Abstract
Camera fingerprinting is a technology established in the signal processing community for image forensics. We explore its novel security and privacy perspectives that have been so far largely ignored, including its applications in privacy intrusion, in handling new socio-technical problems such as revenge porn, and in building a novel authentication mechanism – any photo you take are you.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Liu, B.B., Wei, X., Yan, J.: Enhancing sensor pattern noise for source camera identification: an empirical evaluation. In: Proceeding of 3rd ACM Workshop on Information Hiding and Multimedia Security. pp. 85–90 (2015)
Afroz, S., Caliskan-Islam, A., Stolerman, A., Greenstadt, R., McCoy, D.: Doppelgänger finder: taking stylometry to the underground. In: IEEE Security and Privacy (2014)
Narayanan, A., Paskov, H., Gong, N., Bethencourt, J., Stefanov, E., Shin, R., Song, D.: On the feasibility of internet-scale author identication. In: Proceedings of the 33rd Conference on IEEE Symposium on Security and Privacy. IEEE (2012)
Lukas, J., Fridrich, J., Goljan, M.: Digital camera identication from sen-sor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)
Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74–90 (2008)
Acknowledgements
I thank Mike Bond, James Lei, Laurent Simon, Bingsheng Zhang and the workshop attendees for discussing some of the ideas.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Yan, J. (2017). Novel Security and Privacy Perspectives of Camera Fingerprints. In: Anderson, J., Matyáš, V., Christianson, B., Stajano, F. (eds) Security Protocols XXIV. Security Protocols 2016. Lecture Notes in Computer Science(), vol 10368. Springer, Cham. https://doi.org/10.1007/978-3-319-62033-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-62033-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-62032-9
Online ISBN: 978-3-319-62033-6
eBook Packages: Computer ScienceComputer Science (R0)