메뉴 건너뛰기




Volumn 8, Issue 3, 2013, Pages 450-463

The source identification game: An information-theoretic perspective

Author keywords

adversarial signal processing; counter forensics; game theory; hypothesis testing; Multimedia forensics; source identification

Indexed keywords

ACHIEVABLE PERFORMANCE; ATTACKING STRATEGY; CLOSED FORM SOLUTIONS; COUNTER-FORENSICS; ERROR EXPONENT; FALSE NEGATIVE ERRORS; FORENSIC ANALYSIS; FORENSIC ANALYST; GAME-THEORETIC; HYPOTHESIS TESTING; MULTIMEDIA FORENSICS; NASH EQUILIBRIA; NUMERICAL PROCEDURES; SOURCE IDENTIFICATION; THEORETICAL FRAMEWORK;

EID: 84873669138     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2237397     Document Type: Article
Times cited : (96)

References (32)
  • 1
    • 85032751542 scopus 로고    scopus 로고
    • Special issue on digital forensics
    • E. Delp, N. Memon, and M. Wu, "Special issue on digital forensics," IEEE Signal Process. Mag., vol. 26, no. 2, p., Mar. 2009.
    • (2009) IEEE Signal Process. Mag. , vol.26 , Issue.2
    • Delp, E.1    Memon, N.2    Wu, M.3
  • 3
    • 13244253845 scopus 로고    scopus 로고
    • How realistic is photorealistic?
    • DOI 10.1109/TSP.2004.839896
    • S. Lyu and H. Farid, "How realistic is photorealistic?," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 845-850, Feb. 2005. (Pubitemid 40181778)
    • (2005) IEEE Transactions on Signal Processing , vol.53 , Issue.2 , pp. 845-850
    • Lyu, S.1    Farid, H.2
  • 4
    • 13244251141 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting traces of resampling
    • DOI 10.1109/TSP.2004.839932
    • A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005. (Pubitemid 40181769)
    • (2005) IEEE Transactions on Signal Processing , vol.53 , Issue.2 , pp. 758-767
    • Popescu, A.C.1    Farid, H.2
  • 5
    • 60449117421 scopus 로고    scopus 로고
    • Exposing digital forgeries from JPEG ghosts
    • Mar
    • H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 154-160
    • Farid, H.1
  • 6
    • 78649395962 scopus 로고    scopus 로고
    • Camera response functions for image forensics: An automatic algorithm for splicing detection
    • Dec
    • Y.-F. Hsu and S.-F. Chang, "Camera response functions for image forensics: An automatic algorithm for splicing detection," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 816-825, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 816-825
    • Hsu, Y.-F.1    Chang, S.-F.2
  • 9
    • 56749180518 scopus 로고    scopus 로고
    • Hiding traces of resampling in digital images
    • Dec
    • M. Kirchner and R. Böhme, "Hiding traces of resampling in digital images," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 582-292, Dec. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.4 , pp. 582-292
    • Kirchner, M.1    Böhme, R.2
  • 11
    • 80051605162 scopus 로고    scopus 로고
    • Anti-forensics of digital image compression
    • Sep
    • M. C. Stamm and K. J. R. Liu, "Anti-forensics of digital image compression," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 50-65, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 50-65
    • Stamm, M.C.1    Liu, K.J.R.2
  • 12
    • 84873623957 scopus 로고    scopus 로고
    • Counter-forensics: Attacking image forensics
    • Berlin/Heidelberg, Germany: Springer
    • R. Böhme and M. Kirchner, H. T. Sencar and N. Memon, Eds., "Counter-forensics: Attacking image forensics," in Digital Image Forensics. Berlin/Heidelberg, Germany: Springer, 2012.
    • (2012) Digital Image Forensics
    • Böhme, R.1    Kirchner, M.2    Sencar, H.T.3    Memon, N.4
  • 14
    • 80053033238 scopus 로고    scopus 로고
    • Countering counter-forensics: The case of JPEG compression
    • Berlin/Heidelberg, Germany: Springer
    • S. Lai and R. Böhme, "Countering counter-forensics: The case of JPEG compression," in Information Hiding, ser. Lecture Notes in Computer Science. Berlin/Heidelberg, Germany: Springer, 2011, vol. 6958, pp. 285-298.
    • (2011) Information Hiding, Ser. Lecture Notes in Computer Science , vol.6958 , pp. 285-298
