mina Makar 1,2, Andre Araujo 1, Bernd Girod 1 1 Department of Electrical Engineering, Stanford University 2 Qualcomm

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012 A Tailored Anti-Forensic Approach for Digital Image Compression S.Manimurugan, Athira B.Kaimal Abstract- The influence of digital images on modern society is incredible; image processing has now become

More information

Introduction to Cryptography

Introduction to Cryptography B504 / I538: Introduction to Cryptography Spring 2017 Lecture 11 * modulo the 1-week extension on problems 3 & 4 Assignment 2 * is due! Assignment 3 is out and is due in two weeks! 1 Secrecy vs. integrity

More information

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in

More information

Source Camera Model Identification Using Features from contaminated Sensor Noise

Source Camera Model Identification Using Features from contaminated Sensor Noise Source Camera Model Identification Using Features from contaminated Sensor Noise Amel TUAMA 2,3, Frederic COMBY 2,3, Marc CHAUMONT 1,2,3 1 NÎMES UNIVERSITY, F-30021 Nîmes Cedex 1, France 2 MONTPELLIER

More information

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Mo Chen, Jessica Fridrich, Jan Lukáš, and Miroslav Goljan Dept. of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000,

More information

Image Manipulation Detection using Convolutional Neural Network

Image Manipulation Detection using Convolutional Neural Network Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

Tampering Detection Algorithms: A Comparative Study

Tampering Detection Algorithms: A Comparative Study International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study

More information

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Camera Model Identification Framework Using An Ensemble of Demosaicing Features Camera Model Identification Framework Using An Ensemble of Demosaicing Features Chen Chen Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: chen.chen3359@drexel.edu

More information

The Next Generation of Secure Position, Navigation and Timing Technology

The Next Generation of Secure Position, Navigation and Timing Technology Navigation and Timing Technology November 2017 Contents Executive Summary 2 GPS on the Battlefield 2 Vulnerabilities of GPS 2 Staying Ahead of the Threat 3 Innovating For More Resilient PNT 3 Innovative,

More information

Open and Youth Categories - Groups A & B

Open and Youth Categories - Groups A & B Open and Youth Categories - Groups A & B TERMS & CONDITIONS: ELIGIBILITY 1. The photo contest is open to Singapore Citizens, Permanent Residents and foreigners residing in Singapore. An eligible participant

More information

FUZZY BASED MEDIAN FILTER FOR GRAY-SCALE IMAGES

FUZZY BASED MEDIAN FILTER FOR GRAY-SCALE IMAGES FUZZY BASED MEDIAN FILTER FOR GRAY-SCALE IMAGES Sukomal Mehta 1, Sanjeev Dhull 2 1 Department of Electronics & Comm., GJU University, Hisar, Haryana, sukomal.mehta@gmail.com 2 Assistant Professor, Department

More information

WearLock: Unlock Your Phone via Acoustics using Smartwatch

WearLock: Unlock Your Phone via Acoustics using Smartwatch : Unlock Your Phone via s using Smartwatch Shanhe Yi, Zhengrui Qin*, Nancy Carter, and Qun Li College of William and Mary *Northwest Missouri State University Smartphone is a pocket-size summary of your

More information

FamilySearch Mobile Apps: Family History Anytime, Anywhere

FamilySearch Mobile Apps: Family History Anytime, Anywhere FamilySearch Mobile Apps: Family History Anytime, Anywhere For this and more information about FamilySearch Mobile Apps go to: https://www.familysearch.org/blog/en/familysearch-mobile-apps/ Take your family

More information

Automatic source camera identification using the intrinsic lens radial distortion

Automatic source camera identification using the intrinsic lens radial distortion Automatic source camera identification using the intrinsic lens radial distortion Kai San Choi, Edmund Y. Lam, and Kenneth K. Y. Wong Department of Electrical and Electronic Engineering, University of

More information

WIRELESS physical layer security is becoming increasingly

WIRELESS physical layer security is becoming increasingly IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY 2016 1515 Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature Song Fang, Yao

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

Image Forgery Identification Using JPEG Intrinsic Fingerprints

Image Forgery Identification Using JPEG Intrinsic Fingerprints 1 Image Forgery Identification Using JPEG Intrinsic Fingerprints A. Garg, A. Hailu, and R. Sridharan Abstract In this paper a novel method for image forgery detection is presented. he method exploits the

