Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?
Abstract
:1. Introduction
1.1. Problem Statement
- 1.
- Social Network Watermarking—Are SNs watermarking our images?In Section 5, we present the results of our experiments to understand whether SNs mark the images being uploaded on their social platforms. The relevance assumed by SN platforms in multiple aspects of daily life makes this a topic of extreme importance; however, it is poorly addressed in the literature. Our findings revealed that, in general, SNs do not perform any watermarking techniques on images. Out of the thirteen SNs analysed, we found that only Facebook changes the metadata associated with images to any extent. We performed extensive tests in order to verify whether these changes can be imputed to a watermarking function.
- 2.
- User-Explicit Watermarking—Can conventional watermarking techniques pass through SNs unaffected?In Section 6, we explore various watermarking algorithms as a tool for reliably marking images to be uploaded on SNs. Existing studies cover a limited number of SN platforms and use low-resolution images, making their assessments incomplete and not reflective of real scenarios where a single user has more than one account on multiple SN platforms. Through our analysis, we found that there is no single watermarking technique that can be successfully used across all of the selected SNs.
- 3.
- User-Unaware Watermarking—Are we unknowingly watermarking our images?Taking inspiration from previous works where researchers exploited sensor imperfections to extract the fingerprint to identify a smartphone [6,7,8], we analysed whether the cameras of smartphones through which images are taken can be used to create a watermark. According to conventional watermarking literature [4], the proposed method is invisible and detectable and belongs to the fragile and blind categories.In practice, the fingerprint of the smartphone camera can be extracted from the images without altering the device. This represents the main contribution of our work, and paves the way for addressing several different crucial subtasks related to SNs such as user profile resolution and multi-factor online authentication. In Section 3, we provide more details about our method. We demonstrate in Section 7 that the proposed method is robust enough, despite the uploading and downloading processes of SNs downgrading the shared images.
1.2. Contributions
- 1.
- Profile Attribution—the task of matching a user profile to the right smartphone within a set of devices through a set of shared images, i.e., case (a) in Figure 1.
- 2.
- Intra-layer User Profile Linking—the task of deciding whether a restricted set of user profiles within the same SN belongs to the same user, i.e., case (b) in Figure 1.
- 3.
- Inter-layer User Profile Linking—as in the previous task, this task attempts to match user profiles that belong to different SNs, i.e., case (c) in Figure 1.
- 4.
- Fake Profile Detection—the task of identifying unauthorized clones of user profiles. This task is a corollary of all the previous tasks, as an untrusted/fake profile can be linked to a verified one using the shared images.
2. Related Works
2.1. Image Watermarking in Social Networks
2.2. Fingerprinting the Smartphone Devices
2.3. User Profile Linking in Social Networks
3. Proposed Approach
4. Experimental Settings
5. Social Network Watermarking
5.1. Preliminary Analysis
5.2. Image Comparison
- Name comparison—This test allowed us to understand whether SNs change the names of uploaded images.
- Full comparison—A full comparison was performed by exploiting the Secure Hash Algorithm version 1 (SHA-1) to find differences between pairs of images. SHA-1 uses an image as input and produces a unique 160-bit message digest. Any change in the content or metadata of the image implies a different digest in the output.
- Content comparison—This test was performed by using a bit by bit comparison of the image’s content, excluding the metadata. The test compared two images in binary representation to highlight the differences between pixels.
- Metadata comparison—Metadata are data providing extra information about one or more aspects of a file. Images’ metadata is specified by the Exchangeable image file format (Exif) standard, which includes information such as time, location, camera settings, descriptions, and copyright information.
- Time test—Images were uploaded and downloaded twice on the same profile after allowing certain period of time to elapse, with the aim of determining whether the added metadata were time-dependent.
- Sharing test—Images were uploaded on profile P and downloaded three times: from P, from P (which had visited P), and from P (which had shared the images on the ”wall”). The aim of this test was to determine whether the added metadata were sharing-dependent.
- Location test—CDN provides digital content from locations closer to the user. As it was unknown which CDN node served a particular request, we used a VPN to repeat the sharing test while forcing one of the two profiles to be located in the following countries: Russia, China, the United States, and the United Kingdom. The aim was to determine whether the added metadata were location-dependent.
