 Research
 Open access
 Published:
On the information leakage quantification of camera fingerprint estimates
EURASIP Journal on Information Security volume 2021, Article number: 6 (2021)
Abstract
Camera fingerprints based on sensor PhotoResponse NonUniformity (PRNU) have gained broad popularity in forensic applications due to their ability to univocally identify the camera that captured a certain image. The fingerprint of a given sensor is extracted through some estimation method that requires a few images known to be taken with such sensor. In this paper, we show that the fingerprints extracted in this way leak a considerable amount of information from those images used in the estimation, thus constituting a potential threat to privacy. We propose to quantify the leakage via two measures: one based on the Mutual Information, and another based on the output of a membership inference test. Experiments with practical fingerprint estimators on a realworld image dataset confirm the validity of our measures and highlight the seriousness of the leakage and the importance of implementing techniques to mitigate it. Some of these techniques are presented and briefly discussed.
1 Introduction
The PhotoResponse NonUniformity (PRNU) is a multiplicative spatial pattern that is present in every picture taken with a CCD/CMOS imaging device and acts as a unique fingerprint for the sensor itself [1]. The PRNU is due to manufacturing imperfections that cause sensor elements to have minute area differences and thus capture different amounts of energy even under a perfectly uniform light field. The uniqueness of the PRNU has already led to a number of applications in multimedia forensics, both to solve camera identification/attribution problems using images [2] or stabilized videos [3], and to detect inconsistencies that reflect intentional manipulations [4].
Since the PRNU is a very weak signal, its extraction requires the availability of a number (often dozens) of images known to be taken with the camera under analysis. Although several extraction algorithms (both model and datadriven) exist [1, 5], all of them perform some sort of averaging across the residuals obtained by denoising the available images. The most prevalent method [1] performs a further normalization to take into account the multiplicative nature of the PRNU.
Unfortunately, both the ease with which the PRNU can be extracted and the existence of relatively good theoretical models that explain its contribution lead to attacks that are similar in intention to digital forgery attacks in cryptography: the socalled PRNU copy attack plants the fingerprint from a desired camera in an image taken by a different device with the purpose of incriminating someone or merely undermining the credibility of PRNUbased forensics [6].
While the PRNU copy attack can be considered a threat to trust, in this paper we identify risks to privacy by showing that there is substantial information leakage into the PRNU from the images used for its estimation. The existence of this leakage has been already indirectly exploited in the socalled triangle test [7], which is a countermeasure against the copy attack that in order to detect the forgery relies on the high correlation between the PRNU estimate with any of the image residuals used in the estimation. However, to the best of our knowledge, our work, together with its companion paper [8], constitutes the first attempt at quantifying such leakage by proposing two measures: one based on the mutual information, and another based on the success rate of a membership inference test.
To this end, we provide a detailed derivation of a lower bound for the Mutual Information between a given image and the PRNU, as well as two membership inference tests based on the NeymanPearson criterion and the normalized correlation coefficient, respectively. Although we do not explicitly try to recover traces of the images used to extract the PRNU, we show that the leakage is large enough to consider the possibility of recovery a serious threat. In this sense, we remark that images involved in criminal investigations are often of extremely sensitive nature, like in cases involving child abuse and other sexuallyoriented crimes, so the mere existence of this leakage calls for the implementation of effective protection mechanisms of the camera fingerprints that ensure privacy is preserved at all times during investigations.
While in an ideal scenario the PRNU of a device can be extracted from flatfield images (e.g., of a cloudy sky or a white wall) in practice this is only feasible when there is access to the camera under investigation. In this scenario, where the estimated PRNU practically leaks little information (as trivially shown by our theory), different law enforcement agencies (LEAs) may share the estimated fingerprints for crosssearching in databases with no privacy risks. However, there is a growing number of investigations where no access to the device is feasible and the PRNU must be estimated from images “in the wild”. Cases include images retrieved from hard drives, social networks, and criminal networks in the Dark web. As an example, we discuss the following two cases.
Case 1: During the course of an investigation, police from country A (LEA A) have seized a hard drive containing images from unknown sources involving child abuse. As metadata has been wiped off, LEA A uses some PRNU clustering software to find that the images come from three different cameras, for which the corresponding PRNUs can be extracted. After analyzing the contents of one of the clusters, it is found that some of the pictures taken by camera #1 have been shot in country B. LEA A would like to verify if the police of country B (LEA B) have other images from camera #1 or even the device. Exchanging the highlysensitive pictures with LEA B is dismissed for privacy reasons; alternatively, LEA A sends the estimated PRNU on the belief that it entails no privacy infringement. This is rooted in the fact that law enforcement agencies are accustomed to sharing hashes in order to search for crossmatches in databases with images of child exploitation. However, as our work shows, contrary to robust hashes, PRNUs may leak considerable amounts of information that should be treated as private as it may identify the victims.
Case 2: Members of a gang have been exchanging pictures over the Dark Web. Some of them involving the gang leader (and third persons) have been taken by the same camera (itself unavailable), as confirmed by the PRNU. The police would be interested in crawling the social networks in search of other pictures captured by the same device. Due to their very limited computational resources, and convinced that nothing can be inferred from an estimated PRNU, the police outsource the search to a web crawling company. However, the leakage from the PRNU allows the company to infer information about people, places and objects contained in the images acquired by the police. In particular, from the PRNU it is possible to read a car license plate.
As our paper concludes, sharing of PRNU fingerprints should be done only after carefully assessing the risks and considering all the possible remedies, some of which are evaluated and discussed in this paper.
As already pointed out and formalized in [8], existing techniques in the literature can mitigate the contextual residues of images on the PRNU. Examples are: 1) compression schemes and binarization [9–12], which are originally conceived to reduce the computational burden in the estimation process and limit the required storage of the resulting fingerprint; 2) the application of linear filters, as high pass filters (both fixed [13–15] and trainable [16]) and convolutional neural networks for feature extraction [17], which were found to be useful to enforce neural nets to work with noise residuals [5] in both forgery detection [13, 18] and camera attribution [19], and 3) the use of more powerful denoising schemes than the wavelet denoiser. In the present paper, we take a step further in this direction, analyzing empirically the effects of JPEG compression and the use of more powerful denoising schemes, as BM3D [20]. Despite the relative effectiveness of those solutions, we believe that working with encrypted data at all times [21], although yet not entirely practical due to the large amount of computations needed, is the most promising venue in terms of privacy preservation.
Our main contributions in this paper can be summarized as follows.

