首页 > 最新文献

Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security最新文献

英文 中文
A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural Networks 一种基于卷积神经网络的图像处理参数估计通用方法
Belhassen Bayar, M. Stamm
Estimating manipulation parameter values is an important problem in image forensics. While several algorithms have been proposed to accomplish this, their application is exclusively limited to one type of image manipulation. These existing techniques are often designed using classical approaches from estimation theory by constructing parametric models of image data. This is problematic since this process of developing a theoretical model then deriving a parameter estimator must be repeated each time a new image manipulation is derived. In this paper, we propose a new data-driven generic approach to performing manipulation parameter estimation. Our proposed approach can be adapted to operate on several different manipulations without requiring a forensic investigator to make substantial changes to the proposed method. To accomplish this, we reformulate estimation as a classification problem by partitioning the parameter space into disjoint subsets such that each parameter subset is assigned a distinct class. Subsequently, we design a constrained CNN-based classifier that is able to extract classification features directly from data as well as estimating the manipulation parameter value in a subject image. Through a set of experiments, we demonstrated the effectiveness of our approach using four different types of manipulations.
估计操作参数值是图像取证中的一个重要问题。虽然已经提出了几种算法来实现这一点,但它们的应用仅限于一种类型的图像处理。这些现有的技术通常是通过构造图像数据的参数模型,利用估计理论中的经典方法来设计的。这是有问题的,因为每次导出新的图像处理时,必须重复开发理论模型然后推导参数估计器的过程。在本文中,我们提出了一种新的数据驱动的通用方法来执行操作参数估计。我们提出的方法可以适用于几种不同的操作,而不需要法医调查员对提出的方法进行实质性的修改。为了实现这一点,我们通过将参数空间划分为不相交的子集,使每个参数子集被分配一个不同的类,将估计重新表述为一个分类问题。随后,我们设计了一个基于约束cnn的分类器,该分类器能够直接从数据中提取分类特征,并估计主题图像中的操作参数值。通过一系列实验,我们通过四种不同类型的操作证明了我们的方法的有效性。
{"title":"A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural Networks","authors":"Belhassen Bayar, M. Stamm","doi":"10.1145/3082031.3083249","DOIUrl":"https://doi.org/10.1145/3082031.3083249","url":null,"abstract":"Estimating manipulation parameter values is an important problem in image forensics. While several algorithms have been proposed to accomplish this, their application is exclusively limited to one type of image manipulation. These existing techniques are often designed using classical approaches from estimation theory by constructing parametric models of image data. This is problematic since this process of developing a theoretical model then deriving a parameter estimator must be repeated each time a new image manipulation is derived. In this paper, we propose a new data-driven generic approach to performing manipulation parameter estimation. Our proposed approach can be adapted to operate on several different manipulations without requiring a forensic investigator to make substantial changes to the proposed method. To accomplish this, we reformulate estimation as a classification problem by partitioning the parameter space into disjoint subsets such that each parameter subset is assigned a distinct class. Subsequently, we design a constrained CNN-based classifier that is able to extract classification features directly from data as well as estimating the manipulation parameter value in a subject image. Through a set of experiments, we demonstrated the effectiveness of our approach using four different types of manipulations.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121353140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC H.264/AVC中基于运动矢量的隐写分析的组合与校正特征
Liming Zhai, Lina Wang, Yanzhen Ren
This paper presents a novel feature set for steganalysis of motion vector-based steganography in H.264/AVC. First, the influence of steganographic embedding on the sum of absolute difference (SAD) and the motion vector difference (MVD) is analyzed, and then the statistical characteristics of these two aspects are combined to design features. In terms of SAD, the macroblock partition modes are used to measure the quantization distortion, and by using the optimality of SAD in neighborhood, the partition based neighborhood optimal probability features are extracted. In terms of MVD, it has been proved that MVD is better in feature construction than neighboring motion vector difference (NMVD) which has been widely used by traditional steganalyzers, and thus the inter and intra co-occurrence features are constructed based on the distribution of two components of neighboring MVDs and the distribution of two components of the same MVD. Finally, the combined features are enhanced by window optimal calibration, which utilizes the optimality of both SAD and MVD in a local window area. Experiments on various conditions demonstrate that the proposed scheme generally achieves a more accurate detection than current methods especially for videos encoded in variable block size and high quantization parameter values, and exhibits strong universality in applications.
