Temporal Forensics and Anti-Forensics for Motion Compensated Video

被引:148
作者
Stamm, Matthew C. [1 ]
Lin, W. Sabrina [2 ]
Liu, K. J. Ray [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Intel Corp, Hillsboro, OR 97124 USA
关键词
Digital forensics; anti-forensics; frame deletion; video compression; game theory;
D O I
10.1109/TIFS.2012.2205568
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the ease with which digital information can be altered, many digital forensic techniques have been developed to authenticate multimedia content. Similarly, a number of anti-forensic operations have recently been designed to make digital forgeries undetectable by forensic techniques. However, like the digital manipulations they are designed to hide, many anti-forensic operations leave behind their own forensically detectable traces. As a result, a digital forger must balance the trade-off between completely erasing evidence of their forgery and introducing new evidence of anti-forensic manipulation. Because a forensic investigator is typically bound by a constraint on their probability of false alarm (P-fa) , they must also balance a trade-off between the accuracy with which they detect forgeries and the accuracy with which they detect the use of anti-forensics. In this paper, we analyze the interaction between a forger and a forensic investigator by examining the problem of authenticating digital videos. Specifically, we study the problem of adding or deleting a sequence of frames from a digital video. We begin by developing a theoretical model of the forensically detectable fingerprints that frame deletion or addition leaves behind, then use this model to improve upon the video frame deletion or addition detection technique proposed by Wang and Farid. Next, we propose an anti-forensic technique designed to fool video forensic techniques and develop a method for detecting the use of anti-forensics. We introduce a new set of techniques for evaluating the performance of anti-forensic operations and develop a game theoretic framework for analyzing the interplay between a forensic investigator and a forger. We use these new techniques to evaluate the performance of each of our proposed forensic and anti-forensic techniques, and identify the optimal actions of both the forger and forensic investigator.
引用
收藏
页码:1315 / 1329
页数:15
相关论文
共 25 条
[1]  
Avcibas I, 2004, IEEE IMAGE PROC, P2645
[2]  
CAO G, 2010, P 12 ACM WORKSH MULT, P25
[3]  
Chen M., 2007, P SPIE ELECT IMAGING, VIX, P6505
[4]   Determining image origin and integrity using sensor noise [J].
Chen, Mo ;
Fridrich, Jessica ;
GoIjan, Miroslav ;
Lukas, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) :74-90
[5]   AUTOMATIC ACQUISITION DEVICE IDENTIFICATION FROM SPEECH RECORDINGS [J].
Garcia-Romero, Daniel ;
Espy-Wilson, Carol Y. .
2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, :1806-1809
[6]  
Gloe T., 2007, Proceedings of the 15th international conference on Multimedia, P78
[7]   Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification [J].
Goljan, Miroslav ;
Fridrich, Jessica ;
Chen, Mo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) :227-236
[8]   Digital audio recording analysis: the electric network frequency (ENF) criterion [J].
Grigoras, Catalin .
INTERNATIONAL JOURNAL OF SPEECH LANGUAGE AND THE LAW, 2005, 12 (01) :63-76
[9]  
Kirchner M., 2009, P SPIE IS T ELECT IM, V7254
[10]   Hiding Traces of Resampling in Digital Images [J].
Kirchner, Matthias ;
Boehme, Rainer .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (04) :582-592