T. Bianchi, A. D. Rosa, M. Fontani, Giovanni Rocciolo, A. Piva
{"title":"Detection and classification of double compressed MP3 audio tracks","authors":"T. Bianchi, A. D. Rosa, M. Fontani, Giovanni Rocciolo, A. Piva","doi":"10.1145/2482513.2482523","DOIUrl":"https://doi.org/10.1145/2482513.2482523","url":null,"abstract":"In this paper, a method to detect the presence of double compression in a MP3 audio file is proposed. By exploiting the effect of double compression in the statistical properties of quantized MDCT coefficients, a single measure is derived to decide if a MP3 file is single compressed or it has been double compressed and also to devise the bit-rate of the first compression. Experimental results confirm the performance of the detector, mainly when the bit-rate of the second compression is higher than the bit-rate of the first one.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130413472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the intertwining of information hiding and multimedia security: a personal perspective","authors":"A. Ho","doi":"10.1145/2482513.2484424","DOIUrl":"https://doi.org/10.1145/2482513.2484424","url":null,"abstract":"Over the past decade or so, the tremendous growth and proliferation of multimedia content has led to the important need to protect and verify the content integrity, particularly if the data are to be used for law enforcement, media, legal and financial applications. This has resulted in the research and applications of information hiding, and multimedia security and forensics becoming more and more integrated and intertwined and as clearly demonstrated, amongst other common activities, with the merging of the two prestigious and popular conferences of IH and ACM MMSec into ACM IHMMSEC'2013.\u0000 In this keynote presentation, I will present a personal perspective on some of the various changes, challenges, threats and opportunities in the areas of watermarking, steganography/steganalysis, and multimedia security and forensics that I have faced and experienced since I first stumbled upon digital watermarking and steganography some 16 years ago which I am still very much actively involved today. The talk with provide a chronological overview of some key milestones related to watermarking, information hiding and digital forensics, as well as including some personal events from setting up and managing a University spinout, to technology transfer and product commercialization.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics","authors":"Wei Fan, K. Wang, François Cayre, Z. Xiong","doi":"10.1145/2482513.2482536","DOIUrl":"https://doi.org/10.1145/2482513.2482536","url":null,"abstract":"This paper proposes an anti-forensic method that disguises the footprints left by JPEG compression, whose objective is to fool existing JPEG forensic detectors while keeping a high visual quality of the processed image. First we examine the reliability of existing detectors and point out the potential vulnerability of the quantization table estimation based detector. Then we construct a new, non-parametric method to DCT histogram smoothing without any histogram statistical model. Finally JPEG forensic detectors are fooled by optimizing an objective function considering both the anti-forensic terms and a natural image statistical model. We show that compared to the state-of-the-art methods the proposed JPEG anti-forensic method is able to achieve a higher image visual quality while being undetectable under existing detectors.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127300186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Document authentication using graphical codes: impacts of the channel model","authors":"A. Ho, Bao An Mai Hoang, W. Sawaya, P. Bas","doi":"10.1145/2482513.2482538","DOIUrl":"https://doi.org/10.1145/2482513.2482538","url":null,"abstract":"This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. The core of such a system is the comparison for the receiver between an original binary code, an original corrupted code and a copy of the original code. We analyze two strategies, depending on whether or not the receiver use a binary version of its observation to perform its authentication test. By deriving the optimal test within a Neyman-Pearson setup, a theoretical analysis shows that a thresholding of the code induces a loss of performance. This study also highlights the fact that the probability of the type I and type II errors can be better approximated, by several orders of magnitude, computing Chernoff bounds instead of the Gaussian approximation. Finally we evaluate the impact of an uncertainty for the receiver on the opponent channel and show that the authentication is still possible whenever the receiver can observe forged codes and uses them to estimate the parameters of the model.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129597020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}