On the Security and Applicability of Fragile Camera Fingerprints

Camera sensor noise is one of the most reliable device characteristics in digital image forensics, enabling the unique linkage of images to digital cameras. This so-called camera fingerprint gives rise to different applications, such as image forensics and authentication. However, if images are publicly available, an adversary can estimate the fingerprint from her victim and plant it into spurious images. The concept of fragile camera fingerprints addresses this attack by exploiting asymmetries in data access: While the camera owner will always have access to a full fingerprint from uncompressed images, the adversary has typically access to compressed images and thus only to a truncated fingerprint. The security of this defense, however, has not been systematically explored yet. This paper provides the first comprehensive analysis of fragile camera fingerprints under attack. A series of theoretical and practical tests demonstrate that fragile camera fingerprints allow a reliable device identification for common compression levels in an adversarial environment.

[1]  Jessica J. Fridrich,et al.  Sensor-fingerprint based identification of images corrected for lens distortion , 2012, Other Conferences.

[2]  Matthias Kirchner,et al.  Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study , 2012, MM&Sec '12.

[3]  Felix C. Freiling,et al.  Multimedia Forensics Is Not Computer Forensics , 2009, IWCF.

[4]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Matthias Kirchner,et al.  Fragile sensor fingerprint camera identification , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Dimitrios Koutsonikolas,et al.  ABC: Enabling Smartphone Authentication with Built-in Camera , 2018, NDSS.

[7]  Gabi Nakibly,et al.  Mobile Device Identification via Sensor Fingerprinting , 2014, ArXiv.

[8]  Le Song,et al.  A Kernel Statistical Test of Independence , 2007, NIPS.

[9]  Giulia Boato,et al.  RAISE: a raw images dataset for digital image forensics , 2015, MMSys.

[10]  Jessica Fridrich,et al.  Sensor Defects in Digital Image Forensic , 2013 .

[11]  Ahmet Emir Dirik,et al.  Adaptive photo-response non-uniformity noise removal against image source attribution , 2015, Digit. Investig..

[12]  Jessica J. Fridrich,et al.  Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.

[13]  Enrico Magli,et al.  User Authentication via PRNU-Based Physical Unclonable Functions , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[15]  Rainer Böhme,et al.  Synthesis of color filter array pattern in digital images , 2009, Electronic Imaging.

[16]  Fernando Pérez-González,et al.  Coping with the enemy: Advances in adversary-aware signal processing , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[17]  Jerry D. Gibson,et al.  Distributions of the Two-Dimensional DCT Coefficients for Images , 1983, IEEE Trans. Commun..

[18]  C.-C. Jay Kuo,et al.  Recovering missing coefficients in DCT-transformed images , 2011, 2011 18th IEEE International Conference on Image Processing.

[19]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[20]  Matthias Kirchner,et al.  Patch-Based Desynchronization of Digital Camera Sensor Fingerprints , 2016, Media Watermarking, Security, and Forensics.

[21]  Konrad Rieck,et al.  Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).

[22]  Rainer Böhme,et al.  Can we trust digital image forensics? , 2007, ACM Multimedia.

[23]  Mo Chen,et al.  Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Transactions on Information Forensics and Security.

[24]  Paul C. van Oorschot,et al.  Device fingerprinting for augmenting web authentication: classification and analysis of methods , 2016, ACSAC.

[25]  Davide Cozzolino,et al.  Attacking the triangle test in sensor-based camera identification , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[26]  Ming Zhang,et al.  e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy , 2021, IEEE Transactions on Dependable and Secure Computing.

[27]  Bernard Widrow,et al.  Quantization Noise: A Few Properties of Selected Distributions , 2008 .