本文提出了H.264/AVC中基于运动矢量的隐写分析的一种新的特征集。首先分析隐写嵌入对绝对差(SAD)和运动矢量差(MVD)和的影响,然后结合这两方面的统计特性设计特征。在SAD方面,采用宏块分割模式来度量量化失真,利用SAD在邻域的最优性,提取基于分割的邻域最优概率特征。在MVD方面,证明了MVD在特征构建方面优于传统隐写分析仪广泛使用的相邻运动矢量差(NMVD),因此基于相邻运动矢量差的两分量分布和相同运动矢量差的两分量分布构建了帧间和帧内共现特征。最后,通过窗口最优校准来增强组合特征,该窗口最优校准利用了局部窗口区域内SAD和MVD的最优性。在各种条件下的实验表明,该方法的检测精度普遍高于现有方法,特别是对于可变块大小和高量化参数值的视频编码,具有较强的应用通用性。
{"title":"Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC","authors":"Liming Zhai, Lina Wang, Yanzhen Ren","doi":"10.1145/3082031.3083237","DOIUrl":"https://doi.org/10.1145/3082031.3083237","url":null,"abstract":"This paper presents a novel feature set for steganalysis of motion vector-based steganography in H.264/AVC. First, the influence of steganographic embedding on the sum of absolute difference (SAD) and the motion vector difference (MVD) is analyzed, and then the statistical characteristics of these two aspects are combined to design features. In terms of SAD, the macroblock partition modes are used to measure the quantization distortion, and by using the optimality of SAD in neighborhood, the partition based neighborhood optimal probability features are extracted. In terms of MVD, it has been proved that MVD is better in feature construction than neighboring motion vector difference (NMVD) which has been widely used by traditional steganalyzers, and thus the inter and intra co-occurrence features are constructed based on the distribution of two components of neighboring MVDs and the distribution of two components of the same MVD. Finally, the combined features are enhanced by window optimal calibration, which utilizes the optimality of both SAD and MVD in a local window area. Experiments on various conditions demonstrate that the proposed scheme generally achieves a more accurate detection than current methods especially for videos encoded in variable block size and high quantization parameter values, and exhibits strong universality in applications.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114703227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos H.264/AVC视频中基于dct的数据隐藏方法的隐写分析算法
Peipei Wang, Yun Cao, Xianfeng Zhao, Meineng Zhu
This paper presents an effective steganalytic algorithm to detect Discrete Cosine Transform (DCT) based data hiding methods for H.264/AVC videos. These methods hide covert information into compressed video streams by manipulating quantized DCT coefficients, and usually achieve high payload and low computational complexity, which is suitable for applications with hard real-time requirements. In contrast to considerable literature grown up in JPEG domain steganalysis, so far there is few work found against DCT-based methods for compressed videos. In this paper, the embedding impacts on both spatial and temporal correlations are carefully analyzed, based on which two feature sets are designed for steganalysis. The first feature set is engineered as the histograms of noise residuals from the decompressed frames using 16 DCT kernels, in which a quantity measuring residual distortion is accumulated. The second feature set is designed as the residual histograms from the similar blocks linked by motion vectors between inter-frames. The experimental results have demonstrated that our method can effectively distinguish stego videos undergone DCT manipulations from clean ones, especially for those of high qualities.
