{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T10:39:55Z","timestamp":1770460795326,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T00:00:00Z","timestamp":1644796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T00:00:00Z","timestamp":1644796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Source device identification is an important topic in image forensics since it allows to trace back the origin of an image. Its forensics counterpart is source device anonymization, that is, to mask any trace on the image that can be useful for identifying the source device. A typical trace exploited for source device identification is the photo response non-uniformity (PRNU), a noise pattern left by the device on the acquired images. In this paper, we devise a methodology for suppressing such a trace from natural images without a significant impact on image quality. Expressly, we turn PRNU anonymization into the combination of a global optimization problem in a deep image prior (DIP) framework followed by local post-processing operations. In a nutshell, a convolutional neural network (CNN) acts as a generator and iteratively returns several images with attenuated PRNU traces. By exploiting straightforward local post-processing and assembly on these images, we produce a final image that is anonymized with respect to the source PRNU, still maintaining high visual quality. With respect to widely adopted deep learning paradigms, the used CNN is not trained on a set of input-target pairs of images. Instead, it is optimized to reconstruct output images from the original image under analysis itself. This makes the approach particularly suitable in scenarios where large heterogeneous databases are analyzed. Moreover, it prevents any problem due to the lack of generalization. Through numerical examples on publicly available datasets, we prove our methodology to be effective compared to state-of-the-art techniques.<\/jats:p>","DOI":"10.1186\/s13635-022-00128-7","type":"journal-article","created":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T11:09:56Z","timestamp":1644836996000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["DIPPAS: a deep image prior PRNU anonymization scheme"],"prefix":"10.1186","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2162-9671","authenticated-orcid":false,"given":"Francesco","family":"Picetti","sequence":"first","affiliation":[]},{"given":"Sara","family":"Mandelli","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Bestagini","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Lipari","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Tubaro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,14]]},"reference":[{"key":"128_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J. Luk\u00e1\u0161","year":"2006","unstructured":"J. Luk\u00e1\u0161, J. Fridrich, M. Goljan, Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. (TIFS). 1:, 205\u2013214 (2006).","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"key":"128_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M. Chen","year":"2008","unstructured":"M. Chen, J. Fridrich, M. Goljan, J. Lukas, Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. (TIFS). 3:, 74\u201390 (2008).","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"key":"128_CR3","volume-title":"IEEE International Workshop on Information Forensics and Security","author":"M. Kirchner","year":"2019","unstructured":"M. Kirchner, C. Johnson, in IEEE International Workshop on Information Forensics and Security. SPN-CNN: boosting sensor-based source camera attribution with deep learning (IEEENew York, 2019)."},{"key":"128_CR4","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/LSP.2020.3008855","volume":"27","author":"S. Mandelli","year":"2020","unstructured":"S. Mandelli, D. Cozzolino, P. Bestagini, L. Verdoliva, S. Tubaro, CNN-based fast source device identification. IEEE Signal Process. Lett.27:, 1285\u20131289 (2020).","journal-title":"IEEE Signal Process. Lett."