I had my Canon DSLR body cleaned at the service centre here in Brampton, ON. When I got it back I noticed it felt different--the shutter sound is more thumpy, and etc. I checked the serial number to check if it was really mine and it was. It's all fine but then months later just by some coincidence I saw a photo on Flickr with my e-mail address in the metatags. Some of my photo buddies warned me that Canon is notorious for swapping parts when your cameras are in for service.
Would it be possible to process the images somehow and find the noise profile for every image and match it with existing images?
When I found a directory full of images and couldn't remember which camera took them, I noticed that there were a few fuzzy pixels of green and red if I zoomed all the way in that were present in all photos taken by that camera. I took a photo of a white wall in a dark room (to force high ISO) with a couple of my cameras and found the one. Of course I found out about the EXIF serial number and other unique data later on, but it could still be useful on sites that store the original image but strip EXIF.
EDIT: The paper I linked above details source identification by recognizing patterns in demosaicing artifacts. In that paper the authors combined the demosaicing fingerprinting with their earlier noise fingerprinting work: http://isis.poly.edu/~forensics/pubs/icme2007.pdf
The "green pixel" in your camera is a hot pixel, probably due to a partially defective sensor. This isn't guaranteed to occur in all (or even a significant number of) cameras.
Not to mention noise is, by definition, high entropy and hard to predict. There are patterns to noise due to sensor design and manufacturing, but that would make it unique to the sensor design, not to a specific copy of it.
I think it could help to add a feature "I've found camera/sd card/other device with photos". Just an anecdotal evidence, but my friend's friend found an iPod with some photos few years ago and couldn't locate the owner. Surely it doesn't happen very often, but if this site gained enough popularity, it could be really helpful.
(1) Various encode/decode steps along to publishing the photo online don't corrupt EXIF data
(2) Thief isn't sophisticated to wipe/disable EXIF data. Many cameras shoot in a proprietary, higher-bit format and give you a fairly obvious wizard option on a desktop tool to include/exclude the EXIF data.
(3) Thief will use the camera, not sell it immediately into a second-hand market.
(4) Even if your camera is supported, it has to be configured to record EXIF data by both you and the thief. Some proprietary formats are fairly raw and don't always include EXIF-derivable data by default.
This will get some adoption because what other option do users have, but it will be interesting to see how many uploads convert to a lost camera being recovered/thief being apprehended. If users had the ability to leave a testimonial when there is some kind of closure, you could derive a metric of success.
Yup--my camera (Canon 60D) was listed, but when I used a photo that had been exported with Lightroom, it couldn't read the serial number. Only when I gave an original JPEG did it have any success, and it didn't end up finding any photos, since anything I've uploaded has been exported through Lightroom.
Tried it with a photo taken from a camera I had stolen in Peru:
The 'SAMSUNG TECHWIN CO., LTD. Samsung SL201' does not write serial information in the exif. See the supported cameras page for a list of models that do.
Another neat idea: Allow the user to select their city, the make and model of the camera, and the date it was stolen. Then you can scrape Craigslist from the surrounding area and show possible matches.
What's the database of photos it can search against like? I just tried looking up a photo, the site found the serial number in it but couldn't find any matching photos online. I know the exist, even the exact same photo I was testing with is available on various websites.
Interesting reaction. When Intel was going to include a unique serial number in every CPU, I recall a lot of people getting into an uproar over the privacy implications.
For one camera I got:
"fail
The 'NIKON CORPORATION NIKON D200' does not write serial information in the exif. See the supported cameras page for a list of models that do."
For my other camera, a Pentax K20D which is on the supported list I got:
"Problem extracting serial number. If possible, use an original image from the camera that has not been edited in any software."
The only thing I had done was uploaded the image from the camera via iPhoto. But all the EXIF data was in tact, including the Pentax K20D, the serial #, even the lens I used. So I don't think iPhoto stripped any data.
I'm wondering why if Flickr for example can extract all of the EXIF data, even for images not directly from the flash card, why did this happen?
I doubt this will every successfully result in a stolen camera being recovered. But, it is a cool new idea that certainly has other obvious applications such as finding other photos by the same camera.
Would it be better rebranded to a different purpose?
So this uses exif data, which as people here have noted can be stripped, but can't you still ID digital cameras from things like sensor noise? I haven't looked at the statistical properties of it, it probably changes over time, only works on at high ISOs, and search would be way more intensive, but I know that my camera has a very predictable noise pattern.
The photo itself is not uploaded to the site for checking. Only a few bytes with the serial and camera model/manufacturer are sent in a HTTP GET to stolencamerafinder.com. This makes it very light in traffic.
The site can expand the camera->owner database by searching photos with valid EXIFs on famous sites and correlating it to the user.
Great idea. But instead of a serial input, it should ask for a photo or Flickr account or so. I don't know my cam's serial, and I can't look it up easily if it's stolen.