We derive a model for the fingerprint estimator in terms of the true PRNU and the estimation noise. This model becomes crucial in our two approaches to quantifying the leakage, and is also assumed (but not derived) in [8].

We take a step to model and bound the information leakage in camera fingerprints as the PRNU, based on a waterfilling information theoretic approach.

We propose a membership inference test, which allows to identify the images in a dataset that were used to estimate a given PRNU.

We propose and test empirically some methods to reduce the leakage in practice.

We confirm that information leakage is a serious privacy threat that should be properly assessed before sharing camera fingerprints.

We show that the discovered leakage could be potentially used to detect PRNU copy attacks without resorting to the original images (as is done in the triangle test), since the extracted PRNU will have an underlying structure that will not match that of the host image.
The rest of the paper is organized as follows: in Section 2 we review the basic principles of PRNU extraction; in Section 3 we propose two metrics to quantify the leakage; Section 4 hints at the potential of our discovery to counter injectionbased attacks; Section 5 briefly discusses several approaches to mitigate the leakage; Section 6 contains the results of experiments carried on images taken with popular cameras, and, finally, Section 7 presents our conclusions.
1.1 Notation
Matrices, written in boldface font, represent luminance images. All are assumed to be of size M×N. The pixel in position (m,n) of image X is referred to as X[m,n]. Given two matrices, X and Y, its Hadamard product Z=X∘Y is such that Z[m,n]=X[m,n]·Y[m,n], for all m=1,…,M and n=1,…,N. The Frobenius crossproduct of X and Y is defined as \(\langle \mathbf {X}, \mathbf {Y} \rangle _{F} \doteq \text {tr} \left (\mathbf {X}^{\top } \mathbf {Y}\right)\), where tr(·) denotes trace and T transpose. The allone matrix is denoted by 1. Random variables are written in capital letters, e.g., X, while realizations are in lowercase, e.g., x. Given two random variables X,Y, X→Y means that X converges to Y in probability.
2 Preliminaries
In this paper, we will use the prevalent simplified sensor output model presented in [1] in matrix form:
where Y is the output of the sensor, K is the multiplicative PRNU term, X is the noisefree image and N collects all the nonmultiplicative noise sources.
This PRNU term can be estimated from a set of L images \(\{\mathbf {Y}^{(i)}\}_{i = 1}^{L}\) coming from the same sensor, as shown in Fig. 1 (no deleaking strategy is used in the conventional estimator). Firstly, the noisefree image X^{(i)} is estimated using a denoising filter,^{Footnote 1} and this estimate \(\hat {\mathbf {X}}^{(i)}\) is used to obtain a residual \(\mathbf {W}^{(i)} \doteq \mathbf {Y}^{(i)}\hat {\mathbf {X}}^{(i)}\). Under the assumption of N^{(i)} being composed by i.i.d. samples of a Gaussian process, the Maximum Likelihood (ML) estimator of K reduces to:
where \(\mathbf {R} \doteq {\sum _{i = 1}^{L}\hat {\mathbf {X}}^{(i)} \circ \hat {\mathbf {X}}^{(i)}}\), and the division is pointwise. Often, the result of this estimation contains nonunique traces left by color interpolation, compression or other systematic errors, that are removed by postprocessing (e.g., zeromeaning and Wiener filtering in the fullDFT domain). Ideally, this PRNU will be a zeromean white Gaussian process with variance \(\sigma _{k}^{2}\), independent of the location within the matrix.
Unfortunately, the denoising process will not perform perfectly. In fact, the denoised image can be more accurately modeled as:
where Δ^{(i)} takes into account the traces of the noisefree image that are left out by the denoising and (1−Ω^{(i)}) models the fraction of the PRNUdependent component that passes through the denoiser. Then, when subtracted to Y^{(i)} and applied to the estimator, we have:
Then, it is easy to show that (4) can be expressed as
where \(\mathbf {\Omega } \doteq \left (\sum _{i = 1}^{L} \mathbf {\Omega }^{(i)}\circ \hat {\mathbf {X}}^{(i)} \circ \mathbf {X}^{(i)}\right) / \ \mathbf {R}\) is a function of the used images, which takes into account the amount of PRNU removed in the denoising process, and N_{k} is estimation noise that depends on both \(\left \{\mathbf {\Delta }^{(i)}{\circ \hat {\mathbf {X}}^{(i)}}\right \}_{i = 1}^{L}\) and \(\left \{\mathbf {N}^{(i)} \circ \hat {\mathbf {X}}^{(i)}\right \}_{i = 1}^{L}\), which in turn convey contextual information about the images. Experiments reported in [23] show that N_{k} can be wellmodeled by an independent Gaussian process with variance at the (k,l)th position denoted by γ^{2}[k,l].
Figure 2 illustrates a rather extreme case of leakage in which the PRNU of a Xiaomi MI5S smartphone camera is estimated from 25 DNG (uncompressed) images: the one on the left panel plus 24 additional dark images. As becomes evident, there is a lot of information leaking from the first image into the estimated PRNU. Although by no means this experiment describes a realistic case, it does expose that such alarming leaks may well occur in smaller areas of the image. A more downtoearth example is shown in Fig. 3, where the PRNU has been estimated with L=25 images taken with a Nikon D3200 camera (see description of the database in the experimental part), and it visibly contains traces (with semantic meaning) of four images shown in the upper part which were used in the estimation. The bottom panels represent log(1+1/γ^{2}[l,k]), when the local variance γ^{2}[l,k] of \(\hat {\mathbf {K}}\) is estimated through a 9×9 window. The division by γ^{2}[l,k] has the purpose of emphasizing the areas with low local variance whereas the logarithm simply enhances the contrast for visualization purposes. Notice that despite the use of the more sophisticated denoising algorithm BM3D [20] (bottomright panel) as compared to the waveletbased denoising [22] (bottomleft panel), the leakage is still very conspicuous.
A more systematic approach to quantifying those leaks is presented in the next section.
