首页 > 最新文献

2014 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

英文 中文
Bidimensional empirical mode decomposition-based unlighting for face recognition 基于二维经验模态分解的消光人脸识别
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084297
Miguel A. Ochoa-Villegas, J. Nolazco-Flores, Olivia Barron-Cano, I. Kakadiaris
A face recognition system must be capable of handling facial data with head pose variations or different illumination conditions. However, as these conditions are uncontrolled the requirement of better algorithms has become essential. We propose a Bidimensional Empirical Mode Decomposition-based unlighting method that preprocesses the luminance and the reflectance parts of an image. First, three luminance components are estimated using Bidimensional Intrinsic Mode Functions residuals. Second, a shadow removal procedure using recursive Retinex is applied. Third, the reflectance part is denoised using mean-Gaussian filters. After that, a new image is created multiplying each shadow-free luminance by the reflectance. The final output is obtained using the geometric mean on the newly acquired images. This algorithm has been tested in two 3D- 2D face recognition databases: UHDB11 and FRGCv2.0. The performance of BEMDU demonstrates an improvement of up to 15.42% when compared with the AELM, LBEMD, PittPatt, the baseline, and EA algorithms.
人脸识别系统必须能够处理头部姿势变化或不同光照条件下的面部数据。然而,由于这些条件是不受控制的,对更好的算法的要求变得至关重要。我们提出了一种基于二维经验模式分解的消光方法,该方法对图像的亮度和反射率部分进行预处理。首先,利用二维本征模态函数残差估计三个亮度分量。其次,使用递归视网膜进行阴影去除。第三,利用均值高斯滤波器对反射部分进行去噪。在那之后,一个新的图像被创建乘以每个无阴影亮度的反射率。对新获取的图像进行几何平均,得到最终输出。该算法已在两个3D- 2D人脸识别数据库UHDB11和FRGCv2.0中进行了测试。与AELM、LBEMD、PittPatt、基线和EA算法相比,BEMDU算法的性能提高了15.42%。
{"title":"Bidimensional empirical mode decomposition-based unlighting for face recognition","authors":"Miguel A. Ochoa-Villegas, J. Nolazco-Flores, Olivia Barron-Cano, I. Kakadiaris","doi":"10.1109/WIFS.2014.7084297","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084297","url":null,"abstract":"A face recognition system must be capable of handling facial data with head pose variations or different illumination conditions. However, as these conditions are uncontrolled the requirement of better algorithms has become essential. We propose a Bidimensional Empirical Mode Decomposition-based unlighting method that preprocesses the luminance and the reflectance parts of an image. First, three luminance components are estimated using Bidimensional Intrinsic Mode Functions residuals. Second, a shadow removal procedure using recursive Retinex is applied. Third, the reflectance part is denoised using mean-Gaussian filters. After that, a new image is created multiplying each shadow-free luminance by the reflectance. The final output is obtained using the geometric mean on the newly acquired images. This algorithm has been tested in two 3D- 2D face recognition databases: UHDB11 and FRGCv2.0. The performance of BEMDU demonstrates an improvement of up to 15.42% when compared with the AELM, LBEMD, PittPatt, the baseline, and EA algorithms.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122136726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FiberID: molecular-level secret for identification of things FiberID:用于识别事物的分子级秘密
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084308
Zhen Chen, Yongbo Zeng, Gerald Hefferman, Y. Sun
This paper describes a new physical unclonable function for identification, FiberID, which uses the molecular level Rayleigh backscatter pattern within a small section of telecommunication-grade optical fiber as a means of verification and identification. The verification process via FiberID is experimentally studied, and an equal error rate (EER) of 0.06% is achieved. Systematic evaluation of FiberID is conducted in term of physical length and ambient temperature. Due to its inherent irreproducibility, FiberID holds the promise to significantly enhance current identification, security, and anti-counterfeiting technologies.
