{"id":786,"date":"2006-04-29T09:10:55","date_gmt":"2006-04-29T13:10:55","guid":{"rendered":"http:\/\/www.pcin.net\/update\/index.php\/2006\/04\/29\/digital-cameras-leave-unique-pixel-fingerprints\/"},"modified":"2015-09-14T08:07:49","modified_gmt":"2015-09-14T12:07:49","slug":"digital-cameras-leave-unique-pixel-fingerprints","status":"publish","type":"post","link":"http:\/\/pcin.net\/update\/2006\/04\/29\/digital-cameras-leave-unique-pixel-fingerprints\/","title":{"rendered":"Digital Cameras Leave Unique &#8216;Pixel&#8217; Fingerprints"},"content":{"rendered":"<div class=\"entry\">\n<p><span class=\"articleHead\">From <a href=\"http:\/\/www.pcin.net\/c\/?505\">TechWeb<\/a>:<\/span><\/p>\n<blockquote><p>Digital photographers could soon lose their ability to anonymously shoot sensitive or illegal subject matter, thanks to new research that can link digital images to the camera with which they were taken.<\/p>\n<p>The research, conducted at Binghamton University in New York, analyzes the slight variations created by the image sensor in each camera to uniquely identify pictures.<\/p>\n<p>The technology is being presented as potentially useful in nailing child pornographers. &#8220;The defense in these kind of cases would often be that the images were not taken by this person&#8217;s camera,&#8221; Jessica Fridrich, the Binghamton University engineering professor who oversaw the research, said in a statement. &#8220;But if it can be shown that the original images were taken by the person&#8217;s cell phone or camera, it becomes a much stronger case.&#8221;<\/p><\/blockquote>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>From TechWeb: Digital photographers could soon lose their ability to anonymously shoot sensitive or illegal subject matter, thanks to new research that can link digital images to the camera with which they were taken. The research, conducted at Binghamton University in New York, analyzes the slight variations created by the image sensor in each camera &#8230;<\/p>\n","protected":false},"author":1977,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2],"tags":[],"class_list":{"0":"post-786","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-computer-news","7":"anons"},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/posts\/786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/users\/1977"}],"replies":[{"embeddable":true,"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/comments?post=786"}],"version-history":[{"count":0,"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/posts\/786\/revisions"}],"wp:attachment":[{"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/media?parent=786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/categories?post=786"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/tags?post=786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}