首页 > 最新文献

2012 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

英文 中文
AC-3 bit stream watermarking AC-3位流水印
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412646
Xiao-Ming Chen, Michael Arnold, P. Baum, G. Doërr
AC-3 audio compression find applications in home cinema, DVD, BD and digital television. This paper addresses the challenge of transparently watermarking AC-3 bit streams instead of the conventional decoding - baseband watermarking - re-encoding approach. We discuss the alternate possibilities to embed watermarks by altering the MDCT coefficients delivered in the bit stream, which consists of mantissas and exponents. We then introduce an AC-3 bit stream watermarking system that is accomplished by solely modifying mantissas to obtain a low computational complexity. We subsequently present the associated watermark detector, which proves to be interoperable with a legacy watermarking system that operates in a different embedding domain. Finally, we compare the proposed bit stream system with the regular decoding - watermarking - re-encoding chain to verify the quality and robustness.
AC-3音频压缩发现在家庭影院,DVD, BD和数字电视的应用。本文解决了对AC-3比特流进行透明水印的挑战,取代了传统的解码-基带水印-重编码方法。我们讨论了通过改变比特流中传递的MDCT系数来嵌入水印的替代可能性,比特流由尾数和指数组成。然后,我们介绍了一种AC-3位流水印系统,该系统仅通过修改尾数来获得较低的计算复杂度。随后,我们提出了相关的水印检测器,该检测器被证明可以与在不同嵌入域中运行的传统水印系统互操作。最后,我们将所提出的比特流系统与常规的解码-水印-重编码链进行了比较,以验证其质量和鲁棒性。
{"title":"AC-3 bit stream watermarking","authors":"Xiao-Ming Chen, Michael Arnold, P. Baum, G. Doërr","doi":"10.1109/WIFS.2012.6412646","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412646","url":null,"abstract":"AC-3 audio compression find applications in home cinema, DVD, BD and digital television. This paper addresses the challenge of transparently watermarking AC-3 bit streams instead of the conventional decoding - baseband watermarking - re-encoding approach. We discuss the alternate possibilities to embed watermarks by altering the MDCT coefficients delivered in the bit stream, which consists of mantissas and exponents. We then introduce an AC-3 bit stream watermarking system that is accomplished by solely modifying mantissas to obtain a low computational complexity. We subsequently present the associated watermark detector, which proves to be interoperable with a legacy watermarking system that operates in a different embedding domain. Finally, we compare the proposed bit stream system with the regular decoding - watermarking - re-encoding chain to verify the quality and robustness.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low level crowd analysis using frame-wise normalized feature for people counting 使用逐帧归一化特征进行人员计数的低级人群分析
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412657
H. Fradi, J. Dugelay
People counting is a crucial component in visual surveillance mainly for crowd monitoring and management. Recently, significant progress has been made in this field by using features regression. In this context, perspective distortions have been frequently studied, however, crowded scenes remain particularly challenging and could deeply affect the count because of the partial occlusions that occur between individuals. To address these challenges, we propose a people counting approach that harness the advantage of incorporating an uniform motion model into Gaussian Mixture Model (GMM) background subtraction to obtain high accurate foreground segmentation. The counting is based on foreground measurements, where a perspective normalization and a crowd measure-informed corner density are introduced with foreground pixel counts into a single feature. Afterwards, the correspondence between this frame-wise feature and the number of persons is learned by Gaussian Process regression. Experimental results demonstrate the benefits of integrating GMM with motion cue, and normalizing the proposed feature as well. Also, by means of comparisons to other feature-based methods, our approach has been experimentally validated showing more accurate results.