},{"key":"128_CR5","volume-title":"SPIE Electronic Imaging (EI)","author":"M. Chen","year":"2007","unstructured":"M. Chen, J. Fridrich, M. Goljan, J. Lukas, in SPIE Electronic Imaging (EI). Source digital camcorder identification using sensor photo-response nonuniformity (SPIEBellingham, 2007)."},{"key":"128_CR6","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.diin.2015.01.017","volume":"12","author":"A. Karak\u00fc\u00e7\u00fck","year":"2015","unstructured":"A. Karak\u00fc\u00e7\u00fck, A. E. Dirik, Adaptive photo-response non-uniformity noise removal against image source attribution. J Digit. Investig.12:, 66\u201376 (2015).","journal-title":"J Digit. Investig."},{"key":"128_CR7","volume-title":"IEEE International Conference on Image Processing (ICIP)","author":"H. Zeng","year":"2015","unstructured":"H. Zeng, J. Chen, X. Kang, W. Zeng, in IEEE International Conference on Image Processing (ICIP). Removing camera fingerprint to disguise photograph source (IEEENew York, 2015)."},{"key":"128_CR8","doi-asserted-by":"publisher","first-page":"957","DOI":"10.23919\/EUSIPCO.2018.8553596","volume-title":"2018 26th European Signal Processing Conference (EUSIPCO)","author":"N. Bonettini","year":"2018","unstructured":"N. Bonettini, L. Bondi, D. G\u00fcera, S. Mandelli, P. Bestagini, S. Tubaro, E. J. Delp, in 2018 26th European Signal Processing Conference (EUSIPCO). Fooling PRNU-based detectors through convolutional neural networks (IEEENew York, 2018), pp. 957\u2013961."},{"key":"128_CR9","volume-title":"IS&T\/SPIE Electronic Imaging (EI)","author":"K. Rosenfeld","year":"2009","unstructured":"K. Rosenfeld, H. T. Sencar, in IS&T\/SPIE Electronic Imaging (EI). A study of the robustness of PRNU-based camera identification (SPIEBellingham, 2009)."},{"key":"128_CR10","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s11042-020-09133-9","volume":"80","author":"J. Bernacki","year":"2021","unstructured":"J. Bernacki, On robustness of camera identification algorithms. Multimedia Tools Appl.80:, 921\u2013942 (2021). https:\/\/link.springer.com\/article\/10.1007%2Fs11042-020-09133-9.","journal-title":"Multimedia Tools Appl."},{"key":"128_CR11","doi-asserted-by":"publisher","first-page":"2277","DOI":"10.1109\/TIFS.2014.2361200","volume":"9","author":"A. E. Dirik","year":"2014","unstructured":"A. E. Dirik, H. T. Sencar, N. Memon, Analysis of seam-carving-based anonymization of images against PRNU noise pattern-based source attribution. IEEE Trans. Inf. Forensics Secur. (TIFS). 9:, 2277\u20132290 (2014).","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"key":"128_CR12","volume-title":"IS&T Electronic Imaging (EI)","author":"J. Entrieri","year":"2016","unstructured":"J. Entrieri, M. Kirchner, in IS&T Electronic Imaging (EI). Patch-based desynchronization of digital camera sensor fingerprints (IS&TSpringfield, 2016)."},{"key":"128_CR13","volume-title":"IEEE International Conference on Image Processing (ICIP)","author":"S. Mandelli","year":"2017","unstructured":"S. Mandelli, L. Bondi, S. Lameri, V. Lipari, P. Bestagini, S. Tubaro, in IEEE International Conference on Image Processing (ICIP). Inpainting-based camera anonymization (IEEENew York, 2017)."},{"key":"128_CR14","volume-title":"The IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"D. Ulyanov","year":"2018","unstructured":"D. Ulyanov, A. Vedaldi, V. Lempitsky, in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Deep image prior (IEEENew York, 2018)."},{"key":"128_CR15","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1080\/15567281.2010.531500","volume":"3","author":"T. Gloe","year":"2010","unstructured":"T. Gloe, R. B\u00f6hme, The Dresden image database for benchmarking digital image forensics. J Dig. Forensic Pract.3:, 150\u2013159 (2010).","journal-title":"J Dig. Forensic Pract."