ABSTRACT
From the very beginning when photography appeared and then much more in the digital era, images and videos have been edited not only to improve the visual quality of what they represented but also to change what had been acquired to mystify the reality. This is often done in order to transfer a different meaning to the watcher and basically mislead his/her opinion. On the other side, during the years, the need for even more effective defense instruments able to detect such alterations has increased. This has become particularly crucial with the advent of deep-learning based techniques that have allowed to rather easily achieve realistic results in content manipulation (deepfakes) but also in multimedia synthetic generation. This talk will provide a look throughout the evolution of the various kinds of manipulations with a parallel focus on the diverse multimedia forensic techniques and approaches [1, 2]. An analysis will be carried out to try to understand how needs and solutions have been evolved [3] in order to fix the lesson learnt and to individuate future research challenges.
- Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, and Giuseppe Serra. 2011. A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery. IEEE Transactions on Information Forensics and Security 6, 3 (2011), 1099–1110. https://doi.org/10.1109/TIFS.2011.2129512Google ScholarDigital Library
- Hany Farid. 2009. Image forgery detection. IEEE Signal Processing Magazine 26, 2 (2009), 16–25. https://doi.org/10.1109/MSP.2008.931079Google ScholarCross Ref
- Luisa Verdoliva. 2020. Media Forensics and DeepFakes: An Overview. IEEE Journal of Selected Topics in Signal Processing 14, 5 (2020), 910–932. https://doi.org/10.1109/JSTSP.2020.3002101Google ScholarCross Ref
Index Terms
- Multimedia Forensics versus disinformation in images and videos: lesson learnt and new challenges
Recommendations
Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals
ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and SecurityThis article presents policing challenges of investigating, evidencing and prosecuting organized cybercriminals for the crimes committed using cryptocurrencies such as Bitcoin. A set of best practices is discussed to tackle these challenges in real ...
Multimedia Forensics: An Overview of Recent Advances and Open Issues
MuVer '17: Proceedings of the First International Workshop on Multimedia VerificationAs a result of globalization and worldwide connectivity, people from all over the planet are exchanging constantly increasing amounts of images, videos, and audio recordings on a daily basis. The lifecycle of media contents is becoming more and more ...
Threat Models and Games for Adversarial Multimedia Forensics
MFSec '17: Proceedings of the 2nd International Workshop on Multimedia Forensics and SecurityWe define a number of threat models to describe the goals, the available information and the actions characterising the behaviour of a possible attacker in multimedia forensic scenarios. We distinguish between an investigative scenario, wherein the ...
Comments