本文描述了一种新的物理不可克隆识别功能,FiberID,它利用一小段电信级光纤内的分子水平瑞利反向散射模式作为验证和识别的手段。实验研究了光纤识别的验证过程,实现了0.06%的等错误率。从物理长度和环境温度两个方面对FiberID进行了系统的评价。由于其固有的不可复制性,FiberID有望显著增强当前的识别、安全性和防伪技术。
{"title":"FiberID: molecular-level secret for identification of things","authors":"Zhen Chen, Yongbo Zeng, Gerald Hefferman, Y. Sun","doi":"10.1109/WIFS.2014.7084308","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084308","url":null,"abstract":"This paper describes a new physical unclonable function for identification, FiberID, which uses the molecular level Rayleigh backscatter pattern within a small section of telecommunication-grade optical fiber as a means of verification and identification. The verification process via FiberID is experimentally studied, and an equal error rate (EER) of 0.06% is achieved. Systematic evaluation of FiberID is conducted in term of physical length and ambient temperature. Due to its inherent irreproducibility, FiberID holds the promise to significantly enhance current identification, security, and anti-counterfeiting technologies.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"8 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Understanding the effects of real-world behavior in statistical disclosure attacks 了解统计披露攻击中真实世界行为的影响
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084306
Simon Oya, C. Troncoso, F. Pérez-González
High-latency anonymous communication systems prevent passive eavesdroppers from inferring communicating partners with certainty. However, disclosure attacks allow an adversary to recover users' behavioral profiles when communications are persistent. Understanding how the system parameters affect the privacy of the users against such attacks is crucial. Earlier work in the area analyzes the performance of disclosure attacks in controlled scenarios, where a certain model about the users' behavior is assumed. In this paper, we analyze the profiling accuracy of one of the most efficient disclosure attack, the least squares disclosure attack, in realistic scenarios. We generate real traffic observations from datasets of different nature and find that the models considered in previous work do not fit this realistic behavior. We relax previous hypotheses on the behavior of the users and extend previous performance analyses, validating our results with real data and providing new insights into the parameters that affect the protection of the users in the real world.
高延迟匿名通信系统可以防止被动窃听者确定地推断通信伙伴。然而,披露攻击允许攻击者在通信持续时恢复用户的行为配置文件。了解系统参数如何影响用户的隐私免受此类攻击是至关重要的。该领域的早期工作分析了受控场景下披露攻击的性能,其中假设了关于用户行为的特定模型。在本文中,我们分析了最有效的披露攻击之一——最小二乘披露攻击在现实场景中的分析准确性。我们从不同性质的数据集生成真实的交通观测结果,并发现以前工作中考虑的模型不适合这种现实行为。我们放松了以前对用户行为的假设,扩展了以前的性能分析,用真实数据验证了我们的结果,并对影响现实世界中用户保护的参数提供了新的见解。
{"title":"Understanding the effects of real-world behavior in statistical disclosure attacks","authors":"Simon Oya, C. Troncoso, F. Pérez-González","doi":"10.1109/WIFS.2014.7084306","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084306","url":null,"abstract":"High-latency anonymous communication systems prevent passive eavesdroppers from inferring communicating partners with certainty. However, disclosure attacks allow an adversary to recover users' behavioral profiles when communications are persistent. Understanding how the system parameters affect the privacy of the users against such attacks is crucial. Earlier work in the area analyzes the performance of disclosure attacks in controlled scenarios, where a certain model about the users' behavior is assumed. In this paper, we analyze the profiling accuracy of one of the most efficient disclosure attack, the least squares disclosure attack, in realistic scenarios. We generate real traffic observations from datasets of different nature and find that the models considered in previous work do not fit this realistic behavior. We relax previous hypotheses on the behavior of the users and extend previous performance analyses, validating our results with real data and providing new insights into the parameters that affect the protection of the users in the real world.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121437162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A feature-based approach for image tampering detection and localization 基于特征的图像篡改检测与定位方法
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084319
L. Verdoliva, D. Cozzolino, G. Poggi
We propose a new camera-based technique for tampering localization. A large number of blocks are extracted off-line from training images and characterized through features based on a dense local descriptor. A multidimensional Gaussian model is then fit to the training features. In the testing phase, the image is analyzed in sliding-window modality: for each block, the log-likelihood of the associated feature is computed, reprojected in the image domain, and aggregated, so as to form a smooth decision map. Eventually, the tampering is localized by simple thresholding. Experiments carried out in a number of situation of interest show promising results.
