Social Network Forensics through Smartphones and Shared Images

被引:4
|
作者
Rouhi, Rahimeh [1 ]
Bertini, Flavio [2 ]
Montesi, Danilo [1 ]
Li, Chang-Tsun [3 ,4 ]
机构
[1] Univ Bologna, Dept Comp Sci & Engn, Bologna, Italy
[2] Univ Bologna, Dept Phys & Astron, Bologna, Italy
[3] Univ Warwick, Dept Comp Sci, Warwick, England
[4] Deakin Univ, Sch Informat Technol, Geelong, Vic, Australia
基金
欧盟地平线“2020”;
关键词
camera sensor pattern noise; smartphone identification; user profile linking; digital investigations; social network; CAMERA; IDENTIFICATION; ALGORITHM;
D O I
10.1109/iwbf.2019.8739237
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The fast growth of Social Networks (SNs), amplified by the ever-increasing use of smartphones, has intensified online cybercrimes. This trend has accelerated digital investigations through SNs. In particular, camera Sensor Pattern Noise (SPN) uniquely characterizing each smartphone has attracted a lot of attention. In this paper, we propose a clustering and classification approach to achieve Smartphone Identification (SI) and User Profiles Linking (UPL) across SNs to provide investigators with significant findings in SN forensics. We test the proposed methods on a dataset of 2,000 images shared on Google+, Facebook, WhatsApp, and Telegram taken by 10 smartphones. The results show the effectiveness of our approach in distinguishing between the same models of the same smartphone brands despite the loss of image detail through the compression process on SNs. The average of sensitivity and specificity values are, respectively, 98.5% and 99.5% for SI and UPL across the SNs.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A cloud-based forensics tracking scheme for online social network clients
    Lin, Feng-Yu
    Huang, Chien-Cheng
    Chang, Pei-Ying
    FORENSIC SCIENCE INTERNATIONAL, 2015, 255 : 64 - 71
  • [42] Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning
    Wu, Haiwei
    Zhou, Jiantao
    Zhang, Xinyu
    Tian, Jinyu
    Sun, Weiwei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 148 - 162
  • [43] Counter-forensics and the geographies of images
    Abbott, Bea
    Lally, Nick
    ENVIRONMENT AND PLANNING D-SOCIETY & SPACE, 2024,
  • [44] Achieving Critical Infrastructure Protection through the Interaction of Computer Security and Network Forensics
    Hunt, Ray
    Slay, Jill
    PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 23 - 30
  • [45] FORENSICS AIDED STEGANALYSIS OF HETEROGENEOUS IMAGES
    Barni, M.
    Cancelli, G.
    Esposito, A.
    2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, : 1690 - 1693
  • [46] Counter-forensics and the geographies of images
    Abbott, Bea
    Lally, Nick
    ENVIRONMENT AND PLANNING D-SOCIETY & SPACE, 2025, 43 (01): : 51 - 69
  • [47] Social influence through consensus: Advertising with shared attitudes
    Erb, HP
    ZEITSCHRIFT FUR SOZIALPSYCHOLOGIE, 1998, 29 (02): : 156 - 164
  • [48] Shared reality through social tuning of implicit prejudice
    Skorinko, Jeanine L. M.
    Sinclair, Stacey
    CURRENT OPINION IN PSYCHOLOGY, 2018, 23 : 109 - 112
  • [49] Identifying Shared Software Components to Support Malware Forensics
    Ruttenberg, Brian
    Miles, Craig
    Kellogg, Lee
    Notani, Vivek
    Howard, Michael
    LeDoux, Charles
    Lakhotia, Arun
    Pfeffer, Avi
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2014, 2014, 8550 : 21 - 40
  • [50] Towards Designing Shared Digital Forensics Instructional Materials
    Xu, Weifeng
    Deng, Lin
    Xu, Dianxiang
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 117 - 122