• DocumentCode
    2932965
  • Title

    An analysis on attacker actions in fingerprint-copy attack in source camera identification

  • Author

    Caldelli, Roberto ; Amerini, Irene ; Novi, Andrea

  • Author_Institution
    Media Integration & Commun. Center - MICC, Univ. of Florence, Florence, Italy
  • fYear
    2011
  • fDate
    Nov. 29 2011-Dec. 2 2011
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Multimedia forensics deals with the analysis of multimedia data to gather information on their origin and authenticity through the use of specific tools. At this point an important question arises: how much reliable are these algorithms? In this work we have considered the technique presented in [1] where it is shown how source camera identification can be attacked. In particular, the problem investigated concerns the situation when an adversary estimates the sensor fingerprint from a set of images belonging to the person he wants to frame and superimposes it onto an image acquired by a different camera to charge the innocent victim as the author of that photo. In [1], a countermeasure against such attack, named Triangle Test, is introduced. In this paper we have analyzed if a more sophisticated action of the attacker can invalidate such countermeasure. Experimental results are provided to prove how hacker´s action could be improved.
  • Keywords
    computer forensics; data analysis; fingerprint identification; image sensors; multimedia computing; attacker action analysis; fingerprint-copy attack; multimedia data analysis; multimedia forensics; source camera identification; Fingerprint recognition; Noise;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Forensics and Security (WIFS), 2011 IEEE International Workshop on
  • Conference_Location
    Iguacu Falls
  • Print_ISBN
    978-1-4577-1017-9
  • Electronic_ISBN
    978-1-4577-1018-6
  • Type

    conf

  • DOI
    10.1109/WIFS.2011.6123122
  • Filename
    6123122