我们提出了一种新的基于摄像机的篡改定位技术。从训练图像中离线提取大量块,并通过基于密集局部描述符的特征进行特征化。然后对训练特征进行多维高斯模型拟合。在测试阶段,以滑动窗口的方式对图像进行分析,对每个块计算相关特征的对数似然,在图像域中进行重投影,并进行聚合,形成光滑的决策图。最后,通过简单的阈值法对篡改进行了定位。在许多令人感兴趣的情况下进行的实验显示出有希望的结果。
{"title":"A feature-based approach for image tampering detection and localization","authors":"L. Verdoliva, D. Cozzolino, G. Poggi","doi":"10.1109/WIFS.2014.7084319","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084319","url":null,"abstract":"We propose a new camera-based technique for tampering localization. A large number of blocks are extracted off-line from training images and characterized through features based on a dense local descriptor. A multidimensional Gaussian model is then fit to the training features. In the testing phase, the image is analyzed in sliding-window modality: for each block, the log-likelihood of the associated feature is computed, reprojected in the image domain, and aggregated, so as to form a smooth decision map. Eventually, the tampering is localized by simple thresholding. Experiments carried out in a number of situation of interest show promising results.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132328522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Face recognition via adaptive sparse representations of random patches 基于随机斑块自适应稀疏表示的人脸识别
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084296
D. Mery, K. Bowyer
Unconstrained face recognition is still an open problem, as state-of-the-art algorithms have not yet reached high recognition performance in real-world environments (e.g., crowd scenes at the Boston Marathon). This paper addresses this problem by proposing a new approach called Adaptive Sparse Representation of Random Patches (ASR+). In the learning stage, for each enrolled subject, a number of random patches are extracted from the subject's gallery images in order to construct representative dictionaries. In the testing stage, random test patches of the query image are extracted, and for each test patch a dictionary is built concatenating the `best' representative dictionary of each subject. Using this adapted dictionary, each test patch is classified following the Sparse Representation Classification (SRC) methodology. Finally, the query image is classified by patch voting. Thus, our approach is able to deal with a larger degree of variability in ambient lighting, pose, expression, occlusion, face size and distance from the camera. Experiments were carried out on five widely-used face databases. Results show that ASR+ deals well with unconstrained conditions, outperforming various representative methods in the literature in many complex scenarios.
无约束人脸识别仍然是一个开放的问题,因为最先进的算法尚未在现实环境中达到高识别性能(例如,波士顿马拉松比赛的人群场景)。为了解决这个问题,本文提出了一种新的方法,称为随机斑块的自适应稀疏表示(ASR+)。在学习阶段,对于每个注册的主题,从主题的图库图像中随机提取一些补丁,以构建具有代表性的字典。在测试阶段,提取查询图像的随机测试补丁,并为每个测试补丁构建字典,并将每个主题的“最佳”代表性字典连接起来。使用这个改编的字典,每个测试补丁按照稀疏表示分类(SRC)方法进行分类。最后,对查询图像进行补丁投票分类。因此,我们的方法能够处理环境光线、姿势、表情、遮挡、面部大小和距离相机的距离等更大程度的变化。实验在5个广泛使用的人脸数据库上进行。结果表明,ASR+能很好地处理无约束条件,在许多复杂场景下优于文献中各种代表性方法。
{"title":"Face recognition via adaptive sparse representations of random patches","authors":"D. Mery, K. Bowyer","doi":"10.1109/WIFS.2014.7084296","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084296","url":null,"abstract":"Unconstrained face recognition is still an open problem, as state-of-the-art algorithms have not yet reached high recognition performance in real-world environments (e.g., crowd scenes at the Boston Marathon). This paper addresses this problem by proposing a new approach called Adaptive Sparse Representation of Random Patches (ASR+). In the learning stage, for each enrolled subject, a number of random patches are extracted from the subject's gallery images in order to construct representative dictionaries. In the testing stage, random test patches of the query image are extracted, and for each test patch a dictionary is built concatenating the `best' representative dictionary of each subject. Using this adapted dictionary, each test patch is classified following the Sparse Representation Classification (SRC) methodology. Finally, the query image is classified by patch voting. Thus, our approach is able to deal with a larger degree of variability in ambient lighting, pose, expression, occlusion, face size and distance from the camera. Experiments were carried out on five widely-used face databases. Results show that ASR+ deals well with unconstrained conditions, outperforming various representative methods in the literature in many complex scenarios.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134070250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Malware detection using HTTP user-agent discrepancy identification 使用HTTP用户代理差异识别进行恶意软件检测
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084331
Martin Grill, M. Rehák
Botnet detection systems that use Network Behavioral Analysis (NBA) principle struggle with performance and privacy issues on large-scale networks. Because of that many researchers focus on fast and simple bot detection methods that at the same time use as little information as possible to avoid privacy violations. Next, deep inspections, reverse engineering, clustering and other time consuming approaches are typically unfeasible in large-scale networks. In this paper we present a novel technique that uses User- Agent field contained in the HTTP header, that can be easily obtained from the web proxy logs, to identify malware that uses User-Agents discrepant with the ones actually used by the infected user. We are using statistical information about the usage of the User-Agent of each user together with the usage of particular User-Agent across the whole analyzed network and typically visited domains. Using those statistics we can identify anomalies, which we proved to be caused by malware-infected hosts in the network. Because of our simple and computationally inexpensive approach we can inspect data from extremely large networks with minimal computational costs.