3 Quantifying the leakage
In this section we discuss the two proposed measures to quantify the leakage into the PRNU estimate of the images used for the estimation.
3.1 Informationtheoretic Leakage
The first measure is based on the Mutual Information of the set of images used for the estimation \(\left \{\mathbf {Y}^{(i)}\right \}_{i=1}^{L}\) and the estimated PRNU \(\hat {\mathbf {K}}\), i.e., \(I\left (\left \{\mathbf {Y}^{(i)}\right \}_{i=1}^{L},\hat {\mathbf {K}}\right)\). Since N_{k} is a function of \(\left \{\mathbf {Y}^{(i)}\right \}_{i=1}^{L}\), we can resort to the data processing inequality to show that \(I\left (\left \{\mathbf {Y}^{(i)}\right \}_{i=1}^{L},\hat {\mathbf {K}}\right) \geq I\left (\mathbf {N}_{k},\hat {\mathbf {K}}\right)\). The right hand side is considerably simpler to manage and produces a lower bound on the leakage.
The main difficulty for the calculation of \(I(\mathbf {N}_{k},\hat {\mathbf {K}})\) is the lack of a complete statistical characterization for Ω. It has been proven by Ihara [24] that given a Gaussian process X with covariance K_{x} and a noise process Z with covariance K_{z}, then the mutual information of X and X+Z is minimized when Z is Gaussian with covariance K_{z}. Therefore, for a given covariance matrix of Ω∘K, assuming that such process is Gaussiandistributed with the same covariance will produce a lower bound on the mutual information. Now, since K is assumed to be white, its covariance matrix is \(\sigma _{k}^{2} \mathbf {I}_{MN\times MN}\). Hence, the covariance of Ω∘K will be an MN×MN diagonal matrix with elements \(\omega ^{2}[k,l]\sigma _{k}^{2}\). Then, the lowerbounding scenario corresponds to MN×MN parallel channels, in which the ‘desired’ signal (i.e., N_{k}) is transmitted on each subchannel with power γ^{2}[l,k] and there is an additive Gaussian ’disturbance’ (corresponding to Ω∘K) with power \(\omega ^{2}[k,l]\sigma _{k}^{2}\).
Unfortunately, determining \(\omega ^{2}[k,l]\sigma _{k}^{2}\) turns out to be a difficult problem because even for moderate L, the term N_{k} dominates Ω∘K in (5). One might think of using flatfield images for this purpose, as in this case the contribution of N_{k} would be negligible sooner as L increases. However, this path is not advisable because with flatfield images the contribution of Ω would be lost. Therefore, we must content ourselves with estimating the trace of the covariance matrix of Ω∘K, given by \(P \doteq \sigma _{k}^{2} \sum _{l,j}\omega ^{2}[l,j]\), and then use it to produce a further lower bound on the mutual information. The value P can be seen as the total disturbance power budget that can be split among the different parallel channels in order to minimize the mutual information. Notice that this represents a worst case because in practice \(\sigma _{k}^{2} \omega ^{2}[l,j]\) will deviate at each position (k,l) from such power distribution and the actual leakage will be larger.
The mutual information in this case can be obtained through the use of Lagrange multipliers, which give the following lower bound in nats [25]:
where μ is the solution to the equation
To estimate P, we propose to randomly split the set \(\left \{\mathbf {Y}^{(i)}\right \}_{i = 1}^{L}\) into two subsets and estimate K from each. Let \(\hat {\mathbf {K}}_{1}\), \(\hat {\mathbf {K}}_{2}\) be those estimates. Then, P can be estimated as \(\hat P= \langle \hat {\mathbf {K}}_{1}, \hat {\mathbf {K}}_{2} \rangle _{F}\). A better estimate can be obtained by repeating several times the splitting of \(\left \{\mathbf {Y}^{(i)}\right \}_{i = 1}^{L}\) and averaging the resulting values of \(\hat P\).
In [8] we propose a procedure for the exact computation of the mutual information, based on injecting synthetic signals that serve as pilots for the estimation of Ω. Unfortunately, the fact discussed above that N_{k} dominates Ω∘K requires synthesizing a huge number of signals which make the procedure rather impractical. However, through experiments reported in [8] we were able to show that the lower bound provided here is tight for realworld images, in the sense that it is very close to its true value and, as we have seen, its computation much more affordable. Thus, even though we cannot claim that the lower bound presented here is always a fine approximation to the leakage, it is reasonable to employ it to draw conclusions, especially so when comparing scenarios in which only one subsystem or parameter is changed.
We remark here that the leakage that we have quantified through a lower bound corresponds to the complete set of images \(\left \{\mathbf {Y}^{(i)}\right \}_{i = 1}^{L}\) used for estimating \(\hat {\mathbf {K}}\). This means that we are not quantifying the leakage of a specific image, say, Y^{(j)}, j∈{1,⋯,L}. Such problem, which is more difficult due to the remaining images acting as a sort of interference, will be the subject of a future work.
From the mutual information formulas above it is interesting to reason about the gain produced by increasing L, which is a possible mitigation strategy. Let us assume that for a certain L=L_{0} the lower bound in (6) is \(I^{}_{0}\) and is achieved when μ=μ_{0} in (7). Now, suppose that we double L to 2L_{0}; we are interested in learning by how much the lower bound decreases. First, note that if \(\gamma ^{2}_{0}[l,j]\) denotes the power in the (l,j)th subchannel for L_{0}, then one would expect that when L is doubled, such power is approximately halved, i.e., \(\gamma ^{2}[l,j]=\gamma _{0}^{2}[l,j]/2\). This is due to the fact that γ^{2}[l,j] is the variance of the estimation noise N_{k}, that is expected to go to zero as 1/L. Now, for small \(\gamma _{0}^{2}[l,j]\), for all l,j, Eq. (7) is approximately solved as
and the lower bound in nats approximately becomes
If we assume that now \(\gamma [l,j]=\gamma _{0}[l,j]/\sqrt {2}\) for all k,l, it is immediate to prove that the approximate solution μ to (7) satisfies μ_{0}/2≤μ≤2μ_{0}, where the lower bound is achieved when P→∞ and the upper bound when P=0. Plugging the current γ[l,j] and μ into the approximation for the lower bound and taking into account that the logarithm is strictly increasing, we find that
