The research, conducted at Binghamton University in New York, analyzes the slight variations created by the image sensor in each camera to uniquely identify pictures--and the camera that shot them.
Digital photographers could soon lose their ability to anonymously shoot sensitive or illegal subject matter, thanks to new research that can link digital images to the camera with which they were taken.
The research, conducted at Binghamton University in New York, analyzes the slight variations created by the image sensor in each camera to uniquely identify pictures.
The technology is being presented as potentially useful in nailing child pornographers. "The defense in these kind of cases would often be that the images were not taken by this person's camera," Jessica Fridrich, the Binghamton University engineering professor who oversaw the research, said in a statement. "But if it can be shown that the original images were taken by the person's cell phone or camera, it becomes a much stronger case."
In technical terms, Fridrich and her co-inventors Jan Lukas and Miroslav Goljan found that every digital picture is overlaid by a weak noise-like pattern of pixel-to-pixel non-uniformity. As with fingerprints, that digital noise pattern will be consistent among all images taken from the same camera.
In preliminary tests, Fridrich's lab analyzed 2,700 pictures taken by nine digital cameras, with what the Binghamton University statement said was 100 percent accuracy.
On the downside, the technique won't work on analysis of a single photo. Investigators have to have either the actual camera or multiple photos to get a line on the noise pattern.
Pegging a photo to an individual camera essentially extends forsenic document identification techniques to the digital imaging area. Such methods have long been used, for example, to identify handwritten ransom notes, and to tie printing materials to typewriters by looking at the unique characteristics of slightly bent keys or carbon-film ribbons.
In higher-tech office machines, Xerox has developed DocuColor, a forensic tracking codes that prints tracking dots on color documents.
As for Fridrich's technique, the Binghamton University statement said it promises to find applications in the analysis of scanned and video imagery. "We already know law enforcement wants to be able to use this," Fridrich said, in the statement. "What we have right now is a research tool; it's a raw technology that we will continue to improve."
Security expert Bruce Schneier, writing on his blog, points out one potential weakness of the method. "There's one important aspect of this fingerprint that the article did not talk about: how easy is it to forge?" Schneier wrote. "Can someone analyze 100 images from a given camera, and then doctor a pre-existing picture so that it appeared to come from that camera?"
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.