采用网络行为分析(NBA)原理的僵尸网络检测系统在大规模网络中面临性能和隐私问题。正因为如此,许多研究人员专注于快速和简单的机器人检测方法,同时使用尽可能少的信息来避免侵犯隐私。其次,深度检查、逆向工程、聚类和其他耗时的方法在大规模网络中通常是不可行的。在本文中,我们提出了一种新技术,该技术使用包含在HTTP头中的User-Agent字段,可以很容易地从web代理日志中获得,以识别使用与受感染用户实际使用的用户-代理不同的恶意软件。我们使用关于每个用户user - agent使用情况的统计信息,以及整个分析网络和通常访问的域中特定user - agent的使用情况。使用这些统计数据,我们可以识别异常,我们证明是由网络中受恶意软件感染的主机引起的。由于我们简单且计算成本低廉的方法,我们可以用最小的计算成本检查来自极大网络的数据。
{"title":"Malware detection using HTTP user-agent discrepancy identification","authors":"Martin Grill, M. Rehák","doi":"10.1109/WIFS.2014.7084331","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084331","url":null,"abstract":"Botnet detection systems that use Network Behavioral Analysis (NBA) principle struggle with performance and privacy issues on large-scale networks. Because of that many researchers focus on fast and simple bot detection methods that at the same time use as little information as possible to avoid privacy violations. Next, deep inspections, reverse engineering, clustering and other time consuming approaches are typically unfeasible in large-scale networks. In this paper we present a novel technique that uses User- Agent field contained in the HTTP header, that can be easily obtained from the web proxy logs, to identify malware that uses User-Agents discrepant with the ones actually used by the infected user. We are using statistical information about the usage of the User-Agent of each user together with the usage of particular User-Agent across the whole analyzed network and typically visited domains. Using those statistics we can identify anomalies, which we proved to be caused by malware-infected hosts in the network. Because of our simple and computationally inexpensive approach we can inspect data from extremely large networks with minimal computational costs.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123945067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Unsupervised feature learning for bootleg detection using deep learning architectures 使用深度学习架构进行盗版检测的无监督特征学习
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084316
Michele Buccoli, Paolo Bestagini, M. Zanoni, A. Sarti, S. Tubaro
The widespread diffusion of portable devices capable of capturing high-quality multimedia data, together with the rapid proliferation of media sharing platforms, has determined an incredible growth of user-generated content available online. Since it is hard to strictly regulate this trend, illegal diffusion of copyrighted material is often likely to occur. This is the case of audio bootlegs, i.e., concerts illegally recorded and redistributed by fans. In this paper, we propose a bootleg detector, with the aim of disambiguating between: i) bootlegs unofficially recorded; ii) live concerts officially published; iii) studio recordings from officially released albums. The proposed method is based on audio feature analysis and machine learning techniques. We exploit a deep learning paradigm to extract highly characterizing features from audio excerpts, and a supervised classifier for detection. The method is validated against a dataset of nearly 500 songs, and results are compared to a state-of-the-art detector. The conducted experiments confirm the capability of deep learning techniques to outperform classic feature extraction approaches.