针对H.264/AVC视频中基于离散余弦变换(DCT)的数据隐藏方法,提出了一种有效的隐写分析算法。这些方法通过控制量化DCT系数,将隐蔽信息隐藏到压缩视频流中,通常具有高负载和低计算复杂度的特点,适合实时性要求较高的应用。与大量关于JPEG域隐写分析的文献相比,到目前为止,针对基于dct的压缩视频方法的研究还很少。本文仔细分析了嵌入对空间相关性和时间相关性的影响,并在此基础上设计了两个特征集用于隐写分析。第一个特征集被设计为使用16个DCT核的解压帧的噪声残差直方图,其中累积了一个测量残差失真的量。第二个特征集被设计为由帧间运动向量连接的相似块的残差直方图。实验结果表明,该方法可以有效区分经过DCT处理的隐写视频和干净视频,特别是高质量的隐写视频。
{"title":"A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos","authors":"Peipei Wang, Yun Cao, Xianfeng Zhao, Meineng Zhu","doi":"10.1145/3082031.3083245","DOIUrl":"https://doi.org/10.1145/3082031.3083245","url":null,"abstract":"This paper presents an effective steganalytic algorithm to detect Discrete Cosine Transform (DCT) based data hiding methods for H.264/AVC videos. These methods hide covert information into compressed video streams by manipulating quantized DCT coefficients, and usually achieve high payload and low computational complexity, which is suitable for applications with hard real-time requirements. In contrast to considerable literature grown up in JPEG domain steganalysis, so far there is few work found against DCT-based methods for compressed videos. In this paper, the embedding impacts on both spatial and temporal correlations are carefully analyzed, based on which two feature sets are designed for steganalysis. The first feature set is engineered as the histograms of noise residuals from the decompressed frames using 16 DCT kernels, in which a quantity measuring residual distortion is accumulated. The second feature set is designed as the residual histograms from the similar blocks linked by motion vectors between inter-frames. The experimental results have demonstrated that our method can effectively distinguish stego videos undergone DCT manipulations from clean ones, especially for those of high qualities.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125560099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Countering Anti-Forensics of Lateral Chromatic Aberration 反侧色差取证
O. Mayer, M. Stamm
Research has shown that lateral chromatic aberrations (LCA), an imaging fingerprint, can be anti-forensically modified to hide evidence of cut-and-paste forgery. In this paper, we propose a new technique for securing digital images against anti-forensic manipulation of LCA. To do this, we exploit resizing differences between color channels, which are induced by LCA anti-forensics, and define a feature vector to quantitatively capture these differences. Furthermore, we propose a detection method that exposes anti-forensically manipulated image patches. The technique algorithm is validated through experimental procedure, showing dependence on forgery patch size as well as anti-forensic scaling factor.
研究表明,横向色差(LCA),一种成像指纹,可以被反法医修改,以隐藏剪切粘贴伪造的证据。在本文中,我们提出了一种保护数字图像免受LCA反法医操纵的新技术。为此,我们利用由LCA反取证引起的颜色通道之间的调整大小差异,并定义一个特征向量来定量捕获这些差异。此外,我们提出了一种检测方法,暴露反法医操纵图像补丁。通过实验验证了该技术算法的有效性,证明了该算法与伪造补丁大小和反取证比例因子的相关性。
{"title":"Countering Anti-Forensics of Lateral Chromatic Aberration","authors":"O. Mayer, M. Stamm","doi":"10.1145/3082031.3083242","DOIUrl":"https://doi.org/10.1145/3082031.3083242","url":null,"abstract":"Research has shown that lateral chromatic aberrations (LCA), an imaging fingerprint, can be anti-forensically modified to hide evidence of cut-and-paste forgery. In this paper, we propose a new technique for securing digital images against anti-forensic manipulation of LCA. To do this, we exploit resizing differences between color channels, which are induced by LCA anti-forensics, and define a feature vector to quantitatively capture these differences. Furthermore, we propose a detection method that exposes anti-forensically manipulated image patches. The technique algorithm is validated through experimental procedure, showing dependence on forgery patch size as well as anti-forensic scaling factor.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131464252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing 照片id文件攻击建模及应用媒体取证检测面部变形
Christian Krätzer, A. Makrushin, T. Neubert, M. Hildebrandt, J. Dittmann
Since 2014, a novel approach to attack face image based person verification designated as face morphing attack has been actively discussed in the biometric and media forensics communities. Up until that point, modern travel documents were considered to be extremely hard to forge or to successfully manipulate. In the case of template-targeting attacks like facial morphing, the face verification process becomes vulnerable, making it a necessity to design protection mechanisms. In this paper, a new modeling approach for face morphing attacks is introduced. We start with a life-cycle model for photo-ID documents. We extend this model by an image editing history model, allowing for a precise description of attack realizations as a foundation for performing media forensics as well as training and testing scenarios for the attack detectors. On the basis of these modeling approaches, two different realizations of the face morphing attack as well as a forensic morphing detector are implemented and evaluated. The design of the feature space for the detector is based on the idea that the blending operation in the morphing pipeline causes the reduction of face details. To quantify this reduction, we adopt features implemented in the OpenCV image processing library, namely the number of SIFT, SURF, ORB, FAST and AGAST keypoints in the face region as well as the loss of edge-information with Canny and Sobel edge operators. Our morphing detector is trained with 2000 self-acquired authentic and 2000 morphed images captured with three camera types (Canon EOS 1200D, Nikon D 3300, Nikon Coolpix A100) and tested with authentic and morphed face images from a public database. Morphing detection accuracies of a decision tree classifier vary from 81.3% to 98% for different training and test scenarios.
