Skip to main content

Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2015)


In recent years, the spread of smartphones has attributed to changes in the user behaviour with respect to multimedia content sharing on online social networks (SNs). One noticeable behaviour is taking pictures using smartphone cameras and sharing them with friends through online social platforms. On the downside, this has contributed to the growth of the cyber crime through SNs. In this paper, we present a method to extract the characteristic fingerprint of the source camera from images being posted on SNs. We use this technique for two investigation activities (i) smartphone verification: correctly verifying if a given picture has been taken by a given smartphone and (ii) profile linking: matching user profiles belonging to different SNs. The method is robust enough to verify the smartphones in spite of the fact that the images get downgraded during the uploading/downloading process. Also, it is capable enough to compare different images belonging to different SNs without using the original images. We evaluate our process on real dataset using three different social networks and five different smartphones. The results, show smartphone verification and profile linking can provide 96.48 % and 99.49 % respectively, on an average of the three social networks, which shows the effectiveness of our approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions


  1. Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digit. Invest. 9, S24–S33 (2012)

    Article  Google Scholar 

  2. Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification via sensor fingerprinting. CoRR, abs/1408.1416 (2014)

    Google Scholar 

  3. Buades, A., Coll, B., Morel, J.-M.: A review of image denoising algorithms, with a new one. Multiscale Model. Simul. 4(2), 490–530 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  4. Cole, S.A.: Is fingerprint identification valid? Rhetorics of reliability in fingerprint proponents discourse. Law Policy 28(1), 109–135 (2006)

    Article  Google Scholar 

  5. Dabov, K., Foi, A., Katkovnik, V., Egiazarian, K.: Image denoising with block-matching and 3D filtering. In: Electronic Imaging 2006, p. 606414. International Society for Optics and Photonics (2006)

    Google Scholar 

  6. Das, A., Borisov, N., Caesar, M.: Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 441–452 (2014)

    Google Scholar 

  7. Dey, S., Roy, N., Xu, W., Choudhury, R.R., Nelakuditi, S.: Accelprint: imperfections of accelerometers make smartphones trackable. In: 21st Annual Network and Distributed System Security Symposium, NDSS, vol. 2013, pp. 23–26 (2014)

    Google Scholar 

  8. Facebook Inc., Form 10-K Annual Report. Technical Report 001–35551, Securities and Exchange Commission, December 2013

    Google Scholar 

  9. Goljan, M., Fridrich, J.: Camera identification from cropped and scaled images. In: Electronic Imaging (2008)

    Google Scholar 

  10. Iofciu, T., Fankhauser, P., Abel, F., Bischoff, K.: Identifying users across social tagging systems. In: ICWSM (2011)

    Google Scholar 

  11. Liang, X., Li, X., Zhang, K., Lu, R., Lin, X., Shen, X.: Fully anonymous profile matching in mobile social networks. IEEE J. Select. Areas Commun. 31(9), 641–655 (2013)

    Article  Google Scholar 

  12. Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)

    Article  Google Scholar 

  13. Salehan, M., Negahban, A.: Social networking on smartphones: when mobile phones become addictive. Computers in Human Behavior 29(6), 2632–2639 (2013)

    Article  Google Scholar 

  14. Sharma, R., Magnani, M., Montesi, D.; Missing data in multiplex networks: a preliminary study. In: International Workshop on Complex Networks and their Applications (2014)

    Google Scholar 

  15. Sharma, R., Magnani, M., Montesi, D.: Investigating the types and effects of missing data in multilayer networks. In: IEEE/ACM ASONAM (2015)

    Google Scholar 

  16. Van, L.T., Emmanuel, S., Kankanhalli, M.S.: Identifying source cell phone using chromatic aberration. In: IEEE ICME (2007)

    Google Scholar 

  17. Vosecky, J., Hong, D., Shen, V.Y.: User identification across multiple social networks. In: International Conference on Networked Digital Technologies (2009)

    Google Scholar 

  18. Ybarra, M.L., Mitchell, K.J.: How risky are social networking sites? a comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics 121(2), 350–357 (2008)

    Article  Google Scholar 

Download references


This work has been supported in part by the Italian Ministry of Education, Universities and Research IMPACT project (RBFR107725) and OPLON project (SCN_00176).

Author information

Authors and Affiliations


Corresponding author

Correspondence to Flavio Bertini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social informatics and Telecommunication Engineering

About this paper

Cite this paper

Bertini, F., Sharma, R., Iannì, A., Montesi, D. (2015). Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting. In: James, J., Breitinger, F. (eds) Digital Forensics and Cyber Crime. ICDF2C 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 157. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25511-8

  • Online ISBN: 978-3-319-25512-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics