Topics in Security: Forensic Signal Analysis



Similar documents
Combating Anti-forensics of Jpeg Compression

Video eavesdropping- RF

SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp

A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component

Exposing Digital Forgeries Through Chromatic Aberration

Sniffing Keystrokes With Lasers/Voltmeters

Digital Image Authentication from JPEG Headers

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

Digital Image Analysis for Evidence: A MATLAB toolbox

Course overview Processamento de sinais 2009/10 LEA

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction

PHYSIOLOGICALLY-BASED DETECTION OF COMPUTER GENERATED FACES IN VIDEO

ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS

Color Image Stegananalysis Using Correlations between RGB Channels

Image Authentication Scheme using Digital Signature and Digital Watermarking

Computer Vision: Machine Vision Filters. Computer Vision. Optical Filters. 25 August 2014

CSEN301 Embedded Systems Trimester 1

Source Class Identification for DSLR and Compact Cameras

Computer Science 1301 Computer Literacy. Student Learning Outcomes

Image Compression through DCT and Huffman Coding Technique

CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP)

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

COURSE OUTLINE COMPUTER INFORMATION SYSTEMS 1A. PREREQUISITE: None. Concurrent enrollment in CIS-96 or CIS-97 is recommended.

Low-resolution Image Processing based on FPGA

MASSEY UNIVERSITY BACHELOR OF ENGINEERING with HONOURS TELECOMMUNICATIONS AND NETWORK ENGINEERING. Major Profile Description and Competency Framework

How To Get A Degree In Electrical Engineering

Review Article An Overview on Image Forensics

Survey of the Mathematics of Big Data

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

SECOND YEAR. Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300) 3 TOTAL 3 TOTAL 6. MASTER OF ENGINEERING IN ELECTRICAL ENGINEERING (MEng EE) FIRST YEAR

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

San José State University Department of Electrical Engineering EE 112, Linear Systems, Spring 2010

EE3414 Multimedia Communication Systems Part I

CIS 551 / TCOM 401 Computer and Network Security

CHAPTER 7 CONCLUSION AND FUTURE WORK

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

MECH 450F/580 COURSE OUTLINE INTRODUCTION TO OCEAN ENGINEERING

Multimedia Systems Hardware & Software THETOPPERSWAY.COM

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

A comprehensive survey on various ETC techniques for secure Data transmission

Security and protection of digital images by using watermarking methods

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

T.A.: Lauren Fissel, LMR379 UG TA/grader: TBA

REQUIRED MATERIALS: I. COURSE OVERVIEW AND OUTLINE:

BSEE Degree Plan Bachelor of Science in Electrical Engineering:

Electrical Engineering

INTRODUCTION TO DIGITAL PHOTOGRAPHY

Problems of Security in Ad Hoc Sensor Network

COURSE DESCRIPTOR Signal Processing II Signalbehandling II 7.5 ECTS credit points (7,5 högskolepoäng)

EECS PhD Comprehensive Examination Guidelines

Example #1: Controller for Frequency Modulated Spectroscopy

Digital Image Processing EE368/CS232

C U R R I C U L U M V I T A E T R I V A N L E

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

Theory and Methods of Lightfield Photography SIGGRAPH 2009

C++ for Image Processing

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

CASPER COLLEGE COURSE SYLLABUS ART 2245 Digital Photo for Art Majors Fall/2015. Lecture Hours: 2 Lab Hours: 4 Credit Hours: 3

Distance Education Learning Resources Unit Document Title: Online Course Review Checklist Last Updated: July 17, 2013 by the DE Office Draft Final

Multimedia Document Authentication using On-line Signatures as Watermarks

MsC in Advanced Electronics Systems Engineering

Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act

Coursework for MS leading to PhD in Electrical Engineering. 1 Courses for Digital Systems and Signal Processing

Universidad de Alcalá

Introduction to Multimedia and Web Design ETPT 5210/7210 Course Syllabus Fall Semester 2008

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Robotics and Engineering Design (SKN11) Syllabus

DCT-JPEG Image Coding Based on GPU

OCR LEVEL 2 CAMBRIDGE TECHNICAL

A Feature Selection Methodology for Steganalysis

Alternative Methods Of Input. Kafui A. Prebbie 82

Overview Basic Design Studio A (MCD1330) Visual Arts Studio A (MCD1340) Drawing A (MCD1270)... 4

Mike Perkins, Ph.D.

