2020
DOI: 10.1007/s11042-020-09133-9
|View full text |Cite
|
Sign up to set email alerts
|

On robustness of camera identification algorithms

Abstract: In this paper we consider the problem of a privacy threat enabling tracing digital cameras by the analysis of pictures they produced. As thousands of images are processed at a mass scale, the threat may apply to most users of digital cameras. We consider a state-of-theart algorithm for digital camera identification proposed in Lucas et al. (IEEE Trans Inf Forensics Secur 1(2):205-214, 2006) and discuss strategies that can be used to bypass it, in order to make information about the camera unavailable. It turns… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 34 publications
(45 reference statements)
0
16
0
Order By: Relevance
“…This paper is a continuation of research presented in [3] and in [2]. In [3] there have been proposed two algorithms called PSNR-CT and DEPECHE.…”
Section: Introductionmentioning
confidence: 84%
See 2 more Smart Citations
“…This paper is a continuation of research presented in [3] and in [2]. In [3] there have been proposed two algorithms called PSNR-CT and DEPECHE.…”
Section: Introductionmentioning
confidence: 84%
“…The DEPECHE algorithm is used for prevention of camera identification based on the analysis of image histogram. In [2] the robustness of camera identification in terms of Lukás et al [27] by analysing degraded images has been checked. The degradation techniques included noising, blurring, removing least significant bit; also an algorithm to bypass the identification of Lukás et al's algorithm has been proposed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For the implementation of [13], we consider the parameter configurations achieving the best anonymization results, i.e., the strategies defined as (5) 1 in the original paper. Moreover, to show that simple denoising does not achieve good anonymization performances [10], we implement the well-known DnCNN denoiser [30] which represents a modern data-driven solution among image denoising strategies.…”
Section: B State-of-the-art Solutionsmentioning
confidence: 99%
“…The second family of methods works by blindly modifying pixel values in order to make the underlying PRNU unrecognizable. For instance, [9] shows that multiple image denoising steps can help attenuating the PRNU, even though this may not be enough to completely hinder its traces from images [10]. Alternatively, [11] applies seam-carving to change pixel locations, and [12] exploits patch-match techniques to scramble pixel positions.…”
Section: Introductionmentioning
confidence: 99%