2021 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

筛选
英文 中文
Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection 融合多尺度纹理和残差描述子的多层次二维条码重播检测
2021 IEEE International Workshop on Information Forensics and Security (WIFS) Pub Date : 2021-12-07 DOI: 10.1109/WIFS53200.2021.9648391
Anselmo Castelo Branco Ferreira, Changsheng Chen, M. Barni
{"title":"Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection","authors":"Anselmo Castelo Branco Ferreira, Changsheng Chen, M. Barni","doi":"10.1109/WIFS53200.2021.9648391","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648391","url":null,"abstract":"Nowadays, 2D barcodes have been widely used for advertisement, mobile payment, and product authentication. However, in applications related to product authentication, an authentic 2D barcode can be illegally copied and attached to a counterfeited product in such a way to bypass the authentication scheme. In this paper, we employ a proprietary 2D barcode pattern and use multimedia forensics methods to analyse the scanning and printing artefacts resulting from the copy (re-broadcasting) attack. A diverse and complementary feature set is proposed to quantify the barcode texture distortions introduced during the illegal copying process. The proposed features are composed of global and local descriptors, which characterize the multi-scale texture appearance and the points of interest distribution, respectively. The proposed descriptors are compared against some existing texture descriptors and deep learning-based approaches under various scenarios, such as cross-datasets and cross-size. Experimental results highlight the practicality of the proposed method in real-world settings.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers 购买前比较:威胁情报提供商的隐私保护选择
2021 IEEE International Workshop on Information Forensics and Security (WIFS) Pub Date : 2021-12-07 DOI: 10.1109/WIFS53200.2021.9648381
Jelle Vos, Z. Erkin, C. Doerr
{"title":"Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers","authors":"Jelle Vos, Z. Erkin, C. Doerr","doi":"10.1109/WIFS53200.2021.9648381","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648381","url":null,"abstract":"In their pursuit to maximize their return on investment, cybercriminals will likely reuse as much as possible between their campaigns. Not only will the same phishing mail be sent to tens of thousands of targets, but reuse of the tools and infrastructure across attempts will lower their costs of doing business. This reuse, however, creates an effective angle for mitigation, as defenders can recognize domain names, attachments, tools, or systems used in a previous compromisation attempt, significantly increasing the cost to the adversary as it would become necessary to recreate the attack infrastructure each time. However, generating such cyber threat intelligence (CTI) is resource-intensive, so organizations often turn to CTI providers that commercially sell feeds with such indicators. As providers have different sources and methods to obtain their data, the coverage and relevance of feeds will vary for each of them. To cover the multitude of threats one organization faces, they are best served by obtaining feeds from multiple providers. However, these feeds may overlap, causing an organization to pay for indicators they already obtained through another provider. This paper presents a privacy-preserving protocol that allows an organization to query the databases of multiple data providers to obtain an estimate of their total coverage without revealing the data they store. In this way, a customer can make a more informed decision on their choice of CTI providers. We implement this protocol in Rust to validate its performance experimentally: When performed between three CTI providers who collectively have 20,000 unique indicators, our protocol takes less than 6 seconds to execute. The code for our experiments is freely available.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132456614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Apart from In-field Sensor Defects, are there Additional Age Traces Hidden in a Digital Image? 除了现场传感器缺陷外,数字图像中是否隐藏着额外的年龄痕迹?
2021 IEEE International Workshop on Information Forensics and Security (WIFS) Pub Date : 2021-12-07 DOI: 10.1109/WIFS53200.2021.9648396
Robert Jöchl, A. Uhl
{"title":"Apart from In-field Sensor Defects, are there Additional Age Traces Hidden in a Digital Image?","authors":"Robert Jöchl, A. Uhl","doi":"10.1109/WIFS53200.2021.9648396","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648396","url":null,"abstract":"Approximating the age of a digital image based on traces left during the acquisition pipeline is at the core of temporal image forensics. Well-known and investigated traces are those caused by in-field sensor defects. The presence of these defects is exploited in two available age approximation methods. A very recent approach in this context, however, trains a Convolutional Neural Network for age approximation. A Convolutional Neural Network independently learns the classification features used. In this context, the following questions arise: how relevant is the presence of strong in-field sensor defects, or does the Convolutional Neural Network learn other age-related features (apart from strong in-field sensor defects)? We investigate these questions systematically on the basis of several experiments in this paper. Furthermore, we analyse whether the learned features are position invariant. This is important since selecting the right input patches is crucial for training a Convolutional Neural Network.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124956846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spoofing Speaker Verification With Voice Style Transfer And Reconstruction Loss 语音风格转移和重建损失的欺骗说话人验证
2021 IEEE International Workshop on Information Forensics and Security (WIFS) Pub Date : 2021-12-07 DOI: 10.1109/WIFS53200.2021.9648375
Thomas Thebaud, Gaël Le Lan, A. Larcher
{"title":"Spoofing Speaker Verification With Voice Style Transfer And Reconstruction Loss","authors":"Thomas Thebaud, Gaël Le Lan, A. Larcher","doi":"10.1109/WIFS53200.2021.9648375","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648375","url":null,"abstract":"In this paper we investigate a template reconstruction attack against a speaker verification system. A stolen speaker embedding is processed with a zero-shot voice-style transfer system to reconstruct a Mel-spectrogram containing as much speaker information as possible. We assume the attacker has a black box access to a state-of-the-art automatic speaker verification system. We modify the AutoVC voice-style transfer system to spoof the automatic speaker verification system. We find that integrating a new loss targeting embedding reconstruction and optimizing training hyper-parameters significantly improves spoofing. Results obtained for speaker verification are similar to other biometrics, such as handwritten digits or face verification. We show on standard corpora (VoxCeleb and VCTK) that the reconstructed Mel-spectrograms contain enough speaker characteristics to spoof the original authentication system.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126183568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How are PDF files published in the Scientific Community? PDF文件是如何在科学界发表的?
