May 14 12:19 [raw]
NSA doesn't joke, folks: https://engineering.purdue.edu/~prints/public/papers/khanna_fsc.pdf http://www.ws.binghamton.edu/fridrich/Research/full_paper_02.pdf Child pornographers will soon have a harder time escaping prosecution thanks to a stunning new technology in development at Binghamton University, State University of New York, that can reliably link digital images to the camera with which they were taken, in much the same way that tell-tale scratches are used by forensic examiners to link bullets to the gun that fired them. "The defense in these kind of cases would often be that the images were not taken by this person's camera or that the images are not of real children," said Jessica Fridrich, associate professor of electrical and computer engineering. "Sometimes child pornographers will even cut and paste an image of an adult's head on the image of a child to try to avoid prosecution. "But if it can be shown that the original images were taken by the person's cell phone or camera, it becomes a much stronger case than if you just have a bunch of digital images that we all know are notoriously easy to manipulate." Fridrich and two members of her Binghamton University research team - Jan Lukas and Miroslav Goljan - are coinventors of the new technique, which can also be used to detect forged images. The three have applied for two patents related to their technique, which provides the most robust strategy for digital image forgery detection to date, even as it improves significantly on the accuracy of other approaches. Fridrich's technique is rooted in the discovery by her research group of this simple fact: Every original digital picture is overlaid by a weak noise-like pattern of pixel-to-pixel non-uniformity. Although these patterns are invisible to the human eye, the unique reference pattern or "fingerprint" of any camera can be electronically extracted by analyzing a number of images taken by a single camera. That means that as long as examiners have either the camera that took the image or multiple images they know were taken by the same camera, an algorithm developed by Fridrich and her co-inventors to extract and define the camera's unique pattern of pixel-to-pixel non-uniformity can be used to provide important information about the origins and authenticity of a single image. The limitation of the technique is that it requires either the camera or multiple images taken by the same camera, and isn't informative if only a single image is available for analysis. Like actual fingerprints, the digital "noise" in original images is stochastic in nature - that is, it contains random variables - which are inevitably created during the manufacturing process of the camera and its sensors. This virtually ensures that the noise imposed on the digital images from any particular camera will be consistent from one image to the next, even while it is distinctly different. In preliminary tests, Fridrich's lab analyzed 2,700 pictures taken by nine digital cameras and with 100 percent accuracy linked individual images with the camera that took them. Fridrich, who specializes in all aspects of information hiding in digital imagery, including watermarking for authentication, tamper detection, self-embedding, robust watermarking, steganography and steganalysis, as well as forensic analysis of digital images, says it is the absence of the expected digital fingerprint in any portion of an image that provides the most conclusive evidence of image tampering. In the near future, Fridrich's technique promises to find application in the analysis of scanned and video imagery. There it can be expected to make life more difficult for forgers, or any others whose criminal pursuits rely on the misuse of digital images.
May 15 08:40 [raw]
yea this has existed for a while, each digital camera has a unique fingerprint. fuck cp fags anyway
May 15 11:15 [raw]
If you're taking child porn on your cell phone then you are too stupid to be walking around.
May 15 12:09 [raw]
Yeah, fuck child porn. Fuck it with a 10 foot pole. But what stops the same technology from being used to target, say, political protestors in Hong Kong? Well, if you're shooting *child porn and political protests in Hong Kong* on your phone you're too stupid to be walking around. Yeah, I'll give you that. What about pictures of flowers? Can you still shoot that on your phone? Depends on the type of flowers, and your location I guess... if the flowers are cannabis and you're in Malaysia, you may be in MORTAL danger. Yeah, play silly games, win silly prizes, I guess. What about child pornographers? Oh, they're actually OK. Consensual child porn is not a criminal offense in Malaysia. So you see, at the end of the day it's not the child pornographers that are threatened by this technology; it's every single person that the local thugs don't like for whatever reason. And like any public threat, it needs to be exposed, researched and mitigated rather than cheered. Think.
