{"title":"多媒体数据与安全","authors":"Balakrishnan Prabhakaran","doi":"10.1109/mmul.2024.3378058","DOIUrl":null,"url":null,"abstract":"The detection of manipulation of multimedia data can be categorized as active and passive approaches.1 The active approaches use source information, such as watermarks and digital signatures. For instance, Bahirat et al.2 proposed a watermarking-based framework for authentication and localization of tampering in red, green, blue (RGB) and the 3-D point cloud. The watermarking methods, which are computationally expensive, cannot be applied on raw unprocessed data. Passive approaches, or blind forensics,3 are intended for testing multimedia data where the original or source information is not available. Deep-learning-based tampering detection avoids the need to perform various forensic tests to detect whether multimedia data have been manipulated or not.4 However, deep-learning-based methodologies need to balance false positives and negatives, as pointed out by Bayar and Stamm.4 Apart from the need for detecting manipulations in multimedia data, there is also a need for localizing (i.e., identifying the region) where the manipulation occurred.","PeriodicalId":13240,"journal":{"name":"IEEE MultiMedia","volume":"14 1","pages":""},"PeriodicalIF":2.3000,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Multimedia Data and Security\",\"authors\":\"Balakrishnan Prabhakaran\",\"doi\":\"10.1109/mmul.2024.3378058\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The detection of manipulation of multimedia data can be categorized as active and passive approaches.1 The active approaches use source information, such as watermarks and digital signatures. For instance, Bahirat et al.2 proposed a watermarking-based framework for authentication and localization of tampering in red, green, blue (RGB) and the 3-D point cloud. The watermarking methods, which are computationally expensive, cannot be applied on raw unprocessed data. Passive approaches, or blind forensics,3 are intended for testing multimedia data where the original or source information is not available. Deep-learning-based tampering detection avoids the need to perform various forensic tests to detect whether multimedia data have been manipulated or not.4 However, deep-learning-based methodologies need to balance false positives and negatives, as pointed out by Bayar and Stamm.4 Apart from the need for detecting manipulations in multimedia data, there is also a need for localizing (i.e., identifying the region) where the manipulation occurred.\",\"PeriodicalId\":13240,\"journal\":{\"name\":\"IEEE MultiMedia\",\"volume\":\"14 1\",\"pages\":\"\"},\"PeriodicalIF\":2.3000,\"publicationDate\":\"2024-04-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE MultiMedia\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/mmul.2024.3378058\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE MultiMedia","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/mmul.2024.3378058","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
The detection of manipulation of multimedia data can be categorized as active and passive approaches.1 The active approaches use source information, such as watermarks and digital signatures. For instance, Bahirat et al.2 proposed a watermarking-based framework for authentication and localization of tampering in red, green, blue (RGB) and the 3-D point cloud. The watermarking methods, which are computationally expensive, cannot be applied on raw unprocessed data. Passive approaches, or blind forensics,3 are intended for testing multimedia data where the original or source information is not available. Deep-learning-based tampering detection avoids the need to perform various forensic tests to detect whether multimedia data have been manipulated or not.4 However, deep-learning-based methodologies need to balance false positives and negatives, as pointed out by Bayar and Stamm.4 Apart from the need for detecting manipulations in multimedia data, there is also a need for localizing (i.e., identifying the region) where the manipulation occurred.
期刊介绍:
The magazine contains technical information covering a broad range of issues in multimedia systems and applications. Articles discuss research as well as advanced practice in hardware/software and are expected to span the range from theory to working systems. Especially encouraged are papers discussing experiences with new or advanced systems and subsystems. To avoid unnecessary overlap with existing publications, acceptable papers must have a significant focus on aspects unique to multimedia systems and applications. These aspects are likely to be related to the special needs of multimedia information compared to other electronic data, for example, the size requirements of digital media and the importance of time in the representation of such media. The following list is not exhaustive, but is representative of the topics that are covered: Hardware and software for media compression, coding & processing; Media representations & standards for storage, editing, interchange, transmission & presentation; Hardware platforms supporting multimedia applications; Operating systems suitable for multimedia applications; Storage devices & technologies for multimedia information; Network technologies, protocols, architectures & delivery techniques intended for multimedia; Synchronization issues; Multimedia databases; Formalisms for multimedia information systems & applications; Programming paradigms & languages for multimedia; Multimedia user interfaces; Media creation integration editing & management; Creation & modification of multimedia applications.