},{"key":"128_CR16","doi-asserted-by":"crossref","unstructured":"D. Shullani, M. Fontani, M. Iuliani, O. A. Shaya, A. Piva, Vision: a video and image dataset for source identification. EURASIP J. Inf. Secur.15: (2017). https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-017-0067-2.","DOI":"10.1186\/s13635-017-0067-2"},{"issue":"3","key":"128_CR17","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1109\/18.761332","volume":"45","author":"P. Moulin","year":"1999","unstructured":"P. Moulin, J. Liu, Analysis of multiresolution image denoising schemes using generalized gaussian and complexity priors. IEEE Trans. Inf. Theory. 45(3), 909\u2013919 (1999). https:\/\/doi.org\/10.1109\/18.761332.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"128_CR18","doi-asserted-by":"publisher","first-page":"6164","DOI":"10.1109\/TIP.2020.2988779","volume":"29","author":"T. Tirer","year":"2020","unstructured":"T. Tirer, R. Giryes, Back-projection based fidelity term for ill-posed linear inverse problems. IEEE Trans. Image Process.29:, 6164\u20136179 (2020). https:\/\/doi.org\/10.1109\/TIP.2020.2988779.","journal-title":"IEEE Trans. Image Process."},{"issue":"10","key":"128_CR19","doi-asserted-by":"publisher","first-page":"2305","DOI":"10.1109\/TPAMI.2018.2873610","volume":"41","author":"W. Dong","year":"2019","unstructured":"W. Dong, P. Wang, W. Yin, G. Shi, F. Wu, X. Lu, Denoising prior driven deep neural network for image restoration. IEEE Trans. Patt. Anal. Mach. Intell.41(10), 2305\u20132318 (2019). https:\/\/doi.org\/10.1109\/TPAMI.2018.2873610.","journal-title":"IEEE Trans. Patt. Anal. Mach. Intell."},{"key":"128_CR20","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TIP.2019.2928627","volume":"29","author":"B. Lin","year":"2020","unstructured":"B. Lin, X. Tao, J. Lu, Hyperspectral image denoising via matrix factorization and deep prior regularization. IEEE Trans. Image Process.29:, 565\u2013578 (2020). https:\/\/doi.org\/10.1109\/TIP.2019.2928627.","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"128_CR21","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/TMI.2018.2865356","volume":"38","author":"H. K. Aggarwal","year":"2019","unstructured":"H. K. Aggarwal, M. P. Mani, M. Jacob, Modl: model-based deep learning architecture for inverse problems. IEEE Trans. Med. Imaging. 38(2), 394\u2013405 (2019). https:\/\/doi.org\/10.1109\/TMI.2018.2865356.","journal-title":"IEEE Trans. Med. Imaging"},{"key":"128_CR22","first-page":"234","volume-title":"International Conference on Medical Image Computing and Computer-assisted Intervention","author":"O. Ronneberger","year":"2015","unstructured":"O. Ronneberger, P. Fischer, T. Brox, in International Conference on Medical Image Computing and Computer-assisted Intervention. U-Net: convolutional networks for biomedical image segmentation (SpringerCham, 2015), pp. 234\u2013241."},{"issue":"7","key":"128_CR23","doi-asserted-by":"publisher","first-page":"3142","DOI":"10.1109\/TIP.2017.2662206","volume":"26","author":"K. Zhang","year":"2017","unstructured":"K. Zhang, W. Zuo, Y. Chen, D. Meng, L. Zhang, Beyond a gaussian denoiser: residual learning of deep CNN for image denoising. IEEE Trans. Image Process. (TIP). 26(7), 3142\u20133155 (2017). https:\/\/doi.org\/10.1109\/TIP.2017.2662206.","journal-title":"IEEE Trans. Image Process. (TIP)"},{"issue":"8","key":"128_CR24","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1109\/LSP.2018.2850222","volume":"25","author":"C. Cruz","year":"2018","unstructured":"C. Cruz, A. Foi, V. Katkovnik, K. Egiazarian, Nonlocality-reinforced convolutional neural networks for image denoising. IEEE Signal Process. Lett.25(8), 1216\u20131220 (2018). https:\/\/doi.org\/10.1109\/LSP.2018.2850222.","journal-title":"IEEE Signal Process. Lett."