Detection of face morphing attacks based on PRNU analysis

U Scherhag, L Debiasi, C Rathgeb… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …

Noisescope: Detecting deepfake images in a blind setting

J Pu, N Mangaokar, B Wang, CK Reddy… - Proceedings of the 36th …, 2020 - dl.acm.org
Recent advances in Generative Adversarial Networks (GANs) have significantly improved
the quality of synthetic images or deepfakes. Photorealistic images generated by GANs start …

Reversible PRNU anonymity for device privacy protection based on data hiding

J Li, X Zhang, B Ma, C Qin, C Wang - Expert Systems with Applications, 2023 - Elsevier
In this paper, we propose a method of protecting a device from being identified with the
images captured by it. This method can suppress the device-related fingerprint, ie, PRNU, in …

PNU Spoofing: a menace for biometrics authentication systems?

A Bruno, G Cattaneo, UF Petrillo, P Capasso - Pattern Recognition Letters, 2021 - Elsevier
Abstract The Pixel Non-Uniformity noise (PNU noise, for short) is a characteristic noise of
digital camera sensors that has been originally used a mean to perform Source Camera …

PRNU-based detection of finger vein presentation attacks

B Maser, D Söllinger, A Uhl - 2019 7th International Workshop …, 2019 - ieeexplore.ieee.org
In this work, we evaluated the effectiveness of the Photo Response Non-Uniformity (PRNU)
to detect presentation/spoofing attacks for finger vein imagery. The performance is evaluated …

Smartphone camera de-identification while preserving biometric utility

S Banerjee, A Ross - 2019 IEEE 10th International Conference …, 2019 - ieeexplore.ieee.org
The principle of Photo Response Non Uniformity (PRNU) is often exploited to deduce the
identity of the smartphone device whose camera or sensor was used to acquire a certain …

PRNU anonymous algorithm used for privacy protection in biometric authentication systems

J Li, X Zhang, B Ma, M Yang, C Wang, Y Liu… - … Journal on Semantic …, 2023 - igi-global.com
The photo response non-uniformity (PRNU) is used to connect an image to its source
sensor. In this paper, researchers propose a PRNU anonymity method based on image …

基于 DCT 和维纳滤波的图像 PRNU 匿名算法.

**健, 赵欢欢, 马宾, 王春鹏… - Forensic Science & …, 2024 - search.ebscohost.com
随着智能手机和社交媒体的普及, 图像隐私引起的公共安全问题受到了广泛关注.
犯罪分子可利用图像信息来侵犯他人隐私, 从而进行恶意跟踪和诈骗勒索等活动. 针对该问题 …

[BOOK][B] Digital Image Forensics in the Context of Biometrics

S Banerjee - 2020 - search.proquest.com
Digital image forensics entails the deduction of the origin, history and authenticity of a digital
image. While a number of powerful techniques have been developed for this purpose, much …

Defending Against Misuse of Synthetic Media: Characterizing Real-world Challenges and Building Robust Defenses

J Pu - 2022 - vtechworks.lib.vt.edu
Recent advances in deep generative models have enabled the generation of realistic
synthetic media or deepfakes, including synthetic images, videos, and text. However …