Skip to main content

2024 | OriginalPaper | Buchkapitel

High-Quality PRNU Anonymous Algorithm for JPEG Images

verfasst von : Jian Li, Huanhuan Zhao, Bin Ma, Chunpeng Wang, Xiaoming Wu, Tao Zuo, Zhengzhong Zhao

Erschienen in: Digital Forensics and Watermarking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The utilization of Photo Response Non-Uniformity (PRNU) technology has found extensive application in the field of multimedia forensics, particularly in the authentication of the original camera source of an image. However, this technique has also given rise to significant concerns regarding privacy breaches. For instance, adversaries can exploit publicly available images to generate PRNU and subsequently impersonate the owners of the images. In response to these challenges, we propose an algorithm for achieving source device anonymity in widely used JPEG images. The method combines the discrete cosine transform (DCT) with JPEG compression to process the DCT coefficients of an image after inverse quantization. By ensuring the high quality of the processed image, this approach effectively breaks the link between an image and its source camera. Additionally, a reversible data hiding method is employed, enabling the recovery of traceability if necessary. Our algorithm offers several advantages over existing schemes. It operates within the domain of JPEG image compression, maintaining a low time complexity. Additionally, it effectively preserves the visual quality of images and eliminates the typical traceability effects associated with images.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1, 205–214 (2006)CrossRef Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1, 205–214 (2006)CrossRef
2.
Zurück zum Zitat Chen, S.-H., Hsu, C.-T.: Source camera identification based on camera gain histogram. In: 2007 IEEE International Conference on Image Processing, pp. IV-429–IV-432 (2007) Chen, S.-H., Hsu, C.-T.: Source camera identification based on camera gain histogram. In: 2007 IEEE International Conference on Image Processing, pp. IV-429–IV-432 (2007)
3.
Zurück zum Zitat Bayram, S., et al.: Source camera identification based on CFA interpolation. In: IEEE International Conference on Image Processing 2005, vol. 3. IEEE (2005) Bayram, S., et al.: Source camera identification based on CFA interpolation. In: IEEE International Conference on Image Processing 2005, vol. 3. IEEE (2005)
4.
Zurück zum Zitat Zhao, X., Stamm, M.C.: Computationally efficient demosaicing filter estimation for forensic camera model identification. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 151–155 (2016) Zhao, X., Stamm, M.C.: Computationally efficient demosaicing filter estimation for forensic camera model identification. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 151–155 (2016)
5.
Zurück zum Zitat Kirchner, M., Gloe, T.: Forensic camera model identification. In: Handbook of Digital Forensics of Multimedia Data and Devices, pp. 329–374. Wiley (2015) Kirchner, M., Gloe, T.: Forensic camera model identification. In: Handbook of Digital Forensics of Multimedia Data and Devices, pp. 329–374. Wiley (2015)
6.
Zurück zum Zitat Goljan, M., Fridrich, J., Mo, C.: Defending against fingerprint-copy attack in sensor-based camera identification. IEEE Trans. Inf. Forensics Secur. 6, 227–236 (2011)CrossRef Goljan, M., Fridrich, J., Mo, C.: Defending against fingerprint-copy attack in sensor-based camera identification. IEEE Trans. Inf. Forensics Secur. 6, 227–236 (2011)CrossRef
7.
Zurück zum Zitat Goljan, M., Fridrich, J.J., Mo, C.: Sensor Noise Camera Identification: Countering Counter-Forensics. International Society for Optics and Photonics (2010) Goljan, M., Fridrich, J.J., Mo, C.: Sensor Noise Camera Identification: Countering Counter-Forensics. International Society for Optics and Photonics (2010)
8.
Zurück zum Zitat Nagaraja, S., Schaffer, P., Aouada, D.: Who clicks there!: anonymising the photographer in a camera saturated society. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society - WPES 2011, Chicago, Illinois, USA, p. 13. ACM Press (2011) Nagaraja, S., Schaffer, P., Aouada, D.: Who clicks there!: anonymising the photographer in a camera saturated society. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society - WPES 2011, Chicago, Illinois, USA, p. 13. ACM Press (2011)