人数统计是视觉监控的重要组成部分,主要用于人群监控和管理。近年来,特征回归在这一领域取得了重大进展。在这种情况下,视角扭曲经常被研究,然而,拥挤的场景仍然特别具有挑战性,并且由于个体之间发生的部分遮挡可能会深刻影响计数。为了解决这些挑战,我们提出了一种人员计数方法,该方法利用将均匀运动模型纳入高斯混合模型(GMM)背景减法的优势,以获得高精度的前景分割。计数是基于前景测量,其中引入了视角归一化和人群测量通知角密度,前景像素计数为单个特征。然后,通过高斯过程回归学习该帧特征与人数之间的对应关系。实验结果表明,将GMM与运动线索相结合,并对所提出的特征进行归一化处理是有益的。此外,通过与其他基于特征的方法的比较,我们的方法已经得到了实验验证,显示出更准确的结果。
{"title":"Low level crowd analysis using frame-wise normalized feature for people counting","authors":"H. Fradi, J. Dugelay","doi":"10.1109/WIFS.2012.6412657","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412657","url":null,"abstract":"People counting is a crucial component in visual surveillance mainly for crowd monitoring and management. Recently, significant progress has been made in this field by using features regression. In this context, perspective distortions have been frequently studied, however, crowded scenes remain particularly challenging and could deeply affect the count because of the partial occlusions that occur between individuals. To address these challenges, we propose a people counting approach that harness the advantage of incorporating an uniform motion model into Gaussian Mixture Model (GMM) background subtraction to obtain high accurate foreground segmentation. The counting is based on foreground measurements, where a perspective normalization and a crowd measure-informed corner density are introduced with foreground pixel counts into a single feature. Afterwards, the correspondence between this frame-wise feature and the number of persons is learned by Gaussian Process regression. Experimental results demonstrate the benefits of integrating GMM with motion cue, and normalizing the proposed feature as well. Also, by means of comparisons to other feature-based methods, our approach has been experimentally validated showing more accurate results.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126855167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
A framework for privacy preserving statistical analysis on distributed databases 分布式数据库中保护隐私的统计分析框架
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412626
Bing-Rong Lin, Ye Wang, S. Rane
Alice and Bob are mutually untrusting curators who possess separate databases containing information about a set of respondents. This data is to be sanitized and published to enable accurate statistical analysis, while retaining the privacy of the individual respondents in the databases. Further, an adversary who looks at the published data must not even be able to compute statistical measures on it. Only an authorized researcher should be able to compute marginal and joint statistics. This work is an attempt toward providing a theoretical formulation of privacy and utility for problems of this type. Privacy of the individual respondents is formulated using ϵ-differential privacy. Privacy of the marginal and joint statistics on the distributed databases is formulated using a new model called δ-distributional ϵ-differential privacy. Finally, a constructive scheme based on randomized response is presented as an example mechanism that satisfies the formulated privacy requirements.
Alice和Bob是互不信任的管理员,他们各自拥有包含一组应答者信息的数据库。这些数据将经过处理和发布,以便进行准确的统计分析,同时在数据库中保留个别受访者的隐私。此外,查看已发布数据的攻击者甚至不能对其进行统计度量。只有经过授权的研究人员才能计算边际统计和联合统计。这项工作试图为这类问题提供一种关于隐私和效用的理论表述。个人受访者的隐私是使用ϵ-differential隐私来制定的。采用δ-distributional ϵ-differential隐私模型对分布式数据库的边际统计和联合统计的隐私进行了阐述。最后,提出了一种基于随机响应的建设性方案,作为满足制定的隐私要求的机制示例。
{"title":"A framework for privacy preserving statistical analysis on distributed databases","authors":"Bing-Rong Lin, Ye Wang, S. Rane","doi":"10.1109/WIFS.2012.6412626","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412626","url":null,"abstract":"Alice and Bob are mutually untrusting curators who possess separate databases containing information about a set of respondents. This data is to be sanitized and published to enable accurate statistical analysis, while retaining the privacy of the individual respondents in the databases. Further, an adversary who looks at the published data must not even be able to compute statistical measures on it. Only an authorized researcher should be able to compute marginal and joint statistics. This work is an attempt toward providing a theoretical formulation of privacy and utility for problems of this type. Privacy of the individual respondents is formulated using ϵ-differential privacy. Privacy of the marginal and joint statistics on the distributed databases is formulated using a new model called δ-distributional ϵ-differential privacy. Finally, a constructive scheme based on randomized response is presented as an example mechanism that satisfies the formulated privacy requirements.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"407 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124324578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Active content fingerprinting: A marriage of digital watermarking and content fingerprinting 主动内容指纹识别:数字水印和内容指纹识别的结合
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412645
S. Voloshynovskiy, F. Farhadzadeh, O. Koval, T. Holotyak
Content fingerprinting and digital watermarking are techniques that are used for the content protection and distribution monitoring. Nowadays, both techniques are well studied and their shortcomings are understood. In this paper, we introduce a new framework named as active content fingerprinting that takes the best from two worlds of content fingerprinting and digital watermarking to overcome some of fundamental restrictions of these techniques in terms of performance and complexity. The proposed framework extends the encoding of conventional content fingerprinting in the way similar to digital watermarking thus allowing to extract the fingerprints from the modified cover data. We consider several encoding strategies, examine the performance of the proposed schemes in terms of bit error rate and compare it with those of conventional fingerprinting and digital watermarking.