自2014年以来,一种基于人脸图像的攻击方法被称为人脸变形攻击,在生物识别和媒体取证界得到了积极的讨论。在那之前,现代旅行证件被认为极难伪造或成功操纵。在人脸变形等模板目标攻击中,人脸验证过程变得脆弱,因此有必要设计保护机制。本文提出了一种新的人脸变形攻击建模方法。我们从带有照片的身份证件的生命周期模型开始。我们通过图像编辑历史模型扩展了该模型,允许对攻击实现进行精确描述,作为执行媒体取证以及攻击检测器的培训和测试场景的基础。在这些建模方法的基础上,实现并评估了两种不同的人脸变形攻击实现以及一个法医变形检测器。检测器特征空间的设计是基于变形管道中混合操作导致人脸细节减少的思想。为了量化这种减少,我们采用了OpenCV图像处理库中实现的特征,即人脸区域中SIFT, SURF, ORB, FAST和AGAST关键点的数量,以及Canny和Sobel边缘算子的边缘信息损失。我们的变形检测器使用三种相机类型(佳能EOS 1200D,尼康D 3300,尼康Coolpix A100)拍摄的2000张自获取的真实和变形图像进行训练,并使用来自公共数据库的真实和变形人脸图像进行测试。在不同的训练和测试场景下,决策树分类器的变形检测准确率从81.3%到98%不等。
{"title":"Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing","authors":"Christian Krätzer, A. Makrushin, T. Neubert, M. Hildebrandt, J. Dittmann","doi":"10.1145/3082031.3083244","DOIUrl":"https://doi.org/10.1145/3082031.3083244","url":null,"abstract":"Since 2014, a novel approach to attack face image based person verification designated as face morphing attack has been actively discussed in the biometric and media forensics communities. Up until that point, modern travel documents were considered to be extremely hard to forge or to successfully manipulate. In the case of template-targeting attacks like facial morphing, the face verification process becomes vulnerable, making it a necessity to design protection mechanisms. In this paper, a new modeling approach for face morphing attacks is introduced. We start with a life-cycle model for photo-ID documents. We extend this model by an image editing history model, allowing for a precise description of attack realizations as a foundation for performing media forensics as well as training and testing scenarios for the attack detectors. On the basis of these modeling approaches, two different realizations of the face morphing attack as well as a forensic morphing detector are implemented and evaluated. The design of the feature space for the detector is based on the idea that the blending operation in the morphing pipeline causes the reduction of face details. To quantify this reduction, we adopt features implemented in the OpenCV image processing library, namely the number of SIFT, SURF, ORB, FAST and AGAST keypoints in the face region as well as the loss of edge-information with Canny and Sobel edge operators. Our morphing detector is trained with 2000 self-acquired authentic and 2000 morphed images captured with three camera types (Canon EOS 1200D, Nikon D 3300, Nikon Coolpix A100) and tested with authentic and morphed face images from a public database. Morphing detection accuracies of a decision tree classifier vary from 81.3% to 98% for different training and test scenarios.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity 重采样取证的信息理论界限:超越循环平稳性的新证据
Cecilia Pasquini, Rainer Böhme
Although several methods have been proposed for the detection of resampling operations in multimedia signals and the estimation of the resampling factor, the fundamental limits for this forensic task leave open research questions. In this work, we explore the effects that a downsampling operation introduces in the statistics of a 1D signal as a function of the parameters used. We quantify the statistical distance between an original signal and its downsampled version by means of the Kullback-Leibler Divergence (KLD) in case of a wide-sense stationary 1st-order autoregressive signal model. Values of the KLD are derived for different signal parameters, resampling factors and interpolation kernels, thus predicting the achievable hypothesis distinguishability in each case. Our analysis reveals unexpected detectability in case of strong downsampling due to the local correlation structure of the original signal. Moreover, since existing detection methods generally leverage the cyclostationarity of resampled signals, we also address the case where the autocovariance values are estimated directly by means of the sample autocovariance from the signal under investigation. Under the considered assumptions, the Wishart distribution models the sample covariance matrix of a signal segment and the KLD under different hypotheses is derived.