More information

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

Mobile Camera Source Identification with SVD

Mobile Camera Source Identification with SVD Mobile Camera Source Identification with SVD A-R Soobhany, KP Lam, P Fletcher, DJ Collins Research Institute for the Environment, Physical Sciences and Applied Mathematics Keele University Keele, Staffordshire,

More information

A Novel Multi-size Block Benford s Law Scheme for Printer Identification

A Novel Multi-size Block Benford s Law Scheme for Printer Identification A Novel Multi-size Block Benford s Law Scheme for Printer Identification Weina Jiang 1, Anthony T.S. Ho 1, Helen Treharne 1, and Yun Q. Shi 2 1 Dept. of Computing, University of Surrey Guildford, GU2 7XH,

More information

Andrei Sabelfeld. Joint work with Per Hallgren and Martin Ochoa

Andrei Sabelfeld. Joint work with Per Hallgren and Martin Ochoa Andrei Sabelfeld Joint work with Per Hallgren and Martin Ochoa Privacy for location based services Explosion of interest to location based services (LBS) locating people, vehicles, vessels, cargo, devices

More information

A Study of Distortion Effects on Fingerprint Matching

A Study of Distortion Effects on Fingerprint Matching A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department

More information

Exposing Photo Manipulation with Geometric Inconsistencies

Exposing Photo Manipulation with Geometric Inconsistencies Exposing Photo Manipulation with Geometric Inconsistencies James F. O Brien U.C. Berkeley Collaborators Hany Farid Eric Kee Valentina Conotter Stephen Bailey 1 image-forensics-pg14.key - October 9, 2014

More information

Deblurring. Basics, Problem definition and variants

Deblurring. Basics, Problem definition and variants Deblurring Basics, Problem definition and variants Kinds of blur Hand-shake Defocus Credit: Kenneth Josephson Motion Credit: Kenneth Josephson Kinds of blur Spatially invariant vs. Spatially varying

More information

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

ADVANCES in digital imaging technologies have led to

ADVANCES in digital imaging technologies have led to 126 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 1, JANUARY 2016 Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization Xufeng Lin and Chang-Tsun Li, Senior Member,

More information

PRIOR IMAGE JPEG-COMPRESSION DETECTION

PRIOR IMAGE JPEG-COMPRESSION DETECTION Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

Multimedia Forensics

Multimedia Forensics Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer

More information

A Forensic Analysis of Images on Online Social Networks

A Forensic Analysis of Images on Online Social Networks 2011 Third International Conference on Intelligent Networking and Collaborative Systems A Forensic Analysis of Images on Online Social Networks Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

CIS 700/002: Special Topics: Acoustic Injection Attacks on MEMS Accelerometers

CIS 700/002: Special Topics: Acoustic Injection Attacks on MEMS Accelerometers CIS 700/002: Special Topics: Acoustic Injection Attacks on MEMS Accelerometers Thejas Kesari CIS 700/002: Security of EMBS/CPS/IoT Department of Computer and Information Science School of Engineering and

More information

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant

More information

Implementation of the Likelihood Ratio framework for camera identification based

Implementation of the Likelihood Ratio framework for camera identification based Implementation of the Likelihood Ratio framework for camera identification based on sensor noise patterns Wiger van Houten 1, Ivo Alberink, Zeno Geradts Criminal Investigation Unit North, Digital Evidence

More information

Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns

Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns Law, Probability and Risk (2011) 10, 149 159 doi:10.1093/lpr/mgr006 Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns WIGER VAN HOUTEN Digital Evidence

More information

USER GUIDE. NEED HELP? Call us on +44 (0)

USER GUIDE. NEED HELP? Call us on +44 (0) USER GUIDE NEED HELP? Call us on +44 (0) 121 250 3642 TABLE OF CONTENTS Document Control and Authority...3 User Guide...4 Create SPN Project...5 Open SPN Project...6 Save SPN Project...6 Evidence Page...7

More information

Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier

Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier Journal of Information Systems and Telecommunication, Vol. 1, No. 4, October - December 2013 233 Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

Smartphone RH/Temperature Probe Instruction Manual

Smartphone RH/Temperature Probe Instruction Manual Smartphone RH/Temperature Probe 800014 Instruction Manual 1 TABLE OF CONTENTS Introduction...3 Features...4 App Screen...5 Measurement Procedures...7 Care and Maintenance...14 Compatibility...14 Specifications...15

More information

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,

More information

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security Baodong Qin 1,2, Shengli Liu 1, Tsz Hon Yuen 3, Robert H. Deng 4, Kefei Chen 5 1. Shanghai Jiao Tong University, China

More information

Image Smoothening and Sharpening using Frequency Domain Filtering Technique

Image Smoothening and Sharpening using Frequency Domain Filtering Technique Volume 5, Issue 4, April (17) Image Smoothening and Sharpening using Frequency Domain Filtering Technique Swati Dewangan M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg, India.