内容指纹和数字水印是用于内容保护和分发监控的技术。如今,这两种技术都得到了很好的研究,它们的缺点也得到了了解。在本文中,我们引入了一种名为主动内容指纹识别的新框架,它充分利用了内容指纹识别和数字水印这两个领域的优点,克服了这些技术在性能和复杂性方面的一些基本限制。所提出的框架以类似于数字水印的方式扩展了传统内容指纹的编码,从而允许从修改后的封面数据中提取指纹。我们考虑了几种编码策略,从误码率的角度检查了所提出方案的性能,并将其与传统的指纹识别和数字水印进行了比较。
{"title":"Active content fingerprinting: A marriage of digital watermarking and content fingerprinting","authors":"S. Voloshynovskiy, F. Farhadzadeh, O. Koval, T. Holotyak","doi":"10.1109/WIFS.2012.6412645","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412645","url":null,"abstract":"Content fingerprinting and digital watermarking are techniques that are used for the content protection and distribution monitoring. Nowadays, both techniques are well studied and their shortcomings are understood. In this paper, we introduce a new framework named as active content fingerprinting that takes the best from two worlds of content fingerprinting and digital watermarking to overcome some of fundamental restrictions of these techniques in terms of performance and complexity. The proposed framework extends the encoding of conventional content fingerprinting in the way similar to digital watermarking thus allowing to extract the fingerprints from the modified cover data. We consider several encoding strategies, examine the performance of the proposed schemes in terms of bit error rate and compare it with those of conventional fingerprinting and digital watermarking.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"34 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116268613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Detection of video double encoding with GOP size estimation 基于GOP大小估计的视频双编码检测
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412641
David Vázquez-Padín, M. Fontani, T. Bianchi, Pedro Comesaña Alfaro, A. Piva, M. Barni
Video forensics is an emerging discipline, that aims at inferring information about the processing history undergone by a digital video in a blind fashion. In this work we introduce a new forensic footprint and, based on it, propose a method for detecting whether a video has been encoded twice; if this is the case, we also estimate the size of the Group Of Pictures (GOP) employed during the first encoding. As shown in the experiments, the footprint proves to be very robust even in realistic settings (i.e., when encoding is carried out using typical compression rates), that are rarely addressed by existing techniques.
视频取证是一门新兴学科,旨在以盲法推断数字视频所经历的处理历史信息。在这项工作中,我们引入了一种新的取证足迹,并在此基础上提出了一种检测视频是否被编码两次的方法;如果是这种情况,我们还估计在第一次编码期间使用的图像组(GOP)的大小。正如实验中所示,即使在现实环境中(即,当使用典型压缩率进行编码时),内存占用也被证明是非常健壮的,而现有技术很少解决这些问题。
{"title":"Detection of video double encoding with GOP size estimation","authors":"David Vázquez-Padín, M. Fontani, T. Bianchi, Pedro Comesaña Alfaro, A. Piva, M. Barni","doi":"10.1109/WIFS.2012.6412641","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412641","url":null,"abstract":"Video forensics is an emerging discipline, that aims at inferring information about the processing history undergone by a digital video in a blind fashion. In this work we introduce a new forensic footprint and, based on it, propose a method for detecting whether a video has been encoded twice; if this is the case, we also estimate the size of the Group Of Pictures (GOP) employed during the first encoding. As shown in the experiments, the footprint proves to be very robust even in realistic settings (i.e., when encoding is carried out using typical compression rates), that are rarely addressed by existing techniques.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123538698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Semantic based DNS forensics 基于语义的DNS取证
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412631
Samuel Marchal, J. François, R. State, T. Engel
In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. We propose a new technique that leverages semantic and natural language processing tools in order to analyze large volumes of DNS data. The main research novelty consists in detecting malicious and dangerous domain names by evaluating the semantic similarity with already known names. This process can provide valuable information for reconstructing network and user activities. We show the efficiency of the method on experimental real datasets gathered from a national passive DNS system.
