Anti-forensics and countering anti-forensics of video frame deletion

来源 :第十二届全国信息隐藏暨多媒体信息安全学术大会 | 被引量 : 0次 | 上传用户:q3175
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Nowadays, tampering digital videos is becoming increasingly easier with the development of digital technology.Several video anti-forensic methods have recently been designed to make digital forgeries undetectable.In this paper,we analyze a typical anti-forensic technique of video frame deletion and demonstrate that the fingerprint of frame deletion still can be extracted from the anti-forensically modified videos.By estimating the true prediction error in the video in question, an effective countering anti-forensics is proposed.Furthermore,an anti-forensics which can maliciously remove the fingerprint of video frame deletion is examined.Experimental results show that our proposed countering anti-forensics can perfectly detect the use of the existing anti-forensic techniques.Compared with the existing countering anti-forensics, our proposed method is more robust against different motion vector searching algorithm.In addition, the proposed anti-forensics can successfully fool the existing frame deletion detection algorithm.
其他文献
Model-based covert timing channels leak confidential information by modulating the inter-packet delays of consecutive packets.In order to evade detection, rather than directly making quantization-base
In this paper, a novel forensics feature is proposed, which is based on quatermion wavelet transform (QWT).Comrpared to digital wavelet transform (DWT) and contourlet wavelet trausform (CWT), QWT can
While most reversible data hiding in encrypted images (RDH-EI) are based on stream cipher, this paper aims to present an alternative method feasible for block-enciphered images.Before uploading data t
The steganographic method based on Gibbs construction attempts to minimize nonadditive distortior.However, it cannot outperform the state-of-the-art steganographic schemes which try to minimize additi
Based the traditional Attribute-Based Encryption (ABE) access control systems, this paper first proposes a new access architecture for MCC, which introduces a middle layer sitting between mobile devic
In this paper, a new method to detect the presence of double MP3 compression is proposec The method is based on the Difference of Calibration Histogram (DCH)characteristic.The features are extracted f
Nowadays telecardiology is widely popular due to the fact that an increasing number of people are suffering from cardiac disease in the world.Therefore huge amount of ECG signal as well as patient con
本文通过利用嵌入分组密码算法的FPGA芯片泄漏的侧信道信息,提出了一种改进的组合侧信道攻击方案.该方案主要针对算法中S盒硬件实现后的电路,以功耗攻击为背景,对组合逻辑电路因毛刺产生的功耗和时序逻辑中寄存器翻转产生的功耗进行不同级别的建模,并利用线性生模型匹配算法和模板攻击中多元高斯模型的匹配算法对关键数据进行两次处理,最终暴力破解获取密钥.此方案不但提高了攻击的效率和准确度,而且为今后密码芯片抵抗
现有的运动向量域视频隐写方法在对运动向量进行嵌入修改时,容易破坏其局部最优性,因此无法抵抗专用隐写分析的攻击.针对此现状,本文提出了一种基于局部最优性保持的运动向量扰动方法,对于需要修改的运动向量,该方法首先确定候选运动向量的搜索区域,再从中筛选出所有局部最优的运动向量,最后选择对视频编码性能扰动最小的运动向量作为修改结果.基于所提方法,并结合高效的隐写码以及合理的代价函数,可以设计出高隐蔽性运动
大多数爬行动物的运动都是由中央模式发生器CPG控制的节律运动,本文通过对生物神经元特性的模拟,构建相应的控制模型,提出一种循环抑制CPG模型来模拟控制蛇形机器人的步态运动.首先分析了蛇形机器人的步态及关节连接方式,在此基础上,构建基于Matsuoka神经元的CPG模型,然后根据所研究的蛇形机器人的关节数构建了7关节的链式CPG网络结构模型.接下来,利用遗传算法对CPG网络参数进行优化.实验结果表明