International Conference on Digital Forensics and Cyber Crime

Digital Forensics and Cyber Crime pp 176-186 | Cite as

Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting

  • Flavio Bertini
  • Rajesh Sharma
  • Andrea Iannì
  • Danilo Montesi
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 157)

Abstract

In recent years, the spread of smartphones has attributed to changes in the user behaviour with respect to multimedia content sharing on online social networks (SNs). One noticeable behaviour is taking pictures using smartphone cameras and sharing them with friends through online social platforms. On the downside, this has contributed to the growth of the cyber crime through SNs. In this paper, we present a method to extract the characteristic fingerprint of the source camera from images being posted on SNs. We use this technique for two investigation activities (i) smartphone verification: correctly verifying if a given picture has been taken by a given smartphone and (ii) profile linking: matching user profiles belonging to different SNs. The method is robust enough to verify the smartphones in spite of the fact that the images get downgraded during the uploading/downloading process. Also, it is capable enough to compare different images belonging to different SNs without using the original images. We evaluate our process on real dataset using three different social networks and five different smartphones. The results, show smartphone verification and profile linking can provide 96.48 % and 99.49 % respectively, on an average of the three social networks, which shows the effectiveness of our approach.

Keywords

Pattern noise Image fingerprint Profile matching Social network analysis Online forensics 

References

  1. 1.
    Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digit. Invest. 9, S24–S33 (2012)CrossRefGoogle Scholar
  2. 2.
    Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification via sensor fingerprinting. CoRR, abs/1408.1416 (2014)Google Scholar
  3. 3.
    Buades, A., Coll, B., Morel, J.-M.: A review of image denoising algorithms, with a new one. Multiscale Model. Simul. 4(2), 490–530 (2005)MATHMathSciNetCrossRefGoogle Scholar
  4. 4.
    Cole, S.A.: Is fingerprint identification valid? Rhetorics of reliability in fingerprint proponents discourse. Law Policy 28(1), 109–135 (2006)CrossRefGoogle Scholar
  5. 5.
    Dabov, K., Foi, A., Katkovnik, V., Egiazarian, K.: Image denoising with block-matching and 3D filtering. In: Electronic Imaging 2006, p. 606414. International Society for Optics and Photonics (2006)Google Scholar
  6. 6.
    Das, A., Borisov, N., Caesar, M.: Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 441–452 (2014)Google Scholar
  7. 7.
    Dey, S., Roy, N., Xu, W., Choudhury, R.R., Nelakuditi, S.: Accelprint: imperfections of accelerometers make smartphones trackable. In: 21st Annual Network and Distributed System Security Symposium, NDSS, vol. 2013, pp. 23–26 (2014)Google Scholar
  8. 8.
    Facebook Inc., Form 10-K Annual Report. Technical Report 001–35551, Securities and Exchange Commission, December 2013Google Scholar
  9. 9.
    Goljan, M., Fridrich, J.: Camera identification from cropped and scaled images. In: Electronic Imaging (2008)Google Scholar
  10. 10.
    Iofciu, T., Fankhauser, P., Abel, F., Bischoff, K.: Identifying users across social tagging systems. In: ICWSM (2011)Google Scholar
  11. 11.
    Liang, X., Li, X., Zhang, K., Lu, R., Lin, X., Shen, X.: Fully anonymous profile matching in mobile social networks. IEEE J. Select. Areas Commun. 31(9), 641–655 (2013)CrossRefGoogle Scholar
  12. 12.
    Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)CrossRefGoogle Scholar
  13. 13.
    Salehan, M., Negahban, A.: Social networking on smartphones: when mobile phones become addictive. Computers in Human Behavior 29(6), 2632–2639 (2013)CrossRefGoogle Scholar
  14. 14.
    Sharma, R., Magnani, M., Montesi, D.; Missing data in multiplex networks: a preliminary study. In: International Workshop on Complex Networks and their Applications (2014)Google Scholar
  15. 15.
    Sharma, R., Magnani, M., Montesi, D.: Investigating the types and effects of missing data in multilayer networks. In: IEEE/ACM ASONAM (2015)Google Scholar
  16. 16.
    Van, L.T., Emmanuel, S., Kankanhalli, M.S.: Identifying source cell phone using chromatic aberration. In: IEEE ICME (2007)Google Scholar
  17. 17.
    Vosecky, J., Hong, D., Shen, V.Y.: User identification across multiple social networks. In: International Conference on Networked Digital Technologies (2009)Google Scholar
  18. 18.
    Ybarra, M.L., Mitchell, K.J.: How risky are social networking sites? a comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics 121(2), 350–357 (2008)CrossRefGoogle Scholar

Copyright information

© Institute for Computer Sciences, Social informatics and Telecommunication Engineering 2015

Authors and Affiliations

  • Flavio Bertini
    • 1
  • Rajesh Sharma
    • 1
  • Andrea Iannì
    • 1
  • Danilo Montesi
    • 1
  1. 1.Department of Computer Science and EngineeringUniversity of BolognaBolognaItaly

Personalised recommendations