The research, conducted at Binghamton University in New York, analyzes the slight variations created by the image sensor in each camera to uniquely identify pictures--and the camera that shot them.
Digital photographers could soon lose their ability to anonymously shoot sensitive or illegal subject matter, thanks to new research that can link digital images to the camera with which they were taken.
The research, conducted at Binghamton University in New York, analyzes the slight variations created by the image sensor in each camera to uniquely identify pictures.
The technology is being presented as potentially useful in nailing child pornographers. "The defense in these kind of cases would often be that the images were not taken by this person's camera," Jessica Fridrich, the Binghamton University engineering professor who oversaw the research, said in a statement. "But if it can be shown that the original images were taken by the person's cell phone or camera, it becomes a much stronger case."
In technical terms, Fridrich and her co-inventors Jan Lukas and Miroslav Goljan found that every digital picture is overlaid by a weak noise-like pattern of pixel-to-pixel non-uniformity. As with fingerprints, that digital noise pattern will be consistent among all images taken from the same camera.
In preliminary tests, Fridrich's lab analyzed 2,700 pictures taken by nine digital cameras, with what the Binghamton University statement said was 100 percent accuracy.
On the downside, the technique won't work on analysis of a single photo. Investigators have to have either the actual camera or multiple photos to get a line on the noise pattern.
Pegging a photo to an individual camera essentially extends forsenic document identification techniques to the digital imaging area. Such methods have long been used, for example, to identify handwritten ransom notes, and to tie printing materials to typewriters by looking at the unique characteristics of slightly bent keys or carbon-film ribbons.
In higher-tech office machines, Xerox has developed DocuColor, a forensic tracking codes that prints tracking dots on color documents.
As for Fridrich's technique, the Binghamton University statement said it promises to find applications in the analysis of scanned and video imagery. "We already know law enforcement wants to be able to use this," Fridrich said, in the statement. "What we have right now is a research tool; it's a raw technology that we will continue to improve."
Security expert Bruce Schneier, writing on his blog, points out one potential weakness of the method. "There's one important aspect of this fingerprint that the article did not talk about: how easy is it to forge?" Schneier wrote. "Can someone analyze 100 images from a given camera, and then doctor a pre-existing picture so that it appeared to come from that camera?"
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 18, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."