media forensics
Recently Published Documents


TOTAL DOCUMENTS

40
(FIVE YEARS 22)

H-INDEX

4
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Mohammed I. Alghamdi

The rapid technological advancement has led the entire world to shift towards digital domain. However, this transition has also result in the emergence of cybercrimes and security breach incidents that threatens the privacy and security of the users. Therefore, this chapter aimed at examining the use of digital forensics in countering cybercrimes, which has been a critical breakthrough in cybersecurity. The chapter has analyzed the most recent trends in digital forensics, which include cloud forensics, social media forensics, and IoT forensics. These technologies are helping the cybersecurity professionals to use the digital traces left by the data storage and processing to keep data safe, while identifying the cybercriminals. However, the research has also observed specific threats to digital forensics, which include technical, operational and personnel-related challenges. The high complexity of these systems, large volume of data, chain of custody, the integrity of personnel, and the validity and accuracy of digital forensics are major threats to its large-scale use. Nevertheless, the chapter has also observed the use of USB forensics, intrusion detection and artificial intelligence as major opportunities for digital forensics that can make the processes easier, efficient, and safe.


2021 ◽  
Author(s):  
Xiongnan Jin ◽  
Yooyoung Lee ◽  
Jonathan Fiscus ◽  
Amy N. Yates ◽  
Andrew Delgado ◽  
...  

2021 ◽  
Author(s):  
Haiying Guan ◽  
Yooyoung Lee ◽  
Lukas Diduch ◽  
Jesse G. Zhang ◽  
Ilia Ghorbanian ◽  
...  
Keyword(s):  

2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Christian Kraetzer ◽  
Andrey Makrushin ◽  
Jana Dittmann ◽  
Mario Hildebrandt

AbstractInformation fusion, i.e., the combination of expert systems, has a huge potential to improve the accuracy of pattern recognition systems. During the last decades, various application fields started to use different fusion concepts extensively. The forensic sciences are still hesitant if it comes to blindly applying information fusion. Here, a potentially negative impact on the classification accuracy, if wrongly used or parameterized, as well as the increased complexity (and the inherently higher costs for plausibility validation) of fusion is in conflict with the fundamental requirements for forensics.The goals of this paper are to explain the reasons for this reluctance to accept such a potentially very beneficial technique and to illustrate the practical issues arising when applying fusion. For those practical discussions the exemplary application scenario of morphing attack detection (MAD) is selected with the goal to facilitate the understanding between the media forensics community and forensic practitioners.As general contributions, it is illustrated why the naive assumption that fusion would make the detection more reliable can fail in practice, i.e., why fusion behaves in a field application sometimes differently than in the lab. As a result, the constraints and limitations of the application of fusion are discussed and its impact to (media) forensics is reflected upon.As technical contributions, the current state of the art of MAD is expanded by: The introduction of the likelihood-based fusion and an fusion ensemble composition experiment to extend the set of methods (majority voting, sum-rule, and Dempster-Shafer Theory of evidence) used previously The direct comparison of the two evaluation scenarios “MAD in document issuing” and “MAD in identity verification” using a realistic and some less restrictive evaluation setups A thorough analysis and discussion of the detection performance issues and the reasons why fusion in a majority of the test cases discussed here leads to worse classification accuracy than the best individual classifier


2021 ◽  
Vol 7 (7) ◽  
pp. 108
Author(s):  
Dennis Siegel ◽  
Christian Kraetzer ◽  
Stefan Seidlitz ◽  
Jana Dittmann

DeepFake detection is a novel task for media forensics and is currently receiving a lot of research attention due to the threat these targeted video manipulations propose to the trust placed in video footage. The current trend in DeepFake detection is the application of neural networks to learn feature spaces that allow them to be distinguished from unmanipulated videos. In this paper, we discuss, with features hand-crafted by domain experts, an alternative to this trend. The main advantage that hand-crafted features have over learned features is their interpretability and the consequences this might have for plausibility validation for decisions made. Here, we discuss three sets of hand-crafted features and three different fusion strategies to implement DeepFake detection. Our tests on three pre-existing reference databases show detection performances that are under comparable test conditions (peak AUC > 0.95) to those of state-of-the-art methods using learned features. Furthermore, our approach shows a similar, if not better, generalization behavior than neural network-based methods in tests performed with different training and test sets. In addition to these pattern recognition considerations, first steps of a projection onto a data-centric examination approach for forensics process modeling are taken to increase the maturity of the present investigation.


Author(s):  
Milica Maksimović ◽  
Patrick Aichroth ◽  
Luca Cuccovillo

AbstractIn this paper, we describe various application scenarios for archive management, broadcast/stream analysis, media search and media forensics which require the detection and accurate localization of unknown partial audio matches within items and datasets. We explain why they cannot be addressed with state-of-the-art matching approaches based on fingerprinting, and propose a new partial matching algorithm which can satisfy the relevant requirements. We propose two distinct requirement sets and hence two variants / settings for our proposed approach: One focusing on lower time granularity and hence lower computational complexity, to be able to deal with large datasets, and one focusing on fine-grain analysis for small datasets and individual items. Both variants are tested using distinct evaluation sets and methodologies and compared with a popular audio matching algorithm, thereby demonstrating that the proposed algorithm achieves convincing performance for the relevant application scenarios beyond the current state-of-the-art.