    • Lai, S.1    Böhme, R.2
  • 21
    • 0032183789 scopus 로고    scopus 로고
    • The method of types
    • PII S0018944898052857
    • I. Csiszar, "The method of types," IEEE Trans. Inf. Theory, vol. 44, no. 6, pp. 2505-2523, Oct. 1998. (Pubitemid 128741898)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.6 , pp. 2505-2523
    • Csiszar, I.1
  • 22
    • 38349193395 scopus 로고    scopus 로고
    • Optimal watermark embedding and detection strategies under limited detection resources
    • Jan
    • N. Merhav and E. Sabbag, "Optimal watermark embedding and detection strategies under limited detection resources," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 255-274, Jan. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.1 , pp. 255-274
    • Merhav, N.1    Sabbag, E.2
  • 23
    • 0001613029 scopus 로고
    • Asymptotically optimal tests for multinomial distributions
    • Apr
    • W. Hoeffding, "Asymptotically optimal tests for multinomial distributions," Annals Math. Statist., vol. 36, no. 2, pp. 369-401, Apr. 1965.
    • (1965) Annals Math. Statist. , vol.36 , Issue.2 , pp. 369-401
    • Hoeffding, W.1
  • 24
    • 0002021736 scopus 로고
    • Equilibrium points in n-person games
    • J. Nash, "Equilibrium points in n-person games," Proc. Nat. Acad. Sci., vol. 36, no. 1, pp. 48-49, 1950.
    • (1950) Proc. Nat. Acad. Sci. , vol.36 , Issue.1 , pp. 48-49
    • Nash, J.1
  • 26
    • 0000239750 scopus 로고    scopus 로고
    • Redundancy rates for renewal and other processes
    • PII S0018944896063717
    • I. Csiszar and P. C. Shields, "Redundancy rates for renewal and other processes," IEEE Trans. Inf. Theory, vol. 42, no. 6, pp. 2065-2072, Nov. 1996. (Pubitemid 126771535)
    • (1996) IEEE Transactions on Information Theory , vol.42 , Issue.6 PART 2 , pp. 2065-2072
    • Csiszar, I.1    Shields, P.C.2
  • 28
    • 84873689187 scopus 로고    scopus 로고
    • Algorithms and software for convex mixed integer nonlinear programs
    • NewYork,NY, USA: Springer
    • P. Bonami, M. Kilinc, and J. Linderoth, J. Lee and S. Leyffer, Eds., "Algorithms and software for convex mixed integer nonlinear programs," in Mixed Integer Nonlinear Programming. NewYork,NY, USA: Springer, 2012, pp. 1-39.
    • (2012) Mixed Integer Nonlinear Programming , pp. 1-39
    • Bonami, P.1    Kilinc, M.2    Linderoth, J.3    Lee, J.4    Leyffer, S.5
  • 29
    • 67349211082 scopus 로고    scopus 로고
    • Using noise inconsistencies for blind image forensics
    • B. Mahdian and S. Saic, "Using noise inconsistencies for blind image forensics," Image Vis. Comput., vol. 27, pp. 1497-1503, 2009.
    • (2009) Image Vis. Comput. , vol.27 , pp. 1497-1503
    • Mahdian, B.1    Saic, S.2
  • 30
    • 80054782322 scopus 로고    scopus 로고
    • Exposing image forgery with blind noise estimation
    • Buffalo, NY, USA, Sep.
    • X. Pan, X. Zhang, and S. Lyu, "Exposing image forgery with blind noise estimation," in Proc. ACM Multimedia and Security Workshop 2011, Buffalo, NY, USA, Sep. 2011, pp. 15-20.
    • (2011) Proc. ACM Multimedia and Security Workshop 2011 , pp. 15-20
    • Pan, X.1    Zhang, X.2    Lyu, S.3
  • 31
    • 84867466942 scopus 로고    scopus 로고
    • A universal technique to hide traces of histogram-based image manipulations
    • Coventry, U.K., Sep. 6-7
    • M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations," in Proc. ACM Multimedia and Security Workshop, Coventry, U.K., Sep. 6-7, 2012, pp. 97-104.
    • (2012) Proc. ACM Multimedia and Security Workshop , pp. 97-104
    • Barni, M.1    Fontani, M.2    Tondi, B.3
  • 32
    • 0024627211 scopus 로고
    • Asymptotically optimal classification for multiple tests with empirically observed statistics
    • Mar
    • M. Gutman, "Asymptotically optimal classification for multiple tests with empirically observed statistics," IEEE Trans. Inf. Theory, vol. 35, no. 2, pp. 401-408, Mar. 1989.
    • (1989) IEEE Trans. Inf. Theory , vol.35 , Issue.2 , pp. 401-408
    • Gutman, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.