"Like snowflakes, no two smartphones are the same. Each device, regardless of the manufacturer or make, can be identified through a pattern of microscopic imaging flaws that are present in every picture they take," said Kui Ren, from University at Buffalo in the US.
"It's kind of like matching bullets to a gun, only we're matching photos to a smartphone camera," said Ren.
The technology could become part of the authentication process - like PIN numbers and passwords - that customers complete at cash registers, ATMs and during online transactions.
Digital cameras are built to be identical. However, manufacturing imperfections create tiny variations in each camera's sensors.
These variations, called photo-response non-uniformity (PRNU), can cause some of sensors' millions of pixels to project colours that are slightly brighter or darker than they should be.
This lack of uniformity forms a systemic distortion in the photo called pattern noise. Extracted by special filters, the pattern is unique for each camera.
PRNU analysis is common in digital forensic science. However, it has not been applied to cybersecurity because extracting it had required analysing 50 photos taken by a camera, and experts though that customers would not be willing to supply that many photos.
As a result, it is possible to match a photo to a smartphone camera using one photo instead of the 50 normally required for digital forensics.
The study discusses how such a system might work. First, a customer registers with a business - such as a bank or retailer - and provides that business with a photo that serves as a reference.
When a customer initiates a transaction, the retailer asks the customer (likely through an app) to photograph two QR codes (a type of barcode) presented on an ATM, cash register or other screen.
The retailer can detect a forgery because the PRNU of the attacker's camera will alter the PRNU component of the photograph.
More tech savvy cybercriminals could potentially remove the PRNU from their device. However, the new protocol can spot this because the QR codes include an embedded probe signal that will be weakened by the removal process.
The transaction is either approved or denied based upon these tests.
Disclaimer: No Business Standard Journalist was involved in creation of this content
You’ve hit your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Access to Exclusive Premium Stories Online
Over 30 behind the paywall stories daily, handpicked by our editors for subscribers


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app