ABC: Enabling Smartphone Authentication with Built-in Camera
|
|
- Samuel Hart
- 5 years ago
- Views:
Transcription
1 ABC: Enabling Smartphone Authentication with Built-in Camera Zhongjie Ba, Sixu Piao, Xinwen Fu f, Dimitrios Koutsonikolas, Aziz Mohaisen f and Kui Ren f 1
2 Camera Identification: Hardware Distortion Manufacturing imperfection leads to pattern noise: Photo Response Non-Uniformity (PRNU)[1] Non-Uniform Pixel Unique Fingerprint! [1] LUKAS, J., FRIDRICH, J., AND GOLJAN, M. Digital camera identifi- cation from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1, 2 (2006),
3 Camera Identification: Fingerprint Matching Given an image, determine if it is captured by a camera of interest Filter Threshold Query image Noise Residue Similarity (PCE) Compare Extract The final identification accuracy is mainly determined by the quality of each fingerprint (target & reference). Training images Reference Fingerprint Image source: 3
4 From Camera Identification to Smartphone Identification Smartphone cameras have displaced the conventional digital camera Smartphones are widely used in security sensitive tasks 4 Image source:
5 Smartphone Camera VS Digital Camera 5
6 Smartphone Camera: Stronger Non-Uniformity The reduction in dimension amplifies the pixels non-uniformity Same level of manufacturing imperfection Stronger non-uniformity 6
7 Smartphone Camera: Higher Identification Accuracy One image alone can uniquely identify a smartphone camera 30 iphone 6 and 10 Galaxy Note 5 16,000 images collected from Amazon Mechanical Turk 7
8 Smartphone Authentication Scenario The user proves her identity to the verifier using her smartphone as a security token The verifier authenticates the user s smartphone by checking the fingerprint of its built-in camera 1. VLC Channel 2. Wireless Channel User with a smartphone Verifier 8
9 A Strawman Solution I m Bob, give me $100 Send me an image Who Yes, taken you are by are Bob s you? camera Bob Verifier Matching Image source: 9
10 Security Risk 1: Fingerprint Leakage Images captured by smartphone cameras, in most cases, are available to the public Facebook Instagram Wechat 10 Image source:
11 Fingerprint Leakage: The Replay Attack Send me an image Who arebyare taken Bob s Yes, you Bob you? camera I m Bob, give me $100 Download Bob s Facebook Adversary Verifier Matching 11
12 Solution: Randomized QR Code Liveness detection: Challenge the user to capture a freshly generated QR code Accurate Efficient Easy to randomize Easy to align Image submitted to the authentication system should match the challenge Image source: 12
13 Security Risk 2: Fingerprint Forgery An adversary can manipulate an image s fingerprint and fabricate forged images Fingerprint Injection Image source: Fingerprint Removal 13
14 Fingerprint Forgery: The Injection Attack Capture this image Who are are using camera Yes, Bob s you Bob you? and send it to me. I m Bob, give me $100 Capture Download Extract Bob s Facebook Injection Adversary Verifier Matching 14
15 Injection Detection Detect forged images that carry injected fingerprints Image source: 15
16 Normal Image VS Forged Image The generation of normal images Environmental noise (Random noise) Captured image Legitimate smartphone Target image 16
17 Normal Image VS Forged Image The generation of forged images Legitimate fingerprint Environmental noise Fingerprint injection Photographing Forged image Captured image Adversary s smartphone Target image 17
18 Normal Image VS Forged Image Forged images carry the foreign fingerprint of the adversary s smartphone camera 18
19 Solution: Correlation Test Revised challenge response process: Challenge the user to capture and upload two freshly generated QR codes. I m Bob, give me $100 Capture these images using Bob s camera and send them to me. Bob Verifier 19
20 Solution: Correlation Test Reference Fingerprint Extract Correlation 2 (PCE2) Extract Captured image 1 Noise residue 1 Noise residue 2 Captured image 2 20
21 Injection Detection: Normal Image Pair PCE1 PCE2 Correlation 2 (PCE2) 21
22 Injection Detection: Forged Image Pair PCE1 << PCE2 Correlation 2 (PCE2) 22
23 Effectiveness of Injection Detection 16,000 images from Amazon Mechanical Turk iphone 6: 400 forged image pairs and 450 normal image pairs Galaxy Note 5: 1600 forged image pairs and 1400 normal image pairs iphone 6 Galaxy Note 5 23
24 Authentication Work Flow What if the adversary removes his camera fingerprint? 24
25 Removal Detection Detect forged images that have been sanitized (fingerprint removal) Image source 25
