Checking PRNU Usability on modern devices
ICASSP 2021-2021 IEEE International Conference on Acoustics …, 2021•ieeexplore.ieee.org
The image source identification task is mainly addressed by exploiting the unique traces of
the sensor pattern noise, that ensure a negligible false alarm rate when comparing patterns
extracted from different devices, even of the same brand or model. However, most recent
smartphones are equipped with proprietary in-camera processing that can possibly expose
unexpected correlated patterns within images belonging to different sensors. In this paper,
we first highlight that wrong source attribution can happen on smartphones belonging to the …
the sensor pattern noise, that ensure a negligible false alarm rate when comparing patterns
extracted from different devices, even of the same brand or model. However, most recent
smartphones are equipped with proprietary in-camera processing that can possibly expose
unexpected correlated patterns within images belonging to different sensors. In this paper,
we first highlight that wrong source attribution can happen on smartphones belonging to the …
The image source identification task is mainly addressed by exploiting the unique traces of the sensor pattern noise, that ensure a negligible false alarm rate when comparing patterns extracted from different devices, even of the same brand or model. However, most recent smartphones are equipped with proprietary in-camera processing that can possibly expose unexpected correlated patterns within images belonging to different sensors.In this paper, we first highlight that wrong source attribution can happen on smartphones belonging to the same brand when images are acquired both in default and in bokeh mode. While the bokeh mode is proved to introduce a correlated pattern due to the specific in-camera post-processing, we also show that natural images also expose such issue, even when a reference from flat images is available. Furthermore, different camera models expose different correlation patterns since they are reasonably related to developers’ choices. Then, we propose a general strategy that allows the forensic practitioner to determine whether a questioned device may suffer from these correlated patterns, thus avoiding the risk of false image attribution.
ieeexplore.ieee.org