2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Cecilia Pasquini ◽  
Irene Amerini ◽  
Giulia Boato

AbstractThe dependability of visual information on the web and the authenticity of digital media appearing virally in social media platforms has been raising unprecedented concerns. As a result, in the last years the multimedia forensics research community pursued the ambition to scale the forensic analysis to real-world web-based open systems. This survey aims at describing the work done so far on the analysis of shared data, covering three main aspects: forensics techniques performing source identification and integrity verification on media uploaded on social networks, platform provenance analysis allowing to identify sharing platforms, and multimedia verification algorithms assessing the credibility of media objects in relation to its associated textual information. The achieved results are highlighted together with current open issues and research challenges to be addressed in order to advance the field in the next future.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Sa Math ◽  
Prohim Tam ◽  
Seokhoon Kim

The 5th generation (5G) communications evolved with heterogeneous user terminals and applications. A convergence of Mobile Edge Computing (MEC) and Software-Defined Networks (SDN) delivers gigantic challenges and opportunities for enhancing computing resources and user Quality of Service (QoS) in fronthaul and backhaul networks. Due to the precipitous expansion of user media in the 5G epoch, efficient media forensics methods are mandatory for specifying and offering effective safety handling based on individual application requirements. According to the exponential increment of Heterogeneous Internet of Things (HetIoT) devices, gigantic traffic will generate through bottleneck 5G fronthaul gateways. 5G fronthaul network environments consist of inadequate resources to surmount the enormous user traffic and communications, QoS will be reduced when the existence of traffic congestion occurs. To confront the aforementioned issues, this paper proposed intelligent media forensics and traffic handling scheme for controlling the Uplink (UL) transmission according to the Downlink (DL) statuses. Support Vector Machine (SVM) algorithm was applied to conduct the media forensics and MEC server integrated into fronthaul gateways, in which gateways resources are divided into UL and DL. Caching technology will be a part of 5G environments, and DL will be utilized for traffic caching. So, it is compulsory to adjust the communication traffic according to UL/DL resource utilization and control the forwarding traffic which relies on resource availability. The experiment was conducted by using computer software, and the proposed scheme illustrated a noteworthy outperformance over the conventional method in terms of diverse significant QoS factors including reliability, latency, and communication throughput.


2021 ◽  
Vol 13 (4) ◽  
pp. 93
Author(s):  
Samar Samir Khalil ◽  
Sherin M. Youssef ◽  
Sherine Nagy Saleh

Fake media is spreading like wildfire all over the internet as a result of the great advancement in deepfake creation tools and the huge interest researchers and corporations are showing to explore its limits. Now anyone can create manipulated unethical media forensics, defame, humiliate others or even scam them out of their money with a click of a button. In this research a new deepfake detection approach, iCaps-Dfake, is proposed that competes with state-of-the-art techniques of deepfake video detection and addresses their low generalization problem. Two feature extraction methods are combined, texture-based Local Binary Patterns (LBP) and Convolutional Neural Networks (CNN) based modified High-Resolution Network (HRNet), along with an application of capsule neural networks (CapsNets) implementing a concurrent routing technique. Experiments have been conducted on large benchmark datasets to evaluate the performance of the proposed model. Several performance metrics are applied and experimental results are analyzed. The proposed model was primarily trained and tested on the DeepFakeDetectionChallenge-Preview (DFDC-P) dataset then tested on Celeb-DF to examine its generalization capability. Experiments achieved an Area-Under Curve (AUC) score improvement of 20.25% over state-of-the-art models.


2021 ◽  
Vol 9 (1) ◽  
pp. 291-300
Author(s):  
Ángel Vizoso ◽  
Martín Vaz-Álvarez ◽  
Xosé López-García

Deepfakes, one of the most novel forms of misinformation, have become a real challenge in the communicative environment due to their spread through online news and social media spaces. Although fake news have existed for centuries, its circulation is now more harmful than ever before, thanks to the ease of its production and dissemination. At this juncture, technological development has led to the emergence of deepfakes, doctored videos, audios or photos that use artificial intelligence. Since its inception in 2017, the tools and algorithms that enable the modification of faces and sounds in audiovisual content have evolved to the point where there are mobile apps and web services that allow average users its manipulation. This research tries to show how three renowned media outlets—<em>The Wall Street Journal</em>,<em> The Washington Post</em>,<em> </em>and<em> Reuters</em>—and three of the biggest Internet-based companies—Google, Facebook, and Twitter—are dealing with the spread of this new form of fake news. Results show that identification of deepfakes is a common practice for both types of organizations. However, while the media is focused on training journalists for its detection, online platforms tended to fund research projects whose objective is to develop or improve media forensics tools.


Sign in / Sign up

Export Citation Format

Share Document