Introduction. Chapter Scope of Electrical Engineering

Help Software Design of NDT Instrument Based on FLASH Cartoon

Information Hiding by Stochastic Diffusion and its Application to Printed Document Authentication

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

EUROPASS DIPLOMA SUPPLEMENT

Transcription:

Topics in Security: Forensic Signal Analysis Fact or fiction? Markus Kuhn, Andrew Lewis Computer Laboratory http://www.cl.cam.ac.uk/teaching/0910/r08/ Michaelmas 2009 MPhil ACS Hans D. Baumann, DOCMA 3 Real Introductory examples: manipulation of photographs 2 Hans D. Baumann, DOCMA 4

or fantasy... unreliable government hardware... Iranian missile test, July 2008 Hans D. Baumann, DOCMA 5 http://www.cs.dartmouth.edu/farid/research/digitaltampering/ 7 Political photos may suddenly lack past company...... or even body parts. Stalin, 1930 President Nicolas Sarkozy. Paris Match, August 2007 http://www.cs.dartmouth.edu/farid/research/digitaltampering/ 6 http://www.cs.dartmouth.edu/farid/research/digitaltampering/... with many more 8

Forensic Signal Analysis This course looks at the use of digital signal processing techniques in a security context, to uncover hidden information from image, video, audio, electromagnetic, etc. signals, in particular to identify manipulation; identify/verify processing history; identify/verify type or instance of the acquiring sensor; eavesdrop on persons or computer systems; communicate covertly (steganography). This is a reading class, i.e. the lecture notes are selected recent original research publications and the material is mostly presented by the students. Prerequisites A background in digital signal processing, image processing, linear algebra, probability, statistics, data compression, communication technology (modulation and detection) will be useful. Some background reading beyond the presented papers will be helpful, in particular on Fourier transform, linear time-invariant systems, filters http://www.cl.cam.ac.uk/teaching/0809/dsp/ Discrete Cosine Transform, JPEG, MPEG http://www.w3.org/graphics/jpeg/itu-t81.pdf Pennebaker, Mitchell: JPEG still image data compression standard. (Moore Library) Digital photography CCD/CMOS sensors, Bayer pattern and interpolation, raw formats, noise reduction algorithms,... 9 10 Presentation + Essay Each student has to choose and lead a 1-hour slot of the course, each of which covers typically 2 3 related papers. This student will implement small experiments inspired by a presented paper; prepare an essay of up to 2500 words that summarizes and discusses the experiment and the main contributions of the chosen papers; prepare and present a 40 minute talk on the same. The remaining time is for questions, discussion of the presented papers and the reviews, discussion of related research ideas, as well as for brief tutorials on related background knowledge. Each student should meet the lecturer one week before their presentation slot and must hand in their essay (PDF email to mgk25) by Wednesday 12:00 after the day of their presentation. Reviews Each week, all other students (excluding those presenting in the next session) will write an about 300 500 word long review of one or two of the papers that are going be presented at the next session. These reviews must be handed in by Wednesday 12:00 before the session (plain-text email to mgk25, no Word or PDF please). Only eight reviews have to be submitted in total. Reviews should be similar in style to those expected from journal reviewers and members of conference programme committees, i.e. concisely summarize the contribution of the paper; identify particular strengths and weaknesses of the paper; suggest possible improvements; assign and justify a grade on a 1 10 scale 0=hopeless, 10=brilliant, where 5/6 is is the dividing line between recommending acceptance and rejection at a selective conference. Slides, essays and reviews will be made available to all course participants via the course web page. 11 12

