{"title":"The optimal attack to histogram-based forensic detectors is simple(x)","authors":"Pedro Comesaña Alfaro, F. Pérez-González","doi":"10.1109/WIFS.2014.7084317","DOIUrl":null,"url":null,"abstract":"In the last years a number of counterforensics tools have been proposed. Although most of them are heuristic and designed ad hoc, lately a formal approach to this problem, rooted in transportation theory, has been pursued. This paper follows this path by designing optimal attacks against histogrambased detectors where the detection region is non-convex. The usefulness of our strategy is demonstrated by providing for the first time the optimal solution to the design of attacks against Benford's Law-based detectors, a problem that has deserved large practical interest by the forensic community. The performance of the proposed scheme is compared with that of the best existing counterforensic method against Benford-based detectors, showing the goodness (indeed, the optimality) of our approach.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIFS.2014.7084317","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
In the last years a number of counterforensics tools have been proposed. Although most of them are heuristic and designed ad hoc, lately a formal approach to this problem, rooted in transportation theory, has been pursued. This paper follows this path by designing optimal attacks against histogrambased detectors where the detection region is non-convex. The usefulness of our strategy is demonstrated by providing for the first time the optimal solution to the design of attacks against Benford's Law-based detectors, a problem that has deserved large practical interest by the forensic community. The performance of the proposed scheme is compared with that of the best existing counterforensic method against Benford-based detectors, showing the goodness (indeed, the optimality) of our approach.