ABSTRACT
A time stamp based on the power network signature called the Electrical Network Frequency (ENF) has been used by an emerging class of approaches for authenticating digital audio and video recordings in computer-to-computer communications. However, the presence of adversaries may render the time stamp insecure, and it is crucial to understand the robustness of ENF analysis against anti-forensic operations. This paper investigates possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and develops detection methods targeting these operations. Improvements over anti-forensic operations that can circumvent the detection are also examined, for which various trade-offs are discussed. To develop an understanding of the dynamics between a forensic analyst and an adversary, an evolutionary perspective and a game-theoretical perspective are proposed, which allow for a comprehensive characterization of plausible anti-forensic strategies and countermeasures. Such an understanding has the potential to lead to more secure and reliable time stamp schemes based on ENF analysis.
- Wikipedia article on"mains hum". http://en.wikipedia.org/wiki/mains hum.Google Scholar
- W. H. Chuang and M. Wu. Robustness of color interpolation identification against anti-forensic operations. In Proc. of 14th Information Hiding Conference, 2012. Google ScholarDigital Library
- R. Garg, A. L. Varna, and M. Wu. "Seeing" ENF: Natural time stamp for digital video via optical sensing and signal processing. In Proc. of ACM Multimedia, Nov. 2011. Google ScholarDigital Library
- C. Grigoras. Applications of ENF criterion in forensics: audio, video, computer, and telecommunication analysis. Forensic Science International, 167:136--145, Apr. 2007.Google ScholarCross Ref
- S. Haykin. Communication Systems. Wiley Publishing, 5th edition, 2009. Google ScholarDigital Library
- M. Kirchner and R. BAuhme. Digital Image Forensics, chapter on Counter-Forensics: Attacking Image Forensics. Springer, 2012.Google Scholar
- C. Nachenberg. Computer virus-antivirus coevolution. Communications on the ACM, 40:46--51, Jan. 1997. Google ScholarDigital Library
- A. V. Oppenheim, R. W. Schafer, and J. R. Buck. Discrete-time Signal Processing. Prentice-Hall, 2 edition, 1999. Google ScholarDigital Library
- D. P. N. Rodriguez, J. A. Apolinario, and L. W. P. Biscainho. Audio authenticity: Detecting ENF discontinuity with high precision phase analysis. IEEE Trans. on Information Forensics and Security, 5(3):534--543, Sep. 2010. Google ScholarDigital Library
- R. W. Sanders. Digital authenticity using the electrical network frequency. In Proc. of 33rd AES Int. Conf. on Audio Forensics, Theory and Practice, Jun. 2008.Google Scholar
- M. C. Stamm, W. S. Lin, and K. J. R. Liu. Temporal forensics and anti-forensics for motion compensated video. IEEE Trans. on Information Forensics and Security, 7(4):1315--1329, Aug. 2012.Google ScholarDigital Library
- Y. Sun and Y. Liu. Security of online reputation systems: The evolution of attacks and defenses. IEEE Signal Processing Magazine, 29(2):87--97, Mar. 2012.Google ScholarCross Ref
Index Terms
- How secure are power network signature based time stamps?
Recommendations
One Secure Attribute-Based Proxy Signature
Attribute-based cryptography has drawn much attention due to its unique advantages and has gained many achievements over the years. Proxy signature allows that people need to delegate some of their signing rights to a reliable agent (that is, a proxy ...
Provably secure pairing-based convertible undeniable signature with short signature length
Pairing'07: Proceedings of the First international conference on Pairing-Based CryptographyUndeniable signatures, introduced by Chaum and van Antwerpen, is a useful cryptography primitive to limit the publicly verifiable property of ordinary digital signatures. In an undeniable signature scheme, the validity or invalidity of the signature can ...
A secure identity-based multi-proxy signature scheme
In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Plenty of multi-...
Comments