TY - GEN
T1 - Countering the pooled triangle test for PRNU-based camera identification
AU - Barni, Mauro
AU - Nakano-Miyatake, Mariko
AU - Santoyo-Garcia, Hector
AU - Tondi, Benedetta
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/7/2
Y1 - 2018/7/2
N2 - We analyze the security of the pooled triangle test in [1] against Counter-Forensic attacks. First, a new attack is proposed, relying on a block-wise variance-based estimation of the fingerprint. The new attack permits to reduce greatly the accuracy of the pooled test, thus outperforming state of the art methods which are in general effective only against the single-image version of the test [1]. Then, a randomized version of the newly proposed attack is introduced to increase its security. The randomized version of the attack maintains good performance even when an attack-aware version of the pooled test is applied. Extensive experiments are carried out in a very general setting, also permitting to show that the performance of the pooled triangle test in the presence of attacks greatly depend on the test parameters, and in particular, on the relationship between the number of images used to run the test and the cardinality of the set of images used for the attack.
AB - We analyze the security of the pooled triangle test in [1] against Counter-Forensic attacks. First, a new attack is proposed, relying on a block-wise variance-based estimation of the fingerprint. The new attack permits to reduce greatly the accuracy of the pooled test, thus outperforming state of the art methods which are in general effective only against the single-image version of the test [1]. Then, a randomized version of the newly proposed attack is introduced to increase its security. The randomized version of the attack maintains good performance even when an attack-aware version of the pooled test is applied. Extensive experiments are carried out in a very general setting, also permitting to show that the performance of the pooled triangle test in the presence of attacks greatly depend on the test parameters, and in particular, on the relationship between the number of images used to run the test and the cardinality of the set of images used for the attack.
UR - http://www.scopus.com/inward/record.url?scp=85062853172&partnerID=8YFLogxK
U2 - 10.1109/WIFS.2018.8630778
DO - 10.1109/WIFS.2018.8630778
M3 - Contribución a la conferencia
AN - SCOPUS:85062853172
T3 - 10th IEEE International Workshop on Information Forensics and Security, WIFS 2018
BT - 10th IEEE International Workshop on Information Forensics and Security, WIFS 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 10th IEEE International Workshop on Information Forensics and Security, WIFS 2018
Y2 - 10 December 2018 through 13 December 2018
ER -