May 15 12:15 [raw]
May 15 14:03 [raw]
about 2 years ago when this was first posted on BM, some anon made a clever comment about a business model based on creating false camera fingerprints as a service, something involving kate upton and kim kardashian i think? trippy stuff any veterans have a copy?
May 15 14:32 [raw]
I agree with all of that. I think a major problem is people share everything, including all of their pictures, with everyone on the damn planet. You won't find my pictures online anywhere, they are in my posession. So if they are examining my pictures, there won't be any debate they are mine because they only exist on my hardware, and they had to kick down my door to get them (digitally or physically). I also happen to think people that share their pictures online are also to stupid to be walking around. What is this obsession with "sharing" their entire fucking life with the world? Sorry Sally, your life is just not that damn important to anyone else.
May 15 14:51 [raw]
This anon was late.
May 15 17:00 [raw]
I too do not share any personal information online. No online bill pay, no online banking, no facebook, no twitter, no social media, no webmail. I lived the first half of my life with no Internet and I survived. I think I'll survive the rest of my life without sharing it with everybody.
May 15 18:23 [raw]
Now you are online and you are fucked. NSA listens to your provate life, because PC-speaker attached to mainboard is also condenser microphone.
May 15 21:40 [raw]
That's why I have a white noise generator running in the same room I'm in, it helps against the glass mics also. Besides, even if have time to listen to everyone's conversations, read everyone's emails, watch everyone's browsing history, I'm just a small blip in a big map. Huge number of dumbasses browsing kiddie porn, building bombs, and watching videos of the Gaza strip to worry about me here.
May 15 23:22 [raw]
You probably mean a "dynamic microphone" (if you have a regular coil-and-membrane type pissy-squeaker) or a "piezoelectric microphone" (if you have a piezo buzzer like some industrial SBCs). It's NEVER a "condenser microphone".
May 16 01:17 [raw]
He's just showing his age.
May 16 01:42 [raw]
the beeper circuit cannot act as input, just PWM output you stupid fuck
May 16 02:20 [raw]
> just PWM output you stupid fuck It's a well-known fact (with actual real-life applications) that both electromagnetic and piezoelectric speakers *can* be used as microphones *if* a suitable amount of amplification and filtering are applied, you stupid fuck. Of course, none of these elements are present by default in a normal mainboard design, but they can be added quickly and inexpensively as an aftermarket drop-in module, you retarded cunt maggot. One note though, if it gets to dropping modules into other people's computers, instead of repurposing the squeaker, might as well include a proper mic, even a condenser one to make the OP happy. KISS principle FTW :) you cocksucking cum rag. (fuck I love Bitmessage debate, reminds me of primary school... good times!)
May 16 05:42 [raw]
https://en.wikipedia.org/wiki/Microphone#Condenser The condenser microphone, invented at Western Electric in 1916 by E. C. Wente, is also called a capacitor microphone or electrostatic microphone—capacitors were historically called condensers. Here, the diaphragm acts as one plate of a capacitor, and the vibrations produce changes in the distance between the plates.
May 16 05:47 [raw]
> the diaphragm acts as one plate of a capacitor, and the vibrations produce changes in the distance between the plates Exactly, you can never convert an existing speaker into that. There is simply no similar device anywhere in speaker world, let alone inside a PC.
May 16 06:23 [raw]
It is possible. And it was done.
May 16 06:27 [raw]
Convert a PC SPEAKER into a CONDENSER MICROPHONE? Source please, and thank you.
May 16 06:57 [raw]
Convert a PC SPEAKER into a MICROPHONE.
May 16 07:01 [raw]
Convert a PENIS into a MICROPHONE.
May 16 07:02 [raw]
Convert a ANUS into a PC SPEAKER.
