Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








10 Hits in 3.3 sec

2020 Index IEEE Transactions on Information Forensics and Security Vol. 15

2020 IEEE Transactions on Information Forensics and Security  
., +, TIFS 2020 1501-1512 Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication in Reactive Monitoring System.  ...  ., +, TIFS 2020 2485-2498 TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions.  ...  G Gait analysis Deep Learning-Based Gait Recognition Using Smartphones in the Wild.  ... 
doi:10.1109/tifs.2021.3053735 fatcat:eforexmnczeqzdj3sc2j4yoige

Optical identification using physical unclonable functions [article]

Pantea Nadimi Goki, Stella Civelli, Emanuele Parente, Roberto Caldelli, Thomas Teferi Mulugeta, Nicola Sambo, Marco Secondini, Luca PotÌ
2023 arXiv   pre-print
In this work, the concept of optical identification (OI) based on physical unclonable functions is introduced for the first time, to our knowledge, in optical communication systems and networks.  ...  To identify most of the sub-systems of a network, we propose to use the Rayleigh backscattering pattern, which is an optical physical unclonable function and allows to achieve OI with a simple procedure  ...  A new approach to PLS is based on the material's physical features, defined by physical unclonable functions (PUFs), in which a physical device provides unique output for a given input [17] .  ... 
arXiv:2305.02141v1 fatcat:kgxdowjdyjbnhmjto4krdcehwi

Camera Fingerprinting Authentication Revisited

Dominik Maier, Henrik Erb, Patrick Mullan, Vincent Haupert
2020 International Symposium on Recent Advances in Intrusion Detection  
its user.  ...  Based on the collected dataset, we reproduce proposed authentication schemes and uncover caveats not discussed in prior work on authentication.  ...  RAW vs JPEG Another camera fingerprint-based authentication protocol was proposed by Valsesia et al. [56] . They also use the PRNU as physical unclonable property.  ... 
dblp:conf/raid/MaierEMH20 fatcat:zegorezqjjekxe4kuglrqi6zla

Web Photo Source Identification based on Neural Enhanced Camera Fingerprint [article]

Feng Qian, Sifeng He, Honghao Huang, Huanyu Ma, Xiaobo Zhang, Lei Yang
2023 arXiv   pre-print
authentication, investigated evidence verification, etc.  ...  Source camera identification of web photos aims to establish a reliable linkage from the captured images to their source cameras, and has a broad range of applications, such as image copyright protection, user  ...  We present a PRNU based digital signature based authentication scheme.  ... 
arXiv:2302.09228v1 fatcat:f4vmointxje7zpkfmwgglz7ovy

Trusted Cameras on Mobile Devices Based on SRAM Physically Unclonable Functions

Rosario Arjona, Miguel Prada-Delgado, Javier Arcenegui, Iluminada Baturone
2018 Sensors  
Among the camera identification techniques, Physically Unclonable Functions (PUFs) allow generating unique, distinctive and unpredictable identifiers from the hardware of a device.  ...  In this work, we propose a trusted camera based on PUFs and standard cryptographic algorithms.  ...  Recent works propose the use of Physically Unclonable Functions (PUFs) to extract bit strings from the response of specific hardware components included in the camera.  ... 
doi:10.3390/s18103352 fatcat:5vhcjdfeg5h7jnwcsxqwe2e72e

Information Forensics: An Overview of the First Decade

Matthew C. Stamm, Min Wu, K. J. Ray Liu
2013 IEEE Access  
When security is compromised, intellectual rights are violated, or authenticity is forged, forensic methodologies and tools are employed to reconstruct what has happened to digital content in order to  ...  This path of technological evolution has naturally led to a critical issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users  ...  Intrinsic features that are difficult to manipulate or duplicate, often known as physically unclonable features (PUF), can be particularly attractive for this forensic task.  ... 
doi:10.1109/access.2013.2260814 fatcat:l3hs7vh2nzakpkihwmkubh24dy

Recent Advances in Digital Multimedia Tampering Detection for Forensics Analysis

Sami Bourouis, Roobaea Alroobaea, Abdullah M. Alharbi, Murad Andejany, Saeed Rubaiee
2020 Symmetry  
This task has become more complex, especially with the progress of symmetrical and asymmetrical network structures which make their authenticity difficult.  ...  In [90] , an effective method was also proposed for tamper detection based on image hashing as well as physical unclonable function (PUF).  ...  The pioneer work that estimated the PRNU signal from an image was published in [89] . The absence of PRNU is used as a clue for PRNU-based splicing detection methods.  ... 
doi:10.3390/sym12111811 fatcat:uhicg3327vexzgyfcx7xprx33a

Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform

Gianmarco Baldini, Raimondo Giuliani, Gary Steri
2018 Applied Sciences  
This paper describes the novel application of the synchrosqueezing transform to the problem of physical layer authentication.  ...  This paper addresses the problem of authentication and identification of wireless devices using their physical properties derived from their Radio Frequency (RF) emissions.  ...  Photo-Response Non-Uniformity noise PUF Physical Unclonable Functions RAI Radiometric Identification RF Radio Frequency RF-DNA Radio Frequency DNA ROC Receiver Operative Characteristics SDR  ... 
doi:10.3390/app8112167 fatcat:6j3qnzvytnfinmlhhe36hcnzx4

Information Forensics and Security: A quarter-century-long journey [article]

Mauro Barni and Patrizio Campisi and Edward J. Delp and Gwenael Doërr and Jessica Fridrich and Nasir Memon and Fernando Pérez-González and Anderson Rocha and Luisa Verdoliva and Min Wu
2023 arXiv   pre-print
PRNU-based methods significantly advanced the state-ofthe-art in both source identification and image forgery detection and have been extensively used by law enforcement agencies to analyze both physical  ...  Interestingly, the baseline tools developed to tackle this challenge can be revisited to tailor some kind of physically unclonable features (PUF).  ... 
arXiv:2309.12159v1 fatcat:b63earpxefdkpatbsozfanfvcy

Identity Document and banknote security forensics: a survey [article]

Albert Berenguel Centeno, Oriol Ramos Terrades, Josep Lladós Canet, Cristina Cañero Morales
2019 arXiv   pre-print
Fingerprinting paper surface Low-cost physically unclonable functions (PUFs) are functions to create intrinsic random physical features to identify objects.  ...  Currency only holds its value as long as users have confidence in its authenticity to represent goods.  ... 
arXiv:1910.08993v1 fatcat:6onl6iprozbm3m7r3rea6xlnfq