A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
2020 Index IEEE Transactions on Information Forensics and Security Vol. 15
2020
IEEE Transactions on Information Forensics and Security
., +, TIFS 2020 1501-1512 Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication in Reactive Monitoring System. ...
., +, TIFS 2020 2485-2498
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions. ...
G Gait analysis Deep Learning-Based Gait Recognition Using Smartphones in the Wild. ...
doi:10.1109/tifs.2021.3053735
fatcat:eforexmnczeqzdj3sc2j4yoige
Optical identification using physical unclonable functions
[article]
2023
arXiv
pre-print
In this work, the concept of optical identification (OI) based on physical unclonable functions is introduced for the first time, to our knowledge, in optical communication systems and networks. ...
To identify most of the sub-systems of a network, we propose to use the Rayleigh backscattering pattern, which is an optical physical unclonable function and allows to achieve OI with a simple procedure ...
A new approach to PLS is based on the material's physical features, defined by physical unclonable functions (PUFs), in which a physical device provides unique output for a given input [17] . ...
arXiv:2305.02141v1
fatcat:kgxdowjdyjbnhmjto4krdcehwi
Camera Fingerprinting Authentication Revisited
2020
International Symposium on Recent Advances in Intrusion Detection
its user. ...
Based on the collected dataset, we reproduce proposed authentication schemes and uncover caveats not discussed in prior work on authentication. ...
RAW vs JPEG Another camera fingerprint-based authentication protocol was proposed by Valsesia et al. [56] . They also use the PRNU as physical unclonable property. ...
dblp:conf/raid/MaierEMH20
fatcat:zegorezqjjekxe4kuglrqi6zla
Web Photo Source Identification based on Neural Enhanced Camera Fingerprint
[article]
2023
arXiv
pre-print
authentication, investigated evidence verification, etc. ...
Source camera identification of web photos aims to establish a reliable linkage from the captured images to their source cameras, and has a broad range of applications, such as image copyright protection, user ...
We present a PRNU based digital signature based authentication scheme. ...
arXiv:2302.09228v1
fatcat:f4vmointxje7zpkfmwgglz7ovy
Trusted Cameras on Mobile Devices Based on SRAM Physically Unclonable Functions
2018
Sensors
Among the camera identification techniques, Physically Unclonable Functions (PUFs) allow generating unique, distinctive and unpredictable identifiers from the hardware of a device. ...
In this work, we propose a trusted camera based on PUFs and standard cryptographic algorithms. ...
Recent works propose the use of Physically Unclonable Functions (PUFs) to extract bit strings from the response of specific hardware components included in the camera. ...
doi:10.3390/s18103352
fatcat:5vhcjdfeg5h7jnwcsxqwe2e72e
Information Forensics: An Overview of the First Decade
2013
IEEE Access
When security is compromised, intellectual rights are violated, or authenticity is forged, forensic methodologies and tools are employed to reconstruct what has happened to digital content in order to ...
This path of technological evolution has naturally led to a critical issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users ...
Intrinsic features that are difficult to manipulate or duplicate, often known as physically unclonable features (PUF), can be particularly attractive for this forensic task. ...
doi:10.1109/access.2013.2260814
fatcat:l3hs7vh2nzakpkihwmkubh24dy
Recent Advances in Digital Multimedia Tampering Detection for Forensics Analysis
2020
Symmetry
This task has become more complex, especially with the progress of symmetrical and asymmetrical network structures which make their authenticity difficult. ...
In [90] , an effective method was also proposed for tamper detection based on image hashing as well as physical unclonable function (PUF). ...
The pioneer work that estimated the PRNU signal from an image was published in [89] . The absence of PRNU is used as a clue for PRNU-based splicing detection methods. ...
doi:10.3390/sym12111811
fatcat:uhicg3327vexzgyfcx7xprx33a
Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform
2018
Applied Sciences
This paper describes the novel application of the synchrosqueezing transform to the problem of physical layer authentication. ...
This paper addresses the problem of authentication and identification of wireless devices using their physical properties derived from their Radio Frequency (RF) emissions. ...
Photo-Response Non-Uniformity noise
PUF
Physical Unclonable Functions
RAI
Radiometric Identification
RF
Radio Frequency
RF-DNA Radio Frequency DNA
ROC
Receiver Operative Characteristics
SDR ...
doi:10.3390/app8112167
fatcat:6j3qnzvytnfinmlhhe36hcnzx4
Information Forensics and Security: A quarter-century-long journey
[article]
2023
arXiv
pre-print
PRNU-based methods significantly advanced the state-ofthe-art in both source identification and image forgery detection and have been extensively used by law enforcement agencies to analyze both physical ...
Interestingly, the baseline tools developed to tackle this challenge can be revisited to tailor some kind of physically unclonable features (PUF). ...
arXiv:2309.12159v1
fatcat:b63earpxefdkpatbsozfanfvcy
Identity Document and banknote security forensics: a survey
[article]
2019
arXiv
pre-print
Fingerprinting paper surface Low-cost physically unclonable functions (PUFs) are functions to create intrinsic random physical features to identify objects. ...
Currency only holds its value as long as users have confidence in its authenticity to represent goods. ...
arXiv:1910.08993v1
fatcat:6onl6iprozbm3m7r3rea6xlnfq