Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis

The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time st...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2013-12, Vol.8 (12), p.2073-2088
Hauptverfasser: Wei-Hong Chuang, Garg, Ravi, Min Wu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2088
container_issue 12
container_start_page 2073
container_title IEEE transactions on information forensics and security
container_volume 8
creator Wei-Hong Chuang
Garg, Ravi
Min Wu
description The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time stamps, and it is crucial to understand the resilience of ENF analysis against anti-forensics. This paper explores possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and devises detection methods targeting these operations. Concealment techniques that can circumvent detection are also discussed and their corresponding trade-offs are examined. Based on the understanding of individual anti-forensic operations and countermeasures, this paper further characterizes the dynamic interplay between forensic analysts and adversaries by providing an evolutionary perspective and a game-theoretical perspective as well as studying representative scenarios and the optimal forensic/anti-forensic strategies.
doi_str_mv 10.1109/TIFS.2013.2285515
format Article
fullrecord <record><control><sourceid>pascalfrancis_RIE</sourceid><recordid>TN_cdi_pascalfrancis_primary_28073838</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6630051</ieee_id><sourcerecordid>28073838</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-783d379ef880f19aac978eef1e0f004b22024be3876e2bcabbb26cf592bd3bb03</originalsourceid><addsrcrecordid>eNo9kMFKAzEQQIMoWKsfIF5y8bh1kjTZ7LGUrhaLHqznJUknEN1ma7JF-vduqZQ5zMDMG2YeIfcMJoxB9bRe1h8TDkxMONdSMnlBRkxKVSjg7PJcM3FNbnL-AphOmdIj8jqLfSjqLmHMwWVq4obOu33sMW3R5H3CTDtPFy26PgVnWvqG_W-Xvmmd8GeP0R3oLJr2kEO-JVfetBnv_vOYfNaL9fylWL0_L-ezVeF4Jfui1GIjygq91uBZZYyrSo3oGYIf7rKcA59aFLpUyK0z1lqunJcVtxthLYgxYae9LnU5J_TNLoWtSYeGQXO00RxtNEcbzb-NgXk8MTuThy98MtGFfAa5hlLoIcbk4TQXEPHcVkoASCb-ADNqaaw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis</title><source>IEEE Electronic Library (IEL)</source><creator>Wei-Hong Chuang ; Garg, Ravi ; Min Wu</creator><creatorcontrib>Wei-Hong Chuang ; Garg, Ravi ; Min Wu</creatorcontrib><description>The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time stamps, and it is crucial to understand the resilience of ENF analysis against anti-forensics. This paper explores possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and devises detection methods targeting these operations. Concealment techniques that can circumvent detection are also discussed and their corresponding trade-offs are examined. Based on the understanding of individual anti-forensic operations and countermeasures, this paper further characterizes the dynamic interplay between forensic analysts and adversaries by providing an evolutionary perspective and a game-theoretical perspective as well as studying representative scenarios and the optimal forensic/anti-forensic strategies.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2013.2285515</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Acoustics ; Applied sciences ; Authentication ; Computer science; control theory; systems ; Correlation ; Detection, estimation, filtering, equalization, prediction ; Digital recording ; Digital recording authentication ; electrical network frequency ; Exact sciences and technology ; Forensics ; Fundamental areas of phenomenology (including applications) ; Game theory ; information forensics ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Physics ; Signal and communications theory ; Signal, noise ; Software ; Spectrogram ; Telecommunications and information theory ; time stamp ; Transduction; acoustical devices for the generation and reproduction of sound</subject><ispartof>IEEE transactions on information forensics and security, 2013-12, Vol.8 (12), p.2073-2088</ispartof><rights>2015 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-783d379ef880f19aac978eef1e0f004b22024be3876e2bcabbb26cf592bd3bb03</citedby><cites>FETCH-LOGICAL-c295t-783d379ef880f19aac978eef1e0f004b22024be3876e2bcabbb26cf592bd3bb03</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6630051$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6630051$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=28073838$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Wei-Hong Chuang</creatorcontrib><creatorcontrib>Garg, Ravi</creatorcontrib><creatorcontrib>Min Wu</creatorcontrib><title>Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time stamps, and it is crucial to understand the resilience of ENF analysis against anti-forensics. This paper explores possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and devises detection methods targeting these operations. Concealment techniques that can circumvent detection are also discussed and their corresponding trade-offs are examined. Based on the understanding of individual anti-forensic operations and countermeasures, this paper further characterizes the dynamic interplay between forensic analysts and adversaries by providing an evolutionary perspective and a game-theoretical perspective as well as studying representative scenarios and the optimal forensic/anti-forensic strategies.