首页> 外文会议>2011 IEEE International Workshop on Information Forensics and Security >An analysis on attacker actions in fingerprint-copy attack in source camera identification
【24h】

An analysis on attacker actions in fingerprint-copy attack in source camera identification

机译:源相机识别中指纹复制攻击中攻击者行为分析

获取原文

摘要

Multimedia forensics deals with the analysis of multimedia data to gather information on their origin and authenticity through the use of specific tools. At this point an important question arises: how much reliable are these algorithms? In this work we have considered the technique presented in [1] where it is shown how source camera identification can be attacked. In particular, the problem investigated concerns the situation when an adversary estimates the sensor fingerprint from a set of images belonging to the person he wants to frame and superimposes it onto an image acquired by a different camera to charge the innocent victim as the author of that photo. In [1], a countermeasure against such attack, named Triangle Test, is introduced. In this paper we have analyzed if a more sophisticated action of the attacker can invalidate such countermeasure. Experimental results are provided to prove how hacker's action could be improved.
机译:多媒体取证处理通过使用特定工具来分析多媒体数据,以收集有关其来源和真实性的信息。此时出现一个重要问题:这些算法的可靠性如何?在这项工作中,我们考虑了[1]中介绍的技术,其中显示了如何攻击源摄像机标识。特别地,所调查的问题涉及这样一种情况:当对手从属于他要构图的人的一组图像中估计传感器指纹,并将其叠加在由其他相机获取的图像上,以指控无辜受害者作为其作者照片。在[1]中,引入了针对这种攻击的对策,称为三角测试。在本文中,我们分析了攻击者的更复杂的操作是否可以使这种对策无效。提供实验结果以证明如何改善黑客的行为。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号