메뉴 건너뛰기




Volumn 11, Issue 10, 2016, Pages 2145-2159

Source Distinguishability under Distortion-Limited Attack: An Optimal Transport Perspective

Author keywords

Adversarial signal processing; cybersecurity; earth mover distance (EMD); game theory; hypothesis testing; multimedia forensics; optimal transportation theory; source identification

Indexed keywords

ERRORS; MEAN SQUARE ERROR; PROBABILITY; PROBABILITY DISTRIBUTIONS; SIGNAL PROCESSING; STATISTICAL MECHANICS;

EID: 84979888094     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2016.2570739     Document Type: Article
Times cited : (22)

References (52)
  • 2
    • 85032751542 scopus 로고    scopus 로고
    • Digital forensics
    • Mar. [From the Guest Editors]
    • E. Delp, N. Memon, and M. Wu, "Digital forensics [From the Guest Editors]," IEEE Signal Process. Mag., vol. 26, no. 2, pp. 14-15, Mar. 2009.
    • (2009) IEEE Signal Process. Mag. , vol.26 , Issue.2 , pp. 14-15
    • Delp, E.1    Memon, N.2    Wu, M.3
  • 7
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection system using common exploits
    • Zürich, Switzerland, Oct.
    • K. M. C. Tan, K. S. Killourhy, and R. A. Maxion, "Undermining an anomaly-based intrusion detection system using common exploits," in Proc. Recent Adv. Intrusion Detect. (RAID), Zürich, Switzerland, Oct. 2002, pp. 54-73.
    • (2002) Proc. Recent Adv. Intrusion Detect. (RAID) , pp. 54-73
    • Tan, K.M.C.1    Killourhy, K.S.2    Maxion, R.A.3
  • 8
    • 84873669138 scopus 로고    scopus 로고
    • The source identification game: An informationtheoretic perspective
    • Mar.
    • M. Barni and B. Tondi, "The source identification game: An informationtheoretic perspective," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 450-463, Mar. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.3 , pp. 450-463
    • Barni, M.1    Tondi, B.2
  • 9
    • 84874075921 scopus 로고    scopus 로고
    • Optimum forensic and counter-forensic strategies for source identification with training data
    • Tenerife, Spain, Dec.
    • M. Barni and B. Tondi, "Optimum forensic and counter-forensic strategies for source identification with training data," in Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS), Tenerife, Spain, Dec. 2012, pp. 199-204.
    • (2012) Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS) , pp. 199-204
    • Barni, M.1    Tondi, B.2
  • 10
    • 84904654792 scopus 로고    scopus 로고
    • Binary hypothesis testing game with training data
    • Aug.
    • M. Barni and B. Tondi, "Binary hypothesis testing game with training data," IEEE Trans. Inf. Theory, vol. 60, no. 8, pp. 4848-4866, Aug. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.8 , pp. 4848-4866
    • Barni, M.1    Tondi, B.2
  • 13
    • 0034313871 scopus 로고    scopus 로고
    • The earth mover's distance as a metric for image retrieval
    • Nov.
    • Y. Rubner, C. Tomasi, and L. J. Guibas, "The earth mover's distance as a metric for image retrieval," Int. J. Comput. Vis., vol. 40, no. 2, pp. 99-121, Nov. 2000.
    • (2000) Int. J. Comput. Vis. , vol.40 , Issue.2 , pp. 99-121
    • Rubner, Y.1    Tomasi, C.2    Guibas, L.J.3
  • 15
    • 84905269810 scopus 로고    scopus 로고
    • The role of permutation coding in minimum-distortion perfect counterforensics
    • Florence, Italy, May
    • F. Balado, "The role of permutation coding in minimum-distortion perfect counterforensics," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Florence, Italy, May 2014, pp. 6240-6244.
    • (2014) Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP) , pp. 6240-6244
    • Balado, F.1
  • 18
    • 84897714672 scopus 로고    scopus 로고
    • The security margin: A measure of source distinguishability under adversarial conditions
    • Austin, TX, USA, Dec.
    • M. Barni and B. Tondi, "The security margin: A measure of source distinguishability under adversarial conditions," in Proc. IEEE Global Conf. Signal Inf. Process. (GlobalSIP), Austin, TX, USA, Dec. 2013, pp. 225-228.
    • (2013) Proc. IEEE Global Conf. Signal Inf. Process. (GlobalSIP) , pp. 225-228
    • Barni, M.1    Tondi, B.2
  • 21
    • 35148827015 scopus 로고    scopus 로고
    • Iterated strict dominance in general games
    • Nov.
    • Y. C. Chen, N. Van Long, and X. Luo, "Iterated strict dominance in general games," Games Econ. Behavior, vol. 61, no. 2, pp. 299-315, Nov. 2007.
    • (2007) Games Econ. Behavior , vol.61 , Issue.2 , pp. 299-315
    • Chen, Y.C.1    Van Long, N.2    Luo, X.3
  • 24
    • 0001662944 scopus 로고
    • The Monge-Kantorovich mass transference problem and its stochastic applications
    • S. T. Rachev, "The Monge-Kantorovich mass transference problem and its stochastic applications," Theory Probab. Appl., vol. 29, no. 4, pp. 647-676, 1985.
    • (1985) Theory Probab. Appl. , vol.29 , Issue.4 , pp. 647-676
    • Rachev, S.T.1
  • 25
    • 0034843832 scopus 로고    scopus 로고
    • The earth mover's distance is the mallows distance: Some insights from statistics
    • Jul.
    • E. Levina and P. Bickel, "The earth mover's distance is the mallows distance: Some insights from statistics," in Proc. 8th IEEE Int. Conf. Comput. Vis. (ICCV), vol. 2. Jul. 2001, pp. 251-256.
    • (2001) Proc. 8th IEEE Int. Conf. Comput. Vis. (ICCV) , vol.2 , pp. 251-256
    • Levina, E.1    Bickel, P.2
  • 26
    • 0024627211 scopus 로고
    • Asymptotically optimal classification for multiple tests with empirically observed statistics
    • Mar.
    • M. Gutman, "Asymptotically optimal classification for multiple tests with empirically observed statistics," IEEE Trans. Inf. Theory, vol. 35, no. 2, pp. 401-408, Mar. 1989.
    • (1989) IEEE Trans. Inf. Theory , vol.35 , Issue.2 , pp. 401-408
    • Gutman, M.1
  • 29
    • 85163204848 scopus 로고
    • The distribution of a product from several sources to numerous localities
    • Apr.
    • F. L. Hitchcock, "The distribution of a product from several sources to numerous localities," J. Math. Phys., vol. 20, nos. 1-4, pp. 224-230, Apr. 1941.
    • (1941) J. Math. Phys. , vol.20 , Issue.1-4 , pp. 224-230
    • Hitchcock, F.L.1
  • 30
    • 0345725588 scopus 로고
    • De l'Imprimerie Royale, Paris: Histoire de l'Academie Royale des Sciences
    • G. Monge, Mémoire sur la théorie des Déblais et des Remblais. De l'Imprimerie Royale, Paris: Histoire de l'Academie Royale des Sciences, 1781, pp. 666-704.
    • (1781) Mémoire sur la Théorie des Déblais et des Remblais , pp. 666-704
    • Monge, G.1
  • 33
    • 0001724641 scopus 로고
    • On simple linear programming problems
    • A. Hoffman, "On simple linear programming problems," in Proc. Symp. Pure Math., vol. 7. 1963, pp. 317-327.
    • (1963) Proc. Symp. Pure Math. , vol.7 , pp. 317-327
    • Hoffman, A.1
  • 34
    • 0001898620 scopus 로고    scopus 로고
    • Perspectives of Monge properties in optimization
    • Sep.
    • R. E. Burkard, B. Klinz, and R. Rudolf, "Perspectives of Monge properties in optimization," Discrete Appl. Math., vol. 70, no. 2, pp. 95-161, Sep. 1996.
    • (1996) Discrete Appl. Math. , vol.70 , Issue.2 , pp. 95-161
    • Burkard, R.E.1    Klinz, B.2    Rudolf, R.3
  • 35
    • 0027554501 scopus 로고
    • A faster strongly polynomial minimum cost flow algorithm
    • J. B. Orlin, "A faster strongly polynomial minimum cost flow algorithm," Oper. Res., vol. 41, no. 2, pp. 338-350, 1993.
    • (1993) Oper. Res. , vol.41 , Issue.2 , pp. 338-350
    • Orlin, J.B.1
  • 36
    • 80051802764 scopus 로고    scopus 로고
    • Optimal histogram representation of large data sets: Fisher vs piecewise linear approximation
    • A. Irpino and E. Romano, "Optimal histogram representation of large data sets: Fisher vs piecewise linear approximation," in Proc. EGC, vol. RNTI-E-9, 2007, pp. 99-110.
