Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/137094
Title: A PUF-based data-device hash for tampered image detection and source camera identification
Authors: Zheng, Yue
Cao, Yuan
Chang, Chip-Hong
Keywords: Engineering::Electrical and electronic engineering
Issue Date: 2019
Source: Zheng, Y., Cao, Y., & Chang, C.-H. (2019). A PUF-based data-device hash for tampered image detection and source camera identification. IEEE Transactions on Information Forensics and Security, 15620-634.
Journal: IEEE Transactions on Information Forensics and Security
Abstract: With the increasing prevalent of digital devices and their abuse for digital content creation, forgeries of digital images and video footage are more rampant than ever. Digital forensics is challenged into seeking advanced technologies for forgery content detection and acquisition device identification. Unfortunately, existing solutions that address image tampering problems fail to identify the device that produces the images or footage while techniques that can identify the camera is incapable of locating the tampered content of its captured images. In this paper, a new perceptual data-device hash is proposed to locate maliciously tampered image regions and identify the source camera of the received image data as a non-repudiable attestation in digital forensics. The presented image may have been either tampered or gone through benign content preserving geometric transforms or image processing operations. The proposed image hash is generated by projecting the invariant image features into a physical unclonable function (PUF)-defined Bernoulli random space. The tamper-resistant random PUF response is unique for each camera and can only be generated upon triggered by a challenge, which is provided by the image acquisition timestamp. The proposed hash is evaluated on the modified CASIA database and CMOS image sensor-based PUF simulated using 180 nm TSMC technology. It achieves a high tamper detection rate of 95.42% with the regions of tampered content successfully located, a good authentication performance of above 98.5% against standard content-preserving manipulations, and 96.25% and 90.42%, respectively, for the more challenging geometric transformations of rotation (0 ∼ 360◦) and scaling (scale factor in each dimension: 0.5). It is demonstrated to be able to identify the source camera with 100% accuracy and is secure against attacks on PUF.
URI: https://hdl.handle.net/10356/137094
ISSN: 1556-6021
DOI: 10.1109/TIFS.2019.2926777
Rights: © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TIFS.2019.2926777
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:EEE Journal Articles

Files in This Item:
File Description SizeFormat 
19TIFS_DD-PUF.pdf6.67 MBAdobe PDFView/Open

SCOPUSTM   
Citations 20

20
Updated on Jan 16, 2023

Web of ScienceTM
Citations 20

16
Updated on Jan 30, 2023

Page view(s)

209
Updated on Feb 2, 2023

Download(s) 20

169
Updated on Feb 2, 2023

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.