Optimal counterforensics for histogram-based forensics

Pedro Comesaña Alfaro, F. Pérez-González
{"title":"Optimal counterforensics for histogram-based forensics","authors":"Pedro Comesaña Alfaro, F. Pérez-González","doi":"10.1109/ICASSP.2013.6638218","DOIUrl":null,"url":null,"abstract":"There has been a recent interest in counterforensics as an adversarial approach to forensic detectors. Most of the existing counterforensics strategies, although successful, are based on heuristic criteria, and their optimality is not proven. In this paper the optimal modification strategy of a content in order to fool a histogram-based forensics detector is derived. The proposed attack relies on the assumption of a convex cost function; special attention is paid to the Euclidean norm, obtaining the optimal attack in the MSE sense. In order to prove the usefulness of the proposed strategy, we employ it to successfully attack a well-known algorithm for detecting double JPEG compression.","PeriodicalId":183968,"journal":{"name":"2013 IEEE International Conference on Acoustics, Speech and Signal Processing","volume":"336 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"33","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Acoustics, Speech and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASSP.2013.6638218","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 33

Abstract

There has been a recent interest in counterforensics as an adversarial approach to forensic detectors. Most of the existing counterforensics strategies, although successful, are based on heuristic criteria, and their optimality is not proven. In this paper the optimal modification strategy of a content in order to fool a histogram-based forensics detector is derived. The proposed attack relies on the assumption of a convex cost function; special attention is paid to the Euclidean norm, obtaining the optimal attack in the MSE sense. In order to prove the usefulness of the proposed strategy, we employ it to successfully attack a well-known algorithm for detecting double JPEG compression.
基于直方图的最佳反取证
最近,反取证作为一种对抗法医探测器的方法引起了人们的兴趣。大多数现有的反取证策略虽然成功,但都是基于启发式标准,其最优性尚未得到证明。本文推导了一种能够欺骗基于直方图的取证检测器的内容修改策略。所提出的攻击依赖于凸代价函数的假设;特别注意欧几里得范数,得到了MSE意义上的最优攻击。为了证明所提出的策略的有效性,我们利用它成功地攻击了一个著名的检测双重JPEG压缩的算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信