10.
Zurück zum Zitat Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (2010) Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (2010)
11.
Zurück zum Zitat Rosenfeld, K., Sencar, H.T.: A study of the robustness of PRNU-based camera identification. In: Media Forensics and Security, pp. 213–219. SPIE (2009) Rosenfeld, K., Sencar, H.T.: A study of the robustness of PRNU-based camera identification. In: Media Forensics and Security, pp. 213–219. SPIE (2009)
12.
Zurück zum Zitat Bernacki, J.: On robustness of camera identification algorithms. Multimedia Tools Appl. 80, 921–942 (2021)CrossRef Bernacki, J.: On robustness of camera identification algorithms. Multimedia Tools Appl. 80, 921–942 (2021)CrossRef
13.
Zurück zum Zitat Chen, M., Fridrich, J., Goljan, M.: Digital imaging sensor identification (further study). In: Security, Steganography, and Watermarking of Multimedia Contents IX, pp. 258–270. SPIE (2007) Chen, M., Fridrich, J., Goljan, M.: Digital imaging sensor identification (further study). In: Security, Steganography, and Watermarking of Multimedia Contents IX, pp. 258–270. SPIE (2007)
14.
Zurück zum Zitat Mandelli, S., Bondi, L., Lameri, S., Lipari, V., Bestagini, P., Tubaro, S.: Inpainting-based camera anonymization. In: 2017 IEEE International Conference on Image Processing (ICIP), pp. 1522–1526 (2017) Mandelli, S., Bondi, L., Lameri, S., Lipari, V., Bestagini, P., Tubaro, S.: Inpainting-based camera anonymization. In: 2017 IEEE International Conference on Image Processing (ICIP), pp. 1522–1526 (2017)
15.
Zurück zum Zitat Dirik, A.E., Karaküçük, A.: Forensic use of photo response non-uniformity of imaging sensors and a counter method. Opt. Express 22, 470–482 (2014)CrossRef Dirik, A.E., Karaküçük, A.: Forensic use of photo response non-uniformity of imaging sensors and a counter method. Opt. Express 22, 470–482 (2014)CrossRef
16.
Zurück zum Zitat Bonettini, N., et al.: Fooling PRNU-based detectors through convolutional neural networks. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 957–961 (2018) Bonettini, N., et al.: Fooling PRNU-based detectors through convolutional neural networks. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 957–961 (2018)
17.
Zurück zum Zitat Dirik, A.E., Sencar, H.T., Memon, N.: Analysis of seam-carving-based anonymization of images against PRNU noise pattern-based source attribution. IEEE Trans. Inf. Forensics Secur. 9, 2277–2290 (2014)CrossRef Dirik, A.E., Sencar, H.T., Memon, N.: Analysis of seam-carving-based anonymization of images against PRNU noise pattern-based source attribution. IEEE Trans. Inf. Forensics Secur. 9, 2277–2290 (2014)CrossRef
18.
Zurück zum Zitat Zeng, H., Chen, J., Kang, X., Zeng, W.: Removing camera fingerprint to disguise photograph source. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 1687–1691 (2015) Zeng, H., Chen, J., Kang, X., Zeng, W.: Removing camera fingerprint to disguise photograph source. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 1687–1691 (2015)
19.
Zurück zum Zitat Entrieri, J., Kirchner, M.: Patch-based desynchronization of digital camera sensor fingerprints. Electron. Imaging 28, 1–9 (2016)CrossRef Entrieri, J., Kirchner, M.: Patch-based desynchronization of digital camera sensor fingerprints. Electron. Imaging 28, 1–9 (2016)CrossRef
20.
Zurück zum Zitat García Villalba, L.J., Sandoval Orozco, A.L., Rosales Corripio, J., Hernandez-Castro, J.: A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques. Future Gener. Comput. Syst. 76, 418–427 (2017)CrossRef García Villalba, L.J., Sandoval Orozco, A.L., Rosales Corripio, J., Hernandez-Castro, J.: A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques. Future Gener. Comput. Syst. 76, 418–427 (2017)CrossRef
21.
Zurück zum Zitat Banerjee, S., Ross, A.: Smartphone camera de-identification while preserving biometric utility. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–10 (2019) Banerjee, S., Ross, A.: Smartphone camera de-identification while preserving biometric utility. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–10 (2019)