在网络级取证中,域名服务(DNS)是一个丰富的信息源。本文描述了一种用于取证目的的DNS数据挖掘的新方法。我们提出了一种利用语义和自然语言处理工具来分析大量DNS数据的新技术。主要的研究新颖之处在于通过评估与已知域名的语义相似度来检测恶意和危险域名。这个过程可以为重建网络和用户活动提供有价值的信息。我们在一个国家无源DNS系统的实验数据集上证明了该方法的有效性。
{"title":"Semantic based DNS forensics","authors":"Samuel Marchal, J. François, R. State, T. Engel","doi":"10.1109/WIFS.2012.6412631","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412631","url":null,"abstract":"In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. We propose a new technique that leverages semantic and natural language processing tools in order to analyze large volumes of DNS data. The main research novelty consists in detecting malicious and dangerous domain names by evaluating the semantic similarity with already known names. This process can provide valuable information for reconstructing network and user activities. We show the efficiency of the method on experimental real datasets gathered from a national passive DNS system.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125974804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimum forensic and counter-forensic strategies for source identification with training data 训练数据源识别的最佳取证和反取证策略
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412649
M. Barni, B. Tondi
In the attempt to provide a mathematical background to multimedia forensics, we introduce the source identification game with training data. The game models a scenario in which a forensic analyst has to decide whether a test sequence has been drawn from a source X or not. In turn, the adversary takes a sequence generated by a different source a modifies it in such a way to induce a classification error. The source X is known only through one or more training sequences. We derive the asymptotic Nash equilibrium of the game under the assumption that the analyst relies only on first order statistics of the test sequence. A geometric interpretation of the result is given together with a comparison with a similar version of the game with known sources. The comparison between the two versions of the games gives interesting insights into the differences and similarities of the two games.
为了给多媒体取证提供数学背景,我们引入了带有训练数据的源识别游戏。该游戏模拟了一个场景,在这个场景中,法医分析师必须决定测试序列是否来自源X。反过来,攻击者获取由不同来源生成的序列,并以这种方式修改它以引起分类错误。只有通过一个或多个训练序列才能知道源X。在分析者只依赖检验序列的一阶统计量的假设下,导出了博弈的渐近纳什均衡。给出了结果的几何解释,并与已知来源的类似游戏版本进行了比较。通过对两个版本的比较,我们可以发现这两款游戏的异同之处。
{"title":"Optimum forensic and counter-forensic strategies for source identification with training data","authors":"M. Barni, B. Tondi","doi":"10.1109/WIFS.2012.6412649","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412649","url":null,"abstract":"In the attempt to provide a mathematical background to multimedia forensics, we introduce the source identification game with training data. The game models a scenario in which a forensic analyst has to decide whether a test sequence has been drawn from a source X or not. In turn, the adversary takes a sequence generated by a different source a modifies it in such a way to induce a classification error. The source X is known only through one or more training sequences. We derive the asymptotic Nash equilibrium of the game under the assumption that the analyst relies only on first order statistics of the test sequence. A geometric interpretation of the result is given together with a comparison with a similar version of the game with known sources. The comparison between the two versions of the games gives interesting insights into the differences and similarities of the two games.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Capacity control of reversible watermarking by two-thresholds embedding 基于双阈值嵌入的可逆水印容量控制
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412653
I. Caciula, D. Coltuc
The distortion introduced by the watermarking depends on the embedded capacity. For the difference expansion reversible watermarking, the classical threshold control does not ensure a fine tuning of the embedding capacity and the simple partial embedding can introduce artifacts. This paper proposes the fine tuning of the capacity by splitting the image into two parts and by marking them with consecutive threshold values. Intermediate capacity values between the ones provided by the thresholds are obtained by varying the ratio between the two parts. The method ensures a fine control of the capacity without introducing artifacts. Experimental results are provided.
水印所带来的失真取决于嵌入的容量。对于差分扩展可逆水印,经典的阈值控制不能保证嵌入容量的微调,简单的局部嵌入容易引入伪影。本文提出了将图像分割成两部分,并用连续的阈值标记它们的方法来微调容量。通过改变两部分之间的比率,可以获得阈值之间的中间容量值。该方法确保了对容量的精细控制,而不引入伪影。给出了实验结果。
{"title":"Capacity control of reversible watermarking by two-thresholds embedding","authors":"I. Caciula, D. Coltuc","doi":"10.1109/WIFS.2012.6412653","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412653","url":null,"abstract":"The distortion introduced by the watermarking depends on the embedded capacity. For the difference expansion reversible watermarking, the classical threshold control does not ensure a fine tuning of the embedding capacity and the simple partial embedding can introduce artifacts. This paper proposes the fine tuning of the capacity by splitting the image into two parts and by marking them with consecutive threshold values. Intermediate capacity values between the ones provided by the thresholds are obtained by varying the ratio between the two parts. The method ensures a fine control of the capacity without introducing artifacts. Experimental results are provided.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117350653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Watermarking method with exact self-propagating restoration capabilities 具有精确自传播恢复能力的水印方法
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412652
Sergio Bravo-Solorio, Chang-Tsun Li, A. Nandi
This paper proposes a new fragile watermarking capable of perfectly restoring the original watermarked pixels of a tampered image. First, a secure block-wise mechanism, resilient to cropping, is used to localise tampered blocks of pixels. The authentic pixels and some reference bits are then used to estimate the original 5 most significant bits (MSBs) of the tampered pixels by means of an exhaustive and iterative restoration mechanism. Results are presented to demonstrate the restoration capabilities of the proposed mechanism.
