DocumentCode
2932965
Title
An analysis on attacker actions in fingerprint-copy attack in source camera identification
Author
Caldelli, Roberto ; Amerini, Irene ; Novi, Andrea
Author_Institution
Media Integration & Commun. Center - MICC, Univ. of Florence, Florence, Italy
fYear
2011
fDate
Nov. 29 2011-Dec. 2 2011
Firstpage
1
Lastpage
6
Abstract
Multimedia forensics deals with the analysis of multimedia data to gather information on their origin and authenticity through the use of specific tools. At this point an important question arises: how much reliable are these algorithms? In this work we have considered the technique presented in [1] where it is shown how source camera identification can be attacked. In particular, the problem investigated concerns the situation when an adversary estimates the sensor fingerprint from a set of images belonging to the person he wants to frame and superimposes it onto an image acquired by a different camera to charge the innocent victim as the author of that photo. In [1], a countermeasure against such attack, named Triangle Test, is introduced. In this paper we have analyzed if a more sophisticated action of the attacker can invalidate such countermeasure. Experimental results are provided to prove how hacker´s action could be improved.
Keywords
computer forensics; data analysis; fingerprint identification; image sensors; multimedia computing; attacker action analysis; fingerprint-copy attack; multimedia data analysis; multimedia forensics; source camera identification; Fingerprint recognition; Noise;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Forensics and Security (WIFS), 2011 IEEE International Workshop on
Conference_Location
Iguacu Falls
Print_ISBN
978-1-4577-1017-9
Electronic_ISBN
978-1-4577-1018-6
Type
conf
DOI
10.1109/WIFS.2011.6123122
Filename
6123122
Link To Document