Device fingerprint can be utilized in optical communication system to strengthen the physical layer security for its uniqueness and unforgeability. In this letter, we propose and demonstrate a noise-model-assisted feature extraction method to reveal the device fingerprint hidden in the transmitted signal. Our scheme is verified in orthogonal frequency division multiplexing-passive optical network (OFDM-PON). First, the additive and multiplicative noise in normal data signal is extracted and two-dimensional feature matrix is formed. Then, a trained convolutional neural network (CNN) is used as a classifier to identify the fingerprint from the feature matrix. Experimental results show that our method achieves a high identification accuracy up...
Abstract This paper demonstrates a Convolutional Neural Network (CNN) based mechanism for identific...
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example i...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...
Confidentiality of the communication is extremely important in wireless networks due to the broadcas...
Source identification is an important topic in image forensics, since it allows to trace back the or...
Recently, RF fingerprinting has become an arousing and emerging technology in identifying multiple w...
Visible light communication (VLC) is a promising technology with a high data rate that can supplemen...
Forensic analyses of digital images rely heavily on the traces of in-camera and out-camera processes...
RF fingerprinting is an emerging technology for identifying hardware-specific features of wireless t...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
As the Internet of Things (IoT) continues to expand, there is a growing necessity for improved techn...
In forensic investigation of criminal cases like child pornography, image forgery, identity theft, s...
In this paper, a novel device identification method is proposed to improve the security of Visible L...
As wireless devices become increasingly pervasive and essential, they are becoming both a target for...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Abstract This paper demonstrates a Convolutional Neural Network (CNN) based mechanism for identific...
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example i...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...
Confidentiality of the communication is extremely important in wireless networks due to the broadcas...
Source identification is an important topic in image forensics, since it allows to trace back the or...
Recently, RF fingerprinting has become an arousing and emerging technology in identifying multiple w...
Visible light communication (VLC) is a promising technology with a high data rate that can supplemen...
Forensic analyses of digital images rely heavily on the traces of in-camera and out-camera processes...
RF fingerprinting is an emerging technology for identifying hardware-specific features of wireless t...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
As the Internet of Things (IoT) continues to expand, there is a growing necessity for improved techn...
In forensic investigation of criminal cases like child pornography, image forgery, identity theft, s...
In this paper, a novel device identification method is proposed to improve the security of Visible L...
As wireless devices become increasingly pervasive and essential, they are becoming both a target for...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Abstract This paper demonstrates a Convolutional Neural Network (CNN) based mechanism for identific...
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example i...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...