26 Normal Image VS Forged Image All white Gaussian noise components will be removed in the process of fingerprint removal 26
27 Solution: Probe Signal Embed a probe signal that will be removed by the fingerprint removal process Environmental noise (Random noise) Probe signal (a white Gaussian noise) Embedding Captured image Legitimate smartphone Target image 27
28 Solution: Probe Signal Detect removal attacks by checking the existence of the probe signal 28
29 Solution: Probe Signal Detect removal attacks through checking the existence of the probe signal Filter Threshold Captured Image Noise Residue Similarity (PCE) Compare Filter Challenged scene Probe Signal 29
30 Effectiveness of Removal Detection Setting 1: Target scene have no probe signal. Setting 2: Target scene have a probe signal. Normal Image. Setting 3: Target scene have a probe signal. Removal Attack. 1. The probe signal is preserved in legitimate image tokens. (Setting 1 VS Setting 2) 2. The probe signal is suppressed in forged images. (Setting 2 VS Setting 3) Forged images can be easily detected 30
31 Full-fledged Authentication Protocol I m Bob, give me $100 Capture these images Who are using Bob s Yes, you are Bob camera you? and send them to me. Bob Verifier Image Content Matching Embed probe signal Fingerprint Verify Matching Injection Detection Removal Detection 31
32 The Attack Detection Flow Fingerprint leakage resilience Reliable camera identification Removal attack Fingerprint forgery Resilience Injection attack 32
33 Efficiency Image Content Matching: Determined by the version of the applied QR code. Normally can be finished within 0.1 second. Fingerprint Matching: Determined by the resolution of the captured image. This is the most time consuming part. Injection Detection: Determined by the resolution of the captured image. Normally can be finished within 0.5 second. Removal Detection: Determined by the resolution of the probe signal. It takes at most 0.9 second. 33
34 Efficiency Fingerprint Matching Overall Efficiency 34
35 What Factors can Influence PRNU? Does PRNU change over time? No Will the ambient environment affect the fingerprint on an image? Only ambient light intensity. What is the relationship between an image s resolution and the strength of its fingerprint? Positively correlated 35
36 Conclusion The first work to enable smartphone authentication using built-in camera Accurate and efficient identification Resilient to fingerprint leakage and forgery Thank you! Questions? 36
37 Reinforced Fingerprint Forgery: the Removal Attack Extract Capture Extract Download Bob s Facebook Removal Adversary Verifier Injection Injection 37
Retrieval of Large Scale Images and Camera Identification via Random Projections
Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management
More informationCamera identification from sensor fingerprints: why noise matters
Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationFragile Sensor Fingerprint Camera Identification
Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera
More informationCamera identification by grouping images from database, based on shared noise patterns
Camera identification by grouping images from database, based on shared noise patterns Teun Baar, Wiger van Houten, Zeno Geradts Digital Technology and Biometrics department, Netherlands Forensic Institute,
More informationity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li
ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick
More informationTECHNICAL DOCUMENTATION
TECHNICAL DOCUMENTATION NEED HELP? Call us on +44 (0) 121 231 3215 TABLE OF CONTENTS Document Control and Authority...3 Introduction...4 Camera Image Creation Pipeline...5 Photo Metadata...6 Sensor Identification
More informationSPTF: Smart Photo-Tagging Framework on Smart Phones
, pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,
More informationSOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS
SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic
More informationApplying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science
FORENSIC SCIENCE JOURNAL SINCE 2002 Forensic Science Journal 2017;16(1):19-42 fsjournal.cpu.edu.tw DOI:10.6593/FSJ.2017.1601.03 Applying the Sensor Noise based Camera Identification Technique to Trace
More informationWatermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008
Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright
More informationA STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.
