ABC: Enabling Smartphone Authentication with Built-in Camera

Similar documents
Retrieval of Large Scale Images and Camera Identification via Random Projections

Camera identification from sensor fingerprints: why noise matters

Introduction to Video Forgery Detection: Part I

Fragile Sensor Fingerprint Camera Identification

Camera identification by grouping images from database, based on shared noise patterns

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

TECHNICAL DOCUMENTATION

SPTF: Smart Photo-Tagging Framework on Smart Phones

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.

Impeding Forgers at Photo Inception

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

Image Forgery Detection Using Svm Classifier

PHOTO ANALYSIS SOFTWARE

Colour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³


Secure Digital Camera

Survey On Passive-Blind Image Forensics

PRNU-Based Image Alignment for Defective Pixel Detection

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

DOTTORATO DI RICERCA IN INFORMATICA IX CICLO UNIVERSITA DEGLI STUDI DI SALERNO. Forensic Analysis for Digital Images.

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS

Detection of Hue Modification Using Photo Response Non-Uniformity

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

Department of Computer Science and Engineering The Chinese University of Hong Kong. Year Final Year Project

Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography

Exposing Image Forgery with Blind Noise Estimation

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Interframe Coding of Global Image Signatures for Mobile Augmented Reality

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

Introduction to Cryptography

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Source Camera Model Identification Using Features from contaminated Sensor Noise

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries

Image Manipulation Detection using Convolutional Neural Network

Biometric Recognition: How Do I Know Who You Are?

Tampering Detection Algorithms: A Comparative Study

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

The Next Generation of Secure Position, Navigation and Timing Technology

Open and Youth Categories - Groups A & B

FUZZY BASED MEDIAN FILTER FOR GRAY-SCALE IMAGES

WearLock: Unlock Your Phone via Acoustics using Smartwatch

FamilySearch Mobile Apps: Family History Anytime, Anywhere

Automatic source camera identification using the intrinsic lens radial distortion

WIRELESS physical layer security is becoming increasingly

Wavelet-based Image Splicing Forgery Detection

Image Forgery Identification Using JPEG Intrinsic Fingerprints

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

MSc(CompSc) List of courses offered in

Mobile Camera Source Identification with SVD

A Novel Multi-size Block Benford s Law Scheme for Printer Identification

Andrei Sabelfeld. Joint work with Per Hallgren and Martin Ochoa

A Study of Distortion Effects on Fingerprint Matching

Exposing Photo Manipulation with Geometric Inconsistencies

Deblurring. Basics, Problem definition and variants

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Biometrics - A Tool in Fraud Prevention

ADVANCES in digital imaging technologies have led to

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Multimedia Forensics

A Forensic Analysis of Images on Online Social Networks

Local prediction based reversible watermarking framework for digital videos

CIS 700/002: Special Topics: Acoustic Injection Attacks on MEMS Accelerometers

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Implementation of the Likelihood Ratio framework for camera identification based

Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns

USER GUIDE. NEED HELP? Call us on +44 (0)

Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

Smartphone RH/Temperature Probe Instruction Manual

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security

Image Smoothening and Sharpening using Frequency Domain Filtering Technique

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Application of Histogram Examination for Image Steganography

Neuro-Fuzzy based First Responder for Image forgery Identification

Source Camera Identification Using Enhanced Sensor Pattern Noise

Glastir Small Grants Geotagged Photo Guidance. The Welsh Government Rural Communities Rural Development Programme for Wales

Study of 3D Barcode with Steganography for Data Hiding

Literature Survey on Image Manipulation Detection

VARIOUS METHODS IN DIGITAL IMAGE PROCESSING. S.Selvaragini 1, E.Venkatesan 2. BIST, BIHER,Bharath University, Chennai-73

Image analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror

Information Forensics: An Overview of the First Decade

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment

Scanner Identification Using Sensor Pattern Noise

CoE4TN4 Image Processing. Chapter 3: Intensity Transformation and Spatial Filtering