6. User-Explicit Watermarking
7. User Unaware Watermarking
7.1. Profile Attribution
7.2. Intra-Layer User Profiles Linking
7.3. Inter-Layer User Profile Linking
8. Discussion
9. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Salehan, M.; Negahban, A. Social networking on smartphones: When mobile phones become addictive. Comput. Hum. Behav. 2013, 29, 2632–2639. [Google Scholar] [CrossRef]
- Rathore, S.; Sharma, P.K.; Loia, V.; Jeong, Y.S.; Park, J.H. Social network security: Issues, challenges, threats, and solutions. Inf. Sci. 2017, 421, 43–69. [Google Scholar] [CrossRef]
- Facebook Inc. Form 10-K Annual Report; Technical Report 001-35551; Securities and Exchange Commission: Washington, DC, USA, 2014. [Google Scholar]
- Cox, I.; Miller, M.; Bloom, J.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography; Morgan Kaufmann: San Francisco, CA, USA, 2007. [Google Scholar]
- Kahng, A.B.; Lach, J.; Mangione-Smith, W.H.; Mantik, S.; Markov, I.L.; Potkonjak, M.; Tucker, P.; Wang, H.; Wolfe, G. Watermarking techniques for intellectual property protection. In Proceedings of the 35th annual Design Automation Conference, Francisco, CA, USA, 15–19 June 1998; pp. 776–781. [Google Scholar]
- Dey, S.; Roy, N.; Xu, W.; Choudhury, R.R.; Nelakuditi, S. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. In Proceedings of the NDSS, San Diego, CA, USA, 23–26 February 2014; Volume 14, pp. 23–26. [Google Scholar]
- Bojinov, H.; Michalevsky, Y.; Nakibly, G.; Boneh, D. Mobile device identification via sensor fingerprinting. arXiv 2014, arXiv:1408.1416. [Google Scholar]
- Das, A.; Borisov, N.; Caesar, M. Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; pp. 441–452. [Google Scholar]
- Bernacki, J. A survey on digital camera identification methods. Forensic Sci. Int. Dig. Investig. 2020, 34, 300983. [Google Scholar] [CrossRef]
- Naskar, R.; Chakraborty, R.S. Reversible Digital Watermarking: Theory and Practices. Synth. Lect. Inf. Secur. Privacy Trust 2014, 5, 130. [Google Scholar] [CrossRef] [Green Version]
- Potdar, V.M.; Han, S.; Chang, E. A survey of digital image watermarking techniques. In Proceedings of the INDIN’05, 2005 3rd IEEE International Conference on Industrial Informatics, Perth, WA, Australia, 10–12 August 2005; pp. 709–716. [Google Scholar]
- Bamatraf, A.; Ibrahim, R.; Salleh, M. Digital watermarking algorithm using LSB. In Proceedings of the 2010 International Conference on Computer Applications and Industrial Electronics (ICCAIE), Kuala Lumpur, Malaysia, 5–8 December 2010; pp. 155–159. [Google Scholar]
- Zeki, A.M.; Abdul Manaf, A. A novel digital watermarking technique based on ISB (Intermediate Significant Bit). World Acad. Sci. Eng. Technol. 2009, 50, 989–996. [Google Scholar]
- Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A. Techniques for data hiding. IBM Syst. J. 1996, 35, 313–336. [Google Scholar] [CrossRef]
- Mishra, A.; Agarwal, C.; Sharma, A.; Bedi, P. Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Syst. Appl. 2014, 41, 7858–7867. [Google Scholar] [CrossRef]
- Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 1997, 6, 1673–1687. [Google Scholar] [CrossRef]
- Kundur, D.; Hatzinakos, D. Digital watermarking using multiresolution wavelet decomposition. In Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, Seattle, WA, USA, 15 May 1998; Volume 5, pp. 2969–2972. [Google Scholar]
- O’Ruanaidh, J.J.; Pun, T. Rotation, Scale and Translation Invariant Digital Image Watermarking. In Proceedings of the International Conference on Image Processing, Santa Barbara, CA, USA, 26–29 October 1997. [Google Scholar]
