Learn More
A printed document can provide intrinsic features of the printer so as to distinguish which printer it comes from. But how to extract the intrinsic features is critical in printer forensics. In this paper, the page document's geometric distortion is extracted as the intrinsic features, and a printer forensics method based on the distortion is proposed.(More)
The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-based steganographic method for images. The method takes(More)
The purpose of this paper is to resolve information security problem in the mobile electronic commerce industry chain. We analyze information security based on evolutionary game theory. In this paper, we set up the information security game model with penalty parameter, calculate replicator dynamics, and analyze the evolutionary stable strategy of the game(More)
With the advent of low-cost multimedia acquisition device and sophisticated video editing techniques, it is becoming increasingly easier to tamper with digital video. In this paper, a novel approach is proposed to detection of double MPEG compression involving two video compression standards, which often occurs in video transcoding process. By analyzing the(More)
²Cell-phones have become a necessary communication accessory in daily life. MMS (Multimedia Messaging Service) used by smart phones has caused higher requirement on mobile image manipulation. Classifying image source cell-phones has become a major issue in the cell-phone communication forensics. There are two ways usually used for tracing and identifying(More)
Steganography is the art of communicating a message by embedding it into multimedia data without drawing any suspicions. Optimal parity assignment (OPA) algorithm is one of palette image steganographic methods. But there is still no effective steganalytic method that can attack it reliably. In this paper, we present a statistical steganalysis for detecting(More)
Source camera identification is an important branch of image forensics. This paper describes a novel method for determining image origin based on color filter array (CFA) interpolation coefficient estimation. To reduce the perturbations introduced by a double JPEG compression, a co-variance matrix is used to estimate the CFA interpolation coefficients. The(More)
Double compression usually occurs after the image has gone through some kinds of tampering, so double compression detection is a basic mean to assess the authenticity of a given image. In this paper, we propose to model the distribution of the mode based first digits of DCT (Discrete Cosine Transform) coefficients using Markov transition probability matrix(More)