Skip to main content

On the Reliability of Cell Phone Camera Fingerprint Recognition

  • Conference paper
  • 1756 Accesses

Abstract

Multiple multimedia forensic algorithms have been introduced allowing tracing back media copies back to its source by matching artifacts to fingerprint databases. While this offers new possibilities for investigating crimes, important questions arise: How reliable are these algorithms? Can a judge trust their results? How easy are they to manipulate? It has been shown that forensic fingerprints of digital cameras can be copied from one image to the next. Our aim is to develop new concepts for increasing the security of theses algorithms. In this work, we describe the state of our research work regarding attacks against forensics and provide an outlook on future approaches to increase their reliability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sorell, M.: Digital Camera Source Identification Through JPEG Quantisation. In: Li, C.-T. (ed.) Multimedia Forensics and Security, pp. 291–313. Idea Group Publishing (2008)

    Google Scholar 

  2. Fridrich, J., Lukáš, J., Goljan, H.: Digital Camera Identification from Sensor Noise. IEEE Transactions on Information Security and Forensics 1(2), 205–214 (2006)

    Article  Google Scholar 

  3. Fridrich, J., Lukáš, J., Goljan, H.: Camera Identification from Printed Images. In: Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA (2008)

    Google Scholar 

  4. Farid, H.: Digital Image Ballistics from JPEG Quantization. Technical Report TR2006-583 (2006), http://www.cs.dartmouth.edu/farid/publications/tr06a.html

  5. Gloe, T., Kirchner, M., Winkler, A., Böhme, R.: Can We Trust Digital Image Forensics? In: Proceedings ACM Multimedia 2007, pp. 68–78 (2007)

    Google Scholar 

  6. Khanna, N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Scanner Identification with Extension to Forgery Detection. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA (2008)

    Google Scholar 

  7. Suh, S., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Printer Mechanism-Level Information Embedding and Extraction for Halftone Documents: New Results. In: Proceedings of the IS&T’s NIP 23: International Conference on Digital Printing Technologies, Anchorage, AK (2007)

    Google Scholar 

  8. Chiang, P., Mikkilineni, A., Delp, E.J., Allebach, J.P., Chiu, G.T.C.: Extrinsic Signatures Embedding and Detection in Electrophotographic Halftone Images through Laser Intensity Modulation. In: Proceedings of the IS&T’s NIP 22: International Conference on Digital Printing Technologies, pp. 432–435 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Steinebach, M., El Ouariachi, M., Liu, H., Katzenbeisser, S. (2010). On the Reliability of Cell Phone Camera Fingerprint Recognition. In: Goel, S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11534-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11534-9_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11533-2

  • Online ISBN: 978-3-642-11534-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics