Multimedia forensics deals with the analysis of multimedia data to gather information on their origin and authenticity through the use of specific tools. At this point an important question arises: how much reliable are these algorithms? In this work we have considered the technique presented in [1] where it is shown how source camera identification can be attacked. In particular, the problem investigated concerns the situation when an adversary estimates the sensor fingerprint from a set of images belonging to the person he wants to frame and superimposes it onto an image acquired by a different camera to charge the innocent victim as the author of that photo. In [1], a countermeasure against such attack, named Triangle Test, is introduced. In this paper we have analyzed if a more sophisticated action of the attacker can invalidate such countermeasure. Experimental results are provided to prove how hacker's action could be improved.

An analysis on attacker actions in fingerprint-copy attack in source camera identification / Caldelli, R.; Amerini, I.; Novi, A.. - (2011), pp. 1-6. (Intervento presentato al convegno 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011 tenutosi a Iguacu Falls; Brazil) [10.1109/WIFS.2011.6123122].

An analysis on attacker actions in fingerprint-copy attack in source camera identification

I. Amerini
;
2011

Abstract

Multimedia forensics deals with the analysis of multimedia data to gather information on their origin and authenticity through the use of specific tools. At this point an important question arises: how much reliable are these algorithms? In this work we have considered the technique presented in [1] where it is shown how source camera identification can be attacked. In particular, the problem investigated concerns the situation when an adversary estimates the sensor fingerprint from a set of images belonging to the person he wants to frame and superimposes it onto an image acquired by a different camera to charge the innocent victim as the author of that photo. In [1], a countermeasure against such attack, named Triangle Test, is introduced. In this paper we have analyzed if a more sophisticated action of the attacker can invalidate such countermeasure. Experimental results are provided to prove how hacker's action could be improved.
2011
2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011
Algorithms; Cameras; Image tampering
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
An analysis on attacker actions in fingerprint-copy attack in source camera identification / Caldelli, R.; Amerini, I.; Novi, A.. - (2011), pp. 1-6. (Intervento presentato al convegno 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011 tenutosi a Iguacu Falls; Brazil) [10.1109/WIFS.2011.6123122].
File allegati a questo prodotto
File Dimensione Formato  
Caldelli_An-analysis_2011.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1 MB
Formato Adobe PDF
1 MB Adobe PDF   Contatta l'autore
VE_2011_11573-1326364.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1 MB
Formato Adobe PDF
1 MB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1326364
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 21
  • ???jsp.display-item.citation.isi??? ND
social impact