- Chang, C.C.; Tsai, P.; Lin, C.C. SVD-based digital image watermarking scheme. Pattern Recogn. Lett. 2005, 26, 1577–1586. [Google Scholar] [CrossRef]
- Saravanan, P.; Sreekara, M.; Manikantan, K. Digital Image Watermarking using Daubechies wavelets. In Proceedings of the 2016 3rd International Conference on Signal Processing and Integrated Networks, Noida, India, 11–12 February 2016; pp. 57–62. [Google Scholar]
- Lai, C.C.; Tsai, C.C. Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 2010, 59, 3060–3063. [Google Scholar] [CrossRef]
- Zhang, X.; Yang, Y. A geometric distortion resilient image watermark algorithm based on DFT-SVD. Jisuanji Gongcheng/Comput. Eng. 2006, 32, 120–121. [Google Scholar]
- Ansari, R.; Devanalamath, M.M.; Manikantan, K.; Ramachandran, S. Robust Digital image Watermarking Algorithm in DWT-DFT-SVD domain for color images. In Proceedings of the 2012 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, India, 19–20 October 2012; pp. 1–6. [Google Scholar]
- Olanrewaju, R. Development of Intelligent Digital Watermarking via Safe Region. Ph.D. Thesis, Electrical and Computer Engineering, International Islamic University Malaysia, Kulliyyah of Engineering, Kuala Lumpur, Malaysia, 2011. [Google Scholar]
- Chomphoosang, P.; Zhang, P.; Durresi, A.; Barolli, L. Survey of Trust Based Communications in Social Networks. In Proceedings of the 2011 14th International Conference on Network-Based Information Systems, Tirana, Albania, 7–9 September 2011. [Google Scholar]
- Zigomitros, A.; Papageorgiou, A.; Patsakis, C. Social network content management through watermarking. In Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012; pp. 1381–1386. [Google Scholar]
- Hiney, J.; Dakve, T.; Szczypiorski, K.; Gaj, K. Using Facebook for Image Steganography. In Proceedings of the 2015 10th International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24–27 August 2015; pp. 442–447. [Google Scholar]
- Banos, O.; Lee, S.; Yoon, Y.; Le-Tien, T. A novel watermarking scheme for image authentication in social networks. In Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, Bali, Indonesia, 8–10 January 2015; p. 48. [Google Scholar]
- Thongkor, K.; Mettripun, N.; Pramoun, T.; Amornraksa, T. Image watermarking based on DWT coefficients modification for social networking services. In Proceedings of the 2013 10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Krabi, Thailand, 15–17 May 2013; pp. 1–6. [Google Scholar]
- Lyu, R.; Zhou, J.T.; Sun, W.W.; Dong, L. Reversible Data Hiding over Facebook. Proc. Eng. Technol. Innov. 2017, 7, 25–30. [Google Scholar]
- Singh, A.K.; Kumar, B.; Singh, S.K.; Ghrera, S.; Mohan, A. Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener. Comput. Syst. 2018, 86, 926–939. [Google Scholar] [CrossRef]
- Szczypiorski, K. StegHash: New Method for Information Hiding in Open Social Networks. Int. J. Electron. Telecommun. 2016, 62, 347–352. [Google Scholar] [CrossRef] [Green Version]
- Kurtz, A.; Gascon, H.; Becker, T.; Rieck, K.; Freiling, F. Fingerprinting Mobile Devices Using Personalized Configurations. Proc. Privacy Enhanc. Technol. 2016, 2016, 4–19. [Google Scholar] [CrossRef] [Green Version]
- Velten, M.; Schneider, P.; Wessel, S.; Eckert, C. User identity verification based on touchscreen interaction analysis in web contexts. In Information Security Practice and Experience; Springer: Berlin/Heidelberg, Germany, 2015; pp. 268–282. [Google Scholar]