A 1.3 Megapixel CMOS Imager Designed for Digital Still Cameras

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Transcription:

ABC: Enabling Smartphone Authentication with Built-in Camera Zhongjie Ba, Sixu Piao, Xinwen Fu f, Dimitrios Koutsonikolas, Aziz Mohaisen f and Kui Ren f 1

Camera Identification: Hardware Distortion Manufacturing imperfection leads to pattern noise: Photo Response Non-Uniformity (PRNU)[1] Non-Uniform Pixel Unique Fingerprint! [1] LUKAS, J., FRIDRICH, J., AND GOLJAN, M. Digital camera identifi- cation from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 205 214. 2

Camera Identification: Fingerprint Matching Given an image, determine if it is captured by a camera of interest Filter Threshold Query image Noise Residue Similarity (PCE) Compare Extract The final identification accuracy is mainly determined by the quality of each fingerprint (target & reference). Training images Reference Fingerprint Image source: https://www.packtpub.com/networking-and-servers/mastering-python-forensics; 3

From Camera Identification to Smartphone Identification Smartphone cameras have displaced the conventional digital camera Smartphones are widely used in security sensitive tasks 4 Image source: https://techdigg.com/2017/05/12/apple-wants-you-to-be-a-professional-iphone-7-photographer/; https://www.nextpowerup.com/news/28115/google-brings-android-pay-to-uk/

Smartphone Camera VS Digital Camera https://lensvid.com/technique/why-depth-of-field-is-not-effected-by-sensor-size-a-demonstration/ 5

Smartphone Camera: Stronger Non-Uniformity The reduction in dimension amplifies the pixels non-uniformity Same level of manufacturing imperfection Stronger non-uniformity 6

Smartphone Camera: Higher Identification Accuracy One image alone can uniquely identify a smartphone camera 30 iphone 6 and 10 Galaxy Note 5 16,000 images collected from Amazon Mechanical Turk 7

Smartphone Authentication Scenario The user proves her identity to the verifier using her smartphone as a security token The verifier authenticates the user s smartphone by checking the fingerprint of its built-in camera 1. VLC Channel 2. Wireless Channel User with a smartphone Verifier 8

A Strawman Solution I m Bob, give me $100 Send me an image Who Yes, taken you are by are Bob s you? camera Bob Verifier Matching Image source: http://588ku.com/sucai/4051615.html; https://cn.vectorhq.com/istock/cartoon-ben-franklin-100-dollar-bill-116281; 9

Security Risk 1: Fingerprint Leakage Images captured by smartphone cameras, in most cases, are available to the public Facebook Instagram Wechat 10 Image source: http://www.148apps.com/app/284882215/; http://dzapk.com/applications/instagram-black-mod-v11-0-0-3-20.html; http://www.woshipm.com/operate/215491.html

Fingerprint Leakage: The Replay Attack Send me an image Who arebyare taken Bob s Yes, you Bob you? camera I m Bob, give me $100 Download Bob s Facebook Adversary Verifier Matching 11

Solution: Randomized QR Code Liveness detection: Challenge the user to capture a freshly generated QR code Accurate Efficient Easy to randomize Easy to align Image submitted to the authentication system should match the challenge Image source: http://aleksandarpetkovic.com/category/ambiental-media/ 12

Security Risk 2: Fingerprint Forgery An adversary can manipulate an image s fingerprint and fabricate forged images Fingerprint Injection Image source: http://www.jiguo.com/article/article/51934.html; http://www.dizzle.com/dizzle-launches-new-white-glove-concierge-service/ Fingerprint Removal 13

Fingerprint Forgery: The Injection Attack Capture this image Who are are using camera Yes, Bob s you Bob you? and send it to me. I m Bob, give me $100 Capture Download Extract Bob s Facebook Injection Adversary Verifier Matching 14

Injection Detection Detect forged images that carry injected fingerprints Image source: http://www.entornointeligente.com/articulo/185619/venezuela-amenazas-muy-graves-incluso-a-su-vida-escarra-denuncia-acoso-contra-sus-2-hijas-en-eeuu 15

