期刊文献+

数字媒体取证技术综述 被引量:20

Overview of digital media forensics technology
原文传递
导出
摘要 面对每天有数以百万计通过网络传播的多媒体数据,到底哪些内容是真实可信的,虚假内容的背后又经历了哪些篡改?数字取证技术将给出答案。该技术不预先嵌入水印,而是直接分析多媒体数据的内容,达到辨别真实性的目的。任何篡改和伪造都会在一定程度上破坏原始多媒体数据本身固有特征的完整性,由于其具有一致性和独特性,可作为自身的"固有指纹",用于鉴别篡改文件。随着篡改媒体的数量与日俱增,社会稳定甚至国家安全受到了严重威胁。特别地,随着深度学习技术的快速发展,虚假媒体与真实媒体之间的感官差距越来越小,这对媒体取证研究提出了巨大挑战,并使得多媒体取证成为信息安全领域一个重要的研究方向。因此,目前迫切需要能够检测虚假多媒体内容和避免危险虚假信息传播的技术和工具。本文旨在对过去多媒体取证领域所提出的优秀检测取证算法进行总结。除了回顾传统的媒体取证方法,还将介绍基于深度学习的方法。本文针对当今主流的多媒体篡改对象:图像、视频和语音分别进行总结,并针对每种媒体形式,分别介绍传统篡改方法和基于AI(artificial intelligence)生成的篡改方法,并介绍了已公开的大规模数据集以及相关应用的情况,同时探讨了多媒体取证领域未来可能的发展方向。 Internet and social networks have become the main platforms for people to access and share various digital media.Among them,media based on images,videos,and audio carry more information and are the most eye-catching.With the rapid development of computer technology,image and video editing software and tools have appeared one after another,such as Photoshop,Adobe Premiere Pro,and VideoStudio.These editing software can be faster and easier to modify the media.The effect of image forgery is realistic,and the effect of video editing and synthesis is natural and smooth.In recent years,the image generation technology has also been greatly developed,and the visual effects of the generated images may be fake.The problem of multimedia forgery attracts people’s attention.The purpose of forgery may be entertainment(such as beautifying images),malicious modification of the content of images and videos(such as deliberately modifying photos of political figures or deliberately exaggerating the severity of news events),and malicious copying.Image forgery incidents in recent years also remind people to focus on the security of media content.The authenticity of visual media content decreases and is increasingly being questioned.At present,millions of multimedia data are transmitted via the Internet every day.What type of content is true?What tampering was made behind the wrong content?The digital forensics technology proposed in recent years provides the answer.This technology does not embed a watermark in advance but directly analyzes the content of multimedia data to achieve the purpose of authenticity recognition.The basic principle is that the inherent characteristics of the original multimedia data are consistent and unique and can be used as its own"intrinsic fingerprint".Any tampering or forgery destroys its integrity to a certain extent.In recent years,media tampering has been increasing and has seriously threatened social stability and even national security.Especially with the rapid development of deep learning technology,the perceived gap between fake media and real media decreases.This finding poses a serious challenge to media forensic research and makes multimedia forensics an important issue in the field of information security research direction.Therefore,technologies and tools that can detect erroneous multimedia content are urgently required,and the spread of dangerous erroneous information is avoided.This article aims to summarize the excellent detection and forensics algorithms proposed in the previous multimedia forensics field.In addition to reviewing traditional media forensics methods,we introduce methods based on deep learning.This article summarizes the current mainstream multimedia tampering objects,namely,images,videos,and sounds.Each media form includes traditional tampering methods and artificial intelligence(AI)-based tampering methods.Among them,video tampering is mainly divided into intraframe tampering and interframe tampering.Intraframe tampering takes the video frame as a unit to delete objects on the screen or performing"copy and move"operations,and interframe tampering takes the video sequence as a unit to add or delete frames.Traditional methods for detecting fake videos can be divided into video encoding tracking detection,video content inconsistency detection,video frame repeated tampering,and copy and paste detection.AI-based error video detection technology focuses on detecting artifacts left over from the network generated in the imaging network,which is different from the imaging process of a real camera.The purpose of digital image forensics technology is to verify the integrity and authenticity of digital images.Image forensic methods can be divided into active methods and passive methods.Active image forensics includes embedding watermarks or signatures in digital images.The passive blind forensic(blind forensics)method is not limited by these factors.It distinguishes images by detecting traces of tampering in the image.Common image forgery and tampering include enhancement,modification,area duplication,splicing,and synthesis.The detection of partial replacement image is divided into the following:1)Area copy and tamper detection,which copies and pastes part of the area in the image to other areas.During the copying process,the copied area may undergo various geometric transformations and postprocessing.2)Image processing fingerprints detection.The visual difference caused by simple area copying,splicing,and tampering is still evident.The forger performs postprocessing,such as zooming,rotating,and blurring the image,to eliminate these traces.3)In recompression fingerprint detection,tampered images inevitably undergo recompression;thus,digital image recompression detection can provide a powerful auxiliary basis for digital image forensics.For the traceability detection technology of forged images,most images are captured by the camera.The general physical structure of the camera and the physical differences between different cameras leave traces on the captured images.These traces(camera fingerprints)appear as a series of features on the image,and the acquisition device of this image can be identified by examining the fingerprint of the device embedded in the image.The detection technology for the overall image generated by AI also focuses on detecting the artifacts left by the network generated in the imaging network.In the previous decades,some digital audio forensic studies have focused on detecting various forms of audio tampering.These methods check the metadata of audio files.In addition,the publicly available large-scale data sets and related applications are introduced,and the possible future development directions of the multimedia forensic field is discussed.
作者 李晓龙 俞能海 张新鹏 张卫明 李斌 卢伟 王伟 刘晓龙 Li Xiaolong;Yu Nenghai;Zhang Xinpeng;Zhang Weiming;Li Bin;Lu Wei;Wang Wei;Liu Xiaolong(Institute of Information Science,Beijing Jiaotong University,Beijing 100044,China;School of Information Science and Technology,University of Science and Technology of China,Hefei 230027,China;School of Communication and Information Engineering,Shanghai University,Shanghai 200444,China;School of Information Engineering,Shenzhen University,Shenzhen 518060,China;School of Computer Science and Engineering,Sun Yat-sen University,Guangzhou 510006,China;Institute of Automation,Chinese Academy of Sciences,Beijing 100190,China)
出处 《中国图象图形学报》 CSCD 北大核心 2021年第6期1216-1226,共11页 Journal of Image and Graphics
基金 国家重点研发计划项目(2020AAA0140003) 国家自然科学基金项目(U2001202,62072480,U1736213)。
关键词 多媒体取证 多媒体溯源 篡改检测 篡改定位 虚假人脸 multimedia forensics multimedia traceability forgery detection forgery localization fake face
  • 相关文献

