메뉴 건너뛰기




Volumn 8, Issue 12, 2013, Pages 2073-2088

Anti-forensics and countermeasures of electrical network frequency analysis

Author keywords

Digital recording authentication; Electrical network frequency; Game theory; Information forensics; Time stamp

Indexed keywords

ADVERSARIAL ENVIRONMENTS; DETECTION METHODS; DIGITAL RECORDING; ELECTRICAL NETWORKS; EVOLUTIONARY PERSPECTIVE; FORENSIC ANALYST; INFORMATION FORENSICS; TIME STAMPS;

EID: 84888338964     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2285515     Document Type: Article
Times cited : (32)

References (26)
  • 1
    • 33947379497 scopus 로고    scopus 로고
    • Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis
    • DOI 10.1016/j.forsciint.2006.06.033, PII S0379073806004312, Selected Articles of the 4th European Academy of Forensic Science Conference (EAFS2006) June 13-16, 2006 Helsinki, Finland
    • C. Grigoras, "Applications of ENF criterion in forensics: Audio, video, computer, and telecommunication analysis," Forensic Sci. Int., vol. 167, pp. 136-145, Apr. 2007. (Pubitemid 46453424)
    • (2007) Forensic Science International , vol.167 , Issue.2-3 , pp. 136-145
    • Grigoras, C.1
  • 3
    • 77955689262 scopus 로고    scopus 로고
    • Audio authenticity: Detecting ENF discontinuity with high precision phase analysis
    • Sep.
    • D. P. N. Rodriguez, J. A. Apolinario, and L. W. P. Biscainho, "Audio authenticity: Detecting ENF discontinuity with high precision phase analysis," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 534-543, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 534-543
    • Rodriguez, D.P.N.1    Apolinario, J.A.2    Biscainho, L.W.P.3
  • 4
    • 84880765692 scopus 로고    scopus 로고
    • 'Seeing' ENF: Power signature based timestamp for digital multimedia via optical sensing and signal processing
    • Sep.
    • R. Garg, A. L. Varna, A. H. Ahmad, and M. Wu, "'Seeing' ENF: Power signature based timestamp for digital multimedia via optical sensing and signal processing," IEEE Trans. Forensics Inf. Security, vol. 8, no. 9, pp. 1417-1432, Sep. 2013.
    • (2013) IEEE Trans. Forensics Inf. Security , vol.8 , Issue.9 , pp. 1417-1432
    • Garg, R.1    Varna, A.L.2    Ahmad, A.H.3    Wu, M.4
  • 5
    • 84873623957 scopus 로고    scopus 로고
    • Counter-forensics: Attacking image forensics
    • H. T. Sencar and N. Memon, Eds. New York, NY, USA: Springer-Verlag
    • M. Kirchner and R. Bohme, "Counter-forensics: Attacking image forensics," in Digital Image Forensics, H. T. Sencar and N. Memon, Eds. New York, NY, USA: Springer-Verlag, 2012.
    • (2012) Digital Image Forensics
    • Kirchner, M.1    Bohme, R.2
  • 6
    • 84869484544 scopus 로고    scopus 로고
    • Robustness of color interpolation identification against anti-forensic operations
    • W.-H. Chuang and M. Wu, "Robustness of color interpolation identification against anti-forensic operations," in Proc. 14th Inf. Hiding Conf., 2012, pp. 16-30.
    • (2012) Proc. 14th Inf. Hiding Conf. , pp. 16-30
    • Chuang, W.-H.1    Wu, M.2
  • 7
    • 84888386204 scopus 로고    scopus 로고
    • Information forensics: An overview of the first decade
    • May
    • M. C. Stamm, M. Wu, and K. J. R. Liu, "Information forensics: An overview of the first decade," IEEE Access, vol. 1, no. 1, pp. 167-200, May 2013.
    • (2013) IEEE Access , vol.1 , Issue.1 , pp. 167-200
    • Stamm, M.C.1    Wu, M.2    Liu, K.J.R.3
  • 9
    • 84869407144 scopus 로고    scopus 로고
    • How secure are power network signature based time stamps?
    • W.-H. Chuang, R. Garg, and M. Wu, "How secure are power network signature based time stamps?" in Proc. ACM Conf. CCS, 2012, pp. 1-11.
    • (2012) Proc. ACM Conf. CCS , pp. 1-11
    • Chuang, W.-H.1    Garg, R.2    Wu, M.3
  • 10
    • 70349333825 scopus 로고    scopus 로고
    • Using the ENF criterion for determining the time of recording of short digital audio recordings
    • Aug.
    • M. Huijbregtse and Z. Geradts, "Using the ENF criterion for determining the time of recording of short digital audio recordings," in Proc. Int. Workshop Comput. Forensics, Aug. 2009, pp. 116-124.
    • (2009) Proc. Int. Workshop Comput. Forensics , pp. 116-124
    • Huijbregtse, M.1    Geradts, Z.2
  • 12
    • 84863919973 scopus 로고    scopus 로고
    • ENF extraction from digital recordings using adaptive techniques and frequency tracking
    • Aug.
    • O. Ojowu, J. Karlsson, J. Li, and Y. Liu, "ENF extraction from digital recordings using adaptive techniques and frequency tracking," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1330-1338, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1330-1338
    • Ojowu, O.1    Karlsson, J.2    Li, J.3    Liu, Y.4
  • 13
    • 84876101665 scopus 로고    scopus 로고
    • Electrical network frequency (ENF) maximum-likelihood estimation via a multitone harmonic model
    • May
    • D. Bykhovsky and A. Cohen, "Electrical network frequency (ENF) maximum-likelihood estimation via a multitone harmonic model," IEEE Trans. Inf. Forensics Security, vol. 8, no. 5, pp. 744-753, May 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.5 , pp. 744-753
    • Bykhovsky, D.1    Cohen, A.2
  • 14
    • 84880841551 scopus 로고    scopus 로고
    • Spectrum combining for ENF signal estimation
    • Sep.
    • A. Hajj-Ahmad, R. Garg, and M. Wu, "Spectrum combining for ENF signal estimation," IEEE Signal Process. Lett., vol. 20, no. 9, pp. 885-888, Sep. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.9 , pp. 885-888
    • Hajj-Ahmad, A.1    Garg, R.2    Wu, M.3
  • 15
    • 0022683359 scopus 로고
    • Multiple emitter location and signal parameter estimation
    • Mar.
    • R. O. Schmidt, "Multiple emitter location and signal parameter estimation," IEEE Trans. Antennas Propag., vol. 34, no. 3, pp. 276-280, Mar. 1986.
    • (1986) IEEE Trans. Antennas Propag. , vol.34 , Issue.3 , pp. 276-280
    • Schmidt, R.O.1
  • 16
    • 0024702515 scopus 로고
    • ESPRIT-estimation of signal parameters via rotational invariance techniques
    • Jul.
    • R. Roy and T. Kailath, "ESPRIT-estimation of signal parameters via rotational invariance techniques," IEEE Trans. Acoustics, Speech Signal Process., vol. 37, no. 7, pp. 984-995, Jul. 1989.
    • (1989) IEEE Trans. Acoustics, Speech Signal Process. , vol.37 , Issue.7 , pp. 984-995
    • Roy, R.1    Kailath, T.2
  • 19
    • 84888320755 scopus 로고    scopus 로고
    • [Online]. Available
    • - (2009). Wikipidia Article on 'Mains hum' [Online]. Available: http://en.wikipedia.org/wiki/mains-hum
    • (2009) Wikipidia Article on 'Mains Hum
  • 20
    • 0030736223 scopus 로고    scopus 로고
    • Computer virus-antivirus coevolution
    • Jan.
    • C. Nachenberg, "Computer virus-antivirus coevolution," Commun. ACM, vol. 40, pp. 46-51, Jan. 1997.
    • (1997) Commun. ACM , vol.40 , pp. 46-51
    • Nachenberg, C.1
  • 21
    • 85032751561 scopus 로고    scopus 로고
    • Security of online reputation systems: The evolution of attacks and defenses
    • Mar.
    • Y. Sun and Y. Liu, "Security of online reputation systems: The evolution of attacks and defenses," IEEE Signal Process. Mag., vol. 29, no. 2, pp. 87-97, Mar. 2012.
    • (2012) IEEE Signal Process. Mag. , vol.29 , Issue.2 , pp. 87-97
    • Sun, Y.1    Liu, Y.2
  • 24
    • 84864056133 scopus 로고    scopus 로고
    • Temporal forensics and antiforensics for motion compensated video
    • Aug.
    • M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Temporal forensics and antiforensics for motion compensated video," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1315-1329, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1315-1329
    • Stamm, M.C.1    Lin, W.S.2    Liu, K.J.R.3
  • 25
    • 79951834941 scopus 로고    scopus 로고
    • Defending against fingerprintcopy attack in sensor-based camera identification
    • Mar.
    • M. Goljan, J. Fridrich, and M. Chen, "Defending against fingerprintcopy attack in sensor-based camera identification," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 227-236, Mar. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.1 , pp. 227-236
    • Goljan, M.1    Fridrich, J.2    Chen, M.3
  • 26
    • 84873669138 scopus 로고    scopus 로고
    • The source identification game: An informationtheoretic perspective
    • Mar.
    • M. Barni and B. Tondi, "The source identification game: An informationtheoretic perspective," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 450-463, Mar. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.3 , pp. 450-463
    • Barni, M.1    Tondi, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.