[+] [-] humblepie|15 years ago|reply
[+] [-] yellowbkpk|15 years ago|reply
When I found a directory full of images and couldn't remember which camera took them, I noticed that there were a few fuzzy pixels of green and red if I zoomed all the way in that were present in all photos taken by that camera. I took a photo of a white wall in a dark room (to force high ISO) with a couple of my cameras and found the one. Of course I found out about the EXIF serial number and other unique data later on, but it could still be useful on sites that store the original image but strip EXIF.
[+] [-] jevinskie|15 years ago|reply
I did a summary presentation of the topic and paper. PPT: http://dl.dropbox.com/u/716143/digicam-fingerprint.ppt PPTX: http://dl.dropbox.com/u/716143/digicam-fingerprint.pptx
EDIT: The paper I linked above details source identification by recognizing patterns in demosaicing artifacts. In that paper the authors combined the demosaicing fingerprinting with their earlier noise fingerprinting work: http://isis.poly.edu/~forensics/pubs/icme2007.pdf
[+] [-] potatolicious|15 years ago|reply
Not to mention noise is, by definition, high entropy and hard to predict. There are patterns to noise due to sensor design and manufacturing, but that would make it unique to the sensor design, not to a specific copy of it.
[+] [-] JoelSutherland|15 years ago|reply
[+] [-] lutorm|15 years ago|reply
[+] [-] cousin_it|15 years ago|reply
[+] [-] peterb|15 years ago|reply
[+] [-] zipdog|15 years ago|reply
[+] [-] rednum|15 years ago|reply
[+] [-] GFischer|15 years ago|reply
[+] [-] charlief|15 years ago|reply
(1) Various encode/decode steps along to publishing the photo online don't corrupt EXIF data
(2) Thief isn't sophisticated to wipe/disable EXIF data. Many cameras shoot in a proprietary, higher-bit format and give you a fairly obvious wizard option on a desktop tool to include/exclude the EXIF data.
(3) Thief will use the camera, not sell it immediately into a second-hand market.
(4) Even if your camera is supported, it has to be configured to record EXIF data by both you and the thief. Some proprietary formats are fairly raw and don't always include EXIF-derivable data by default.
This will get some adoption because what other option do users have, but it will be interesting to see how many uploads convert to a lost camera being recovered/thief being apprehended. If users had the ability to leave a testimonial when there is some kind of closure, you could derive a metric of success.
[+] [-] xyzzyz|15 years ago|reply
2) Seriously, do you think that a common thief cares about EXIF, let alone know?
3) I have not seen a camera which does not write EXIF -- more probable problem is that it does not write camera serial number.
4) What is the difference? You have similarly small chance of retrieving it, no matter whose possession it is in at the moment.
[+] [-] kyleslattery|15 years ago|reply
[+] [-] rorrr|15 years ago|reply
- 99.9% people shoot JPEG (which has EXIF enabled by default in pretty much every camera).
- Most DSLR owners don't shoot RAW and don't know what EXIF is.
- Most RAW formats contain EXIF information (at least for major brands).
- Most graphic editors do not destroy EXIF data.
- Even if a thief sells the camera, buying stolen stuff is illegal, so you can get your camera back (it's buyer's problem)
[+] [-] jasonkester|15 years ago|reply
The 'SAMSUNG TECHWIN CO., LTD. Samsung SL201' does not write serial information in the exif. See the supported cameras page for a list of models that do.
[+] [-] nprincigalli|15 years ago|reply
[+] [-] meinhimmel|15 years ago|reply
[+] [-] corin_|15 years ago|reply
[+] [-] pavel_lishin|15 years ago|reply
[+] [-] subway|15 years ago|reply
Have you considered allowing users to specify a file by URL, or the browser's browse mechanism for file input?
[+] [-] stevejalim|15 years ago|reply
[+] [-] biot|15 years ago|reply
[+] [-] defroost|15 years ago|reply
For my other camera, a Pentax K20D which is on the supported list I got:
"Problem extracting serial number. If possible, use an original image from the camera that has not been edited in any software."
The only thing I had done was uploaded the image from the camera via iPhoto. But all the EXIF data was in tact, including the Pentax K20D, the serial #, even the lens I used. So I don't think iPhoto stripped any data.
I'm wondering why if Flickr for example can extract all of the EXIF data, even for images not directly from the flash card, why did this happen?
[+] [-] seles|15 years ago|reply
Would it be better rebranded to a different purpose?
[+] [-] tel|15 years ago|reply
[+] [-] lostbit|15 years ago|reply
The site can expand the camera->owner database by searching photos with valid EXIFs on famous sites and correlating it to the user.
[+] [-] hallowtech|15 years ago|reply
[+] [-] TWSS|15 years ago|reply
[+] [-] PanMan|15 years ago|reply
[+] [-] hortonew|15 years ago|reply
[+] [-] Sniffnoy|15 years ago|reply
[+] [-] antidaily|15 years ago|reply
[+] [-] wicknicks|15 years ago|reply