能够捕获高质量多媒体数据的便携式设备的广泛普及,以及媒体共享平台的迅速扩散,决定了在线用户生成内容的惊人增长。由于很难严格控制这种趋势,因此经常可能发生非法传播受版权保护的材料。这就是盗版音乐的情况,即由歌迷非法录制和重新分发的音乐会。在本文中,我们提出了一种盗版检测器,其目的是消除以下两点之间的歧义:i)非官方记录的盗版;Ii)正式发布的现场音乐会;Iii)正式发行专辑的录音室录音。该方法基于音频特征分析和机器学习技术。我们利用深度学习范式从音频摘录中提取高度表征的特征,并利用监督分类器进行检测。该方法在近500首歌曲的数据集上进行了验证,并将结果与最先进的检测器进行了比较。所进行的实验证实了深度学习技术优于经典特征提取方法的能力。
{"title":"Unsupervised feature learning for bootleg detection using deep learning architectures","authors":"Michele Buccoli, Paolo Bestagini, M. Zanoni, A. Sarti, S. Tubaro","doi":"10.1109/WIFS.2014.7084316","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084316","url":null,"abstract":"The widespread diffusion of portable devices capable of capturing high-quality multimedia data, together with the rapid proliferation of media sharing platforms, has determined an incredible growth of user-generated content available online. Since it is hard to strictly regulate this trend, illegal diffusion of copyrighted material is often likely to occur. This is the case of audio bootlegs, i.e., concerts illegally recorded and redistributed by fans. In this paper, we propose a bootleg detector, with the aim of disambiguating between: i) bootlegs unofficially recorded; ii) live concerts officially published; iii) studio recordings from officially released albums. The proposed method is based on audio feature analysis and machine learning techniques. We exploit a deep learning paradigm to extract highly characterizing features from audio excerpts, and a supervised classifier for detection. The method is validated against a dataset of nearly 500 songs, and results are compared to a state-of-the-art detector. The conducted experiments confirm the capability of deep learning techniques to outperform classic feature extraction approaches.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124096498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The optimal attack to histogram-based forensic detectors is simple(x) 对基于直方图的取证检测器的最佳攻击很简单(x)
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084317
Pedro Comesaña Alfaro, F. Pérez-González
In the last years a number of counterforensics tools have been proposed. Although most of them are heuristic and designed ad hoc, lately a formal approach to this problem, rooted in transportation theory, has been pursued. This paper follows this path by designing optimal attacks against histogrambased detectors where the detection region is non-convex. The usefulness of our strategy is demonstrated by providing for the first time the optimal solution to the design of attacks against Benford's Law-based detectors, a problem that has deserved large practical interest by the forensic community. The performance of the proposed scheme is compared with that of the best existing counterforensic method against Benford-based detectors, showing the goodness (indeed, the optimality) of our approach.
在过去的几年里,人们提出了许多反取证工具。虽然其中大多数是启发式的和特别设计的,但最近已经开始采用一种基于运输理论的正式方法来解决这个问题。本文通过设计针对基于直方图的检测器的最优攻击来遵循这条路径,其中检测区域是非凸的。我们的策略的有用性通过首次提供针对本福德基于法律的检测器的攻击设计的最佳解决方案得到了证明,这是一个值得法医社区广泛关注的实际问题。将所提出方案的性能与针对基于benford的检测器的现有最佳反取证方法的性能进行了比较,显示了我们方法的优点(实际上是最优性)。
{"title":"The optimal attack to histogram-based forensic detectors is simple(x)","authors":"Pedro Comesaña Alfaro, F. Pérez-González","doi":"10.1109/WIFS.2014.7084317","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084317","url":null,"abstract":"In the last years a number of counterforensics tools have been proposed. Although most of them are heuristic and designed ad hoc, lately a formal approach to this problem, rooted in transportation theory, has been pursued. This paper follows this path by designing optimal attacks against histogrambased detectors where the detection region is non-convex. The usefulness of our strategy is demonstrated by providing for the first time the optimal solution to the design of attacks against Benford's Law-based detectors, a problem that has deserved large practical interest by the forensic community. The performance of the proposed scheme is compared with that of the best existing counterforensic method against Benford-based detectors, showing the goodness (indeed, the optimality) of our approach.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125974383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Minutiae set to bit-string conversion using multi-scale bag-of-words paradigm 细枝末节设置为使用多尺度词袋范式的位串转换
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084294
W. Wong, M. D. Wong, Y. Kho, A. Teoh
Minutiae-based matching is commonly used in fingerprint recognition systems due to its proven performance. However, such matching procedure usually involves unordered and variable size templates and it does not favour emerging bio-cryptography applications and most classifiers. This paper proposes a solution by converting the original minutiae set into a bit-string through the amalgamation of bag-of-words modelling, multi-scale construction and dynamic quantization. Experimental results show that the proposed method has high potential in biocryptography applications due to its outstanding EER of <; 0:51% and entropy of 723 bits. Further security and privacy concerns are also analyzed.
