ebook img

Digital Forensics and Watermarking : 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings PDF

424 Pages·2017·63.52 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Digital Forensics and Watermarking : 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings

Christian Kraetzer Yun-Qing Shi Jana Dittmann Hyoung Joong Kim (Eds.) 1 3 Digital Forensics 4 0 1 S and Watermarking C N L 16th International Workshop, IWDW 2017 Magdeburg, Germany, August 23–25, 2017 Proceedings 123 Lecture Notes in Computer Science 10431 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zurich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany More information about this series at http://www.springer.com/series/7410 Christian Kraetzer Yun-Qing Shi (cid:129) Jana Dittmann Hyoung Joong Kim (Eds.) (cid:129) Digital Forensics and Watermarking 16th International Workshop, IWDW 2017 – Magdeburg, Germany, August 23 25, 2017 Proceedings 123 Editors Christian Kraetzer JanaDittmann Department ofComputer Science Department ofComputer Science Otto-von-Guericke University Magdeburg Otto-von-Guericke University Magdeburg Magdeburg Magdeburg Germany Germany Yun-Qing Shi Hyoung JoongKim Department ofElectrical andComputer Graduate SchoolInformation Security Engineering Korea University NewJersey Institute ofTechnology Seoul Newark, NJ Korea USA ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notesin Computer Science ISBN 978-3-319-64184-3 ISBN978-3-319-64185-0 (eBook) DOI 10.1007/978-3-319-64185-0 LibraryofCongressControlNumber:2017931057 LNCSSublibrary:SL4–SecurityandCryptology ©SpringerInternationalPublishingAG2017 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations. Printedonacid-freepaper ThisSpringerimprintispublishedbySpringerNature TheregisteredcompanyisSpringerInternationalPublishingAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface The 16th International Workshop on Digital Forensics and Watermarking (IWDW 2017), hosted by the Advanced Multimedia and Security Lab (AMSL) of the DepartmentofComputerScience,OttovonGuerickeUniversityMagdeburg,washeld on the premises of the newly renovated “Haus des Handwerks” in Magdeburg, Germany, during August 23–25, 2017. The chosen venue is close to the place where Otto von Guericke first held his famous Magdeburg Hemispheres Experiment in the 17th century. IWDW 2017, following the principles of the IWDW series, aimed at providing a technical program covering state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Among48submissionsfromEurope,Asia,andNorthAmerica,theTechnicalProgram Committeeselected30papersforpresentationandpublication,includingonepaperfor a best paper award. The selection was based on the reviews provided by 52 Program Committee members. Besides the regular presentations, two special session were held: The first one (“Emerging threats of Criminal Use of Information Hiding: Usage Scenarios and DetectionApproaches”)wasorganizedjointlywiththeEuropolEC3initiativeCUING (Criminal Use of Information Hiding) and aimed to bring together academic and law-enforcement-relatedresearchontheapplicationofsteganography,covertchannels, watermarkingandotherformsofinformationhidinginthecontextofcybercrime.The secondspecialsession(“BiometricImage-TamperingDetection”)wasco-organizedby the German national research project ANANAS (Anomalie-Erkennung zur Verhin- derung von Angriffen auf gesichtsbildbasierte Authentifikationssysteme: Anomaly Detection for the Prevention of Attacks Against Face Image-Based Authentication Systems), to address the challenging task of blind validation of biometric image authenticity. Here, detecting traces of illegitimate image editing and distinguishing them from traces of legitimate image editing was the major concern of this session, motivated by the fact that digital photographs have recently been actively used in machine-readable documents for the purpose of biometric identity verification, gen- eratingtheriskofcriminalintenttoovercomeautomatedrecognitionsystemsbyimage manipulation. Inadditiontothepaperpresentations,theworkshopfeaturedtwoinvitedtalks:One keynote “Applications of Natural Laws for Multimedia Security and Forensics,” presented by Professor Anthony T.S. Ho (University of Surrey, UK) and an intro- ductory talk for one of the special sessions, titled “Media Forensics and Trustworthi- ness of Biometric Images – An Industry Perspective” by Dr. Andreas Wolf (Principal ScientistBiometricsatBundesdruckereiGmbH,Germany,andoneoftheGermanDIN experts delegated to the ISO/IEC JTC1 committees SC17, SC31, and SC37 as well as to the European Standards Committee CEN). VI Preface We wish to thank Springer for sponsoring a Best Paper Award for IWDW 2017. Itwasdecidedtobeawardedtothepaperwiththetitle“TopologicalDataAnalysisFor Image Tampering Detection” by Aras Asaad and Sabah Jassim (The University of Buckingham, UK). As the reviewers pointed out for this paper, the application of TopologicalDataAnalysistomediaforensicsdoneisstillearlystagework,butitopens a new and promising perspective in the field of media forensics. We feel that this novelty deserves to be awarded to encourage (especially young) researchers to step outside the well established routes. We would like to thank all of the authors, reviewers, lecturers, and participants for their valuable contributions to IWDW 2017. Our sincere gratitude also goes to all the