DocumentCode
55126
Title
Information Forensics: An Overview of the First Decade
Author
Stamm, Matthew Christopher ; Min Wu ; Liu, K.J.R.
Author_Institution
Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA
Volume
1
fYear
2013
fDate
2013
Firstpage
167
Lastpage
200
Abstract
In recent decades, we have witnessed the evolution of information technologies from the development of VLSI technologies, to communication and networking infrastructure, to the standardization of multimedia compression and coding schemes, to effective multimedia content search and retrieval. As a result, multimedia devices and digital content have become ubiquitous. This path of technological evolution has naturally led to a critical issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users for legitimate purposes, and to be able to forensically prove with high confidence when otherwise. When security is compromised, intellectual rights are violated, or authenticity is forged, forensic methodologies and tools are employed to reconstruct what has happened to digital content in order to answer who has done what, when, where, and how. The goal of this paper is to provide an overview on what has been done over the last decade in the new and emerging field of information forensics regarding theories, methodologies, state-of-the-art techniques, major applications, and to provide an outlook of the future.
Keywords
VLSI; authorisation; information retrieval; information technology; multimedia systems; standardisation; ubiquitous computing; VLSI technologies; authorized users; coding schemes; communication infrastructure; digital content; forensic methodologies; information forensics; information technologies; intellectual rights; multimedia compression; multimedia content retrieval; multimedia content search; multimedia devices; networking infrastructure; standardization; technological evolution; Computer Security; Data privacy; Digital forensics; Feature extraction; Fingerprint recognition; Forensics; Forgery; Information processing; Intellectual property; Multimedia communication; Very large scale integration; Anti-forensics; information forensics; multimedia fingerprint; tampering detection;
fLanguage
English
Journal_Title
Access, IEEE
Publisher
ieee
ISSN
2169-3536
Type
jour
DOI
10.1109/ACCESS.2013.2260814
Filename
6515027
Link To Document