Skip to main content
Log in

PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications

  • Regular Paper
  • Published:
Computing Aims and scope Submit manuscript

Abstract

Tracing the origin of digital images is a crucial concern in digital image forensics, where accurately identifying the source of an image is essential that leads important clues to investing and law enforcement agencies. Photo Response Non-Uniformity (PRNU) based camera attribution is an effective forensic tool for identifying the source camera of a crime scene image. The PRNU pattern approach helps investigators determine whether a specific camera captured a crime scene image using the Pearson correlation coefficient between the unique camera fingerprint and the PRNU noise. However, this approach raises privacy concerns as the camera fingerprint or the PRNU noise can be linked to non-crime images taken by the camera, potentially disclosing the photographer’s identity. To address this issue, we propose a novel PRNU-based source camera attribution scheme that enables forensic investigators to conduct criminal investigations while preserving privacy. In the proposed scheme, a camera fingerprint extracted from a set of known images and PRNU noise extracted from the anonymous image are divided into multiple shares using Shamir’s Secret Sharing (SSS). These shares are distributed to various cloud servers where correlation is computed on a share basis between the camera fingerprint and the PRNU noise. The partial correlation values are combined to obtain the final correlation value, determining whether the camera took the image. The security analysis and the experimental results demonstrate that the proposed scheme not only preserves privacy and ensures data confidentiality and integrity, but also is computationally efficient compared to existing methods. Specifically, the results showed that our scheme achieves similar accuracy in source camera attribution with a negligible decrease in performance compared to non-privacy-preserving methods and is computationally less expensive than state-of-the-art schemes. Our work advances research in image forensics by addressing the need for accurate source identification and privacy protection. The privacy-preserving approach is beneficial for scenarios where protecting the identity of the photographer is crucial, such as in whistleblower cases.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

No datasets were generated or analysed during the current study.

Code availability

It will be provided on request

References

  1. Alhumoud MT (2020) Photo response non-uniformity de-convolution for stabilized video source attribution. Master’s thesis, University of Dayton

  2. Fernández-Menduiña S, Pérez-González F (2020) On the information leakage of camera fingerprint estimates. arXiv preprint arXiv:2002.11162

  3. Bernacki J (2020) A survey on digital camera identification methods. Forensic Sci Int Digit Invest 34:300983

    Google Scholar 

  4. Chen L Data privacy and deep learning in the mobile era: Traceability and protection. PhD thesis, Illinois Institute of Technology (2020)

  5. Gupta S, Mohan N, Kumar M (2021) A study on source device attribution using still images. Arch Comput Methods Eng 28(4):2209–2223

    Article  Google Scholar 

  6. Karaküçük A, Dirik AE (2015) Adaptive photo-response non-uniformity noise removal against image source attribution. Digit Invest 12:66–76

    Article  Google Scholar 

  7. Zhao Y, Zheng N, Qiao T, Xu M (2019) Source camera identification via low dimensional prnu features. Multim Tools Appl 78:8247–8269

    Article  Google Scholar 

  8. Pérez-González F, Fernández-Menduiña S (2021) Prnu-leaks: facts and remedies. In: 2020 28th European Signal Processing Conference (EUSIPCO), pp. 720–724. IEEE

  9. Li J, Liu Y, Ma B, Wang C, Qin C, Wu X, Li S (2023) A novel PCA-based method for PRNU distillation to the benefit of source camera identification. Appl Sci 13(11):6583

    Article  Google Scholar 

  10. Taspinar S, Mohanty M, Memon N (2017) Prnu-based camera attribution from multiple seam-carved images. IEEE Trans Inf Forensics Secur 12(12):3065–3080

    Article  Google Scholar 

  11. Singh P, Raman B, Misra M (2018) Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and pob number system. Multim Tools Appl 77:12581–12605

    Article  Google Scholar 

  12. Fan G, Mohanty M (2017) Privacy-preserving disease susceptibility test with shamir’s secret sharing. In: SECRYPT, pp. 525–533

  13. Entrieri J, Kirchner M (2016) Patch-based desynchronization of digital camera sensor fingerprints. Electron Imaging 2016(8):1–9

    Article  Google Scholar 

  14. Flor E, Aygun R, Mercan S, Akkaya K (2021) Prnu-based source camera identification for multimedia forensics. In: 2021 IEEE 22nd International Conference on Information Reuse and Integration for Data Science (IRI), pp. 168–175

  15. Law SC, Law NF (2022) Performance enhancement of prnu-based source identification for smart video surveillance. HKIE Trans Hong Kong Inst Eng 29(3):172–181

    Article  Google Scholar 

  16. Fernández-Menduiña S, Pérez-González F, Masciopinto M (2023) Source camera attribution via PRNU emphasis: towards a generalized multiplicative model. Signal Process Image Commun 114:116944

    Article  Google Scholar 

  17. Pedrouzo-Ulloa A, Masciopinto M, Troncoso-Pastoriza JR, Pérez-González F Camera attribution forensic analyzer in the encrypted domain. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–7 (2018). IEEE

  18. Pedrouzo-Ulloa A, Masciopinto M, Troncoso-Pastoriza JR, Pérez-González F (2019) Efficient prnu matching in the encrypted domain. In: Multidisciplinary Digital Publishing Institute Proceedings 21:17

  19. Mohanty M, Zhang M, Asghar MR, Russello G (2019) e-PRNU: encrypted domain PRNU-based camera attribution for preserving privacy. IEEE Trans Depend Secure Comput 18(1):426–437

    Article  Google Scholar 

  20. Shingu T, Iwamura K, Kaneda K (2016) Secrecy computation without changing polynomial degree in shamir’s (k, n) secret sharing scheme. In: DCNET, pp. 89–94

  21. Gill SS, Wu H, Patros P, Ottaviani C, Arora P, Pujol VC, Haunschild D, Parlikad AK, Cetinkaya O, Lutfiyya H et al (2024) Modern computing: vision and challenges. Telemat Inform Rep 13:100116

    Article  Google Scholar 

Download references

Funding

There are currently no funding sources for this work.

Author information

Authors and Affiliations

Authors

Contributions

Riyanka Jena : Writing the Original Draft; Data Curation, Experiments Priyanka Singh: Supervision; Writing—Review & Editing; Conceptualization Manoranjan Mohanty: Supervision; Writing—Review & Editing; Conceptualization Manik Lal Das: Supervision; Writing—Review & Editing; Conceptualization

Corresponding author

Correspondence to Riyanka Jena.

Ethics declarations

Conflict of interest

The authors declare that there is no actual or potential Conflict of interest regarding the publication of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

A preliminary version of this work is archived, https://arxiv.org/pdf/2106.07029.pdf.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jena, R., Singh, P., Mohanty, M. et al. PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications. Computing 106, 3309–3333 (2024). https://doi.org/10.1007/s00607-024-01330-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-024-01330-w

Keywords

Mathematics subject classification

Navigation