2021 IEEE International Workshop on Information Forensics and Security (WIFS) Pub Date : 2021-12-07 DOI: 10.1109/WIFS53200.2021.9648374
Supriya Adhatarao, C. Lauradoux
{"title":"How are PDF files published in the Scientific Community?","authors":"Supriya Adhatarao, C. Lauradoux","doi":"10.1109/WIFS53200.2021.9648374","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648374","url":null,"abstract":"Authors are often not aware of hidden information and that they can contain more information than the actual content of the file. This work mainly focuses on how PDF files are published in the scientific community. We have analyzed a corpus of 555865 PDF files to show that direct and modified authoring process of PDF creations leads to the leakage of sensitive information on the researchers. Our analysis on the extraction of the metadata has shown that at least 23% of the PDF files in our dataset contains valuable information on the authoring process. We were even able to solve the co-authorship (multiple authors) problem by crossing the information of multiple PDF files using linear algebra. We believe that, PDF sanitization needs to be included in the scientific publication processes to avoid leakage of sensitive information. We have explored and suggested necessary strategies available for the safer distribution of scientific work by researchers.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122038348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Recognition Performance of BioHashing on state-of-the-art Face Recognition models 生物哈希在最先进的人脸识别模型上的识别性能研究
2021 IEEE International Workshop on Information Forensics and Security (WIFS) Pub Date : 2021-12-07 DOI: 10.1109/WIFS53200.2021.9648382
Hatef Otroshi-Shahreza, Vedrana Krivokuća Hahn, S. Marcel
{"title":"On the Recognition Performance of BioHashing on state-of-the-art Face Recognition models","authors":"Hatef Otroshi-Shahreza, Vedrana Krivokuća Hahn, S. Marcel","doi":"10.1109/WIFS53200.2021.9648382","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648382","url":null,"abstract":"Face recognition has become a popular authentication tool in recent years. Modern state-of-the-art (SOTA) face recognition methods rely on deep neural networks, which extract discriminative features from face images. Although these methods have high recognition performance, the extracted features contain privacy-sensitive information. Hence, the users' privacy would be jeopardized if the features stored in the face recognition system were compromised. Accordingly, protecting the extracted face features (templates) is an essential task in face recognition systems. In this paper, we use BioHashing for face template protection and aim to establish the minimum BioHash length that would be required in order to maintain the recognition accuracy achieved by the corresponding unprotected system. We consider two hypotheses and experimentally show that the performance depends on the value of the BioHash length (as opposed to the ratio of the BioHash length to the dimension of the original features). To eliminate bias in our experiments, we use several SOTA face recognition models with different network structures, loss functions, and training datasets, and we evaluate these models on two different datasets (LFW and MOBIO). We provide an open-source implementation of all the experiments presented in this paper so that other researchers can verify our findings and build upon our work.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"1896 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130059494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Time Scaling Detection and Estimation in Audio Recordings 音频记录中的时间尺度检测与估计
2021 IEEE International Workshop on Information Forensics and Security (WIFS) Pub Date : 2021-12-07 DOI: 10.1109/WIFS53200.2021.9648389
M. Pilia, S. Mandelli, Paolo Bestagini, S. Tubaro
{"title":"Time Scaling Detection and Estimation in Audio Recordings","authors":"M. Pilia, S. Mandelli, Paolo Bestagini, S. Tubaro","doi":"10.1109/WIFS53200.2021.9648389","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648389","url":null,"abstract":"The widespread diffusion of user friendly editing software for audio signals has made audio tampering extremely accessible to anyone. Therefore, it is increasingly necessary to develop forensic methodologies aiming at verifying if a given audio content has been digitally manipulated or not. Among the multiple available audio editing techniques, a very common one is time scaling, i.e., altering the temporal evolution of an audio signal without affecting any pitch component. For instance, this can be used to slow-down or speed-up speech recordings, thus enabling the creation of natural sounding fake speech compositions. In this work, we propose to blindly detect and estimate the time scaling applied to an audio signal. To expose time scaling, we leverage a Convolutional Neural Network that analyzes the Log-Mel Spectrogram and the phase of the Short Time Fourier Transform of the input audio signal. The proposed technique is tested on different audio datasets, considering various time scaling implementations and challenging cross test scenarios.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131829086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact of Super-Resolution and Human Identification in Drone Surveillance 超分辨率和人的识别在无人机监视中的影响
2021 IEEE International Workshop on Information Forensics and Security (WIFS) Pub Date : 2021-12-07 DOI: 10.1109/WIFS53200.2021.9648399
Akshay Agarwal, N. Ratha, Mayank Vatsa, Richa Singh
{"title":"Impact of Super-Resolution and Human Identification in Drone Surveillance","authors":"Akshay Agarwal, N. Ratha, Mayank Vatsa, Richa Singh","doi":"10.1109/WIFS53200.2021.9648399","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648399","url":null,"abstract":"In the scene of large crowd gatherings and challenging visiting places such as rough hills and high glass buildings, acquisition of the images through normal cameras is difficult and next to impossible. In all such scenarios, the drone becomes a useful acquisition sensor to capture the detailed information of the scene and the objects present there. With the rapid development of consumer unmanned aerial vehicles (UAV) or drones, the utilization of these devices became extremely easy. The popular use-case of the drones can be seen for the surveillance to identify any possible threats in the large crowd gathering and recognize the different individuals present in the crowd. However, the images captured using the drones are generally taken from a significant distance to avoid any collision; hence these images generally suffer in quality such as low resolution, motion blur, and other environmental factors. The impact of these artifacts has been seen in the face recognition performance using several machine learning algorithms on large-scale drone databases namely Drone SURF. In this research, we intend to tackle the above artifacts by looking at the problem from the perspective of super-resolution of low-quality images. We have studied state-of-the-art (SOTA) super-resolution algorithms and see whether current methods are capable of handling the challenges of drone images. Apart from that, we have also evaluated another SOTA deep network developed for object detection for human segmentation in drone images. The proposed research provides interesting findings highlighting the limitations of existing works from the perspective of handling drone images. We would like the readers to go through the paper to find out the current limitations and possible future directions in drone image surveillance.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128348280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
3D Print-Scan Resilient Localized Mesh Watermarking 3D打印扫描弹性局部网格水印
2021 IEEE International Workshop on Information Forensics and Security (WIFS) Pub Date : 2021-12-07 DOI: 10.1109/WIFS53200.2021.9648379
Yanmei Chen, Zehua Ma, Hang Zhou, Weiming Zhang
{"title":"3D Print-Scan Resilient Localized Mesh Watermarking","authors":"Yanmei Chen, Zehua Ma, Hang Zhou, Weiming Zhang","doi":"10.1109/WIFS53200.2021.9648379","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648379","url":null,"abstract":"Existing 3D print-scan watermarking schemes usually have some limitations, such as the use of auxiliary materials and expensive high-resolution devices, and low visual quality of watermarked models. Considering these limitations, we propose a novel localized mesh watermarking method, which is resilient to 3D print-scan process and suitable for ordinary consumer-level 3D printing and scanning devices. In our scheme, we use the geodesic distances of the model's surface to determine the location and scope of the localized embedded watermark and construct a special tracking signal for the synchronization of the watermark. When detecting the watermark, we amplify the watermark signal through the residual mesh and achieve blind watermark detection. By evaluating various 3D mesh models, we demonstrate that the proposed localized watermarking method can ensure a high watermark extraction accuracy after the 3D print-scan process while maintaining high visual quality.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115343634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Augmentation for JPEG Steganalysis 用于JPEG隐写分析的数据增强
2021 IEEE International Workshop on Information Forensics and Security (WIFS) Pub Date : 2021-12-07 DOI: 10.1109/WIFS53200.2021.9648390
T. Itzhaki, Yassine Yousfi, J. Fridrich
{"title":"Data Augmentation for JPEG Steganalysis","authors":"T. Itzhaki, Yassine Yousfi, J. Fridrich","doi":"10.1109/WIFS53200.2021.9648390","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648390","url":null,"abstract":"Deep Convolutional Neural Networks (CNNs) have performed remarkably well in JPEG steganalysis. However, they heavily rely on large datasets to avoid overfitting. Data augmentation is a popular technique to inflate the datasets available without collecting new images. For JPEG steganalysis, the augmentations predominantly used by researchers are limited to rotations and flips (D4 augmentations). This is due to the fact that the stego signal is erased by most augmentations used in computer vision. In this paper, we systematically survey a large number of other augmentation techniques and assess their benefit in JPEG steganalysis.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信