22.
Zurück zum Zitat Picetti, F., Mandelli, S., Bestagini, P., Lipari, V., Tubaro, S.: DIPPAS: a deep image prior PRNU anonymization scheme. EURASIP J. Inf. Secur. 2022, 2 (2022)CrossRef Picetti, F., Mandelli, S., Bestagini, P., Lipari, V., Tubaro, S.: DIPPAS: a deep image prior PRNU anonymization scheme. EURASIP J. Inf. Secur. 2022, 2 (2022)CrossRef
23.
Zurück zum Zitat Gloe, T., Böhme, R.: The “Dresden Image Database” for benchmarking digital image forensics. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1584–1590. Association for Computing Machinery, New York (2010) Gloe, T., Böhme, R.: The “Dresden Image Database” for benchmarking digital image forensics. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1584–1590. Association for Computing Machinery, New York (2010)
24.
Zurück zum Zitat De Marsico, M., Nappi, M., Narducci, F., Proença, H.: Insights into the results of MICHE I - mobile iris challenge evaluation. Pattern Recogn. 74, 286–304 (2017)CrossRef De Marsico, M., Nappi, M., Narducci, F., Proença, H.: Insights into the results of MICHE I - mobile iris challenge evaluation. Pattern Recogn. 74, 286–304 (2017)CrossRef
25.
Zurück zum Zitat Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3, 74–90 (2008)CrossRef Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3, 74–90 (2008)CrossRef
26.
Zurück zum Zitat Goljan, M., Fridrich, J., Filler, T.: Large scale test of sensor fingerprint camera identification. In: Media Forensics and Security, pp. 170–181. SPIE (2009) Goljan, M., Fridrich, J., Filler, T.: Large scale test of sensor fingerprint camera identification. In: Media Forensics and Security, pp. 170–181. SPIE (2009)
27.
Zurück zum Zitat Debiasi, L., Uhl, A.: Techniques for a forensic analysis of the CASIA-IRIS V4 database. In: 3rd International Workshop on Biometrics and Forensics (IWBF 2015), pp. 1–6 (2015) Debiasi, L., Uhl, A.: Techniques for a forensic analysis of the CASIA-IRIS V4 database. In: 3rd International Workshop on Biometrics and Forensics (IWBF 2015), pp. 1–6 (2015)
28.
Zurück zum Zitat Debiasi, L., Uhl, A., Sun, Z.: Generation of iris sensor PRNU fingerprints from uncorrelated data. In: 2nd International Workshop on Biometrics and Forensics, pp. 1–6 (2014) Debiasi, L., Uhl, A., Sun, Z.: Generation of iris sensor PRNU fingerprints from uncorrelated data. In: 2nd International Workshop on Biometrics and Forensics, pp. 1–6 (2014)
29.
Zurück zum Zitat Ma, B., Shi, Y.Q.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11, 1914–1927 (2016)CrossRef Ma, B., Shi, Y.Q.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11, 1914–1927 (2016)CrossRef
30.
Zurück zum Zitat Galdi, C., Nappi, M., Dugelay, J.-L.: Multimodal authentication on smartphones: combining iris and sensor recognition for a double check of user identity. Pattern Recogn. Lett. 82, 144–153 (2016)CrossRef Galdi, C., Nappi, M., Dugelay, J.-L.: Multimodal authentication on smartphones: combining iris and sensor recognition for a double check of user identity. Pattern Recogn. Lett. 82, 144–153 (2016)CrossRef
31.
Zurück zum Zitat Kang, X., Li, Y., Qu, Z., Huang, J.: Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 7, 393–402 (2012)CrossRef Kang, X., Li, Y., Qu, Z., Huang, J.: Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 7, 393–402 (2012)CrossRef
33.
Zurück zum Zitat He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. Presented at the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016) He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. Presented at the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016)
34.
Zurück zum Zitat Hernandez-Diaz, K., Alonso-Fernandez, F., Bigun, J.: Periocular recognition using CNN features off-the-shelf. In: 2018 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–5 (2018) Hernandez-Diaz, K., Alonso-Fernandez, F., Bigun, J.: Periocular recognition using CNN features off-the-shelf. In: 2018 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–5 (2018)
Metadaten
Titel
High-Quality PRNU Anonymous Algorithm for JPEG Images
verfasst von
Jian Li
Huanhuan Zhao
Bin Ma
Chunpeng Wang
Xiaoming Wu
Tao Zuo
Zhengzhong Zhao
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2585-4_2

Premium Partner