Active and Passive Multimedia Forensics
نویسندگان
چکیده
Thanks to their huge expressive capability, coupled with the widespread use of the Internet and of affordable and high quality cameras and computers, digital multimedia represent nowadays one of the principal means of communication. Besides the many benefits, the wide proliferation of such contents has lead to problematic issues regarding their authenticity and security. To cope with such problems, the scientific community has focused its attention on digital forensic techniques. The objective of this doctoral study is to actively contribute to this field of research, developing efficient techniques to protect digital contents and verify their integrity. Digital Watermarking has been initially proposed as a valuable instrument to prove content ownership, protect copyright and verify integrity, by imperceptibly embedding a message into a documents. Such message can later be detected and used to disclose possible copyrights violations or manipulations. For specific applications, such as copyright protection, the watermark is required to be as robust as possible, surviving possible attack a malevolent user may be willing to apply. In light of this, we developed a novel watermarking benchmarking tool able to evaluate the robustness of watermarking techniques under the attack of multiple processing operators. On the other hand, for specific applications, such as forensic and medical, the robustness requirement is overtaken by integrity preservation. To cope with this aim, fragile watermarking has been developed, assuming that the watermark is modified whenever a tampering occurs, thus its absence can be taken as evidence of manipulation. Among this class of techniques, we developed a prediction-based reversible watermarking algorithm, which allows a perfect recovery of both the original content and the watermark. More recently, passive forensics approaches, which work in absence of any watermark or special hardware, have been proposed for authentication purposes. The basic idea is that the manipulation of a digital media, if performed properly, may not leave any visual trace of its occurrence, but it alters the statistics of the content. Without any prior knowledge about the content, such alterations can be revealed and taken as evidence of forgery. We focused our study on geometric-based forensic techniques both for images and videos authentication. Firstly we proposed a method for authenticating text on signs and billboards, based on the assumption that text on a planar surface is imaged under perspective projection, but it is unlikely to satisfy such geometric mapping when manipulated. Finally, we proposed a novel geometric technique to detect physically implausible trajectories of objects in video sequences. This technique explicitly models the three-dimensional trajectory of objects in free-flight and the corresponding two-dimensional projection into the image plane. Deviations from this model provide evidence of manipulation.
منابع مشابه
Towards Multimedia Opinion Mining*
Both opinion mining and multimedia retrieval are active research areas with challenging applications, but as far as we know the present vision paper is the first attempt to integrate them into multimedia opinion mining. Here we address the specific case of satirical comments in politics by exploiting the presence of photomontage to infer a tendentially negative opinion. In order to do so, we in...
متن کاملForensics, Anti-forensics and Counter Anti-forensics for JPEG Compressed Images
-With the advancement in information technology and image processing software the manipulation of the images has increased considerably from past few decades. Retouching or tampering of the images has been so prevalent that nowadays one can hardly believe their originality. Image authenticity is done using forgery detection techniques. These methods are broadly classified as active and passive....
متن کاملActive query process for digital video surveillance forensic applications
Multimedia forensics is a new emerging discipline regarding the analysis and exploitation of digital data as support for investigation to extract probative elements. Among them, visual data about people and people activities, extracted from videos in an efficient way, are becoming day by day more appealing for forensics, due to the availability of large video-surveillance footage. Thus many res...
متن کاملTitle of dissertation : FUNDAMENTAL LIMITS IN MULTIMEDIA FORENSICS AND ANTI - FORENSICS
Title of dissertation: FUNDAMENTAL LIMITS IN MULTIMEDIA FORENSICS AND ANTI-FORENSICS Xiaoyu Chu, Doctor of Philosophy, 2015 Dissertation directed by: Professor K. J. Ray Liu Department of Electrical and Computer Engineering As the use of multimedia editing tools increases, people become questioning the authenticity of multimedia content. This is specially a big concern for authorities, such as ...
متن کاملMemory Forensics over the IEEE 1394 Interface
The IEEE 1394 “FireWire” interface provides a means for acquiring direct memory access. We discuss how this can be used to perform live memory forensics on a target system. We also present libforensic1394 an open-source software library designed especially for this purpose. Passive and active applications of live memory forensics are analysed. Memory imaging techniques are discussed at length. ...
متن کاملPassive-blind Image Forensics
In this chapter, we will review the research area of passive-blind image forensics, i.e., an form of image analysis for finding out the condition of an image without relying on pre-registration or pre-embedded information. We consider the two main functions of passive-blind image forensics as being image forgery detection and image source identification. In this vein, we provide a detailed revi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013