- Huang, Y.; Zhang, J.; Huang, H. Camera Model Identification With Unknown Models. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2692–2704. [Google Scholar] [CrossRef]
- Baldini, G.; Steri, G. A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components. IEEE Commun. Surv. Tutor. 2017, 19, 1761–1789. [Google Scholar] [CrossRef]
- Van Lanh, T.; Chong, K.S.; Emmanuel, S.; Kankanhalli, M.S. A survey on digital camera image forensic methods. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, Beijing, China, 2–5 July 2007; pp. 16–19. [Google Scholar]
- Van, L.T.; Emmanuel, S.; Kankanhalli, M.S. Identifying source cell phone using chromatic aberration. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, Beijing, China, 2–5 July 2007; pp. 883–886. [Google Scholar]
- Bayram, S.; Sencar, H.; Memon, N.; Avcibas, I. Source camera identification based on CFA interpolation. In Proceedings of the IEEE International Conference on Image Processing 2005, Genoa, Italy, 11–14 September 2005; Volume 3, p. III–69. [Google Scholar]
- Popescu, A.C.; Farid, H. Exposing digital forgeries in color filter array interpolated images. IEEE Trans. Signal Process. 2005, 53, 3948–3959. [Google Scholar] [CrossRef]
- Lukas, J.; Fridrich, J.; Goljan, M. Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 2006, 1, 205–214. [Google Scholar] [CrossRef]
- Goljan, M.; Fridrich, J. Camera identification from cropped and scaled images. In Proceedings of the Electronic Imaging 2008. International Society for Optics and Photonics, San Jose, CA, USA, 28–29 January 2008; p. 68190E. [Google Scholar]
- Castiglione, A.; Cattaneo, G.; De Santis, A. A forensic analysis of images on online Social Networks. In Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, 30 November–2 December 2011; pp. 679–684. [Google Scholar]
- Castiglione, A.; Cattaneo, G.; Cembalo, M.; Petrillo, U.F. Experimentations with source camera identification and Online Social Networks. J. Ambient Intell. Hum. Comput. 2013, 4, 265–274. [Google Scholar] [CrossRef]
- Marra, F.; Poggi, G.; Sansone, C.; Verdoliva, L. Blind PRNU-based image clustering for source identification. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2197–2211. [Google Scholar] [CrossRef]
- Rouhi, R.; Bertini, F.; Montesi, D.; Lin, X.; Quan, Y.; Li, C.T. Hybrid clustering of shared images on Social Networks for digital forensics. IEEE Access 2019, 7, 87288–87302. [Google Scholar] [CrossRef]
- Mohanty, M.; Zhang, M.; Asghar, M.R.; Russello, G. PANDORA: Preserving privacy in PRNU-based source camera attribution. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 1202–1207. [Google Scholar]
- Scherhag, U.; Debiasi, L.; Rathgeb, C.; Busch, C.; Uhl, A. Detection of face morphing attacks based on PRNU analysis. IEEE Trans. Biometr. Behav. Identity Sci. 2019, 1, 302–317. [Google Scholar] [CrossRef]
- Quan, Y.; Li, C.T. On addressing the impact of ISO speed upon PRNU and forgery detection. IEEE Trans. Inf. Forensics Secur. 2020, 16, 190–202. [Google Scholar] [CrossRef]
- Lin, X.; Li, C.T. On Constructing A Better Correlation Predictor For Prnu-Based Image Forgery Localization. In Proceedings of the 2021 IEEE International Conference on Multimedia and Expo (ICME), Shenzhen, China, 5–9 July 2021; pp. 1–6. [Google Scholar]
- Kang, X.; Li, Y.; Qu, Z.; Huang, J. Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 2012, 7, 393–402. [Google Scholar] [CrossRef]