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

Application of Histogram Examination for Image Steganography

Application of Histogram Examination for Image Steganography J. Appl. Environ. Biol. Sci., 5(9S)97-104, 2015 2015, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Application of Histogram Examination

More information

Neuro-Fuzzy based First Responder for Image forgery Identification

Neuro-Fuzzy based First Responder for Image forgery Identification ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Source Camera Identification Using Enhanced Sensor Pattern Noise

Source Camera Identification Using Enhanced Sensor Pattern Noise T-IFS-011-009 1 Source Camera Identification Using Enhanced Sensor Pattern Noise Chang-Tsun L Member, IEEE Abstract Sensor pattern noises (SPNs), extracted from digital images to serve as the fingerprints

More information

Glastir Small Grants Geotagged Photo Guidance. The Welsh Government Rural Communities Rural Development Programme for Wales

Glastir Small Grants Geotagged Photo Guidance. The Welsh Government Rural Communities Rural Development Programme for Wales back to contents Glastir Small Grants Geotagged Photo Guidance The Welsh Government Rural Communities Rural Development Programme for Wales 2014-2020 Crown copyright 2016 WG29876 Digital ISBN: 978 1 4734

More information

Study of 3D Barcode with Steganography for Data Hiding

Study of 3D Barcode with Steganography for Data Hiding Study of 3D Barcode with Steganography for Data Hiding Megha S M 1, Chethana C 2 1Student of Master of Technology, Dept. of Computer Science and Engineering& BMSIT&M Yelahanka Banglore-64, 2 Assistant

More information

Literature Survey on Image Manipulation Detection

Literature Survey on Image Manipulation Detection Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,

More information

VARIOUS METHODS IN DIGITAL IMAGE PROCESSING. S.Selvaragini 1, E.Venkatesan 2. BIST, BIHER,Bharath University, Chennai-73

VARIOUS METHODS IN DIGITAL IMAGE PROCESSING. S.Selvaragini 1, E.Venkatesan 2. BIST, BIHER,Bharath University, Chennai-73 Volume 116 No. 16 2017, 265-269 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu VARIOUS METHODS IN DIGITAL IMAGE PROCESSING S.Selvaragini 1, E.Venkatesan

More information

Image analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror

Image analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror Image analysis CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror A two- dimensional image can be described as a function of two variables f(x,y). For a grayscale image, the value of f(x,y) specifies the brightness

More information

Information Forensics: An Overview of the First Decade

Information Forensics: An Overview of the First Decade Received March 8, 2013, accepted April 6, 2013, published May 10, 2013. Digital Object Identifier 10.1109/ACCESS.2013.2260814 Information Forensics: An Overview of the First Decade MATTHEW C. STAMM (MEMBER,

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment

Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment Gabriel Goller & Georg Sigl 144215 Introduction Device Under Test Sensor Radio Receiver Front End Software Defined

More information

Scanner Identification Using Sensor Pattern Noise

Scanner Identification Using Sensor Pattern Noise Scanner Identification Using Sensor Pattern Noise Nitin Khanna a, Aravind K. Mikkilineni b George T. C. Chiu b, Jan P. Allebach a, Edward J. Delp a a School of Electrical and Computer Engineering b School

More information

CoE4TN4 Image Processing. Chapter 3: Intensity Transformation and Spatial Filtering

CoE4TN4 Image Processing. Chapter 3: Intensity Transformation and Spatial Filtering CoE4TN4 Image Processing Chapter 3: Intensity Transformation and Spatial Filtering Image Enhancement Enhancement techniques: to process an image so that the result is more suitable than the original image

More information

A 1.3 Megapixel CMOS Imager Designed for Digital Still Cameras

A 1.3 Megapixel CMOS Imager Designed for Digital Still Cameras A 1.3 Megapixel CMOS Imager Designed for Digital Still Cameras Paul Gallagher, Andy Brewster VLSI Vision Ltd. San Jose, CA/USA Abstract VLSI Vision Ltd. has developed the VV6801 color sensor to address

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha

More information