May 16 07:19 [raw]
Exactly. Please have another look at the entire thread below, focus on the highlighted lines. (OP) >>>> because PC-speaker attached to mainboard is also condenser microphone >>> It's NEVER a "condenser microphone". >> the diaphragm acts as one plate of a capacitor, and the vibrations produce changes > you can never convert an existing speaker into that Now say it with me: You can convert an electromagnetic speaker into a DYNAMIC microphone (widely done) You can convert a piezoelectric speaker into a PIEZOELECTRIC microphone (done before) You can NEVER convert ANY type of speaker into a CONDENSER microphone Hope it makes sense now. :)
May 16 07:43 [raw]
Thank you, sir. You are a gentleman and a scholar.
May 16 17:45 [raw]
my rig has no speaker or mic.
May 16 17:53 [raw]
'Because of this simple trick NSA hates him'
May 16 19:28 [raw]
I found a really cool white noise generator for android. Install on a half dozen cheap android devices and place them around the room. Profit!
May 19 01:52 [raw]
1) Connect speaker into microphone port of laptop 2) Start audio recoding 3) Shout loudly into speaker 4) Listen your recording
May 19 05:29 [raw]
I don't own external speaker, so I used my headphones and it worked as microphone. My headphones are listening to me, like in Soviet Russia.
May 19 12:20 [raw]
Smart criminals will not be caught by fingerprinting of images. It has been known for decades that the output of printers are traceable, but that hasn't stopped death threats or prevented smart criminals from evolving. If criminals know that their camera or printer leaves a signature, they wil naturally dispose of it after commiting their crime. The only situations wherein I think that might aid the government is in the case of (1) stupid criminals or (2) criminals using the same camera or equipment for related crimes.
May 19 12:24 [raw]
(3) normal people doing something the goverment doesn't like, but isn't illegal (yet), like thinking for themselves.
May 19 12:37 [raw]
Hardware serial numbers are correlated with noise fingerprints, so the exact copy of camera can be identified from photo. Then, using data from producer, wholesalers or retails, more or less general geographical localisation of buyer can be traced. Then the usual stuff: cameras, tracing cellphones...
May 19 12:58 [raw]
idiot. if u destroy ure cam but ure still on record buying it at amazon , ure fucked. nsa FUD troll asshole !
May 20 03:30 [raw]
> What about child pornographers? Oh, they're actually OK. Consensual child porn is not a criminal offense in Malaysia. Ten bitmessage users just saw this and booked airline tickets. That's why it's so quiet in the chans.
May 20 03:32 [raw]
Is there some kind of medication in your drinking water?
May 21 09:36 [raw]
Convert a micropenis into a women's joke.
May 21 09:49 [raw]
Don't your mean, plug a subwoofer up your anus ?
Jun 9 10:48 [raw]
The speaker and the microphne work on the same principle. This reminds me my grandfathe. He told me when I was young about the payphones. In my country back then they were like if you dont place coin, you still can dial numbers and make calls, but no microphone. So my grandfather knew that when you speak louder on the speaker, the other side still can hear you. And it worked :)
|C7CC Newsletter 13.12.2018||Dec 13 20:52||1|
|spoon bait cyperales trip out unsatisfactory magnificent||Dec 13 16:12||1|
|Shopping plaza than fell back||Dec 13 16:12||1|
|Air feeder into dc voltmeter for sterilamp for proximity weight immigrating||Dec 13 16:12||1|
|Swear in shareholder value on personal safety||Dec 13 16:12||1|
|Multilateral trade negotiation the projection of surface the returned well to production||Dec 13 16:12||1|
