Feeds

Boffins discover digital-camera 'fingerprints'

Pictures reveal make and model

Choosing a cloud hosting partner with confidence

If you recently murdered someone and took a picture of the victim as a little memento, you’d be wise to ditch the camera. Because imaging boffins have developed a way of identifying a camera’s particulars from its pictures.

Scientists at the Department of Electrical and Computer Engineering, Polytechnic University, New York said that by retracing the steps each digital camera uses to create a picture, they’re able to identify the make and model of snapper used.

The process involves analysis of a camera’s “demosaicing” image processing software, used to convert the output of the CCD into a photo. Because this software is unique to each camera model, an algorithm can be created to unpick the demosaicing operation, revealing the make and model used.

Mark Pollitt, a former FBI crime lab scientist, told New Scientist that the process could potentially be used to identify when and where a camera was purchased.

Such knowledge would enable police to retrieve security camera footage from a specific camera retailer, which might identify the suspect.

Admittedly, the process isn’t as accurate as the unique stamp made on bullet casings by guns, but tests have shown the process to be around 90 per cent accurate.

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.