membersoftheTechnicalProgramCommittee,specialsessionreviewers,andourlocal volunteers for their careful work and great efforts made in the wonderful organization of this workshop. Finally, we hope that the readers will enjoy this volume and that it will provide inspiration and opportunities for future research. August 2017 Christian Kraetzer Yun-Qing Shi Jana Dittmann Hyoung Joong Kim Organization General Chairs Jana Dittmann Otto von Guericke University Magdeburg, Germany Christian Kraetzer Otto von Guericke University Magdeburg, Germany Technical Program Chairs Yun-Qing Shi New Jersey Institute of Technology (NJIT), USA Hyoung Joong Kim Korea University, Korea Organizing Chair Silke Reifgerste Otto von Guericke University Magdeburg, Germany Technical Program Committee Claude Delpha Laboratoire des Signaux et Systèmes (L2S), CNRS – Centrale Supelec, Université Paris Sud, France Yan Diqun CKC Software Laboratory, Ningbo University, China Jana Dittmann Otto von Guericke University Magdeburg, Germany Isao Echizen National Institute of Informatics, Japan Jiankun Hu The University of New South Wales, Australia Guang Hua Huazhong University of Science and Technology, China Fangjun Huang Sun Yat-Sen University, China Sabah Jassim The University of Buckingham, UK Xinghao Jiang Shanghai Jiao Tong University, China Ton Kalker DTS, Inc., USA Xiangui Kang Sun Yat-Sen University, China Mohan Kankanhalli National University of Singapore, Singapore Stefan Katzenbeisser TU Darmstadt, Germany Andrew Ker University of Oxford, UK Anja Keskinarkaus University of Oulu, Finland Hyoung Joong Kim Korea University, Korea Christian Kraetzer Otto von Guericke University Magdeburg, Germany Minoru Kuribayashi Okayama University, Japan Heung-Kyu Lee Korea Advanced Institute of Science and Technology, Korea Chang-Tsun Li Charles Sturt University, Australia Shenghong Li Shanghai Jiaotong University, China Feng Liu Chinese Academy of Sciences, China VIII Organization Zhe-Ming Lu Zhejiang University, China Bin Ma Qilu University of Technology, Jinan, China Wojciech Mazurczyk Warsaw University of Technology, Institute of Telecommunications, Poland Jiangqun Ni Sun Yat-sen University, China Rongrong Ni Beijing Jiaotong University, China Michiharu Niimi Kyushu Institute of Technology, Japan Akira Nishimura Tokyo University of Information Sciences, Japan Cecilia Pasquini Universität Innsbruck, Austria Tomas Pevny CzechTechnicalUniversityinPrague,CzechRepublic Alessandro Piva University of Florence, Italy Yong Man Ro KAIST, Korea Pascal Schoettle Universität Innsbruck, Austria Yun-Qing Shi New Jersey Institute of Technology (NJIT), USA Athanassios Skodras University of Patras, Greece Martin Steinebach Fraunhofer Institute for Secure Information Technology, Germany Krzysztof Szczypiorski Warsaw University of Technology, Institute of Telecommunications, Poland Claus Vielhauer BrandenburgUniversityofAppliedSciences,Germany Sviatsolav Voloshynovskiy University of Geneva, Switzerland Steffen Wendzel Worms University of Applied Sciences, Germany Andreas Westfeld University of Applied Sciences Dresden, Germany Xiaotian Wu Jinan University, China James C.N. Yang National Dong Hwa University, Taiwan Xinpeng Zhang Shanghai University, China Xianfeng Zhao Institute of Information Engineering, Chinese Academy of Sciences, China Guopu Zhu Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, China Special Session Reviewers for the CUING Special Session Bernhard Fechner FernUniversität Hagen, Germany Sebastian Zander Murdoch University, Australia Jean-Francois Lalande INSA Centre Val de Loire, France Saffija Kasem-Madani University of Bonn, Germany International Publicity Liaisons Ton Kalker DTS, Inc., USA Contents Forensics HEVC Double Compression Detection Based on SN-PUPM Feature. . . . . . . 3 Qianyi Xu, Tanfeng Sun, Xinghao Jiang, and Yi Dong Towards Automated Forensic Pen Ink Verification by Spectral Analysis . . . . 18 MichaelKalbitz,TobiasScheidat,BenjaminYüksel,andClausVielhauer Recaptured Image Forensics Based on Quality Aware and Histogram Feature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Pengpeng Yang, Ruihan Li, Rongrong Ni, and Yao Zhao Website Fingerprinting Attack on Psiphon and Its Forensic Analysis. . . . . . . 42 Tekachew Gobena Ejeta and Hyoung Joong Kim Deep Learning Based Counter–Forensic Image Classification for Camera Model Identification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Venkata Udaya Sameer, Ruchira Naskar, Nikhita Musthyala, and Kalyan Kokkalla Block-Based Convolutional Neural Network for Image Forgery Detection . . . 65 Jianghong Zhou, Jiangqun Ni, and Yuan Rao A Hybrid Feature Model for Seam Carving Detection . . . . . . . . . . . . . . . . . 77 Jingyu Ye and Yun-Qing Shi Biometric Image Tampering Detection Face Morphing Detection: An Approach Based on Image Degradation Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Tom Neubert Detection of Face Morphing Attacks by Deep Learning. . . . . . . . . . . . . . . . 107 Clemens Seibold, Wojciech Samek, Anna Hilsmann, and Peter Eisert CNNsUnderAttack:OntheVulnerabilityofDeepNeuralNetworksBased Face Recognition to Image Morphing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Lukasz Wandzik, Raul Vicente Garcia, Gerald Kaeding, and Xi Chen Topological Data Analysis for Image Tampering Detection . . . . . . . . . . . . . 136 Aras Asaad and Sabah Jassim

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.