Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis
The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time st...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2013-12, Vol.8 (12), p.2073-2088 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2088 |
---|---|
container_issue | 12 |
container_start_page | 2073 |
container_title | IEEE transactions on information forensics and security |
container_volume | 8 |
creator | Wei-Hong Chuang Garg, Ravi Min Wu |
description | The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time stamps, and it is crucial to understand the resilience of ENF analysis against anti-forensics. This paper explores possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and devises detection methods targeting these operations. Concealment techniques that can circumvent detection are also discussed and their corresponding trade-offs are examined. Based on the understanding of individual anti-forensic operations and countermeasures, this paper further characterizes the dynamic interplay between forensic analysts and adversaries by providing an evolutionary perspective and a game-theoretical perspective as well as studying representative scenarios and the optimal forensic/anti-forensic strategies. |
doi_str_mv | 10.1109/TIFS.2013.2285515 |
format | Article |
fullrecord | <record><control><sourceid>pascalfrancis_RIE</sourceid><recordid>TN_cdi_pascalfrancis_primary_28073838</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6630051</ieee_id><sourcerecordid>28073838</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-783d379ef880f19aac978eef1e0f004b22024be3876e2bcabbb26cf592bd3bb03</originalsourceid><addsrcrecordid>eNo9kMFKAzEQQIMoWKsfIF5y8bh1kjTZ7LGUrhaLHqznJUknEN1ma7JF-vduqZQ5zMDMG2YeIfcMJoxB9bRe1h8TDkxMONdSMnlBRkxKVSjg7PJcM3FNbnL-AphOmdIj8jqLfSjqLmHMwWVq4obOu33sMW3R5H3CTDtPFy26PgVnWvqG_W-Xvmmd8GeP0R3oLJr2kEO-JVfetBnv_vOYfNaL9fylWL0_L-ezVeF4Jfui1GIjygq91uBZZYyrSo3oGYIf7rKcA59aFLpUyK0z1lqunJcVtxthLYgxYae9LnU5J_TNLoWtSYeGQXO00RxtNEcbzb-NgXk8MTuThy98MtGFfAa5hlLoIcbk4TQXEPHcVkoASCb-ADNqaaw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis</title><source>IEEE Electronic Library (IEL)</source><creator>Wei-Hong Chuang ; Garg, Ravi ; Min Wu</creator><creatorcontrib>Wei-Hong Chuang ; Garg, Ravi ; Min Wu</creatorcontrib><description>The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time stamps, and it is crucial to understand the resilience of ENF analysis against anti-forensics. This paper explores possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and devises detection methods targeting these operations. Concealment techniques that can circumvent detection are also discussed and their corresponding trade-offs are examined. Based on the understanding of individual anti-forensic operations and countermeasures, this paper further characterizes the dynamic interplay between forensic analysts and adversaries by providing an evolutionary perspective and a game-theoretical perspective as well as studying representative scenarios and the optimal forensic/anti-forensic strategies.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2013.2285515</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Acoustics ; Applied sciences ; Authentication ; Computer science; control theory; systems ; Correlation ; Detection, estimation, filtering, equalization, prediction ; Digital recording ; Digital recording authentication ; electrical network frequency ; Exact sciences and technology ; Forensics ; Fundamental areas of phenomenology (including applications) ; Game theory ; information forensics ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Physics ; Signal and communications theory ; Signal, noise ; Software ; Spectrogram ; Telecommunications and information theory ; time stamp ; Transduction; acoustical devices for the generation and reproduction of sound</subject><ispartof>IEEE transactions on information forensics and security, 2013-12, Vol.8 (12), p.2073-2088</ispartof><rights>2015 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-783d379ef880f19aac978eef1e0f004b22024be3876e2bcabbb26cf592bd3bb03</citedby><cites>FETCH-LOGICAL-c295t-783d379ef880f19aac978eef1e0f004b22024be3876e2bcabbb26cf592bd3bb03</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6630051$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6630051$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28073838$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Wei-Hong Chuang</creatorcontrib><creatorcontrib>Garg, Ravi</creatorcontrib><creatorcontrib>Min Wu</creatorcontrib><title>Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time stamps, and it is crucial to understand the resilience of ENF analysis against anti-forensics. This paper explores possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and devises detection methods targeting these operations. Concealment techniques that can circumvent detection are also discussed and their corresponding trade-offs are examined. Based on the understanding of individual anti-forensic operations and countermeasures, this paper further characterizes the dynamic interplay between forensic analysts and adversaries by providing an evolutionary perspective and a game-theoretical perspective as well as studying representative scenarios and the optimal forensic/anti-forensic strategies.</description><subject>Acoustics</subject><subject>Applied sciences</subject><subject>Authentication</subject><subject>Computer science; control theory; systems</subject><subject>Correlation</subject><subject>Detection, estimation, filtering, equalization, prediction</subject><subject>Digital recording</subject><subject>Digital recording authentication</subject><subject>electrical network frequency</subject><subject>Exact sciences and technology</subject><subject>Forensics</subject><subject>Fundamental areas of phenomenology (including applications)</subject><subject>Game theory</subject><subject>information forensics</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Physics</subject><subject>Signal and communications theory</subject><subject>Signal, noise</subject><subject>Software</subject><subject>Spectrogram</subject><subject>Telecommunications and information theory</subject><subject>time stamp</subject><subject>Transduction; acoustical devices for the generation and reproduction of sound</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMFKAzEQQIMoWKsfIF5y8bh1kjTZ7LGUrhaLHqznJUknEN1ma7JF-vduqZQ5zMDMG2YeIfcMJoxB9bRe1h8TDkxMONdSMnlBRkxKVSjg7PJcM3FNbnL-AphOmdIj8jqLfSjqLmHMwWVq4obOu33sMW3R5H3CTDtPFy26PgVnWvqG_W-Xvmmd8GeP0R3oLJr2kEO-JVfetBnv_vOYfNaL9fylWL0_L-ezVeF4Jfui1GIjygq91uBZZYyrSo3oGYIf7rKcA59aFLpUyK0z1lqunJcVtxthLYgxYae9LnU5J_TNLoWtSYeGQXO00RxtNEcbzb-NgXk8MTuThy98MtGFfAa5hlLoIcbk4TQXEPHcVkoASCb-ADNqaaw</recordid><startdate>20131201</startdate><enddate>20131201</enddate><creator>Wei-Hong Chuang</creator><creator>Garg, Ravi</creator><creator>Min Wu</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20131201</creationdate><title>Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis</title><author>Wei-Hong Chuang ; Garg, Ravi ; Min Wu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-783d379ef880f19aac978eef1e0f004b22024be3876e2bcabbb26cf592bd3bb03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Acoustics</topic><topic>Applied sciences</topic><topic>Authentication</topic><topic>Computer science; control theory; systems</topic><topic>Correlation</topic><topic>Detection, estimation, filtering, equalization, prediction</topic><topic>Digital recording</topic><topic>Digital recording authentication</topic><topic>electrical network frequency</topic><topic>Exact sciences and technology</topic><topic>Forensics</topic><topic>Fundamental areas of phenomenology (including applications)</topic><topic>Game theory</topic><topic>information forensics</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Physics</topic><topic>Signal and communications theory</topic><topic>Signal, noise</topic><topic>Software</topic><topic>Spectrogram</topic><topic>Telecommunications and information theory</topic><topic>time stamp</topic><topic>Transduction; acoustical devices for the generation and reproduction of sound</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wei-Hong Chuang</creatorcontrib><creatorcontrib>Garg, Ravi</creatorcontrib><creatorcontrib>Min Wu</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wei-Hong Chuang</au><au>Garg, Ravi</au><au>Min Wu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2013-12-01</date><risdate>2013</risdate><volume>8</volume><issue>12</issue><spage>2073</spage><epage>2088</epage><pages>2073-2088</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time stamps, and it is crucial to understand the resilience of ENF analysis against anti-forensics. This paper explores possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and devises detection methods targeting these operations. Concealment techniques that can circumvent detection are also discussed and their corresponding trade-offs are examined. Based on the understanding of individual anti-forensic operations and countermeasures, this paper further characterizes the dynamic interplay between forensic analysts and adversaries by providing an evolutionary perspective and a game-theoretical perspective as well as studying representative scenarios and the optimal forensic/anti-forensic strategies.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TIFS.2013.2285515</doi><tpages>16</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2013-12, Vol.8 (12), p.2073-2088 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_pascalfrancis_primary_28073838 |
source | IEEE Electronic Library (IEL) |
subjects | Acoustics Applied sciences Authentication Computer science control theory systems Correlation Detection, estimation, filtering, equalization, prediction Digital recording Digital recording authentication electrical network frequency Exact sciences and technology Forensics Fundamental areas of phenomenology (including applications) Game theory information forensics Information, signal and communications theory Memory and file management (including protection and security) Memory organisation. Data processing Physics Signal and communications theory Signal, noise Software Spectrogram Telecommunications and information theory time stamp Transduction acoustical devices for the generation and reproduction of sound |
title | Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T00%3A53%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Anti-Forensics%20and%20Countermeasures%20of%20Electrical%20Network%20Frequency%20Analysis&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Wei-Hong%20Chuang&rft.date=2013-12-01&rft.volume=8&rft.issue=12&rft.spage=2073&rft.epage=2088&rft.pages=2073-2088&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2013.2285515&rft_dat=%3Cpascalfrancis_RIE%3E28073838%3C/pascalfrancis_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6630051&rfr_iscdi=true |