},{"key":"128_CR25","doi-asserted-by":"publisher","unstructured":"F. Kong, F. Picetti, V. Lipari, P. Bestagini, S. Tubaro, in SEG Technical Program Expanded Abstracts 2020. Deep prior-based seismic data interpolation via multi-res U-Net, (2020), pp. 3159\u20133163. https:\/\/doi.org\/10.1190\/segam2020-3426173.1.","DOI":"10.1190\/segam2020-3426173.1"},{"key":"128_CR26","doi-asserted-by":"publisher","unstructured":"S. Mandelli, F. Borra, V. Lipari, P. Bestagini, A. Sarti, S. Tubaro, in SEG Technical Program Expanded Abstracts 2018. Seismic data interpolation through convolutional autoencoder, (2018), pp. 4101\u20134105. https:\/\/doi.org\/10.1190\/segam2018-2995428.1.","DOI":"10.1190\/segam2018-2995428.1"},{"issue":"6","key":"128_CR27","doi-asserted-by":"publisher","first-page":"1856","DOI":"10.1109\/TMI.2019.2959609","volume":"39","author":"Z. Zhou","year":"2020","unstructured":"Z. Zhou, M. M. R. Siddiquee, N. Tajbakhsh, J. Liang, Unet++: redesigning skip connections to exploit multiscale features in image segmentation. IEEE Trans. Med. Imaging. 39(6), 1856\u20131867 (2020). https:\/\/doi.org\/10.1109\/TMI.2019.2959609.","journal-title":"IEEE Trans. Med. Imaging"},{"issue":"6","key":"128_CR28","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1109\/JSTSP.2020.3001502","volume":"14","author":"R. E. Jurdi","year":"2020","unstructured":"R. E. Jurdi, C. Petitjean, P. Honeine, F. Abdallah, Bb-unet: U-Net with bounding box prior. IEEE J. Sel. Top. Signal Process.14(6), 1189\u20131198 (2020). https:\/\/doi.org\/10.1109\/JSTSP.2020.3001502.","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"128_CR29","doi-asserted-by":"publisher","unstructured":"O. Sidorov, J. Y. Hardeberg, in 2019 IEEE\/CVF International Conference on Computer Vision Workshop (ICCVW). Deep hyperspectral prior: single-image denoising, inpainting, super-resolution, (2019), pp. 3844\u20133851. https:\/\/doi.org\/10.1109\/ICCVW.2019.00477.","DOI":"10.1109\/ICCVW.2019.00477"},{"issue":"3","key":"128_CR30","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1190\/INT-2018-0232.1","volume":"7","author":"F. Picetti","year":"2019","unstructured":"F. Picetti, V. Lipari, P. Bestagini, S. Tubaro, Seismic image processing through the generative adversarial network. Interpretation. 7(3), 15\u201326 (2019). https:\/\/doi.org\/10.1190\/INT-2018-0232.1.","journal-title":"Interpretation"},{"key":"128_CR31","doi-asserted-by":"publisher","unstructured":"F. Devoti, C. Parera, A. Lieto, D. Moro, V. Lipari, P. Bestagini, S. Tubaro, in SEG Tech. Program Expanded Abstr. 2019. Wavefield compression for seismic imaging via convolutional neural networks, (2019), pp. 2227\u20132231. https:\/\/doi.org\/10.1190\/segam2019-3216395.1.","DOI":"10.1190\/segam2019-3216395.1"},{"key":"128_CR32","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.neunet.2019.08.025","volume":"121","author":"N. Ibtehaz","year":"2020","unstructured":"N. Ibtehaz, M. S. Rahman, Multiresunet: rethinking the U-Net architecture for multimodal biomedical image segmentation. Neural Netw.121:, 74\u201387 (2020).","journal-title":"Neural Netw."},{"key":"128_CR33","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"C. Szegedy","year":"2015","unstructured":"C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, A. Rabinovich, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Going deeper with convolutions (IEEENew York, 2015)."},{"key":"128_CR34","doi-asserted-by":"publisher","first-page":"2080","DOI":"10.1109\/TIP.2007.901238","volume":"16","author":"K. Dabov","year":"2007","unstructured":"K. Dabov, A. Foi, V. Katkovnik, K. Egiazarian, Image denoising by sparse 3D transform-domain collaborative filtering. IEEE Trans. Image Process. (TIP). 16:, 2080\u20132095 (2007).","journal-title":"IEEE Trans. Image Process. (TIP)"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-022-00128-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13635-022-00128-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-022-00128-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T11:16:11Z","timestamp":1644837371000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-022-00128-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,14]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["128"],"URL":"https:\/\/doi.org\/10.1186\/s13635-022-00128-7","relation":{},"ISSN":["2510-523X"],"issn-type":[{"value":"2510-523X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,14]]},"assertion":[{"value":"9 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2"}}