{"title":"On the Obfuscation of Image Sensor Fingerprints","authors":"Marcus Schwarting, T. Burton, Roman V Yampolskiy","doi":"10.1109/GOCICT.2015.21","DOIUrl":null,"url":null,"abstract":"To date, there have been several attempts to utilize sensor noise for device identification and authentication. Most of these developments have taken place in mobile image sensors, accelerometers, and microphones. The ramifications of isolating sensor fingerprints is that any third party, utilizing multiple sources, may effectively track the mobile movements of a user without the use of cookies. Sensor fingerprints, especially that of images, could pose quite a challenge to applications and websites that promise online anonymity in picture sharing. This paper describes the threat potential as well as the required steps to remedy said vulnerability. It then suggests the potential for widespread implementation in a more diverse span of fields.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GOCICT.2015.21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
To date, there have been several attempts to utilize sensor noise for device identification and authentication. Most of these developments have taken place in mobile image sensors, accelerometers, and microphones. The ramifications of isolating sensor fingerprints is that any third party, utilizing multiple sources, may effectively track the mobile movements of a user without the use of cookies. Sensor fingerprints, especially that of images, could pose quite a challenge to applications and websites that promise online anonymity in picture sharing. This paper describes the threat potential as well as the required steps to remedy said vulnerability. It then suggests the potential for widespread implementation in a more diverse span of fields.