Project proposal Each student is also asked to prepare a research project proposal (e.g. for an MPhil or PhD thesis), consisting of a brief handout and a 10- minute sales-pitch. Such a proposal should outline a problem area; state a research question; list potentially applicable research methods and tools; identify the most relevant related literature; identify risks; identify success criteria and milestones. These are due for the last session of the course. No slides are expected for the oral presentation. Evaluation The lecturer will assess each of the following contributions on a 0 100% scale, and the overall course mark will be formed out of an arithmetic average, weighted as follows: presentation: 20% essay: 20% experiment: 20% top-8 reviews: 20% participation in discussions, attendance, project proposal: 20% A good average contribution will receive a 75% grade, leaving room above for extensions that go beyond. Each missed session will reduce by 5% the participation score! The 80-hour time budget for the course consists of 16 hours for the sessions, 8 2 hours for the reviews, 15 hours each for preparing the experiment, the essay and the presentation, and 3 hours for preparing the project proposal. 13 14 Topics Students are most welcome to suggest additional or alternative papers within each topic. For additional references and URLs, see Andrew Lewis: Multimedia forensics bibliography http://www.cl.cam.ac.uk/~abl26/bibliography/ Resampling detection in images Popescu, Farid: Statistical tools for digital forensics (part) Kirchner: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue Gloe, Kirchner, et al.: Can we trust digital image forensics? (part) 15 16

Recompression history Image sensor identification Neelamani et al.: JPEG compression history estimation for color images Hany Farid: Exposing digital forgeries from JPEG ghosts Tjoa, Lin, Liu: Transform coder classification for digital image forensics Chen, Fridrich, Goljan: Digital imaging sensor identification (further study) Goljan, Fridrich, Filler: Large scale test of sensor fingerprint camera identification 17 19 Image characteristics CFA interpolation detectors Fu, et al: A generalized Benford s law for JPEG coefficients and its applications in image forensics Wang, Weihong: Detecting re-projected video Popescu, Farid: Exposing digital forgeries in color filter array interpolated images Gallagher, Chen: Image authentication by detecting traces of demosaicing Kirchner, Böhme: Synthesis of color filter array patters in digital images 18 20

Macroscopic features Johnson, Farid: Exposing digital forgeries by detecting inconsistencies in lighting Popescu, Farid: Exposing digital forgeries by detecting duplicated image regions 21 Display eavesdropping I van Eck: Electromagnetic radiation from video display units: an eavesdropping risk? Computers & Security 4(269 286) Kuhn, Anderson: Soft Tempest: hidden data transmission using electromagnetic emanations. IHW 1998, LNCS 1525 Kuhn: Compromising emanations: eavesdropping risks of computer displays, Chapter 3: Analog video displays. UCAM-CL- TR-577 Display eavesdropping II Kuhn: Electromagnetic Eavesdropping Risks of Flat-Panel Displays. PET 2004, LNCS 3424 Kuhn: Optical time-domain eavesdropping risks of CRT displays. IEEE S&P 2002 Backes et al.: Tempest in a Teapot: compromising reflections revisited. IEEE S&P 2009 23 Printers and scanners Keyboard eavesdropping Kee, Farid: Printer profiling for forensics and ballistics Khanna, Chiu, Allebach, Delp: Scanner identification with extension to forgery detection Asonov, Agrawal: Keyboard acoustic emanations. IEEE S&P 2004 Zhang, Zhou, Tygar: Keyboard acoustic emanations revisited. ACM CCS 2005 Song, Wagner, Tian: Timing analysis of keystrokes and timing attacks on SSH. USENIX Security 2001 Vuagnoux, Pasini: Compromising electromagnetic emanations of wired and wireless keyboards. USENIX Security 2009 22 24

Microcontroller power analysis Schedule Kocher, Jaffe, Jun: Differential power analysis. CRYPTO 99, LNCS 1666 Chari, Rao, Rohatgi: Template attacks. CHES 2002, LNCS 2523 8 October: Preparation meeting / JPEG tutorial 15 October: Video TEMPEST demo / slot 1 22 October: slot 2 / slot 3 29 October: slot 4 / slot 5 5 November: slot 6 / slot 7 12 November: slot 8 / slot 9 19 November: slot 10 / slot 11 26 November: Project proposals + wrap up The final schedule will be announced and updated as necessary on the course web page. 25 27 Steganography Cox, Miller, Brown, Fridrich, Kalker: Digital Watermarking and Steganography (one book chapter). [K.6 74] 26