• Title/Summary/Keyword: Multimedia Forensics

Search Result 17, Processing Time 0.027 seconds

Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering (Wiener 필터링에 기반하는 센서 패턴 노이즈를 활용한 영상 장치 식별 기술 연구)

  • Lee, Hae-Yeoun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2153-2158
    • /
    • 2016
  • Multimedia such as image, audio, and video is easy to create and distribute with the advance of IT. Since novice uses them for illegal purposes, multimedia forensics are required to protect contents and block illegal usage. This paper presents a multimedia forensic algorithm for video to identify the device used for acquiring unknown video files. First, the way to calculate a sensor pattern noise using Wiener filter (W-SPN) is presented, which comes from the imperfection of photon detectors against light. Then, the way to identify the device is explained after estimating W-SPNs from the reference device and the unknown video. For the experiment, 30 devices including DSLR, compact camera, smartphone, and camcorder are tested and analyzed quantitatively. Based on the results, the presented algorithm can achieve the 96.0% identification accuracy.

A Survey on Passive Image Copy-Move Forgery Detection

  • Zhang, Zhi;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.6-31
    • /
    • 2018
  • With the rapid development of the science and technology, it has been becoming more and more convenient to obtain abundant information via the diverse multimedia medium. However, the contents of the multimedia are easily altered with different editing software, and the authenticity and the integrity of multimedia content are under threat. Forensics technology is developed to solve this problem. We focus on reviewing the blind image forensics technologies for copy-move forgery in this survey. Copy-move forgery is one of the most common manners to manipulate images that usually obscure the objects by flat regions or append the objects within the same image. In this paper, two classical models of copy-move forgery are reviewed, and two frameworks of copy-move forgery detection (CMFD) methods are summarized. Then, massive CMFD methods are mainly divided into two types to retrospect the development process of CMFD technologies, including block-based and keypoint-based. Besides, the performance evaluation criterions and the datasets created for evaluating the performance of CMFD methods are also collected in this review. At last, future research directions and conclusions are given to provide beneficial advice for researchers in this field.

Development of a Copyright Protection System for Computer Forensics (컴퓨터 포렌식을 위한 디지털 저작권 보호시스템 개발)

  • Lee, Wol-Young;Hwang, Chul
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.365-372
    • /
    • 2007
  • The information of world is most likely to be created as digital data. These digital productions need some legal protection mechanisms or techniques because users can illegally use them. Thus many researchers are developing various techniques. Currently most techniques are focusing on the physical and chemical methods like disk inspection for taking legal evidence about production infringement. This paper has developed a computer forensics-based copyrights protection system capable of detecting and notifying disobedience facts when user uses illegally a production. Furthermore if the user infringes continually the production the system stores the infringement facts to take the legal evidence by mapping to law for intellectual property right. The technique can protect data from digital evidence manipulation or destruction.

  • PDF

Broken Integrity Detection of Video Files in Video Event Data Recorders

  • Lee, Choongin;Lee, Jehyun;Pyo, Youngbin;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3943-3957
    • /
    • 2016
  • As digital evidence has a highly influential role in proving the innocence of suspects, methods for integrity verification of such digital evidence have become essential in the digital forensic field. Most surveillance camera systems are not equipped with proper built-in integrity protection functions. Because digital forgery techniques are becoming increasingly sophisticated, manually determining whether digital content has been falsified is becoming extremely difficult for investigators. Hence, systematic approaches to forensic integrity verification are essential for ascertaining truth or falsehood. We propose an integrity determination method that utilizes the structure of the video content in a Video Event Data Recorder (VEDR). The proposed method identifies the difference in frame index fields between a forged file and an original file. Experiments conducted using real VEDRs in the market and video files forged by a video editing tool demonstrate that the proposed integrity verification scheme can detect broken integrity in video content.

A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices

  • Han, Jaehyeok;Lee, Sangjin
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.402-410
    • /
    • 2022
  • Digital data can be manipulated easily, so information related to the timestamp is important in establishing the reliability of the data. The time values for a certain file can be extracted following the analysis of the filesystem metadata or file internals, and the information can be utilized to organize a timeline for a digital investigation. Suppose the reversal of a timestamp is found on a mobile device during this process. In this case, a more detailed analysis is required due to the possibility of anti-forensic activity, but little previous research has investigated the handling and possible manipulation of timestamps on mobile devices. Therefore, in this study, we determine how time values for multimedia files are handled according to the operating system or filesystem on mobile devices. We also discuss five types of timestamps-file created (C), last modified (M), last accessed (A), digitalized (Di), and filename (FN) of multimedia files, and experimented with their operational features across multiple devices such as smartphones and cameras.

