Skip to main content

Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 157)

Abstract

In recent years, the spread of smartphones has attributed to changes in the user behaviour with respect to multimedia content sharing on online social networks (SNs). One noticeable behaviour is taking pictures using smartphone cameras and sharing them with friends through online social platforms. On the downside, this has contributed to the growth of the cyber crime through SNs. In this paper, we present a method to extract the characteristic fingerprint of the source camera from images being posted on SNs. We use this technique for two investigation activities (i) smartphone verification: correctly verifying if a given picture has been taken by a given smartphone and (ii) profile linking: matching user profiles belonging to different SNs. The method is robust enough to verify the smartphones in spite of the fact that the images get downgraded during the uploading/downloading process. Also, it is capable enough to compare different images belonging to different SNs without using the original images. We evaluate our process on real dataset using three different social networks and five different smartphones. The results, show smartphone verification and profile linking can provide 96.48 % and 99.49 % respectively, on an average of the three social networks, which shows the effectiveness of our approach.

Keywords

  • Pattern noise
  • Image fingerprint
  • Profile matching
  • Social network analysis
  • Online forensics

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-25512-5_12
  • Chapter length: 11 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   54.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-25512-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   72.00
Price excludes VAT (USA)
Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.

References

  1. Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digit. Invest. 9, S24–S33 (2012)

    CrossRef  Google Scholar 

  2. Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification via sensor fingerprinting. CoRR, abs/1408.1416 (2014)

    Google Scholar 

  3. Buades, A., Coll, B., Morel, J.-M.: A review of image denoising algorithms, with a new one. Multiscale Model. Simul. 4(2), 490–530 (2005)

    MATH  MathSciNet  CrossRef  Google Scholar 

  4. Cole, S.A.: Is fingerprint identification valid? Rhetorics of reliability in fingerprint proponents discourse. Law Policy 28(1), 109–135 (2006)

    CrossRef  Google Scholar 

  5. Dabov, K., Foi, A., Katkovnik, V., Egiazarian, K.: Image denoising with block-matching and 3D filtering. In: Electronic Imaging 2006, p. 606414. International Society for Optics and Photonics (2006)

    Google Scholar 

  6. Das, A., Borisov, N., Caesar, M.: Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 441–452 (2014)

    Google Scholar 

  7. Dey, S., Roy, N., Xu, W., Choudhury, R.R., Nelakuditi, S.: Accelprint: imperfections of accelerometers make smartphones trackable. In: 21st Annual Network and Distributed System Security Symposium, NDSS, vol. 2013, pp. 23–26 (2014)

    Google Scholar 

  8. Facebook Inc., Form 10-K Annual Report. Technical Report 001–35551, Securities and Exchange Commission, December 2013

    Google Scholar 

  9. Goljan, M., Fridrich, J.: Camera identification from cropped and scaled images. In: Electronic Imaging (2008)

    Google Scholar 

  10. Iofciu, T., Fankhauser, P., Abel, F., Bischoff, K.: Identifying users across social tagging systems. In: ICWSM (2011)

    Google Scholar 

  11. Liang, X., Li, X., Zhang, K., Lu, R., Lin, X., Shen, X.: Fully anonymous profile matching in mobile social networks. IEEE J. Select. Areas Commun. 31(9), 641–655 (2013)

    CrossRef  Google Scholar 

  12. Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)

    CrossRef  Google Scholar 

  13. Salehan, M., Negahban, A.: Social networking on smartphones: when mobile phones become addictive. Computers in Human Behavior 29(6), 2632–2639 (2013)

    CrossRef  Google Scholar 

  14. Sharma, R., Magnani, M., Montesi, D.; Missing data in multiplex networks: a preliminary study. In: International Workshop on Complex Networks and their Applications (2014)

    Google Scholar 

  15. Sharma, R., Magnani, M., Montesi, D.: Investigating the types and effects of missing data in multilayer networks. In: IEEE/ACM ASONAM (2015)

    Google Scholar 

  16. Van, L.T., Emmanuel, S., Kankanhalli, M.S.: Identifying source cell phone using chromatic aberration. In: IEEE ICME (2007)

    Google Scholar 

  17. Vosecky, J., Hong, D., Shen, V.Y.: User identification across multiple social networks. In: International Conference on Networked Digital Technologies (2009)

    Google Scholar 

  18. Ybarra, M.L., Mitchell, K.J.: How risky are social networking sites? a comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics 121(2), 350–357 (2008)

    CrossRef  Google Scholar 

Download references

Acknowledgments

This work has been supported in part by the Italian Ministry of Education, Universities and Research IMPACT project (RBFR107725) and OPLON project (SCN_00176).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Flavio Bertini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Institute for Computer Sciences, Social informatics and Telecommunication Engineering

About this paper

Cite this paper

Bertini, F., Sharma, R., Iannì, A., Montesi, D. (2015). Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting. In: James, J., Breitinger, F. (eds) Digital Forensics and Cyber Crime. ICDF2C 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 157. Springer, Cham. https://doi.org/10.1007/978-3-319-25512-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25512-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25511-8

  • Online ISBN: 978-3-319-25512-5

  • eBook Packages: Computer ScienceComputer Science (R0)