1,054 research outputs found

    Compressed Fingerprint Matching and Camera Identification via Random Projections

    Get PDF
    Sensor imperfections in the form of photo-response nonuniformity (PRNU) patterns are a well-established fingerprinting technique to link pictures to the camera sensors that acquired them. The noise-like characteristics of the PRNU pattern make it a difficult object to compress, thus hindering many interesting applications that would require storage of a large number of fingerprints or transmission over a bandlimited channel for real-time camera matching. In this paper, we propose to use realvalued or binary random projections to effectively compress the fingerprints at a small cost in terms of matching accuracy. The performance of randomly projected fingerprints is analyzed from a theoretical standpoint and experimentally verified on databases of real photographs. Practical issues concerning the complexity of implementing random projections are also addressed by using circulant matrices

    Rotation-invariant binary representation of sensor pattern noise for source-oriented image and video clustering

    Get PDF
    Most existing source-oriented image and video clustering algorithms based on sensor pattern noise (SPN) rely on the pairwise similarities, whose calculation usually dominates the overall computational time. The heavy computational burden is mainly incurred by the high dimensionality of SPN, which typically goes up to millions for delivering plausible clustering performance. This problem can be further aggravated by the uncertainty of the orientation of images or videos because the spatial correspondence between data with uncertain orientations needs to be reestablished in a brute-force search manner. In this work, we propose a rotation-invariant binary representation of SPN to address the issue of rotation and reduce the computational cost of calculating the pairwise similarities. Results on two public multimedia forensics databases have shown that the proposed approach is effective in overcoming the rotation issue and speeding up the calculation of pairwise SPN similarities for source-oriented image and video clustering

    Random subspace method for aource camera identification

    Get PDF
    Sensor pattern noise is an inherent fingerprint of imaging devices, which has been widely used for source camera identification, image classification, and forgery detection. In a previous work, we proposed a feature extraction method based on the principal component analysis denoising concept, which can enhance the performance of conventional SPN extraction methods. However, this method is vulnerable, because the training samples are seriously affected by the image content. Accordingly, it is difficult to train a reliable feature extractor by using such a training set. To address this problem, a camera identification framework based on the random subspace method and majority voting is proposed in this work. The experimental results show that the proposed solution can suppress the interference from scene details and enhance the performance in terms of the receiver operating characteristic curve

    Incremental updating feature extracion for camera identification

    Get PDF
    Sensor Pattern Noise (SPN) is an inherent fingerprint of imaging devices, which has been widely used in the tasks of digital camera identification, image classification and forgery detection. In our previous work, a feature extraction method based on PCA denoising concept was applied to extract a set of principal components from the original noise residual. However, this algorithm is inefficient when query cameras are continuously received. To solve this problem, we propose an extension based on Candid Covariance-free Incremental PCA (CCIPCA) and two modifications to incrementally update the feature extractor according to the received cameras. Experimental results show that the PCA and CCIPCA based features both outperform their original features on the ROC performance, and CCIPCA is more efficient on camera updating

    Multimedia Forensics

    Get PDF
    This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field

    Privacy in Biometric Systems

    Get PDF
    Biometrics are physiological and/or behavioral characteristics of a person that have been used to provide an automatic proof of identity in a growing list of applications including crime/terrorism fighting, forensics, access and border control, securing e-/m-commerce transactions and service entitlements. In recent years, a great deal of research into a variety of new and traditional biometrics has widened the scope of investigations beyond improving accuracy into mechanisms that deal with serious concerns raised about the potential misuse of collected biometric data. Despite the long list of biometrics’ benefits, privacy concerns have become widely shared due to the fact that every time the biometric of a person is checked, a trace is left that could reveal personal and confidential information. In fact, biometric-based recognition has an inherent privacy problem as it relies on capturing, analyzing, and storing personal data about us as individuals. For example, biometric systems deal with data related to the way we look (face, iris), the way we walk (gait), the way we talk (speaker recognition), the way we write (handwriting), the way we type on a keyboard (keystroke), the way we read (eye movement), and many more. Privacy has become a serious concern for the public as biometric systems are increasingly deployed in many applications ranging from accessing our account on a Smartphone or computer to border control and national biometric cards on a very large scale. For example, the Unique Identification Authority of India (UIDAI) has issued 56 million biometric cards as of January 2014 [1], where each biometric card holds templates of the 10 fingers, the two irises and the face. An essential factor behind the growing popularity of biometrics in recent years is the fact that biometric sensors have become a lot cheaper as well as easier to install and handle. CCTV cameras are installed nearly everywhere and almost all Smartphones are equipped with a camera, microphone, fingerprint scanner, and probably very soon, an iris scanner

    Image Forensics in the Wild

    Get PDF

    Multimedia Forensics

    Get PDF
    This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field

    A Biometric Approach to Prevent False Use of IDs

    Get PDF
    What is your username? What is your password? What is your PIN number? These are some of the commonly used key questions users need to answer accurately in order to verify their identity and gain access to systems and their own data. Passwords, Personal Identification Numbers (PINs) and ID cards are different means of tokens used to identify a person, but these can be forgotten, stolen or lost. Currently, University of Hertfordshire (UH) carries out identity checks by checking the photograph on an ID card during exams. Other processes such as attendance monitoring and door access control require tapping the ID card on a reader. These methods can cause issues such as unauthorised use of ID card on attendance system and door access system if ID card is found, lost or borrowed. During exams, this could lead to interruptions when carrying out manual checks. As the invigilator carries out checks whilst the student is writing an exam, it is often difficult to see the student’s face as they face down whilst writing the exam. They cannot be disturbed for the ID check process. Students are also required to sign a manual register as they walk into the exam room. This process is time consuming. A more robust approach to identification of individuals that can avoid the above mentioned limitations of the traditional means, is the use of biometrics. Fingerprint was the first biometric modality that has been used. In comparison to other biometric modalities such as signature and face recognition, fingerprint is highly unique, accepted and leads to a more accurate matching result. Considering these properties of fingerprint biometrics, it has been explored in the research study presented in this thesis to enhance the efficiency and the reliability of the University’s exam process. This thesis focuses on using fingerprint recognition technology in a novel approach to check identity for exams in a University environment. Identifying a user using fingerprints is not the only aim of this project. Convenience and user experience play vital roles in this project whilst improving speed and processes at UH
    • …
    corecore