skip to main content
10.1145/2382196.2382243acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

How secure are power network signature based time stamps?

Published:16 October 2012Publication History

ABSTRACT

A time stamp based on the power network signature called the Electrical Network Frequency (ENF) has been used by an emerging class of approaches for authenticating digital audio and video recordings in computer-to-computer communications. However, the presence of adversaries may render the time stamp insecure, and it is crucial to understand the robustness of ENF analysis against anti-forensic operations. This paper investigates possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and develops detection methods targeting these operations. Improvements over anti-forensic operations that can circumvent the detection are also examined, for which various trade-offs are discussed. To develop an understanding of the dynamics between a forensic analyst and an adversary, an evolutionary perspective and a game-theoretical perspective are proposed, which allow for a comprehensive characterization of plausible anti-forensic strategies and countermeasures. Such an understanding has the potential to lead to more secure and reliable time stamp schemes based on ENF analysis.

References

  1. Wikipedia article on"mains hum". http://en.wikipedia.org/wiki/mains hum.Google ScholarGoogle Scholar
  2. W. H. Chuang and M. Wu. Robustness of color interpolation identification against anti-forensic operations. In Proc. of 14th Information Hiding Conference, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Garg, A. L. Varna, and M. Wu. "Seeing" ENF: Natural time stamp for digital video via optical sensing and signal processing. In Proc. of ACM Multimedia, Nov. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Grigoras. Applications of ENF criterion in forensics: audio, video, computer, and telecommunication analysis. Forensic Science International, 167:136--145, Apr. 2007.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Haykin. Communication Systems. Wiley Publishing, 5th edition, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Kirchner and R. BAuhme. Digital Image Forensics, chapter on Counter-Forensics: Attacking Image Forensics. Springer, 2012.Google ScholarGoogle Scholar
  7. C. Nachenberg. Computer virus-antivirus coevolution. Communications on the ACM, 40:46--51, Jan. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. V. Oppenheim, R. W. Schafer, and J. R. Buck. Discrete-time Signal Processing. Prentice-Hall, 2 edition, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. P. N. Rodriguez, J. A. Apolinario, and L. W. P. Biscainho. Audio authenticity: Detecting ENF discontinuity with high precision phase analysis. IEEE Trans. on Information Forensics and Security, 5(3):534--543, Sep. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. W. Sanders. Digital authenticity using the electrical network frequency. In Proc. of 33rd AES Int. Conf. on Audio Forensics, Theory and Practice, Jun. 2008.Google ScholarGoogle Scholar
  11. M. C. Stamm, W. S. Lin, and K. J. R. Liu. Temporal forensics and anti-forensics for motion compensated video. IEEE Trans. on Information Forensics and Security, 7(4):1315--1329, Aug. 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y. Sun and Y. Liu. Security of online reputation systems: The evolution of attacks and defenses. IEEE Signal Processing Magazine, 29(2):87--97, Mar. 2012.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. How secure are power network signature based time stamps?

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
        October 2012
        1088 pages
        ISBN:9781450316514
        DOI:10.1145/2382196

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 October 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader