SlideShare a Scribd company logo
1 of 27
Seminario Digital Forensics: “ Identificazione di dispositivi  per l’acquisizione di immagini in ambito forense” Irene Amerini Firenze 7.11.2008
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario Digital images  every where ... as a result of a tremendous amount of growth in digital imaging technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario Fake or Photo?
Scenario Problem : digital images or videos are not easily acceptable in a court because it is difficult to establish their integrity, origin, and authorship Solution : Digital Forensic Use : assisting human investigator by giving instruments for the authentication and the analysis of a digital clue turning it in a evidence. Evidence
Digital Forensic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multimedia Forensic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multimedia forensic:  types of problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Forensic Definition : “Use of scientifically derived and proven  methods  toward the preservation, collection, validation, identification,  analysis ,  interpretation , documentation and presentation of  digital evidence  derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.”  ( def. Digital Forensic Research Workshop 2001) Digital evidence  or electronic evidence is any probative information stored or transmitted in digital form.
Source Identification:  the   road map ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Acquisition Process ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methodology -  Lens ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methodology -  CFA ,[object Object],[object Object],demosaicking ,[object Object],[object Object]
Methodology -  Sensor ,[object Object],[object Object]
Methodology -  Sensor ,[object Object],[object Object],[object Object],[object Object],[object Object],PRNU as Fingerprint
Methodology -  Sensor Noise responsible for PRNU   ,[object Object],[object Object],F  denoising filter (wavelet) fingerprint camera ,[object Object],[object Object],[object Object],Imaging Sensor Output Model:
Research Topics ,[object Object],[object Object],[object Object],[object Object]
Research Topics Fuji Nikon Create a fingerprint FP Fuji FP Nikon ,[object Object],Set A Set B
Research Topics Test image Which camera: Fuji,  Nikon model A  or Nikon model B? ,[object Object]
Research Topics ,[object Object],Fuji
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Research Topics M N
Future Trends ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Acquisition Process ,[object Object],[object Object],[object Object]
Decision ,[object Object],[object Object],[object Object]
Methodology -  approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Research Topics ,[object Object],Test image PRNU FP Fuji FP Nikon Modello A correlation PRNU FP Nikon Modello B denoising
Identificazione di dispositivi per l’acquisizione di immagini in ambito forense Ing. Irene Amerini

More Related Content

Similar to LCI - MICC Seminario-Forensics

Digital Image Forensics: camera fingerprint and its robustness
Digital Image Forensics: camera fingerprint and its robustness Digital Image Forensics: camera fingerprint and its robustness
Digital Image Forensics: camera fingerprint and its robustness Francesco Forestieri
 
EC4160-lect 1,2.ppt
EC4160-lect 1,2.pptEC4160-lect 1,2.ppt
EC4160-lect 1,2.pptssuser812128
 
detection and disabling of digital camera
detection and disabling of digital cameradetection and disabling of digital camera
detection and disabling of digital cameraVipin R Nair
 
Ee 417 Senior Design
Ee 417 Senior DesignEe 417 Senior Design
Ee 417 Senior Designcrouchj1
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessmentijsrd.com
 
cseimageprocessingppt-170902095009.pdf
cseimageprocessingppt-170902095009.pdfcseimageprocessingppt-170902095009.pdf
cseimageprocessingppt-170902095009.pdfRaviRenu1
 
Digital stereoscopic imaging (1)
Digital stereoscopic imaging (1)Digital stereoscopic imaging (1)
Digital stereoscopic imaging (1)kamsaliraviteja
 
DIPsadasdasfsdfsdfdfasdfsdfsdgsdgdsfgdfgfdg
DIPsadasdasfsdfsdfdfasdfsdfsdgsdgdsfgdfgfdgDIPsadasdasfsdfsdfdfasdfsdfsdgsdgdsfgdfgfdg
DIPsadasdasfsdfsdfdfasdfsdfsdgsdgdsfgdfgfdgMrVMNair
 
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...journalBEEI
 
Machine vision Application
Machine vision ApplicationMachine vision Application
Machine vision ApplicationAbhishek Sainkar
 
Avoiding privacy in cinema using ir camera (1)
Avoiding privacy in cinema using ir camera (1)Avoiding privacy in cinema using ir camera (1)
Avoiding privacy in cinema using ir camera (1)Shanker Rajendiran
 
Recognizing and Tracking Outdoor Objects by Using Artoolkit Markers
Recognizing and Tracking Outdoor Objects by Using Artoolkit MarkersRecognizing and Tracking Outdoor Objects by Using Artoolkit Markers
Recognizing and Tracking Outdoor Objects by Using Artoolkit MarkersAIRCC Publishing Corporation
 
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERSRECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERSijcsit
 

Similar to LCI - MICC Seminario-Forensics (20)

Digital Signal Processing 2009 - LCI MICC -
Digital Signal Processing 2009  - LCI MICC -Digital Signal Processing 2009  - LCI MICC -
Digital Signal Processing 2009 - LCI MICC -
 
Digital Image Forensics: camera fingerprint and its robustness
Digital Image Forensics: camera fingerprint and its robustness Digital Image Forensics: camera fingerprint and its robustness
Digital Image Forensics: camera fingerprint and its robustness
 
EC4160-lect 1,2.ppt
EC4160-lect 1,2.pptEC4160-lect 1,2.ppt
EC4160-lect 1,2.ppt
 
detection and disabling of digital camera
detection and disabling of digital cameradetection and disabling of digital camera
detection and disabling of digital camera
 
Ee 417 Senior Design
Ee 417 Senior DesignEe 417 Senior Design
Ee 417 Senior Design
 
resumefinal
resumefinalresumefinal
resumefinal
 
Cse image processing ppt
Cse image processing pptCse image processing ppt
Cse image processing ppt
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessment
 
cseimageprocessingppt-170902095009.pdf
cseimageprocessingppt-170902095009.pdfcseimageprocessingppt-170902095009.pdf
cseimageprocessingppt-170902095009.pdf
 
Image Processing ppt
Image Processing pptImage Processing ppt
Image Processing ppt
 
Digital stereoscopic imaging (1)
Digital stereoscopic imaging (1)Digital stereoscopic imaging (1)
Digital stereoscopic imaging (1)
 
DIPsadasdasfsdfsdfdfasdfsdfsdgsdgdsfgdfgfdg
DIPsadasdasfsdfsdfdfasdfsdfsdgsdgdsfgdfgfdgDIPsadasdasfsdfsdfdfasdfsdfsdgsdgdsfgdfgfdg
DIPsadasdasfsdfsdfdfasdfsdfsdgsdgdsfgdfgfdg
 
Unit 3 machine vision
Unit 3 machine vision Unit 3 machine vision
Unit 3 machine vision
 
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
 
30 ball
30 ball30 ball
30 ball
 
Machine vision Application
Machine vision ApplicationMachine vision Application
Machine vision Application
 
Avoiding privacy in cinema using ir camera (1)
Avoiding privacy in cinema using ir camera (1)Avoiding privacy in cinema using ir camera (1)
Avoiding privacy in cinema using ir camera (1)
 
Recognizing and Tracking Outdoor Objects by Using Artoolkit Markers
Recognizing and Tracking Outdoor Objects by Using Artoolkit MarkersRecognizing and Tracking Outdoor Objects by Using Artoolkit Markers
Recognizing and Tracking Outdoor Objects by Using Artoolkit Markers
 
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERSRECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
 
final_project
final_projectfinal_project
final_project
 

Recently uploaded

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

LCI - MICC Seminario-Forensics

  • 1. Seminario Digital Forensics: “ Identificazione di dispositivi per l’acquisizione di immagini in ambito forense” Irene Amerini Firenze 7.11.2008
  • 2.
  • 3.
  • 5. Scenario Problem : digital images or videos are not easily acceptable in a court because it is difficult to establish their integrity, origin, and authorship Solution : Digital Forensic Use : assisting human investigator by giving instruments for the authentication and the analysis of a digital clue turning it in a evidence. Evidence
  • 6.
  • 7.
  • 8.
  • 9. Digital Forensic Definition : “Use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis , interpretation , documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.” ( def. Digital Forensic Research Workshop 2001) Digital evidence or electronic evidence is any probative information stored or transmitted in digital form.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. Identificazione di dispositivi per l’acquisizione di immagini in ambito forense Ing. Irene Amerini

Editor's Notes

  1. Casi di pirateria nelle copisterie: dati 2 file pdf (copie dello stesso docuemtno carteceo) si vuole sapere se sono state scannerizzate dallo stesso scanner e quinid dalla stessa copisteria o da due scanner diversi
  2. AREE Valgono gli stessi principi generali della digital forensics per la trattazione dei reperti digitali: -preservazione dell’originale -acquisizione integra e non ripudiabile -utilizzo di copie di lavoro -documentazione e ripetibilità Data recovery da qualsiasi dispositivo di supporto digitale In primis la computer forensics si occupa del trattamento, della raccolta e della preservazione delle prove digitali Network forensic: Accesso abusivo ad un sistema informatico o telematico Esistenza di sistemi e supporti per la connessione che possono essere interessati (hub, switch, proxy, ecc.). Analizzare file di LOG, software di monitoring, report di IDS, ecc Intercettazione del traffico(sniffing) raccolta del traffico e sua ricostruzione Prouezione occultamento dei dati: accesso ai dati remoti
  3. Parallelo pistola e bossolo Tampering: img digitale oggetto per accusare una persona (macchina di sangue rimossa) Spostare la decisione Ottenere un vantaggio Applicazioni per la sanità (radiografia contraffatta soldi dall’assicurazione)
  4. Classi di prblemi che vengono investigati: -distinguere tipo di marca e modello di un tipo di device (Digital camera, scanner, cell-phone, camcorder) -date 2 img dire se appartengono allo stesso dispositivo -distinguere tra tipi di device: DC vs Scanner DC vs CG DC vc CG vs Scanner
  5. Crypto: il digest è legato strettamente al contenuto e viene definito un particolare formato e non è possibile usarne altri; per ogni midifca fatta sull’immagine il digest cambia.
  6. Lens system: concave e convesse per prevenire aberrazione cromatica e sferica oppure lenti asferiche Auto-esposimetro Auto-focus Unità di stabilizzazione Filtri infrarossi; anti-aliasing filter CFA per produrre un’immagine a colori Sensor: matrice di fotodiodi; quando la luce colpisce il sensore ciascun pixel del sensore generano un segnale proprorzionale all’intensità luminosa che è poi convertita in un segnale digitale con un convertitore analogico-digitale DIP Digital Image Processor
  7. Identificare digital camera Ma anche scanner e computer graphics
  8. Template deterministoco impresso sopra l’immagine PNU (pixel non uniformity) Low frequency defects : rifrazione della luce, particelle di polvere
  9. Y intensità della luce incidente Sigma fattore di guadagno per ottenere il corretto bilanciamento del bianco Gamma gamma correction Video: PRNU fingerprint from a video segment; Scanner: row noise reference pattern
  10. Tutte le righe del pattern noise bidimensionale uguali Segnale viene costruito concatenando queste righe questo degnale è un segnale periodico di periodo M (numero colonne) Ora il segnale così costruito ha N ripetizioni quindi in frequenza avrà dei picchi collocati in NxM/M =N. Qunadi la maggior parte dell’energia di questo segnale sarà posizionata in questi picchi
  11. Lens system: concave e convesse per prevenire aberrazione cromatica e sferica oppure lenti asferiche Auto-esposimetro Auto-focus Unità di stabilizzazione Filtri infrarossi; anti-aliasing filter CFA per produrre un’immagine a colori Sensor: matrice di fotodiodi; quando la luce colpisce il sensore ciascun pixel del sensore generano un segnale proprorzionale all’intensità luminosa che è poi convertita in un segnale digitale con un convertitore analogico-digitale DIP Digital Image Processor