A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS Yu Chen and Vrizlynn L. L. Thing Institute for Infocomm Research, 1 Fusionopolis Way, 138632,
More informationImpeding Forgers at Photo Inception
Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth
More information2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge
2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge This competition is sponsored by the IEEE Signal Processing Society Introduction The IEEE Signal Processing Society s 2018
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationPHOTO ANALYSIS SOFTWARE
The problems with social media images As a general rule, there are three basic ways of authenticating an image prior to trial. The first way involves the photographer attesting to the image s authenticity.
More informationColour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics
Colour-Decoupled Photo Response Non-Uniformity for Digital mage Forensics Chang-Tsun Li 1 and Yue Li 2 1 Department of Computer Science, University of arwick, Coventry CV4 7AL, UK c-t.li@warwick.ac.uk
More informationForensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification
Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence
More informationSapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³
A REVIEW OF TRENDS IN DIGITAL IMAGE PROCESSING FOR FORENSIC CONSIDERATION Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ Department of Forensic Science Sam Higginbottom Institute of agriculture Technology
More informationOriginal citation: Li, C-T. (2012). Color-Decoupled Photo Response Non-Uniformity for Digital mage Forensics. EEE Transactions on Circuits and Systems for Video Technology, 22(2), pp. 260-271 Permanent
More informationSecure Digital Camera
Secure Digital Camera Paul Blythe and Jessica Fridrich Department of Electrical and Computer Engineering SUNY Binghamton, Binghamton, NY 13902-6000 {pblythe, fridrich}@binghamton.edu ABSTRACT In this paper,
More informationSurvey On Passive-Blind Image Forensics
Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal
More informationPRNU-Based Image Alignment for Defective Pixel Detection
PRNU-Based Image Alignment for Defective Pixel Detection Christof Kauba, Andreas Uhl Department of Computer Sciences, University of Salzburg, AUSTRIA {ckauba,uhl}@cosy.sbg.ac.at Abstract Image alignment
More informationDistinguishing between Camera and Scanned Images by Means of Frequency Analysis
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Roberto Caldelli, Irene Amerini, and Francesco Picchioni Media Integration and Communication Center - MICC, University of
More informationIMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION
IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.
More informationDOTTORATO DI RICERCA IN INFORMATICA IX CICLO UNIVERSITA DEGLI STUDI DI SALERNO. Forensic Analysis for Digital Images.
DOTTORATO DI RICERCA IN INFORMATICA IX CICLO UNIVERSITA DEGLI STUDI DI SALERNO Forensic Analysis for Digital Images Maurizio Cembalo November, 2010 PhD Program Chair Prof.ssa Margherita Napoli Supervisor
More informationENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS
ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS Hui Su, Ravi Garg, Adi Hajj-Ahmad, and Min Wu {hsu, ravig, adiha, minwu}@umd.edu University of Maryland, College Park ABSTRACT Electric Network (ENF) based forensic
More informationDetection of Hue Modification Using Photo Response Non-Uniformity
The final version of record is available at http://dx.doi.org/.9/tcsvt.6.53988 Detection of Hue Modification Using Photo Response Non-Uniformity Jong-Uk Hou, Student Member, IEEE, and Heung-Kyu Lee Abstract
More informationIDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION
Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationDepartment of Computer Science and Engineering The Chinese University of Hong Kong. Year Final Year Project
Digital Interactive Game Interface Table Apps for ipad Supervised by: Professor Michael R. Lyu Student: Ng Ka Hung (1009615714) Chan Hing Faat (1009618344) Year 2011 2012 Final Year Project Department
More informationApplications of Flash and No-Flash Image Pairs in Mobile Phone Photography
Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography Xi Luo Stanford University 450 Serra Mall, Stanford, CA 94305 xluo2@stanford.edu Abstract The project explores various application
More informationExposing Image Forgery with Blind Noise Estimation
Exposing Image Forgery with Blind Noise Estimation Xunyu Pan Computer Science Department University at Albany, SUNY Albany, NY 12222, USA xypan@cs.albany.edu Xing Zhang Computer Science Department University
More informationAn Automatic JPEG Ghost Detection Approach for Digital Image Forensics
An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif
More informationOn the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts
On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts Riccardo Satta and Pasquale Stirparo,2 Institute for the Protection and Security of the Citizen Joint
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationInterframe Coding of Global Image Signatures for Mobile Augmented Reality
Interframe Coding of Global Image Signatures for Mobile Augmented Reality David Chen 1, Mina Makar 1,2, Andre Araujo 1, Bernd Girod 1 1 Department of Electrical Engineering, Stanford University 2 Qualcomm
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012
A Tailored Anti-Forensic Approach for Digital Image Compression S.Manimurugan, Athira B.Kaimal Abstract- The influence of digital images on modern society is incredible; image processing has now become
More informationIntroduction to Cryptography
B504 / I538: Introduction to Cryptography Spring 2017 Lecture 11 * modulo the 1-week extension on problems 3 & 4 Assignment 2 * is due! Assignment 3 is out and is due in two weeks! 1 Secrecy vs. integrity
More informationPassive Image Forensic Method to detect Copy Move Forgery in Digital Images
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in
More informationSource Camera Model Identification Using Features from contaminated Sensor Noise
Source Camera Model Identification Using Features from contaminated Sensor Noise Amel TUAMA 2,3, Frederic COMBY 2,3, Marc CHAUMONT 1,2,3 1 NÎMES UNIVERSITY, F-30021 Nîmes Cedex 1, France 2 MONTPELLIER
More informationImaging Sensor Noise as Digital X-Ray for Revealing Forgeries
Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Mo Chen, Jessica Fridrich, Jan Lukáš, and Miroslav Goljan Dept. of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000,
More informationImage Manipulation Detection using Convolutional Neural Network
Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationTampering Detection Algorithms: A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
More informationCamera Model Identification Framework Using An Ensemble of Demosaicing Features
Camera Model Identification Framework Using An Ensemble of Demosaicing Features Chen Chen Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: chen.chen3359@drexel.edu
More informationThe Next Generation of Secure Position, Navigation and Timing Technology
Navigation and Timing Technology November 2017 Contents Executive Summary 2 GPS on the Battlefield 2 Vulnerabilities of GPS 2 Staying Ahead of the Threat 3 Innovating For More Resilient PNT 3 Innovative,
More informationOpen and Youth Categories - Groups A & B
Open and Youth Categories - Groups A & B TERMS & CONDITIONS: ELIGIBILITY 1. The photo contest is open to Singapore Citizens, Permanent Residents and foreigners residing in Singapore. An eligible participant
More informationFUZZY BASED MEDIAN FILTER FOR GRAY-SCALE IMAGES
FUZZY BASED MEDIAN FILTER FOR GRAY-SCALE IMAGES Sukomal Mehta 1, Sanjeev Dhull 2 1 Department of Electronics & Comm., GJU University, Hisar, Haryana, sukomal.mehta@gmail.com 2 Assistant Professor, Department
More informationWearLock: Unlock Your Phone via Acoustics using Smartwatch
: Unlock Your Phone via s using Smartwatch Shanhe Yi, Zhengrui Qin*, Nancy Carter, and Qun Li College of William and Mary *Northwest Missouri State University Smartphone is a pocket-size summary of your
More informationFamilySearch Mobile Apps: Family History Anytime, Anywhere
FamilySearch Mobile Apps: Family History Anytime, Anywhere For this and more information about FamilySearch Mobile Apps go to: https://www.familysearch.org/blog/en/familysearch-mobile-apps/ Take your family
More informationAutomatic source camera identification using the intrinsic lens radial distortion
Automatic source camera identification using the intrinsic lens radial distortion Kai San Choi, Edmund Y. Lam, and Kenneth K. Y. Wong Department of Electrical and Electronic Engineering, University of
More informationWIRELESS physical layer security is becoming increasingly
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY 2016 1515 Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature Song Fang, Yao
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationImage Forgery Identification Using JPEG Intrinsic Fingerprints
1 Image Forgery Identification Using JPEG Intrinsic Fingerprints A. Garg, A. Hailu, and R. Sridharan Abstract In this paper a novel method for image forgery detection is presented. he method exploits the
More informationA JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid
A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationMobile Camera Source Identification with SVD
Mobile Camera Source Identification with SVD A-R Soobhany, KP Lam, P Fletcher, DJ Collins Research Institute for the Environment, Physical Sciences and Applied Mathematics Keele University Keele, Staffordshire,