- Goljan, M.; Fridrich, J.; Filler, T. Large scale test of sensor fingerprint camera identification. In Proceedings of the IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, St. Asaph, North Wales, UK, 5–7 June 2009; p. 72540. [Google Scholar]
- Flor, E.; Aygun, R.; Mercan, S.; Akkaya, K. PRNU-based Source Camera Identification for Multimedia Forensics. In Proceedings of the 2021 IEEE 22nd International Conference on Information Reuse and Integration for Data Science (IRI), Las Vegas, NV, USA, 10–12 August 2021; pp. 168–175. [Google Scholar]
- Agreste, S.; De Meo, P.; Ferrara, E.; Piccolo, S.; Provetti, A. Trust networks: Topology, dynamics, and measurements. IEEE Internet Comput. 2015, 19, 26–35. [Google Scholar] [CrossRef]
- Kontaxis, G.; Polakis, I.; Ioannidis, S.; Markatos, E.P. Detecting social network profile cloning. In Proceedings of the 2011 IEEE International Conference on Pervasive Computing and Communications Workshops, Seattle, WA, USA, 21–25 March 2011; pp. 295–300. [Google Scholar]
- Fire, M.; Kagan, D.; Elyashar, A.; Elovici, Y. Friend or foe? Fake profile identification in online Social Networks. Soc. Netw. Anal. Mining 2014, 4, 1–23. [Google Scholar] [CrossRef] [Green Version]
- Conti, M.; Poovendran, R.; Secchiero, M. FakeBook: Detecting fake profiles in on-line Social Networks. In Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), Istanbul, Turkey, 26–29 August 2012; pp. 1071–1078. [Google Scholar]
- Sharma, R.; Magnani, M.; Montesi, D. Investigating the types and effects of missing data in multilayer networks. Proceedings of 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, Paris, France, 25–28 August 2015; pp. 392–399. [Google Scholar]
- Al Mutawa, N.; Baggili, I.; Marrington, A. Forensic analysis of social networking applications on mobile devices. Dig. Investig. 2012, 9, S24–S33. [Google Scholar] [CrossRef]
- Raad, E.; Chbeir, R.; Dipanda, A. User profile matching in Social Networks. In Proceedings of the 2010 13th International Conference on Network-Based Information Systems (NBiS), Takayama, Japan, 14–16 September 2010; pp. 297–304. [Google Scholar]
- Iofciu, T.; Fankhauser, P.; Abel, F.; Bischoff, K. Identifying Users Across Social Tagging Systems. In Proceedings of the ICWSM, Barcelona, Spain, 17–21 July 2011. [Google Scholar]
- Vosecky, J.; Hong, D.; Shen, V.Y. User identification across multiple Social Networks. In Proceedings of the 2009 First International Conference on Networked Digital Technologies, Ostrava, Czech Republic, 28–31 July 2009; pp. 360–365. [Google Scholar]
- Liang, X.; Li, X.; Zhang, K.; Lu, R.; Lin, X.; Shen, X.S. Fully anonymous profile matching in mobile Social Networks. IEEE J. Sel. Areas Commun. 2013, 31, 641–655. [Google Scholar] [CrossRef]
- Bartunov, S.; Korshunov, A.; Park, S.T.; Ryu, W.; Lee, H. Joint link-attribute user identity resolution in online social networks. In Proceedings of the 6th International Conference on Knowledge Discovery and Data Mining, Workshop on Social Network Mining and Analysis, Beijing, China, 12–16 August 2012. [Google Scholar]
- Jain, P.; Kumaraguru, P.; Joshi, A. @ i seek’fb. me’: Identifying users across multiple online social networks. In Proceedings of the 22nd International Conference on World Wide Web, Rio de Janeiro, Brazil, 13–17 May 2013; pp. 1259–1268. [Google Scholar]
- Cortis, K.; Scerri, S.; Rivera, I.; Handschuh, S. An ontology-based technique for online profile resolution. In Proceedings of the International Conference on Social Informatics, Kyoto, Japan, 25–27 November 2013; pp. 284–298. [Google Scholar]