For any x>0, from the monotonicity of the logarithm we can write log(1+x/2)≥ log(1+x)− log(2). Then, the decrease in the lower bound when \(\gamma [l,j]=\gamma _{0}[l,j]/\sqrt {2}\), written as \(\Delta I^{} \doteq I_{0}^{}I^{}\) in nats can be bounded as follows:
When this change is written in bits per pixel, we arrive at a simple interpretation: whenever L is doubled, the decrease in the leakage is at most 0.5 bits per pixel. As we will confirm in the experimental part, in practice the reduction is more modest, and more so as L keeps increasing (see Fig. 4).
3.2 Membership inference
In the PRNU scenario a membership inference test [26] is a binary hypothesis test that, given a PRNU estimate, classifies a certain image as having been used or not in the estimation. This inference is possible due to the aforementioned leakage: the higher the success rate in the membership inference test, the larger the leakage. It is important to note that the number L of images used in the estimation becomes a key parameter, since as L increases the information provided by the other images will dilute the individual contributions.
The potential recognition of the images used to estimate the PRNU allows any malicious attacker to obtain information about the input database, which may result in privacy risks in certain scenarios. As an example, knowing whether certain images were used to compute the PRNU may aid a convicted criminal in identifying the informant who handed them to law enforcement.
We derive two types of membership detectors: a NeymanPearsonbased (NP) detector and a normalizedcrosscorrelationbased (NCC) detector. Even though the former is expected to perform better due to its statistical properties, along its derivation we will find that it requires information that is not readily available to a potential attacker. Therefore, assuming knowledge of such information leads to a ‘geniebased’ detector which is not practically realizable but is useful as it sets an upper bound on the achievable performance. In contrast, the NCC detector will behave (slightly) worse but is perfectly implementable.
Let Y^{(r)} be the image whose membership we want to test and which is known to contain the true PRNU K. Note that the available observations to implement the test are \(\hat {\mathbf {X}}^{(r)}\), W^{(r)} and \(\hat {\mathbf {K}}\). Then, two hypotheses can be formulated:
where \(\mathbf {Q} \doteq \left (\mathbf {W}^{(r)} \circ \hat {\mathbf {X}}^{(r)}\right) / \mathbf {R}\). The matrix \(\hat {\mathbf {K}}\) can be modeled as having independent zeromean Gaussian elements with variances at position (l,j) denoted by \(\lambda ^{2}_{l, j}\) under the hypothesis \(\mathcal {H}_{0}\) and \(\theta ^{2}_{l, j}\) under the hypothesis \(\mathcal {H}_{1}\).
Let \(\mathbf {P} \doteq \hat {\mathbf {K}}\mathbf {Q}\). Then, applying the NeymanPearson criterion [27], the following test is obtained:
where ψ^{′} is a threshold selected so that a certain probability of false alarm is attained.
In order to implement the test above, the variances \(\lambda _{l, j}^{2}\) and \(\theta _{l, j}^{2}\) are needed for all l,j. They can be computed as the respective local variances at each position of \(\hat {\mathbf {K}}\) and P. Unfortunately, P is only available through Q that in turn requires knowledge of R. Since the latter will be in general unknown to an attacker, the NP detector must be considered only of theoretical interest.
When L is large enough, it is reasonable to assume that \(\theta _{l, j}^{2} \approx \lambda _{l, j}^{2}\), for all l,j. In such case, the test in (14) simplifies to:
Notice from (14) that when L→∞, then \(\mathbf {P} \to \hat {\mathbf {K}}\) and \(\theta _{l, j}^{2} \approx \lambda _{l, j}^{2}\), for all l,j since the information provided by an individual image is less significant. As a consequence, when L→∞ the membership test is equivalent to guessing the outcome of (fair) coin tossing^{Footnote 2}.
Assuming J_{NP} is Gaussian distributed under \(\mathcal {H}_{0}\) with mean μ_{J} and variance \(\sigma ^{2}_{J}\), which is reasonable by invoking the Central Limit Theorem, we obtain the following expression for the probability of false alarm in terms of the threshold ψ^{′},
where \(\mathcal {Q}\left (\cdot \right)\) represents the Qfunction, i.e., \({\mathcal Q}(x)=\frac {1}{\sqrt {2\pi }}\int _{x}^{\infty } e^{t^{2}/2}dt\), and \({\mathcal Q}^{1}(\cdot)\) its inverse function. Then, using the approximation for large L, we know that under \(\mathcal {H}_{0}\) the mean value is given by
while, assuming uncorrelation between all pixels, the variance can be approximated by:
As a realizable alternative to the NP detector, it is possible to resort to the NCC of \(\hat {\mathbf {K}}\) and W^{(r)}, which has been already employed in camera attribution scenarios [28]. This approach relies on the availability of sample estimates of the respective means (\(\hat \mu _{k}\) and \(\hat \mu _{t}\)) and variances (\(\hat \sigma _{k}^{2}\) and \(\hat \sigma _{t}^{2}\)) of \(\hat {\mathbf {K}}\) and W^{(r)}. The resulting detection statistic becomes
4 Potential in detecting PRNUcopy attacks
One wellknown countermeasure against PRNUcopy attacks is the triangle test that assumes the existence of a public set of images from which some have been used to extract the PRNU that is planted in the target image. The test looks for high correlations between the allegedly forged image and the images in the public set. An improved version, the pooled triangle test looks for high joint crosscorrelations between the forged image and some subset of the public set.
The triangle test and more so the pooled one, find some difficulties to get them implemented in practice because the camera owner may lose track of her set of public images. However, the existence of leakage in the case of natural images shown here might be useful for detecting the existence of a planted PRNU, independently from the availability of a public set. Indeed, in the residual computed from the forged image, there will be traces of the planted PRNU with an underlying structure that does not match that of the forged image.