虽然已经提出了几种方法来检测多媒体信号中的重采样操作和估计重采样因子,但这一法医任务的基本限制留下了开放的研究问题。在这项工作中,我们探讨了降采样操作作为所使用参数的函数在一维信号统计中引入的影响。在广义平稳一阶自回归信号模型中,我们利用Kullback-Leibler散度(KLD)量化了原始信号与其下采样版本之间的统计距离。针对不同的信号参数、重采样因子和插值核,导出了KLD的值,从而预测了每种情况下可实现的假设可分辨性。我们的分析揭示了由于原始信号的局部相关结构,在强下采样情况下的意外可检测性。此外,由于现有的检测方法通常利用重采样信号的循环平稳性,我们还解决了通过调查信号的样本自协方差直接估计自协方差值的情况。在所考虑的假设条件下,推导了信号段样本协方差矩阵的Wishart分布模型和不同假设条件下的KLD。
{"title":"Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity","authors":"Cecilia Pasquini, Rainer Böhme","doi":"10.1145/3082031.3083233","DOIUrl":"https://doi.org/10.1145/3082031.3083233","url":null,"abstract":"Although several methods have been proposed for the detection of resampling operations in multimedia signals and the estimation of the resampling factor, the fundamental limits for this forensic task leave open research questions. In this work, we explore the effects that a downsampling operation introduces in the statistics of a 1D signal as a function of the parameters used. We quantify the statistical distance between an original signal and its downsampled version by means of the Kullback-Leibler Divergence (KLD) in case of a wide-sense stationary 1st-order autoregressive signal model. Values of the KLD are derived for different signal parameters, resampling factors and interpolation kernels, thus predicting the achievable hypothesis distinguishability in each case. Our analysis reveals unexpected detectability in case of strong downsampling due to the local correlation structure of the original signal. Moreover, since existing detection methods generally leverage the cyclostationarity of resampled signals, we also address the case where the autocovariance values are estimated directly by means of the sample autocovariance from the signal under investigation. Under the considered assumptions, the Wishart distribution models the sample covariance matrix of a signal segment and the KLD under different hypotheses is derived.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114957801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Every Move You Make: Tracking Smartphone Users through Motion Sensors 你做的每一个动作:通过运动传感器跟踪智能手机用户
Anupam Das
Online users are increasingly being subjected to privacy-invasive tracking across the web for advertisement and surveillance purposes, using IP addresses, cookies, and browser fingerprinting. As web browsing activity shifts to mobile platforms such as smartphones, traditional browser fingerprinting techniques become less effective due to ephemeral IP addresses and uniform software-base. However, device fingerprinting using built-in sensors offers a new avenue for attack. In this talk, I will describe how motion sensors such as accelerometer and gyroscope, embedded in smartphones, can be exploited to track users online. Next, I will discuss the practical aspects of this attack and how it can be used to track users across different sessions under natural web browsing settings. Finally, I will talk about usable countermeasures that we have developed to protect users against such fingerprinting techniques.
网络用户越来越多地受到侵犯隐私的跟踪,这些跟踪是出于广告和监视的目的,使用IP地址、cookie和浏览器指纹。随着网络浏览活动转向智能手机等移动平台,传统的浏览器指纹识别技术由于IP地址的短暂性和统一的软件基础而变得不那么有效。然而,使用内置传感器的设备指纹识别为攻击提供了新的途径。在这个演讲中,我将描述如何运动传感器,如加速度计和陀螺仪,嵌入智能手机,可以利用在线跟踪用户。接下来,我将讨论这种攻击的实际方面,以及如何使用它在自然网页浏览设置下跨不同会话跟踪用户。最后,我将谈谈我们开发的保护用户免受此类指纹技术侵害的可用对策。
{"title":"Every Move You Make: Tracking Smartphone Users through Motion Sensors","authors":"Anupam Das","doi":"10.1145/3082031.3092568","DOIUrl":"https://doi.org/10.1145/3082031.3092568","url":null,"abstract":"Online users are increasingly being subjected to privacy-invasive tracking across the web for advertisement and surveillance purposes, using IP addresses, cookies, and browser fingerprinting. As web browsing activity shifts to mobile platforms such as smartphones, traditional browser fingerprinting techniques become less effective due to ephemeral IP addresses and uniform software-base. However, device fingerprinting using built-in sensors offers a new avenue for attack. In this talk, I will describe how motion sensors such as accelerometer and gyroscope, embedded in smartphones, can be exploited to track users online. Next, I will discuss the practical aspects of this attack and how it can be used to track users across different sessions under natural web browsing settings. Finally, I will talk about usable countermeasures that we have developed to protect users against such fingerprinting techniques.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131081842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nonlinear Feature Normalization in Steganalysis 隐写分析中的非线性特征归一化
M. Boroumand, J. Fridrich
In this paper, we propose a method for normalization of rich feature sets to improve detection accuracy of simple classifiers in steganalysis. It consists of two steps: 1) replacing random subsets of empirical joint probability mass functions (co-occurrences) by their conditional probabilities and 2) applying a non-linear normalization to each element of the feature vector by forcing its marginal distribution over covers to be uniform. We call the first step random conditioning and the second step feature uniformization. When applied to maxSRMd2 features in combination with simple classifiers, we observe a gain in detection accuracy across all tested stego algorithms and payloads. For better insight, we investigate the gain for two image formats. The proposed normalization has a very low computational complexity and does not require any feedback from the stego class.