基于特征的匹配由于其良好的性能而被广泛应用于指纹识别系统中。然而,这种匹配过程通常涉及无序和可变大小的模板,它不适合新兴的生物密码学应用和大多数分类器。本文提出了一种结合词袋建模、多尺度构造和动态量化的方法,将原始细节集转化为位串的解决方案。实验结果表明,该方法具有良好的EER <;0:51,熵为723位。进一步的安全和隐私问题也进行了分析。
{"title":"Minutiae set to bit-string conversion using multi-scale bag-of-words paradigm","authors":"W. Wong, M. D. Wong, Y. Kho, A. Teoh","doi":"10.1109/WIFS.2014.7084294","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084294","url":null,"abstract":"Minutiae-based matching is commonly used in fingerprint recognition systems due to its proven performance. However, such matching procedure usually involves unordered and variable size templates and it does not favour emerging bio-cryptography applications and most classifiers. This paper proposes a solution by converting the original minutiae set into a bit-string through the amalgamation of bag-of-words modelling, multi-scale construction and dynamic quantization. Experimental results show that the proposed method has high potential in biocryptography applications due to its outstanding EER of <; 0:51% and entropy of 723 bits. Further security and privacy concerns are also analyzed.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132431608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Selection-channel-aware rich model for Steganalysis of digital images 数字图像隐写分析的选择通道感知丰富模型
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084302
Tomáš Denemark, V. Sedighi, Vojtech Holub, R. Cogranne, J. Fridrich
From the perspective of signal detection theory, it seems obvious that knowing the probabilities with which the individual cover elements are modified during message embedding (the so-called probabilistic selection channel) should improve steganalysis. It is, however, not clear how to incorporate this information into steganalysis features when the detector is built as a classifier. In this paper, we propose a variant of the popular spatial rich model (SRM) that makes use of the selection channel. We demonstrate on three state-of-the-art content-adaptive steganographic schemes that even an imprecise knowledge of the embedding probabilities can substantially increase the detection accuracy in comparison with feature sets that do not consider the selection channel. Overly adaptive embedding schemes seem to be more vulnerable than schemes that spread the embedding changes more evenly throughout the cover.
从信号检测理论的角度来看,似乎很明显,知道在消息嵌入期间单个覆盖元素被修改的概率(所谓的概率选择通道)应该改善隐写分析。然而,当检测器作为分类器构建时,如何将这些信息合并到隐写分析特征中尚不清楚。在本文中,我们提出了一种利用选择通道的空间丰富模型(SRM)的变体。我们展示了三种最先进的内容自适应隐写方案,与不考虑选择通道的特征集相比,即使对嵌入概率有不精确的了解,也可以大大提高检测精度。过度自适应的嵌入方案似乎比在整个覆盖物中更均匀地分布嵌入变化的方案更脆弱。
{"title":"Selection-channel-aware rich model for Steganalysis of digital images","authors":"Tomáš Denemark, V. Sedighi, Vojtech Holub, R. Cogranne, J. Fridrich","doi":"10.1109/WIFS.2014.7084302","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084302","url":null,"abstract":"From the perspective of signal detection theory, it seems obvious that knowing the probabilities with which the individual cover elements are modified during message embedding (the so-called probabilistic selection channel) should improve steganalysis. It is, however, not clear how to incorporate this information into steganalysis features when the detector is built as a classifier. In this paper, we propose a variant of the popular spatial rich model (SRM) that makes use of the selection channel. We demonstrate on three state-of-the-art content-adaptive steganographic schemes that even an imprecise knowledge of the embedding probabilities can substantially increase the detection accuracy in comparison with feature sets that do not consider the selection channel. Overly adaptive embedding schemes seem to be more vulnerable than schemes that spread the embedding changes more evenly throughout the cover.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121733488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 293
期刊
2014 IEEE International Workshop on Information Forensics and Security (WIFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1