Please use this identifier to cite or link to this item:
http://hdl.handle.net/11452/28528
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sencar, Hüsrev Taha | - |
dc.contributor.author | Memon, Nasir D. | - |
dc.date.accessioned | 2022-09-07T10:33:02Z | - |
dc.date.available | 2022-09-07T10:33:02Z | - |
dc.date.issued | 2014-12 | - |
dc.identifier.citation | Dirik, A. E. vd. (2014). "Analysis of seam-carving-based anonymization of images against PRNU noise pattern-based source attribution". IEEE Transactions on Information Forensics and Security, 9(12), 2277-2290. | en_US |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.issn | 1556-6021 | - |
dc.identifier.uri | https://doi.org/10.1109/TIFS.2014.2361200 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/abstract/document/6914598 | - |
dc.identifier.uri | http://hdl.handle.net/11452/28528 | - |
dc.description.abstract | The availability of sophisticated source attribution techniques raises new concerns about privacy and anonymity of photographers, activists, and human right defenders who need to stay anonymous while spreading their images and videos. Recently, the use of seam-carving, a content-aware resizing method, has been proposed to anonymize the source camera of images against the well-known photoresponse nonuniformity (PRNU)-based source attribution technique. In this paper, we provide an analysis of the seam-carving-based source camera anonymization method by determining the limits of its performance introducing two adversarial models. Our analysis shows that the effectiveness of the deanonymization attacks depend on various factors that include the parameters of the seam-carving method, strength of the PRNU noise pattern of the camera, and an adversary's ability to identify uncarved image blocks in a seam-carved image. Our results show that, for the general case, there should not be many uncarved blocks larger than the size of 50x50 pixels for successful anonymization of the source camera. | en_US |
dc.description.sponsorship | Center for Interdisciplinary Studies in Security and Privacy, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE-INST Electrical Electronics Engineers | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | PRNU noise pattern | en_US |
dc.subject | Seam-carving | en_US |
dc.subject | Source attribution | en_US |
dc.subject | Anonymization | en_US |
dc.subject | De-anonymization attacks | en_US |
dc.subject | Counter-forensics | en_US |
dc.subject | Digital camera identification | en_US |
dc.subject | Sensor | en_US |
dc.subject | Computer science | en_US |
dc.subject | Engineering | en_US |
dc.subject | Anonymization | en_US |
dc.subject | Content-aware | en_US |
dc.subject | Deanonymization | en_US |
dc.subject | Photoresponse nonuniformity | en_US |
dc.subject | PRNU noise | en_US |
dc.subject | Seam-carving | en_US |
dc.subject | Source attribution | en_US |
dc.subject | Source attribution techniques | en_US |
dc.subject | Cameras | en_US |
dc.title | Analysis of seam-carving-based anonymization of images against PRNU noise pattern-based source attribution | en_US |
dc.type | Article | en_US |
dc.identifier.wos | 000353290200009 | tr_TR |
dc.identifier.scopus | 2-s2.0-84911191957 | tr_TR |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi | tr_TR |
dc.contributor.department | Uludağ Üniversitesi/Mühendislik Fakültesi/Elektrik Elektronik Mühendisliği Bölümü. | tr_TR |
dc.contributor.orcid | 0000-0002-6200-1717 | tr_TR |
dc.identifier.startpage | 2277 | tr_TR |
dc.identifier.endpage | 2290 | tr_TR |
dc.identifier.volume | 9 | tr_TR |
dc.identifier.issue | 12 | tr_TR |
dc.relation.journal | IEEE Transactions on Information Forensics and Security | en_US |
dc.contributor.buuauthor | Dirik, Ahmet Emir | - |
dc.contributor.researcherid | K-6977-2012 | tr_TR |
dc.relation.collaboration | Yurt dışı | tr_TR |
dc.relation.collaboration | Sanayi | tr_TR |
dc.subject.wos | Computer science, theory & methods | en_US |
dc.subject.wos | Engineering, electrical & electronic | en_US |
dc.indexed.wos | SCIE | en_US |
dc.indexed.scopus | Scopus | en_US |
dc.wos.quartile | Q1 | en_US |
dc.contributor.scopusid | 23033658100 | tr_TR |
dc.subject.scopus | Digital Image; Tampering; Discrete Cosine Transforms | en_US |
Appears in Collections: | Scopus Web of Science |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.