Social Network Forensics through Smartphones and Shared Images

被引:4
|
作者
Rouhi, Rahimeh [1 ]
Bertini, Flavio [2 ]
Montesi, Danilo [1 ]
Li, Chang-Tsun [3 ,4 ]
机构
[1] Univ Bologna, Dept Comp Sci & Engn, Bologna, Italy
[2] Univ Bologna, Dept Phys & Astron, Bologna, Italy
[3] Univ Warwick, Dept Comp Sci, Warwick, England
[4] Deakin Univ, Sch Informat Technol, Geelong, Vic, Australia
基金
欧盟地平线“2020”;
关键词
camera sensor pattern noise; smartphone identification; user profile linking; digital investigations; social network; CAMERA; IDENTIFICATION; ALGORITHM;
D O I
10.1109/iwbf.2019.8739237
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The fast growth of Social Networks (SNs), amplified by the ever-increasing use of smartphones, has intensified online cybercrimes. This trend has accelerated digital investigations through SNs. In particular, camera Sensor Pattern Noise (SPN) uniquely characterizing each smartphone has attracted a lot of attention. In this paper, we propose a clustering and classification approach to achieve Smartphone Identification (SI) and User Profiles Linking (UPL) across SNs to provide investigators with significant findings in SN forensics. We test the proposed methods on a dataset of 2,000 images shared on Google+, Facebook, WhatsApp, and Telegram taken by 10 smartphones. The results show the effectiveness of our approach in distinguishing between the same models of the same smartphone brands despite the loss of image detail through the compression process on SNs. The average of sensitivity and specificity values are, respectively, 98.5% and 99.5% for SI and UPL across the SNs.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Smartphones Identification Through the Built-In Microphones With Convolutional Neural Network
    Baldini, Gianmarco
    Amerini, Irene
    IEEE ACCESS, 2019, 7 : 158685 - 158696
  • [32] SocICoAP: Social Interaction with supplementary sensors and actuators through CoAP in smartphones
    Martin, Cristian
    Chen, Jaime
    Diaz, Manuel
    Reyna, Ana
    Rubio, Bartolome
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 672 - 677
  • [33] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66
  • [34] Foundation of Network Forensics
    Dobrynin, Andrey V.
    Jacobs, Michael
    Tian, Yuan
    MACROMOLECULES, 2023, 56 (22) : 9289 - 9296
  • [35] Copyright protection of images on a social network
    Kedmenec, Luka
    Poljicak, Ante
    Mandic, Lidija
    2014 56TH INTERNATIONAL SYMPOSIUM ELMAR (ELMAR), 2014, : 179 - 182
  • [36] Trusted Internet Forensics: design of a network forensics appliance
    Bruschi, D.
    Monga, M.
    Rosti, E.
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 35 - 37
  • [37] Social network, social trust and shared goals in organizational knowledge sharing
    Chow, Wing S.
    Chan, Lai Sheung
    INFORMATION & MANAGEMENT, 2008, 45 (07) : 458 - 465
  • [38] IDENTIFICATION OF INPAINTED IMAGES AND NATURAL IMAGES FOR DIGITAL FORENSICS
    Wu Qiong Sun Shaojie Zhu Wei Li Guohui(College of Information System and Management
    Journal of Electronics(China), 2009, 26 (03) : 341 - 345
  • [39] Privacy policies for shared content in social network sites
    Squicciarini, Anna C.
    Shehab, Mohamed
    Wede, Joshua
    VLDB JOURNAL, 2010, 19 (06): : 777 - 796
  • [40] Privacy policies for shared content in social network sites
    Anna C. Squicciarini
    Mohamed Shehab
    Joshua Wede
    The VLDB Journal, 2010, 19 : 777 - 796