Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3658664.3659650acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper
Free access

The Adobe Hidden Feature and its Impact on Sensor Attribution

Published: 24 June 2024 Publication History
  • Get Citation Alerts
  • Abstract

    If the extraction of sensor fingerprints represents nowadays an important forensic tool for sensor attribution, it has been shown recently in [2,3,12] that images coming from several sensors were more prone to generate False Positives (FP) by presenting a common "leak". In this paper, we investigate the possible cause of this leak and after inspecting the EXIF metadata of the sources causing FP, we found out that they were related to the Adobe Lightroom or Camera Raw software. The cross-correlation between residuals on images presenting FP reveals periodic peaks showing the presence of a periodic pattern. By developing our own images with Adobe Lightroom we are able to show that all developments from raw images (or 16 bits per channel coded) to 8 bits-coded images also embed a periodic 128x128 pattern very similar to a watermark. However, we also show that the watermark depends on both the content and the architecture used to develop the image. The rest of the paper presents two different ways of removing this watermark, one by removing it from the image noise component, and the other by removing it in the pixel domain. We show that for a camera presenting FP in [12], we were able to prevent the False Positives. A discussion with Adobe representatives informed us that the company decided to add this pattern in order to induce dithering.

    References

    [1]
    Shruti Agarwal and Hany Farid. Photo forensics from rounding artifacts. In Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security, pages 103--114, 2020.
    [2]
    Chiara Albisani, Massimo Iuliani, and Alessandro Piva. Checking PRNU Usability on modern devices. In ICASSP 2021--2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 2535--2539. IEEE, 2021.
    [3]
    Daniele Baracchi, Massimo Iuliani, Andrea G Nencini, and Alessandro Piva. Facing image source attribution on iPhone X. In Digital Forensics and Watermarking: 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25--27, 2020, Revised Selected Papers 19, pages 196--207. Springer, 2021.
    [4]
    Patrick Bas, Teddy Furon, François Cayre, Gwenaël Doërr, and Benjamin Mathon. Watermarking security: fundamentals, secure designs and attacks, 2016.
    [5]
    Nabeel Nisar Bhat and Tiziano Bianchi. Investigating inconsistencies in prnubased camera identification. In 2022 IEEE International Conference on Image Processing (ICIP), pages 851--855. IEEE, 2022.
    [6]
    Luca Bondi, Paolo Bestagini, and Nicolò Bonettini. Python porting of prnu extractor and helper functions. https://github.com/polimi-ispl/prnu-python. Accessed: 2023--11--30.
    [7]
    François Cayre, Caroline Fontaine, and Teddy Furon. Watermarking security: theory and practice. IEEE Transactions on Signal Processing, 53(10):3976--3987, 2005.
    [8]
    Giovanni Chierchia, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. A bayesian-mrf approach for prnu-based image forgery detection. IEEE Transactions on Information Forensics and Security, 9(4):554--567, 2014.
    [9]
    Kostadin Dabov, Alessandro Foi, Vladimir Katkovnik, and Karen Egiazarian. Bm3d image denoising with shape-adaptive principal component analysis. In SPARS'09-Signal Processing with Adaptive Sparse Structured Representations, 2009.
    [10]
    Jessica Fridrich. Digital image forensics. IEEE Signal Processing Magazine, 26(2):26-- 37, 2009.
    [11]
    Miroslav Goljan, Jessica Fridrich, and Tomá" Filler. Large scale test of sensor fingerprint camera identification. In Media forensics and security, volume 7254, pages 170--181. SPIE, 2009.
    [12]
    Massimo Iuliani, Marco Fontani, and Alessandro Piva. A leak in PRNU based source identification questioning fingerprint uniqueness. IEEE Access, 9:52455-- 52463, 2021.
    [13]
    M. Kutter. Watermarking resisting to translation, rotation and scaling. In Proc. SPIE Int. Symp. on Voice, Video, and Data Communication, volume 3528, pages 423--431, Boston, U.S.A., November 1998.
    [14]
    Liu Liu, Xinwen Fu, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba, Feng Lin, Li Lu, and Kui Ren. Fits: Matching camera fingerprints subject to software noise pollution. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pages 1660--1674, 2023.
    [15]
    Jan Lukas, Jessica Fridrich, and Miroslav Goljan. Determining digital image origin using sensor imperfections. In Image and Video Communications and Processing 2005, volume 5685, pages 249--260. SPIE, 2005.
    [16]
    MKivanc Mihcak, Igor Kozintsev, Kannan Ramchandran, and Pierre Moulin. Lowcomplexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Processing Letters, 6(12):300--303, 1999.
    [17]
    Tomás Pevn
    [18]
    y, Patrick Bas, and Jessica Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2):215, 2010.

    Index Terms

    1. The Adobe Hidden Feature and its Impact on Sensor Attribution

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security
        June 2024
        305 pages
        ISBN:9798400706370
        DOI:10.1145/3658664
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 24 June 2024

        Permissions

        Request permissions for this article.

        Check for updates

        Badges

        • Honorable Mention

        Author Tags

        1. false-positive
        2. prnu
        3. watermark removal
        4. watermarking

        Qualifiers

        • Short-paper

        Conference

        IH&MMSEC '24
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 128 of 318 submissions, 40%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 29
          Total Downloads
        • Downloads (Last 12 months)29
        • Downloads (Last 6 weeks)29

        Other Metrics

        Citations

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media