本文提出了一种丰富特征集的归一化方法,以提高隐写分析中简单分类器的检测精度。它包括两个步骤:1)用它们的条件概率替换经验联合概率质量函数(共现)的随机子集;2)通过强迫特征向量在覆盖上的边际分布均匀,对特征向量的每个元素应用非线性归一化。我们称第一步为随机条件反射,第二步为特征均匀化。当将maxSRMd2特征与简单分类器结合使用时,我们观察到所有测试的隐进算法和有效负载的检测精度都有所提高。为了更好地了解,我们研究了两种图像格式的增益。所提出的归一化具有非常低的计算复杂度,并且不需要来自stego类的任何反馈。
{"title":"Nonlinear Feature Normalization in Steganalysis","authors":"M. Boroumand, J. Fridrich","doi":"10.1145/3082031.3083239","DOIUrl":"https://doi.org/10.1145/3082031.3083239","url":null,"abstract":"In this paper, we propose a method for normalization of rich feature sets to improve detection accuracy of simple classifiers in steganalysis. It consists of two steps: 1) replacing random subsets of empirical joint probability mass functions (co-occurrences) by their conditional probabilities and 2) applying a non-linear normalization to each element of the feature vector by forcing its marginal distribution over covers to be uniform. We call the first step random conditioning and the second step feature uniformization. When applied to maxSRMd2 features in combination with simple classifiers, we observe a gain in detection accuracy across all tested stego algorithms and payloads. For better insight, we investigate the gain for two image formats. The proposed normalization has a very low computational complexity and does not require any feedback from the stego class.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117165562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Audio Steganalysis with Convolutional Neural Network 基于卷积神经网络的音频隐写分析
Bolin Chen, Weiqi Luo, Haodong Li
In recent years, deep learning has achieved breakthrough results in various areas, such as computer vision, audio recognition, and natural language processing. However, just several related works have been investigated for digital multimedia forensics and steganalysis. In this paper, we design a novel CNN (convolutional neural networks) to detect audio steganography in the time domain. Unlike most existing CNN based methods which try to capture media contents, we carefully design the network layers to suppress audio content and adaptively capture the minor modifications introduced by ±1 LSB based steganography. Besides, we use a mix of convolutional layer and max pooling to perform subsampling to achieve good abstraction and prevent over-fitting. In our experiments, we compared our network with six similar network architectures and two traditional methods using handcrafted features. Extensive experimental results evaluated on 40,000 speech audio clips have shown the effectiveness of the proposed convolutional network.