More informationA Novel Multi-size Block Benford s Law Scheme for Printer Identification
A Novel Multi-size Block Benford s Law Scheme for Printer Identification Weina Jiang 1, Anthony T.S. Ho 1, Helen Treharne 1, and Yun Q. Shi 2 1 Dept. of Computing, University of Surrey Guildford, GU2 7XH,
More informationAndrei Sabelfeld. Joint work with Per Hallgren and Martin Ochoa
Andrei Sabelfeld Joint work with Per Hallgren and Martin Ochoa Privacy for location based services Explosion of interest to location based services (LBS) locating people, vehicles, vessels, cargo, devices
More informationA Study of Distortion Effects on Fingerprint Matching
A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department
More informationExposing Photo Manipulation with Geometric Inconsistencies
Exposing Photo Manipulation with Geometric Inconsistencies James F. O Brien U.C. Berkeley Collaborators Hany Farid Eric Kee Valentina Conotter Stephen Bailey 1 image-forensics-pg14.key - October 9, 2014
More informationDeblurring. Basics, Problem definition and variants
Deblurring Basics, Problem definition and variants Kinds of blur Hand-shake Defocus Credit: Kenneth Josephson Motion Credit: Kenneth Josephson Kinds of blur Spatially invariant vs. Spatially varying
More informationDetection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table
Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationADVANCES in digital imaging technologies have led to
126 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 1, JANUARY 2016 Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization Xufeng Lin and Chang-Tsun Li, Senior Member,
More informationPRIOR IMAGE JPEG-COMPRESSION DETECTION
Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION
More informationSyed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University
Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous
More informationMultimedia Forensics
Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer
More informationA Forensic Analysis of Images on Online Social Networks
2011 Third International Conference on Intelligent Networking and Collaborative Systems A Forensic Analysis of Images on Online Social Networks Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis
More informationLocal prediction based reversible watermarking framework for digital videos
Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,
More informationCIS 700/002: Special Topics: Acoustic Injection Attacks on MEMS Accelerometers
CIS 700/002: Special Topics: Acoustic Injection Attacks on MEMS Accelerometers Thejas Kesari CIS 700/002: Security of EMBS/CPS/IoT Department of Computer and Information Science School of Engineering and
More informationRobust Invisible QR Code Image Watermarking Algorithm in SWT Domain
Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant
More informationImplementation of the Likelihood Ratio framework for camera identification based
Implementation of the Likelihood Ratio framework for camera identification based on sensor noise patterns Wiger van Houten 1, Ivo Alberink, Zeno Geradts Criminal Investigation Unit North, Digital Evidence
More informationImplementation of the likelihood ratio framework for camera identification based on sensor noise patterns
Law, Probability and Risk (2011) 10, 149 159 doi:10.1093/lpr/mgr006 Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns WIGER VAN HOUTEN Digital Evidence
More informationUSER GUIDE. NEED HELP? Call us on +44 (0)
USER GUIDE NEED HELP? Call us on +44 (0) 121 250 3642 TABLE OF CONTENTS Document Control and Authority...3 User Guide...4 Create SPN Project...5 Open SPN Project...6 Save SPN Project...6 Evidence Page...7
More informationCamera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
Journal of Information Systems and Telecommunication, Vol. 1, No. 4, October - December 2013 233 Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationSmartphone RH/Temperature Probe Instruction Manual
Smartphone RH/Temperature Probe 800014 Instruction Manual 1 TABLE OF CONTENTS Introduction...3 Features...4 App Screen...5 Measurement Procedures...7 Care and Maintenance...14 Compatibility...14 Specifications...15
More informationAN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM
AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,
More informationContinuous Non-Malleable Key Derivation and Its Application to Related-Key Security
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security Baodong Qin 1,2, Shengli Liu 1, Tsz Hon Yuen 3, Robert H. Deng 4, Kefei Chen 5 1. Shanghai Jiao Tong University, China
More informationImage Smoothening and Sharpening using Frequency Domain Filtering Technique
Volume 5, Issue 4, April (17) Image Smoothening and Sharpening using Frequency Domain Filtering Technique Swati Dewangan M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg, India.