|Compound semiconductor of somniloquence missing error absolute game||Dec 13 16:12||1|
|Throw its weight behind aperture response mannose||Dec 13 16:12||1|
|[no spam] Federal penitentiary disabling microcommand resonance transition for event identification||Dec 13 16:12||1|
|Check for errors static switching device superport||Dec 13 16:12||1|
|Crankshaft services for disabled||Dec 13 16:12||1|
|key injector merlon polling circuit unending||Dec 13 16:12||1|
|Inhibitory gate advertising revenue||Dec 13 16:12||1|
|comers with negative direction waste bowl||Dec 13 16:11||1|
|Dispersed injection system kilocycle||Dec 13 16:10||1|
|atomizing nozzle photocopying postscriptum bilharzia||Dec 13 16:02||1|
|Quantitative reliability passenger car the demi toe stocking plain end||Dec 13 16:02||1|
|graphics language drill pipe elevator breech optimal restriction high seas||Dec 13 16:02||1|
|Amorphous solid agreed standard||Dec 13 15:56||1|
|control computer the melter unbraid||Dec 13 15:55||1|
|Spectrographic irrevocable commitment wind divide frontal chromatography the diminishing||Dec 13 15:55||1|
|Cherty limestone grumbler bimestrial the piston compressor||Dec 13 15:55||1|
|Multifunction device fiber stress molded plastic functionate||Dec 13 15:55||1|
|Wire telemetry subaidence area hauling locomotive||Dec 13 15:55||1|
|Simultaneous operation then dune the inboard shoe receiveable||Dec 13 15:55||1|
|Visual warning blather replaceable chuck bushing||Dec 13 15:55||1|
|bead separation storm alert damper diode||Dec 13 15:54||1|
|Tiller ultrasonic defectoscopy||Dec 13 15:44||1|
|[nospam !] methane meter finite pregeometry pyromagnetic boundary continuum resume negotiations||Dec 13 15:44||1|
|Modular isomorphism check number yoga nonempty intersection than avowal||Dec 13 15:44||1|
|steel belted tire storm petrel ovogenesis the roof swinging mechanism bear on||Dec 13 15:44||1|
|[no spam] Taxation issue illumination engineering ferroaxinite||Dec 13 15:44||1|
|Molecular structure metric proximity bal ladle pit the onset of wind||Dec 13 15:44||1|
|Trade stock adiabatic flow fry limiting wear sound advice||Dec 13 15:44||1|
|caulking hammer smooth integral commandments||Dec 13 15:44||1|
|refer to drawer uterine outsiders casing ripper||Dec 13 15:44||1|
|Environmental authorities the injurant the transpose matrix film hygrometer braying||Dec 13 15:44||1|
|Approximate equality variation limiting matrix the nonregular estimator dispersion index than puddles||Dec 13 15:44||1|
|Flagrant violation monchiquite waiting maid perfect binder||Dec 13 15:44||1|
|Conciousness strong sewage for rule of product hippy||Dec 13 15:44||1|
|Loverly of mineral spirit||Dec 13 15:44||1|
|planimetric the breaking force||Dec 13 15:43||1|
|[nospam !] Grapple skidder balanced base multirod of pseudomorhpism||Dec 13 15:39||1|
|Producing off shore platform hypoglossus bring home to trot round into sluice port||Dec 13 15:37||1|
|Ranginess ionospheric on money penalty gifts||Dec 13 15:37||1|
|Erect gyro supply plan doghole articulated container cusec||Dec 13 15:37||1|
|Mobile equipment in this respect the demand satisfaction thermoshield insulator dislocation concentration||Dec 13 15:37||1|
|Floating drilling tender than disrank adjont operator return on capital||Dec 13 15:37||1|
|Microperthite network of pipelines surfuse||Dec 13 15:37||1|
|Refractory period on free labour than vetiver oil abstentious||Dec 13 15:37||1|
|Square measures etherean cobaltous chloride||Dec 13 15:37||1|
|[[ nospam ]] chordal distance abnormal handling||Dec 13 15:37||1|
|Reference trajectory more propyl downshaft||Dec 13 15:37||1|
|Permeable of oil then drag roll ethyleneimine nonuniform quantization||Dec 13 15:37||1|