- Goga, O.; Loiseau, P.; Sommer, R.; Teixeira, R.; Gummadi, K.P. On the reliability of profile matching across large online social networks. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, Australia, 10–13 August 2015; pp. 1799–1808. [Google Scholar]
- Peled, O.; Fire, M.; Rokach, L.; Elovici, Y. Entity matching in online Social Networks. In Proceedings of the 2013 International Conference on IEEE Social Computing (SocialCom), Washington, DC, USA, 8–14 September 2013; pp. 339–344. [Google Scholar]
- Rouhi, R.; Bertini, F.; Montesi, D. No matter what images you share, you can probably be fingerprinted anyway. J. Imaging 2021, 7, 33. [Google Scholar] [CrossRef] [PubMed]
- Weickert, J. Anisotropic Diffusion in Image Processing; Teubner Stuttgart: Stuttgart, Germany, 1998; Volume 1. [Google Scholar]
- Perona, P.; Malik, J. Scale-space and edge detection using anisotropic diffusion. IEEE Trans. Pattern Anal. Mach. Intell. 1990, 12, 629–639. [Google Scholar] [CrossRef] [Green Version]
- Dabov, K.; Foi, A.; Katkovnik, V.; Egiazarian, K. Image denoising with block-matching and 3D filtering. In Proceedings of the Electronic Imaging 2006, International Society for Optics and Photonics, San Jose, CA, USA, 16–17 January 2006; p. 606414. [Google Scholar]
- Donoho, D.L. De-noising by soft-thresholding. IEEE Trans. Inf. Theory 1995, 41, 613–627. [Google Scholar] [CrossRef] [Green Version]
- Donoho, D.L.; Johnstone, I.M. Adapting to unknown smoothness via wavelet shrinkage. J. Am. Stat. Assoc. 1995, 90, 1200–1224. [Google Scholar] [CrossRef]
- Mayer, M.A.; Borsdorf, A.; Wagner, M.; Hornegger, J.; Mardin, C.Y.; Tornow, R.P. Wavelet denoising of multiframe optical coherence tomography data. Biomed. Optics Express 2012, 3, 572–589. [Google Scholar] [CrossRef] [Green Version]
- Camera & Imaging Products Association. Exchangeable Image File Format for Digital Still Cameras: Exif Version 2.3; Technical Report CIPA DC-008-2012, JIETA CP-3451C; Camera & Imaging Products Association (CIPA) and Japan Electronics and Information Technology Industries Association (JEITA): Tokyo, Japan, 2010. [Google Scholar]
- Hempstalk, K. Hiding behind corners: Using edges in images for better steganography. In Proceedings of the Proc. Computing Women’s Congress, Hamilton, New Zealand, 11–13 February 2006; Volume 14. [Google Scholar]
- Westfeld, A. F5—A steganographic algorithm. In Proceedings of the Information Hiding, Pittsburgh, PA, USA, 25–27 April 2001; pp. 289–302. [Google Scholar]
- Sloan, T.; Hernandez-Castro, J. Steganalysis of Openpuff through atomic concatenation of mp4 flags. Dig. Investig. 2015, 13, 15–21. [Google Scholar] [CrossRef]
- Vaidya, S. OpenStego v0.7.0. 2014. Available online: http://www.openstego.com/ (accessed on 10 April 2022).
- Campbell-Moore, O. An Error-Resistant Steganography Algorithm for Communicating Secretly on Facebook. Master’s Thesis, Department of Computer Science, Oxford University, Oxford, UK, 2013. [Google Scholar]
- Chorein, A. SilentEye v0.4. 2014. Available online: https://github.com/achorein/silenteye (accessed on 10 April 2022).
- Reddy, V.L.; Subramanyam, A.; Reddy, P.C. SteganPEG Steganography+ JPEG. In Proceedings of the 2011 International Conference on Ubiquitous Computing and Multimedia Applications (UCMA), Daejeon, Korea, 13–15 April 2011; pp. 42–48. [Google Scholar]
- Hetzl, S. Steghide v0.5.1. 2003. Available online: http://steghide.sourceforge.net/index.php (accessed on 10 April 2022).