Normal Image VS Forged Image The generation of normal images Environmental noise (Random noise) Captured image Legitimate smartphone Target image 16

Normal Image VS Forged Image The generation of forged images Legitimate fingerprint Environmental noise Fingerprint injection Photographing Forged image Captured image Adversary s smartphone Target image 17

Normal Image VS Forged Image Forged images carry the foreign fingerprint of the adversary s smartphone camera 18

Solution: Correlation Test Revised challenge response process: Challenge the user to capture and upload two freshly generated QR codes. I m Bob, give me $100 Capture these images using Bob s camera and send them to me. Bob Verifier 19

Solution: Correlation Test Reference Fingerprint Extract Correlation 2 (PCE2) Extract Captured image 1 Noise residue 1 Noise residue 2 Captured image 2 20

Injection Detection: Normal Image Pair PCE1 PCE2 Correlation 2 (PCE2) 21

Injection Detection: Forged Image Pair PCE1 << PCE2 Correlation 2 (PCE2) 22

Effectiveness of Injection Detection 16,000 images from Amazon Mechanical Turk iphone 6: 400 forged image pairs and 450 normal image pairs Galaxy Note 5: 1600 forged image pairs and 1400 normal image pairs iphone 6 Galaxy Note 5 23

Authentication Work Flow What if the adversary removes his camera fingerprint? 24

Removal Detection Detect forged images that have been sanitized (fingerprint removal) Image source https://swimmingupstreamlife.com/2016/07/03/fingerprints/ 25

Normal Image VS Forged Image All white Gaussian noise components will be removed in the process of fingerprint removal 26

Solution: Probe Signal Embed a probe signal that will be removed by the fingerprint removal process Environmental noise (Random noise) Probe signal (a white Gaussian noise) Embedding Captured image Legitimate smartphone Target image 27

Solution: Probe Signal Detect removal attacks by checking the existence of the probe signal 28

Solution: Probe Signal Detect removal attacks through checking the existence of the probe signal Filter Threshold Captured Image Noise Residue Similarity (PCE) Compare Filter Challenged scene Probe Signal 29

Effectiveness of Removal Detection Setting 1: Target scene have no probe signal. Setting 2: Target scene have a probe signal. Normal Image. Setting 3: Target scene have a probe signal. Removal Attack. 1. The probe signal is preserved in legitimate image tokens. (Setting 1 VS Setting 2) 2. The probe signal is suppressed in forged images. (Setting 2 VS Setting 3) Forged images can be easily detected 30

Full-fledged Authentication Protocol I m Bob, give me $100 Capture these images Who are using Bob s Yes, you are Bob camera you? and send them to me. Bob Verifier Image Content Matching Embed probe signal Fingerprint Verify Matching Injection Detection Removal Detection 31

The Attack Detection Flow Fingerprint leakage resilience Reliable camera identification Removal attack Fingerprint forgery Resilience Injection attack 32

Efficiency Image Content Matching: Determined by the version of the applied QR code. Normally can be finished within 0.1 second. Fingerprint Matching: Determined by the resolution of the captured image. This is the most time consuming part. Injection Detection: Determined by the resolution of the captured image. Normally can be finished within 0.5 second. Removal Detection: Determined by the resolution of the probe signal. It takes at most 0.9 second. 33

Efficiency Fingerprint Matching Overall Efficiency 34

What Factors can Influence PRNU? Does PRNU change over time? No Will the ambient environment affect the fingerprint on an image? Only ambient light intensity. What is the relationship between an image s resolution and the strength of its fingerprint? Positively correlated 35

Conclusion The first work to enable smartphone authentication using built-in camera Accurate and efficient identification Resilient to fingerprint leakage and forgery Thank you! Questions? 36

Reinforced Fingerprint Forgery: the Removal Attack Extract Capture Extract Download Bob s Facebook Removal Adversary Verifier Injection Injection 37