近年来,深度学习在计算机视觉、音频识别、自然语言处理等多个领域取得了突破性成果。然而,目前有关数字多媒体取证和隐写分析的研究还不多。在本文中,我们设计了一种新颖的卷积神经网络来检测时域的音频隐写。与大多数现有的基于CNN的试图捕获媒体内容的方法不同,我们精心设计了网络层来抑制音频内容,并自适应地捕获基于±1 LSB的隐写术引入的微小修改。此外,我们使用卷积层和最大池化的混合进行子采样,以达到良好的抽象和防止过拟合。在我们的实验中,我们将我们的网络与六种类似的网络架构和两种使用手工制作特征的传统方法进行了比较。在4万个语音音频片段上进行的大量实验结果表明了所提出的卷积网络的有效性。
{"title":"Audio Steganalysis with Convolutional Neural Network","authors":"Bolin Chen, Weiqi Luo, Haodong Li","doi":"10.1145/3082031.3083234","DOIUrl":"https://doi.org/10.1145/3082031.3083234","url":null,"abstract":"In recent years, deep learning has achieved breakthrough results in various areas, such as computer vision, audio recognition, and natural language processing. However, just several related works have been investigated for digital multimedia forensics and steganalysis. In this paper, we design a novel CNN (convolutional neural networks) to detect audio steganography in the time domain. Unlike most existing CNN based methods which try to capture media contents, we carefully design the network layers to suppress audio content and adaptively capture the minor modifications introduced by ±1 LSB based steganography. Besides, we use a mix of convolutional layer and max pooling to perform subsampling to achieve good abstraction and prevent over-fitting. In our experiments, we compared our network with six similar network architectures and two traditional methods using handcrafted features. Extensive experimental results evaluated on 40,000 speech audio clips have shown the effectiveness of the proposed convolutional network.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130416791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Deep Convolutional Neural Network to Detect J-UNIWARD 基于深度卷积神经网络的J-UNIWARD检测
Guanshuo Xu
This paper presents an empirical study on applying convolutional neural networks (CNNs) to detecting J-UNIWARD -- one of the most secure JPEG steganographic method. Experiments guiding the architectural design of the CNNs have been conducted on the JPEG compressed BOSSBase containing 10,000 covers of size 512×512. Results have verified that both the pooling method and the depth of the CNNs are critical for performance. Results have also proved that a 20-layer CNN, in general, outperforms the most sophisticated feature-based methods, but its advantage gradually diminishes on hard-to-detect cases. To show that the performance generalizes to large-scale databases and to different cover sizes, one experiment has been conducted on the CLS-LOC dataset of ImageNet containing more than one million covers cropped to unified size of 256×256. The proposed 20-layer CNN has cut the error achieved by a CNN recently proposed for large-scale JPEG steganalysis by 35%. Source code is available via GitHub: https://github.com/GuanshuoXu/deep_cnn_jpeg_steganalysis
本文对卷积神经网络(cnn)用于检测J-UNIWARD——最安全的JPEG隐写方法之一进行了实证研究。在JPEG压缩的BOSSBase上进行了指导cnn架构设计的实验,BOSSBase包含10,000个大小为512×512的封面。结果验证了池化方法和cnn的深度对性能都是至关重要的。结果也证明,一般来说,20层的CNN优于最复杂的基于特征的方法,但在难以检测的情况下,其优势逐渐减弱。为了证明该性能适用于大规模数据库和不同覆盖尺寸,在ImageNet的CLS-LOC数据集上进行了一个实验,该数据集包含100多万个覆盖裁剪为统一尺寸256×256。所提出的20层CNN将最近提出的用于大规模JPEG隐写分析的CNN的误差降低了35%。源代码可通过GitHub: https://github.com/GuanshuoXu/deep_cnn_jpeg_steganalysis
{"title":"Deep Convolutional Neural Network to Detect J-UNIWARD","authors":"Guanshuo Xu","doi":"10.1145/3082031.3083236","DOIUrl":"https://doi.org/10.1145/3082031.3083236","url":null,"abstract":"This paper presents an empirical study on applying convolutional neural networks (CNNs) to detecting J-UNIWARD -- one of the most secure JPEG steganographic method. Experiments guiding the architectural design of the CNNs have been conducted on the JPEG compressed BOSSBase containing 10,000 covers of size 512×512. Results have verified that both the pooling method and the depth of the CNNs are critical for performance. Results have also proved that a 20-layer CNN, in general, outperforms the most sophisticated feature-based methods, but its advantage gradually diminishes on hard-to-detect cases. To show that the performance generalizes to large-scale databases and to different cover sizes, one experiment has been conducted on the CLS-LOC dataset of ImageNet containing more than one million covers cropped to unified size of 256×256. The proposed 20-layer CNN has cut the error achieved by a CNN recently proposed for large-scale JPEG steganalysis by 35%. Source code is available via GitHub: https://github.com/GuanshuoXu/deep_cnn_jpeg_steganalysis","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129405714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 178
期刊
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1