With mere illustrative purposes, we have taken the same PRNU shown in Fig. 3 bottomleft, and planted it in the image of Fig. 5a. Then, we have computed the residual Fig. 5b which shows clear traces of the planted PRNU that obviously do not correspond to Fig. 5a. For instance, the vehicle from Fig. 3 topright is still visible in the area of the residual corresponding to the sky. The problem remains when images are JPEGcompressed, because even though the traces of the PRNU may dissipate with compression, the leakage in the estimated PRNU is harder to eliminate (see Section 6). This is illustrated in Fig. 5c, where all intervening images (i.e., those used to extract the PRNU and the host image on which it is planted) are JPEGcompressed with QF=92.
A more systematic approach to exploiting leakage towards PRNUcopy detection is out of the scope of this paper. In any case, the fact that traces of the copied PRNU will be more easily found in flat regions of the target image suggests that a deep neural network trained with residuals coming from both pristine and forged images would be a feasible detector.
Finally, we remark that leakage mitigation techniques, to be discussed in the following Section should be able to reduce the probability of success of such a detector.
5 Leakage mitigation
Given the privacy risks that PRNU leakage entails, it is worth considering potential mitigation strategies, some of which are discussed here. We refer the reader to [8] for complementary details. We classify countermeasures in three categories: prevention, ‘deleaking’, and privacy preservation.
Preventive methods aim at conditioning the estimation process so that the resulting PRNU leaks less information. This can be achieved, for instance, by increasing the number of images L whenever possible (see discussion at the end of Section 3.1), maximizing the use of flatfield images, or improving denoising algorithms thus reducing Δ^{(i)} and, consequently, the leakage, as shown in (4). In Section 6 we will present some experimental proof of the leakage reduction afforded by those approaches.
Deleaking methods consist in modifyng the estimated PRNU in a way that has limited loss in the PRNU detection performance, while decreasing the leakage. Examples of this are PRNU compression methods (e.g. [11]), but other possibilities exist, such as highpass filtering in order to mitigate the pollution introduced by the contextual information of images [29] or whitening the estimated PRNU by normalizing by its local standard deviation (i.e., equalizing) at every spatial position. This PRNU equalization offers practically the same detection performance as using the conventional PRNU but consistently decreases the leakage. A detailed treatment of binarization and equalization as deleaking methods is carried out in [8] and, therefore, is not covered in this work.
Finally, another approach is to limit the exposure of the images and the PRNU in the clear using privacypreserving techniques. This is possible by carrying out the PRNU estimation with encrypted images (and producing an encrypted PRNU) and detecting the encrypted PRNUs from encrypted query images [21]. This way, PRNU detection can be seen as a zeroknowledge proof mechanism. Although this is a very promising approach, substantial work is still needed to reduce the computational complexity of the underlying methods so that they become practical.
6 Experiments
6.1 Experimental setup and results
We have carried out experiments to validate our measures on a database of images, all in both TIFF and JPEG formats, taken with several commercially available cameras listed in Table 1. The number of images per camera ranges from 122 (Canon1100D#2) to 316 (Canon1100D#1). We discuss the results separately for the mutual information and the membership inference test.
6.2 Mutual information
In our first experiment, with TIFF images, we have computed the lower bound from (6) (heretofore denoted as Information Leakage Bound, ILB, and measured in bits per pixel, bpp) for two different values of L, namely L=26 and L=50. Denoising is carried out using the waveletbased denoiser in [22]. The results, shown in Table 1, correspond to the average ILBs of 10 (resp. 5) runs of the experiment with randomly chosen subsets of size L=26 (resp. L=50).
The decreasing trend with L can be explained by the fact that the disturbance power budget P stays approximately constant, while the ‘desired’ signal N_{k} reduces its power with L. In fact, notice that, as L→∞ the term N_{k} is expected to go to zero due to the law of large numbers. The relatively small ILBs observed for the Canon 600D camera are conjectured to be due to the images in the respective dataset being very similar to each other.
Figure 4 (left) better illustrates the decrease of the leakage (as measured by the ILB) with L, as discussed at the end of Section 3.1. The plotted values correspond to the average ILBs of 5 runs of the experiment with randomly chosen subsets of size L. As discussed above, increasing L constitutes an advisable leakage mitigation mechanism that adds to the gains achieved in terms of detection performance. Notice, however, the diminishing returns with L: the leakage reduction from, say, doubling L is larger for smaller values of L. There is an important lesson here: as commercially available cameras increase their resolution, an ever smaller L is required to achieve a certain PRNU detection performance. While this fact is valuable from a practical point of view (often the number of available images in forensic cases is very small), it may be detrimental in terms of leakage, and additional measures may be required.
In order to quantify the impact of using flatfield images, in our next experiment we use DNG images taken with a the camera of a Xiaomi MI5S smartphone to build the following: sets 50brt and 50drk correspond to L=50 images of respectively white and black cardboard, while in sets 49brt+berry and 49drk+berry one of the images is replaced by the one shown in Fig. 2(Left). The corresponding ILBs are given in Table 2.