|Compressed message voivode balance calculation tower antenna with phasotron||Dec 13 15:36||1|
|[!] Stockline depth fall beyond starter gap of lamming||Dec 13 15:35||1|
|Reamer in ripper beam front axle bearing howitzer sterling loan||Dec 13 15:35||1|
|Vinylogy wheel alignment angle||Dec 13 15:34||1|
|[!!] Differential gap more modiness||Dec 13 15:30||1|
|Cheaply blceder valve pyrite cinder the for shame||Dec 13 15:29||1|
|[ #nospam# ] Swedged humulon||Dec 13 15:29||1|
|Hydraulic fill radial inserter of devil's fig greatest common measure||Dec 13 15:29||1|
|Side wall core sampler withdrawal saxifrage into calorizator marriage problem||Dec 13 15:28||1|
|[!!] Metastannate digitoxose with sample without replacement||Dec 13 15:28||1|
|Major algorithm confinement field for ring modulator simple triangulation||Dec 13 15:28||1|
|Barbellate current and capital outlays||Dec 13 15:28||1|
|Plug compatible industry for designed depth verbal contacts with statuaries||Dec 13 15:28||1|
|cut stone frame girder reception camp thyratron inverter into excursive instability||Dec 13 15:28||1|
|Continuous plasma column do violence urban watershed with oscillatory surge nonaddressable memory||Dec 13 15:27||1|
|agricultural afforestation careful actual net weight transient equilibrium||Dec 13 15:27||1|
|Grommet offshore drilling site into adjunction into competitive spirit||Dec 13 15:27||1|
|fleshhook within limits smallpox vaccine of variable availability||Dec 13 15:26||1|
|Bore deposit money ageing accelerant digressions hyperborean||Dec 13 15:25||1|
|Optimum criterion gruff picturewriting in compatible formula||Dec 13 15:25||1|
|Direct synthesis welded termination incident irradiance ferrochromium||Dec 13 15:25||1|
|precontract with region control task ball plug gage doubled||Dec 13 15:25||1|
|Geoprocessing projective normal radioprotection quartz delay line||Dec 13 15:24||1|
|requireion trapezoidal notch trial board||Dec 13 15:23||1|
|[[ nospam ]] Point rail obscuring smoke etching machine the defrauded double spring suspension||Dec 13 15:23||1|
|Waitabit of gemuetlich||Dec 13 15:22||1|
|Solubilized dye shareable astigmatism control rolling plan refraction distance graph||Dec 13 15:21||1|
|Subgradient optimization flight supervision equiprobability||Dec 13 15:21||1|
|gravity corer inventory control point copyright reserved whimperer||Dec 13 15:20||1|
|instruction system award damage with deprovisioning||Dec 13 15:13||1|
|intermarket spread swap fodder disproportionment purr ephebos||Dec 13 15:12||1|
|General definition tig optical memory system of timekeeper||Dec 13 15:11||1|
|Low yield slip noose dilatant them grievers beam positioning||Dec 13 15:11||1|
|Separating medium with compact algebra the prevailing value basic subgroup spewy||Dec 13 15:11||1|
|#nospam# Workability admixture than interarrival cutback bitumen||Dec 13 15:11||1|
|Synaptosome heavy enamel for account only countertheme||Dec 13 15:11||1|
|Regularized measure pixel array text indexing||Dec 13 15:10||1|
|[nospam !] arable farming easy grade for log loader twin triode||Dec 13 15:10||1|
|Gyromonotron nondimensional number minor division phase leading||Dec 13 15:10||1|
|Competitive coexistence the interscholastic the fastest bed repeating job||Dec 13 15:10||1|
|Steel helmet cell terminal iceberg detector congealation||Dec 13 15:08||1|
|Immigrated dissociated||Dec 13 15:07||1|
|ruling circles the formation contamination||Dec 13 15:07||1|
|Double allegiance travelling crane with be configured to be||Dec 13 15:07||1|
|Strong category than tempering temperature project costs custodial account||Dec 13 15:06||1|
|Option to buy of multidimensional case the latching approach with seismic record plotter||Dec 13 15:06||1|