- Bertini, F.; Sharma, R.; Iannì, A.; Montesi, D. Profile resolution across multilayer networks through smartphone camera fingerprint. In Proceedings of the 19th International Database Engineering & Applications Symposium, Yokohama, Japan, 13–15 July 2015; pp. 23–32. [Google Scholar]
- Akshatha, K.; Karunakar, A.K.; Anitha, H.; Raghavendra, U.; Shetty, D. Digital camera identification using PRNU: A feature based approach. Dig. Investig. 2016, 19, 69–77. [Google Scholar] [CrossRef]
- Alles, E.J.; Geradts, Z.J.; Veenman, C.J. Source camera identification for low resolution heavily compressed images. In Proceedings of the 2008 International Conference on Computational Sciences and Its Applications, Washington, DC, USA, 30 June–3 July 2008; pp. 557–567. [Google Scholar]
- Valsesia, D.; Coluccia, G.; Bianchi, T.; Magli, E. User authentication via PRNU-based physical unclonable functions. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1941–1956. [Google Scholar] [CrossRef]
- Lee, Y.; Li, J.; Kim, Y. MicPrint: Acoustic sensor fingerprinting for spoof-resistant mobile device authentication. In Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Houston, TX, USA, 12–14 November 2019; pp. 248–257. [Google Scholar]
ID | Social Networks | Image Sizes |
---|---|---|
SN01 | 2048 × 1152 | |
SN02 | Flickr | 2048 × 1152 |
SN03 | Google Currents | 2048 × 1152 |
SN04 | 1080 × 1080 | |
SN05 | 2048 × 1152 | |
SN06 | 2048 × 1152 | |
SN07 | Telegram | 1280 × 720 |
SN08 | Tumblr | 1280 × 720 |
SN09 | 2048 × 1152 | |
SN10 | Viber | 1280 × 720 |
SN11 | VK | 2560 × 1440 |
SN12 | 1280 × 720 | |
SN13 | 1600 × 1200 |
ID | Brand | Model | Front Camera | Rear Camera |
---|---|---|---|---|
1 | Apple | iPhone 6 | 1280 × 960 | 3264 × 2448 |
2 | Apple | iPhone 6 Plus | 1280 × 960 | 3264 × 2448 |
3 | LG | Nexus 5 | 1280 × 960 | 3264 × 2448 |
4 | LG | Nexus 5 | 1280 × 960 | 3264 × 2448 |
5 | Samsung | Galaxy S2 | 1600 × 1200 | 3264 × 2448 |
6 | Samsung | Galaxy S2 | 1600 × 1200 | 3264 × 2448 |
SNs | A1 [77] | A2 [77] | A3 [77] | A4 [77] | A5 [77] | A6 [77] | A7 [78] | A8 [79] | A9 [80] | A10 [81] | A11 [82] | A12 [83] | A13 [84] |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | •,•,• | •,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | |
Flickr | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,∘,• | •,•,∘ | •,∘,• |
Google Currents | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,•,• | •,∘,• | •,•,∘ | •,∘,• |
∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | |
∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | |
∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | •,∘,• | ∘,∘,∘ | ∘,∘,∘ | |
Telegram | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | •,∘,• | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | •,∘,• | ∘,∘,∘ | ∘,∘,∘ |
Tumblr | ∘,∘,• | ∘,∘,• | ∘,∘,• | ∘,∘,• | ∘,∘,• | ∘,∘,• | •,∘,• | •,•,• | •,•,• | •,•,• | •,∘,• | ∘,∘,∘ | ∘,∘,• |
∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | •,∘,• | ∘,∘,∘ | ∘,∘,∘ | |
Viber | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,• | •,•,• | ∘,∘,∘ | •,•,• | ∘,∘,• | ∘,∘,∘ | ∘,∘,∘ |
VK | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | •,∘,• | •,∘,• | ∘,∘,∘ | ∘,∘,∘ | •,∘,• | ∘,∘,∘ | •,∘,∘ |
∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,• | •,•,• | ∘,∘,∘ | •,•,• | ∘,∘,• | ∘,∘,∘ | ∘,∘,∘ | |
∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | ∘,∘,∘ | •,∘,• | ∘,∘,∘ | ∘,∘,∘ | •,•,• | •,∘,• | ∘,∘,∘ | •,∘,• |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bertini, F.; Sharma, R.; Montesi, D. Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself? J. Imaging 2022, 8, 132. https://doi.org/10.3390/jimaging8050132
Bertini F, Sharma R, Montesi D. Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself? Journal of Imaging. 2022; 8(5):132. https://doi.org/10.3390/jimaging8050132
Chicago/Turabian StyleBertini, Flavio, Rajesh Sharma, and Danilo Montesi. 2022. "Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?" Journal of Imaging 8, no. 5: 132. https://doi.org/10.3390/jimaging8050132
APA StyleBertini, F., Sharma, R., & Montesi, D. (2022). Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself? Journal of Imaging, 8(5), 132. https://doi.org/10.3390/jimaging8050132