参考文献5

二级参考文献45

  • 1王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454. 被引量:39
  • 2骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,30(11):1998-2007. 被引量:65
  • 3赵凌君,贾承丽,匡纲要.SAR图像边缘检测方法综述[J].中国图象图形学报,2007,12(12):2042-2049. 被引量:36
  • 4郑文瑞,丁栋全.多元模糊数据的假设检验方法[J].模糊系统与数学,2007,21(6):123-127. 被引量:2
  • 5ZHOU L N, WANG D M. Digital Image Forensics[M]. Beijing:Beijing University of Posts and Telecommunications Press, 2008:1-2.
  • 6WANG W, FARID H. Exposing digital forgeries in video by detecting double quantization[C]//Proceedings of the 11th ACM Workshop on Multimedia and Security. New York:ACM, 2009:39-48.
  • 7ZHANG J, SU Y, ZHANG M. Exposing digital video forgery by ghost shadow artifact[C]//Proceedings of the 1st ACM Workshop on Multimedia in Forensics. New York:ACM, 2009:49-54.
  • 8DELP E, MEMON N, WU M. Digital forensics[J]. IEEE Signal Processing Magazine, 2009, 26(2):14-15.
  • 9MILANI S, FONTANI M, BESTAGINI P, et al. An overview on video forensics[J]. APSIPA Transactions on Signal and Information Processing, 2012, 1(1):1-18.
  • 10DONG Q, YANG G, ZHU N. A MCEA based passive forensics scheme for detecting frame-based video tampering[J]. Digital Investigation, 2012, 9(2):151-159.

共引文献19

同被引文献114

引证文献20

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部