    • (2007) Proc. EGC , vol.RNTI-E-9 , pp. 99-110
    • Irpino, A.1    Romano, E.2
  • 37
    • 0032116117 scopus 로고    scopus 로고
    • Near-lossless image compression techniques
    • [Online]
    • R. Ansari, N. Memon, and E. Ceran, "Near-lossless image compression techniques," J. Electron. Imag., vol. 7, no. 3, pp. 486-494, 1998. [Online]. Available: http://dx.doi.org/10.1117/1.482591
    • (1998) J. Electron. Imag. , vol.7 , Issue.3 , pp. 486-494
    • Ansari, R.1    Memon, N.2    Ceran, E.3
  • 38
    • 0019229279 scopus 로고
    • Finding structure in Co-occurrence matrices for texture analysis
    • Mar.
    • S. W. Zucker and D. Terzopoulos, "Finding structure in Co-occurrence matrices for texture analysis," Comput. Graph. Image Process., vol. 12, no. 3, pp. 286-308, Mar. 1980.
    • (1980) Comput. Graph. Image Process. , vol.12 , Issue.3 , pp. 286-308
    • Zucker, S.W.1    Terzopoulos, D.2
  • 39
    • 84255178228 scopus 로고    scopus 로고
    • Anomaly detection and reconstruction from random projections
    • Jan.
    • J. E. Fowler and Q. Du, "Anomaly detection and reconstruction from random projections," IEEE Trans. Image Process., vol. 21, no. 1, pp. 184-195, Jan. 2012.
    • (2012) IEEE Trans. Image Process. , vol.21 , Issue.1 , pp. 184-195
    • Fowler, J.E.1    Du, Q.2
  • 41
    • 84891296342 scopus 로고    scopus 로고
    • Camera model identification based on the heteroscedastic noise model
    • Jan.
    • T. H. Thai, R. Cogranne, and F. Retraint, "Camera model identification based on the heteroscedastic noise model," IEEE Trans. Image Process., vol. 23, no. 1, pp. 250-263, Jan. 2014.
    • (2014) IEEE Trans. Image Process. , vol.23 , Issue.1 , pp. 250-263
    • Thai, T.H.1    Cogranne, R.2    Retraint, F.3
  • 42
    • 85015091451 scopus 로고    scopus 로고
    • Content-adaptive steganography by minimizing statistical detectability
    • Feb.
    • V. Sedighi, R. Cogranne, and J. Fridrich, "Content-adaptive steganography by minimizing statistical detectability," IEEE Trans. Inf. Forensics Security, vol. 11, no. 2, pp. 221-234, Feb. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.2 , pp. 221-234
    • Sedighi, V.1    Cogranne, R.2    Fridrich, J.3
  • 43
    • 84896690794 scopus 로고    scopus 로고
    • Contrast enhancement-based forensics in digital images
    • Mar.
    • G. Cao, Y. Zhao, R. Ni, and X. Li, "Contrast enhancement-based forensics in digital images," IEEE Trans. Inf. Forensics Security, vol. 9, no. 3, pp. 515-525, Mar. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.3 , pp. 515-525
    • Cao, G.1    Zhao, Y.2    Ni, R.3    Li, X.4
  • 45
    • 0032022519 scopus 로고    scopus 로고
    • Hypothesis testing for arbitrarily varying source with exponential-type constraint
    • Mar.
    • F.-W. Fu and S.-Y. Shen, "Hypothesis testing for arbitrarily varying source with exponential-type constraint," IEEE Trans. Inf. Theory, vol. 44, no. 2, pp. 892-895, Mar. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.2 , pp. 892-895
    • Fu, F.-W.1    Shen, S.-Y.2
  • 49
    • 84867466942 scopus 로고    scopus 로고
    • A universal technique to hide traces of histogram-based image manipulations
    • Coventry, U.K., Sep.
    • M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations," in Proc. ACM Multimedia Secur. Workshop, Coventry, U.K., Sep. 2012, pp. 97-104.
    • (2012) Proc. ACM Multimedia Secur. Workshop , pp. 97-104
    • Barni, M.1    Fontani, M.2    Tondi, B.3
  • 51
    • 3042651273 scopus 로고    scopus 로고
    • Markov types and minimax redundancy for Markov sources
    • Jul.
    • P. Jacquet and W. Szpankowski, "Markov types and minimax redundancy for Markov sources," IEEE Trans. Inf. Theory, vol. 50, no. 7, pp. 1393-1402, Jul. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.7 , pp. 1393-1402
    • Jacquet, P.1    Szpankowski, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.