This line from DNM image Wiki: | Even if you follow all the tips in this chapter it is still possible to identify the camera that you used because of other camera specific data that is much harder to obfuscate. | Anyone able to elaborate on that or know a good resource on it?

Link to wiki page line in begins first sentence in second section."Making A Photo

Anyone get some deets on this data

I've tried to search for this before but it's hard to pull up anything that isn't about EXIF. Coicncidence? I can't even say for sure what the other data is called even


Comments


[6 Points] Radio-Vision:

I suppose the text is referring to the physical attributes of the camera itself, or, it could be referring to a "digital watermark" an imperceivable bit of noise, added to a photo on the phone, to make it identifiable to LEO, or, whoever wants to identify the source of the photograph.

Basically, the only way you're going to be safe is to like, draw a picture of whatever you were going to take a picture of and then take a picture of that, or scan it, like this. http://imgur.com/a/BgGKt


[2 Points] shillface:

http://dde.binghamton.edu/download/camera_fingerprint/


[1 Points] CookyDough:

You can choose to strip EXIF data when you save a png/jpg/gif in gimp (linux's version of photoshop). You could buy a burner with the best camera on it, activate it near where it is purchased you don't even need to activate the service to use the camera and keep the phone in airplane mode while it is on. You could use the USB cable that comes with every burner phone to upload the pics to your offline linux/tails computer to edit with gimp. You can add "noise" to the image, change pixels, blurr parts of it, sharpen others and more with gimp. Maybe recycle your phone for some cash when you're done or just toss it.