As we discussed above in connection with the leakage mitigation, by comparing these values with those in Table 1 we can see that the usage of flatfield images tends to reduce leakage substantially. On the other hand, our dark images leak less information than the bright ones. Of course, this leakage does not correspond to perceptually meaningful information. Furthermore, while the inclusion of a nonflat image does not increase the information leakage of bright flatfield images, as the former gets diluted in the latter when averaging, this is not the case for dark images: the new image has a considerable impact on N_{k} and thus contributes to a larger leakage. This is consistent with the empirical observation that it is easier to extract traces from the image in Fig. 2(Left) when averaged with dark images (cf. Fig. 2(Right)).
Table 3 contains the results of repeating the experiment shown in Table 1 but using the BM3D denoising algorithm [20] instead of the waveletbased one. The objective here is to show that a better denoising reduces the leakage. Even though all ILBs are smaller for the BM3D algorithm, the reduction with respect to the waveletbased filter is not as substantial as one would expect, given the additional computational cost that it entails.
6.3 Membership inference
Aiming at testing the ability and accuracy of both NP and NCC membership inference detectors, experiments were performed with PRNUs estimated from subsets of 25 and 50 TIFF images, randomly selected from a set of 190 images captured using the NikonD7000 camera. In Fig. 6 the outputs of the NP and NCC detectors are represented for one such subset. The first 50 samples of the shown sequence correspond to the membership test statistics for those 50 images used to estimate the PRNU. From the results, it is clear that the detector is able to distinguish which images were used to estimate the PRNU in a given dataset.
In the same figure we also show the results of repeating the same process considering PRNUs estimated from randomly chosen sets of 25 TIFF images. As expected, the output of the detectors follows the same trend, but the difference between both levels is now larger, since the individual contributions of each image are less relevant when larger datasets are considered for the estimation.
These results are confirmed by representing the ROC curves for both detectors in Fig. 7 with L = 100 and L = 50, generated using 160 different combinations of TIFF images to obtain the PRNU, selected randomly. From this figure the degradation when L increases is again evident. Besides, the NP detector obtains marginally better results, as expected since it was derived from a likelihood ratio. In Fig. 4 (right) the results for the camera Canon600D are also included. From all our set of cameras, this was the only one in which the membership inference method failed systematically. The reasons why are to be fully researched yet. In any case, these results match those depicted in Table 1, where the lower bound on the mutual information for this camera is the lowest between all the tested devices. The excellent results (from an attacker’s point of view) obtained with the NikonD7000 are also explainable from the ILBs in the table since this particular model exhibits a high ILB. This confirms the existence of a very close relationship between the membership identification and the lower bound expressed in Eq. (6), which we intend to explore in the future.
In Fig. 8 the experiments shown in Fig. 6 were repeated, but considering only L=50 images drawn from a set of 190 JPEG compressed images using a Quality Factor of 92. We focused again on the Nikon D7000. From the results, we can see that both detectors perform similarly in this scenario. These conclusions can be further verified with the ROC curves plotted in Fig. 7a, obtained following the same experimental setup than for the uncompressed case.
In Fig. 7b, the ROC curves following exactly the same procedure as in the previous experiments, but considering the BM3D denoiser instead of the waveletbased approach and TIFF images, are plotted. As we can see from the results, the performance of both detectors decreased, which was expected since the BM3D performs better than the basic wavelet denoiser, removing more contextual information. However, we can see that the test still performs acceptably, showing that improving the denoiser is not the most effective practice to reduce the leakage, and confirming the results obtained with the mutual information.
7 Conclusions
In this paper, the leakage in the PRNU from the database of images used for its estimation is revealed and lowerbounded using a informationtheoretic approach. Experimental results show that this leakage is substantial and thus can entail significant risks to privacy. As a consequence of this leakage, membership identification based on the PRNU becomes possible using NeymanPearson and Correlation based approaches, achieving high accuracy for both detectors. More importantly, the leakage here uncovered calls for a careful risk assessment and additional security and privacy measures when it comes to sharing PRNUfingerprint databases.
Different methods to mitigate the leakage were discussed and experimentally tested. First, we addressed the gain afforded by increasing the number L of images used for the estimation and showed that while effective, this strategy produces diminishing returns. On the one hand, we investigated the option of using JPEG compression as a mean to mitigate this phenomenon, and showed that in practice compression schemes provide few advantages over working with uncompressed images. On the other hand, experiments with the BM3D were also performed. Despite the relative improvement on the obtained results compared with the wavelet denoiser, the results also showed that it is not the most effective way to solve the leakage problem.
This paper is still a first step to model and remove the leakage from the PRNU. Some open problems we expect to tackle in the near future are:

Image database reconstruction. Use machine learning techniques to reconstruct as reliably as possible the image database from the estimated PRNU. This will illustrate even further the threats to privacy and support the use of leakage mitigation techniques.

Datadriven PRNU estimators. Analyze the leakage phenomena on machine learningbased PRNU estimators.

Alternative mitigation methods. Investigate on alternative leakage mitigation techniques, as high pass filters (both fixed and based on learning methods).

Compression schemes. Analyze more aggressive compression schemes, and the tradeoff between leakage mitigation and detection performance.
Availability of data and materials
Data and material are available under request.
Declarations
Notes
This should be reflected in ROC curves as following the ‘lineofchance’, cf. Section 3.2.
Abbreviations
 PRNU:

Photo Response NonUniformity
 NP:

NeymanPearson (test/detector)
 NCC:

Normalized Correlation Coefficient
 ROC:

Receiver Operating Characteristic (curve)
 BM3D:

Block Matching and 3D (filtering)
 JPEG:

Joint Photographic Experts Group
 TIFF:

Tagged Image File Format
 ILB:

Information Lower Bound
 DFT:

Discrete Fourier Transform
 ML:

Maximum Likelihood (estimator)
 CCD:

Charge Coupled Device (camera sensor)
 CMOS:

Complementary MetalOxideSemiconductor (camera sensor)
References
M. Chen, J. Fridrich, M. Goljan, J. Lukas, Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur.3(1), 74–90 (2008).
K. Rosenfeld, H. T. Sencar, in Media Forensics and Security, vol. 7254. A study of the robustness of PRNUbased camera identification (International Society for Optics and PhotonicsSPIE, 2009), p. 72540M.
S. Taspinar, M. Mohanty, N. Memon, in 2016 IEEE International Workshop on Information Forensics and Security (WIFS). Source camera attribution using stabilized video, (2016), pp. 1–6.
P. Korus, J. Huang, MultiScale Analysis Strategies in PRNUBased Tampering Localization. IEEE Trans. Inf. Forensics Secur.12(4), 809–824 (2017).
D. Cozzolino, L. Verdoliva, Noiseprint: A CNNBased Camera Model Fingerprint. IEEE Trans. Inf. Forensics Secur.15:, 144–159 (2020).
T. Gloe, M. Kirchner, A. Winkler, R. Bohm, in 15th ACM Int. Conf. Multimedia. Can we trust digital image forensics? (2007), pp. 78–86.
M. Goljan, J. Fridrich, M. Chen, Defending against fingerprintcopy attack in sensorbased camera identification. IEEE Trans. Inf. Forensics Secur.6(1), 227–236 (2011).
F. PérezGonzález, S. FernándezMenduiña, in 28th European Signal Processing Conference (EUSIPCO). PRNUleaks: facts and remedies, (2021), pp. 720–724. https://doi.org/10.23919/Eusipco47968.2020.9287451.
L. Bondi, F. PérezGonzález, P. Bestagini, S. Tubaro, in 2017 IEEE Workshop on Information Forensics and Security (WIFS). Design of projection matrices for PRNU compression, (2017), pp. 1–6.
L. Bondi, P. Bestagini, F. PerezGonzalez, S. Tubaro, Improving PRNU compression through preprocessing, quantization, and coding. IEEE Trans. Inf. Forensics Secur.14(3), 608–620 (2018).
S. Bayram, H. T. Sencar, N. Memon, Efficient sensor fingerprint matching through fingerprint binarization. IEEE Trans. Inf. Forensics Secur.7(4), 1404–1413 (2012).
D. Valsesia, G. Coluccia, T. Bianchi, E. Magli, Compressed fingerprint matching and camera identification via random projections. IEEE Trans. Inf. Forensics Secur.10(7), 1472–1485 (2015).
D. Cozzolino, D. Gragnaniello, L. Verdoliva, in 2014 IEEE International Conference on Image Processing (ICIP). Image forgery detection through residualbased local descriptors and blockmatching, (2014), pp. 5297–5301.