本文提出了一种新的脆弱水印算法,该算法能够完美地恢复被篡改图像的原始水印像素。首先,一个安全的块方向机制,弹性裁剪,被用来定位篡改的像素块。然后使用真实像素和一些参考位,通过穷举和迭代恢复机制来估计篡改像素的原始5个最高有效位(msb)。结果证明了该机制的恢复能力。
{"title":"Watermarking method with exact self-propagating restoration capabilities","authors":"Sergio Bravo-Solorio, Chang-Tsun Li, A. Nandi","doi":"10.1109/WIFS.2012.6412652","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412652","url":null,"abstract":"This paper proposes a new fragile watermarking capable of perfectly restoring the original watermarked pixels of a tampered image. First, a secure block-wise mechanism, resilient to cropping, is used to localise tampered blocks of pixels. The authentic pixels and some reference bits are then used to estimate the original 5 most significant bits (MSBs) of the tampered pixels by means of an exhaustive and iterative restoration mechanism. Results are presented to demonstrate the restoration capabilities of the proposed mechanism.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Fingerprinting a flow of messages to an anonymous server 对发送到匿名服务器的消息流进行指纹识别
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412632
J. Elices, F. Pérez-González
We present an attack to locate hidden servers in anonymous common networks. The attack is based on correlating the flow of messages that arrives to a certain server with the flow that is created by the attacker client. The fingerprint is constructed by sending requests, each request determines one interval. To improve the performance a prediction of the time of arrival is done for each request. We propose an optimal detector to decide whether the flow is fingerprinted, based on the Neyman-Pearson lemma. The usefulness of our algorithm is shown for the case of locating a Tor Hidden Service (HS), where we analytically determine the parameters that yield a fixed false positive probability and compute the corresponding detection probability. Finally, we empirically validate our results with a simulator and with a real implementation on the live Tor network. Results show that our algorithm outperforms any other flow watermarking scheme. Our design also yields a small detectability.
我们提出了一种在匿名公共网络中定位隐藏服务器的攻击方法。攻击基于将到达某个服务器的消息流与攻击者客户机创建的流相关联。指纹是通过发送请求来构造的,每个请求确定一个间隔。为了提高性能,对每个请求的到达时间进行预测。我们提出了一种基于内曼-皮尔逊引理的最优检测器来判断流是否被指纹化。我们的算法在定位Tor隐藏服务(HS)的情况下显示了实用性,其中我们分析确定产生固定假阳性概率的参数并计算相应的检测概率。最后,我们通过模拟器和实时Tor网络上的实际实现来验证我们的结果。实验结果表明,该算法优于其他流水印方案。我们的设计也产生了一个小的可探测性。
{"title":"Fingerprinting a flow of messages to an anonymous server","authors":"J. Elices, F. Pérez-González","doi":"10.1109/WIFS.2012.6412632","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412632","url":null,"abstract":"We present an attack to locate hidden servers in anonymous common networks. The attack is based on correlating the flow of messages that arrives to a certain server with the flow that is created by the attacker client. The fingerprint is constructed by sending requests, each request determines one interval. To improve the performance a prediction of the time of arrival is done for each request. We propose an optimal detector to decide whether the flow is fingerprinted, based on the Neyman-Pearson lemma. The usefulness of our algorithm is shown for the case of locating a Tor Hidden Service (HS), where we analytically determine the parameters that yield a fixed false positive probability and compute the corresponding detection probability. Finally, we empirically validate our results with a simulator and with a real implementation on the live Tor network. Results show that our algorithm outperforms any other flow watermarking scheme. Our design also yields a small detectability.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131936435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2012 IEEE International Workshop on Information Forensics and Security (WIFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1