</description><subject>Acoustics</subject><subject>Applied sciences</subject><subject>Authentication</subject><subject>Computer science; control theory; systems</subject><subject>Correlation</subject><subject>Detection, estimation, filtering, equalization, prediction</subject><subject>Digital recording</subject><subject>Digital recording authentication</subject><subject>electrical network frequency</subject><subject>Exact sciences and technology</subject><subject>Forensics</subject><subject>Fundamental areas of phenomenology (including applications)</subject><subject>Game theory</subject><subject>information forensics</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Physics</subject><subject>Signal and communications theory</subject><subject>Signal, noise</subject><subject>Software</subject><subject>Spectrogram</subject><subject>Telecommunications and information theory</subject><subject>time stamp</subject><subject>Transduction; acoustical devices for the generation and reproduction of sound</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMFKAzEQQIMoWKsfIF5y8bh1kjTZ7LGUrhaLHqznJUknEN1ma7JF-vduqZQ5zMDMG2YeIfcMJoxB9bRe1h8TDkxMONdSMnlBRkxKVSjg7PJcM3FNbnL-AphOmdIj8jqLfSjqLmHMwWVq4obOu33sMW3R5H3CTDtPFy26PgVnWvqG_W-Xvmmd8GeP0R3oLJr2kEO-JVfetBnv_vOYfNaL9fylWL0_L-ezVeF4Jfui1GIjygq91uBZZYyrSo3oGYIf7rKcA59aFLpUyK0z1lqunJcVtxthLYgxYae9LnU5J_TNLoWtSYeGQXO00RxtNEcbzb-NgXk8MTuThy98MtGFfAa5hlLoIcbk4TQXEPHcVkoASCb-ADNqaaw</recordid><startdate>20131201</startdate><enddate>20131201</enddate><creator>Wei-Hong Chuang</creator><creator>Garg, Ravi</creator><creator>Min Wu</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20131201</creationdate><title>Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis</title><author>Wei-Hong Chuang ; Garg, Ravi ; Min Wu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-783d379ef880f19aac978eef1e0f004b22024be3876e2bcabbb26cf592bd3bb03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Acoustics</topic><topic>Applied sciences</topic><topic>Authentication</topic><topic>Computer science; control theory; systems</topic><topic>Correlation</topic><topic>Detection, estimation, filtering, equalization, prediction</topic><topic>Digital recording</topic><topic>Digital recording authentication</topic><topic>electrical network frequency</topic><topic>Exact sciences and technology</topic><topic>Forensics</topic><topic>Fundamental areas of phenomenology (including applications)</topic><topic>Game theory</topic><topic>information forensics</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Physics</topic><topic>Signal and communications theory</topic><topic>Signal, noise</topic><topic>Software</topic><topic>Spectrogram</topic><topic>Telecommunications and information theory</topic><topic>time stamp</topic><topic>Transduction; acoustical devices for the generation and reproduction of sound</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wei-Hong Chuang</creatorcontrib><creatorcontrib>Garg, Ravi</creatorcontrib><creatorcontrib>Min Wu</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wei-Hong Chuang</au><au>Garg, Ravi</au><au>Min Wu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2013-12-01</date><risdate>2013</risdate><volume>8</volume><issue>12</issue><spage>2073</spage><epage>2088</epage><pages>2073-2088</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time stamps, and it is crucial to understand the resilience of ENF analysis against anti-forensics. This paper explores possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and devises detection methods targeting these operations. Concealment techniques that can circumvent detection are also discussed and their corresponding trade-offs are examined. Based on the understanding of individual anti-forensic operations and countermeasures, this paper further characterizes the dynamic interplay between forensic analysts and adversaries by providing an evolutionary perspective and a game-theoretical perspective as well as studying representative scenarios and the optimal forensic/anti-forensic strategies.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TIFS.2013.2285515</doi><tpages>16</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2013-12, Vol.8 (12), p.2073-2088
issn 1556-6013
1556-6021
language eng
recordid cdi_pascalfrancis_primary_28073838
source IEEE Electronic Library (IEL)
subjects Acoustics
Applied sciences
Authentication
Computer science
control theory
systems
Correlation
Detection, estimation, filtering, equalization, prediction
Digital recording
Digital recording authentication
electrical network frequency
Exact sciences and technology
Forensics
Fundamental areas of phenomenology (including applications)
Game theory
information forensics
Information, signal and communications theory
Memory and file management (including protection and security)
Memory organisation. Data processing
Physics
Signal and communications theory
Signal, noise
Software
Spectrogram
Telecommunications and information theory
time stamp
Transduction
acoustical devices for the generation and reproduction of sound
title Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T00%3A53%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Anti-Forensics%20and%20Countermeasures%20of%20Electrical%20Network%20Frequency%20Analysis&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Wei-Hong%20Chuang&rft.date=2013-12-01&rft.volume=8&rft.issue=12&rft.spage=2073&rft.epage=2088&rft.pages=2073-2088&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2013.2285515&rft_dat=%3Cpascalfrancis_RIE%3E28073838%3C/pascalfrancis_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6630051&rfr_iscdi=true