Y. Qian, J. Dong, W. Wang, T. Tan, in Media Watermarking, Security, and Forensics 2015, vol. 9409. Deep learning for steganalysis via convolutional neural networks (International Society for Optics and Photonics, 2015), p. 94090J.
Y. Rao, J. Ni, in 2016 IEEE International Workshop on Information Forensics and Security (WIFS). A deep learning approach to detection of splicing and copymove forgeries in images, (2016), pp. 1–6.
Y. Liu, Q. Guan, X. Zhao, Y. Cao, in Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security. Image forgery localization based on multiscale convolutional neural networks, (2018), pp. 85–90.
B. Bayar, M. C. Stamm, in Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. A deep learning approach to universal image manipulation detection using a new convolutional layer, (2016), pp. 5–10.
L. Verdoliva, D. Cozzolino, G. Poggi, in 2014 IEEE international workshop on information forensics and security (WIFS). A featurebased approach for image tampering detection and localization, (2014), pp. 149–154.
F. Marra, G. Poggi, C. Sansone, L. Verdoliva, in International Conference on Image Analysis and Processing. Evaluation of residualbased local features for camera model identification, (2015), pp. 11–18.
K. Dabov, A. Foi, V. Katovnik, K. Egiazarian, Image denoising by sparse 3D transformdomain collaborative filtering. IEEE Trans. Image Proc.16(8), 2080–2095 (2007).
A. PedrouzoUlloa, M. Masciopinto, J. R. TroncosoPastoriza, F. PérezGonzález, in 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Camera attribution forensic analyzer in the encrypted domain, (2018), pp. 1–7.
K. Mihcak, I. Kozintsev, K. Ramchandran, in IEEE Intl. Conf. on Acoustics, Speech and Signal Processing, 6. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising, (1999), pp. 3253–3256.
M. Masciopinto, F. PérezGonzález, in 2018 26th European Signal Processing Conference (EUSIPCO). Putting the PRNU model in reverse gear: Findings with synthetic signals, (2018), pp. 1352–1356.
S. Ihara, On The Capacity Of Channels with Additive Nongaussian Noise. Inf. Control.37(1), 34–39 (1978).
E. A. Jorswieck, H. Boche, Performance Analysis of Capacity of MIMO Systems under Multiuser Interference Based on WorstCase Noise Behavior. EURASIP J. Wirel. Commun. Netw.2004(2), 670321 (2004).
R. Shokri, M. Stronati, C. Song, V. Shmatikov, in 2017 IEEE Symposium on Security and Privacy (SP). Membership Inference Attacks Against Machine Learning Models, (2017), pp. 3–18.
S. M. Kay, Detection Theory (Prentice Hall PTR, Upper Saddle River, 1998).
M. Goljan, J. Fridrich, in Media Watermarking, Security, and Forensics 2012, vol. 8303, ed. by N. D. Memon, A. M. Alattar, and E. J. Delp III. SensorFingerprint Based Identification of Images Corrected for Lens Distortion (SPIE, 2012), pp. 132–144. https://doi.org/10.1117/12.909659.
D. Cozzolino, G. Poggi, L. Verdoliva, in 2015 IEEE International Workshop on Information Forensics and Security (WIFS). Splicebuster: A new blind image splicing detector, (2015), pp. 1–6.
Acknowledgements
GPSC is funded by the Agencia Estatal de Investigación (Spain) and the European Regional Development Fund (ERDF) under project WINTER (TEC201676409C22R). Also funded by Xunta de Galicia and ERDF under projects Agrupación Estratéxica Consolidada de Galicia accreditation 20162019 and Grupo de Referencia ED431C2017/53.
Author information
Authors and Affiliations
Contributions
All authors contributed equally to this manuscript. Both authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
FernándezMenduiña, S., PérezGonzález, F. On the information leakage quantification of camera fingerprint estimates. EURASIP J. on Info. Security 2021, 6 (2021). https://doi.org/10.1186/s13635021001216
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13635021001216