More informationSecurity in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury
Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing
More informationApplication of Histogram Examination for Image Steganography
J. Appl. Environ. Biol. Sci., 5(9S)97-104, 2015 2015, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Application of Histogram Examination
More informationNeuro-Fuzzy based First Responder for Image forgery Identification
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationSource Camera Identification Using Enhanced Sensor Pattern Noise
T-IFS-011-009 1 Source Camera Identification Using Enhanced Sensor Pattern Noise Chang-Tsun L Member, IEEE Abstract Sensor pattern noises (SPNs), extracted from digital images to serve as the fingerprints
More informationGlastir Small Grants Geotagged Photo Guidance. The Welsh Government Rural Communities Rural Development Programme for Wales
back to contents Glastir Small Grants Geotagged Photo Guidance The Welsh Government Rural Communities Rural Development Programme for Wales 2014-2020 Crown copyright 2016 WG29876 Digital ISBN: 978 1 4734
More informationStudy of 3D Barcode with Steganography for Data Hiding
Study of 3D Barcode with Steganography for Data Hiding Megha S M 1, Chethana C 2 1Student of Master of Technology, Dept. of Computer Science and Engineering& BMSIT&M Yelahanka Banglore-64, 2 Assistant
More informationLiterature Survey on Image Manipulation Detection
Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,
More informationVARIOUS METHODS IN DIGITAL IMAGE PROCESSING. S.Selvaragini 1, E.Venkatesan 2. BIST, BIHER,Bharath University, Chennai-73
Volume 116 No. 16 2017, 265-269 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu VARIOUS METHODS IN DIGITAL IMAGE PROCESSING S.Selvaragini 1, E.Venkatesan
More informationImage analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror
Image analysis CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror A two- dimensional image can be described as a function of two variables f(x,y). For a grayscale image, the value of f(x,y) specifies the brightness
More informationInformation Forensics: An Overview of the First Decade
Received March 8, 2013, accepted April 6, 2013, published May 10, 2013. Digital Object Identifier 10.1109/ACCESS.2013.2260814 Information Forensics: An Overview of the First Decade MATTHEW C. STAMM (MEMBER,
More informationInterleaving And Channel Encoding Of Data Packets In Wireless Communications
Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218
More informationDetecting Resized Double JPEG Compressed Images Using Support Vector Machine
Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de
More informationSide Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment
Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment Gabriel Goller & Georg Sigl 144215 Introduction Device Under Test Sensor Radio Receiver Front End Software Defined
More informationScanner Identification Using Sensor Pattern Noise
Scanner Identification Using Sensor Pattern Noise Nitin Khanna a, Aravind K. Mikkilineni b George T. C. Chiu b, Jan P. Allebach a, Edward J. Delp a a School of Electrical and Computer Engineering b School
More informationCoE4TN4 Image Processing. Chapter 3: Intensity Transformation and Spatial Filtering
CoE4TN4 Image Processing Chapter 3: Intensity Transformation and Spatial Filtering Image Enhancement Enhancement techniques: to process an image so that the result is more suitable than the original image
More informationA 1.3 Megapixel CMOS Imager Designed for Digital Still Cameras
A 1.3 Megapixel CMOS Imager Designed for Digital Still Cameras Paul Gallagher, Andy Brewster VLSI Vision Ltd. San Jose, CA/USA Abstract VLSI Vision Ltd. has developed the VV6801 color sensor to address
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More information