SVD-Based Digital Image Forensics for Detecting Tampering (위변조 검출을 위한 SVD 디지털 이미지 포렌직)

  • Song, Geun-Sil;Kim, Mi-Ae;Lee, Won-Hyung
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.377-378
    • /
    • 2006
  • The proposed method measures the correlation maps of SVD that are used to interpret data relations and structures between the original image and the distorted image. It seems that the SVD results can be used to assist us in gaining information about covariance structure of two images. This method is able to work in the complete absence of any digital watermark or signature. The effectiveness of this method is seen through testing the robustness against JPEG compression.

  • PDF

Digital Forensic for Location Information using Hierarchical Clustering and k-means Algorithm

  • Lee, Chanjin;Chung, Mokdong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.30-40
    • /
    • 2016
  • Recently, the competition among global IT companies for the market occupancy of the IoT(Internet of Things) is fierce. Internet of Things are all the things and people around the world connected to the Internet, and it is becoming more and more intelligent. In addition, for the purpose of providing users with a customized services to variety of context-awareness, IoT platform and related research have been active area. In this paper, we analyze third party instant messengers of Windows 8 Style UI and propose a digital forensic methodology. And, we are well aware of the Android-based map and navigation applications. What we want to show is GPS information analysis by using the R. In addition, we propose a structured data analysis applying the hierarchical clustering model using GPS data in the digital forensics modules. The proposed model is expected to help support the IOT services and efficient criminal investigation process.

Printer Feature Extraction for Digital Forensics (디지털 포렌식을 위한 프린터 특징 추출 및 분석)

  • Lee, Ha-Kyung Jennifer;Cho, Dong-Sub
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.231-233
    • /
    • 2012
  • 컴퓨터 및 프린터 기술의 발전으로 디지털 문서 활용 사례가 전 분야에 확산되면서 디지털 문서의 위 변조 범죄가 증가하고 많은 사회적인 문제를 야기하고 있다. 이러한 컴퓨터를 이용한 범죄의 증거를 수집하고 분석하기 위해 디지털 포렌식 기술의 발전이 더욱 중요해지고 있다. 디지털 포렌식은 PC나 휴대폰 등 각종 디지털 매체 등에 남아 있는 디지털 정보들을 수집 분석해 범죄 단서를 찾는 컴퓨터 법의학이다. 본 논문에서는 프린터기로 출력된 문서의 고해상도 영상현미경 이미지를 사용하여 원본 여부를 판별 할 수 있는 프린터기 동일 여부 판별 기술을 제안한다.

  • PDF

Classifier Combination Based Source Identification for Cell Phone Images

  • Wang, Bo;Tan, Yue;Zhao, Meijuan;Guo, Yanqing;Kong, Xiangwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5087-5102
    • /
    • 2015
  • Rapid popularization of smart cell phone equipped with camera has led to a number of new legal and criminal problems related to multimedia such as digital image, which makes cell phone source identification an important branch of digital image forensics. This paper proposes a classifier combination based source identification strategy for cell phone images. To identify the outlier cell phone models of the training sets in multi-class classifier, a one-class classifier is orderly used in the framework. Feature vectors including color filter array (CFA) interpolation coefficients estimation and multi-feature fusion is employed to verify the effectiveness of the classifier combination strategy. Experimental results demonstrate that for different feature sets, our method presents high accuracy of source identification both for the cell phone in the training sets and the outliers.

Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering (모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Oh, Tae-Woo;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.15-22
    • /
    • 2017
  • With the advance of Internet Technology, various social network services are created and used by users. Especially, the use of smart devices makes that multimedia contents can be used and distributed on social network services. However, since the crime rate also is increased by users with illegal purposes, there are needs to protect contents and block illegal usage of contents with multimedia forensics. In this paper, we propose a multimedia forensic technique which is identifying the video source. First, the scheme to acquire the sensor pattern noise (SPN) using morphology filtering is presented, which comes from the imperfection of photon detector. Using this scheme, the SPN of reference videos from the reference device is estimated and the SPN of an unknown video is estimated. Then, the similarity between two SPNs is measured to identify whether the unknown video is acquired using the reference device. For the performance analysis of the proposed technique, 30 devices including DSLR camera, compact camera, camcorder, action cam and smart phone are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 96% accuracy in identification.