Temporal Forensics and Anti-Forensics for Motion Compensated Video
- 21 June 2012
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 7 (4), 1315-1329
- https://doi.org/10.1109/tifs.2012.2205568
Abstract
Due to the ease with which digital information can be altered, many digital forensic techniques have been developed to authenticate multimedia content. Similarly, a number of anti-forensic operations have recently been designed to make digital forgeries undetectable by forensic techniques. However, like the digital manipulations they are designed to hide, many anti-forensic operations leave behind their own forensically detectable traces. As a result, a digital forger must balance the trade-off between completely erasing evidence of their forgery and introducing new evidence of anti-forensic manipulation. Because a forensic investigator is typically bound by a constraint on their probability of false alarm (P_fa), they must also balance a trade-off between the accuracy with which they detect forgeries and the accuracy with which they detect the use of anti-forensics. In this paper, we analyze the interaction between a forger and a forensic investigator by examining the problem of authenticating digital videos. Specifically, we study the problem of adding or deleting a sequence of frames from a digital video. We begin by developing a theoretical model of the forensically detectable fingerprints that frame deletion or addition leaves behind, then use this model to improve upon the video frame deletion or addition detection technique proposed by Wang and Farid. Next, we propose an anti-forensic technique designed to fool video forensic techniques and develop a method for detecting the use of anti-forensics. We introduce a new set of techniques for evaluating the performance of anti-forensic operations and develop a game theoretic framework for analyzing the interplay between a forensic investigator and a forger. We use these new techniques to evaluate the performance of each of our proposed forensic and anti-forensic techniques, and identify the optimal actions of both the forger and forensic investigator.Keywords
This publication has 23 references indexed in Scilit:
- Countering JPEG anti-forensicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Wavelet-based image compression anti-forensicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Undetectable image tampering through JPEG compression anti-forensicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Synthesis of color filter array pattern in digital imagesPublished by SPIE-Intl Soc Optical Eng ,2009
- Can we trust digital image forensics?Published by Association for Computing Machinery (ACM) ,2007
- Digital audio forensicsPublished by Association for Computing Machinery (ACM) ,2007
- Exposing digital forgeries in video by detecting double MPEG compressionPublished by Association for Computing Machinery (ACM) ,2006
- Digital audio recording analysis: the Electric Network Frequency (ENF) CriterionInternational Journal of Speech, Language and the Law, 2005
- Statistical Tools for Digital ForensicsLecture Notes in Computer Science, 2004
- A new diamond search algorithm for fast block-matching motion estimationIEEE Transactions on Image Processing, 2000