Skip to main content

TIFS Volume 14 Issue 5

Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks

Watermarking is a solution for copyright protection and forensics tracking, but recapturing and de-synchronization attacks may be used to effectively remove audio watermarks. Although much effort has been made in recent years, the robustness of audio watermarking against recapturing and de-synchronization attacks is still a challenging issue. Specifically, we first construct the frequency-domain coefficients logarithmic mean (FDLM) feature of digital audio.

Read more

Digital Audio Signature for 3D Printing Integrity

Additive manufacturing (AM, or 3D printing) is a novel manufacturing technology that has been adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper, we address issues associated with sabotage via tampering during the 3D printing process by presenting an approach that can verify the integrity of a 3D printed object.

Read more

Counter JPEG Anti-Forensic Approach Based on the Second-Order Statistical Analysis

The forensic investigation of JPEG compression generally relies on the analysis of first-order statistics based on image histogram. The JPEG compression detection methods based on such methodology can be effortlessly circumvented by adopting some anti-forensic attacks. This paper presents a counter JPEG anti-forensic method by considering the second-order statistical analysis based on the co-occurrence matrices (CMs).

Read more

Physical Password Breaking via Thermal Sequence Analysis

The thermal camera can capture keyboard surface temperature change after a human's touch. This phenomenon may be used to steal users' passwords physically. In this paper, based on the study of thermal dynamics of keyboards, we design a password break system using an infrared thermal camera. First, we build a signal model to describe the dynamic process of temperature change on the keyboard using Newton's law of cooling. Next, we develop a maximum likelihood parameter estimation algorithm to estimate the keystroke time instants.

Read more

Digital Audio Signature for 3D Printing Integrity

Additive manufacturing (AM, or 3D printing) is a novel manufacturing technology that has been adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper, we address issues associated with sabotage via tampering during the 3D printing process by presenting an approach that can verify the integrity of a 3D printed object.

Read more

A Study of Age and Ageing in Fingerprint Biometrics

Thanks to Mr. James Bond, we are aware that diamonds are forever but, are fingerprints? It is well known that biometrics brings to the security field a new paradigm; unlike traditional systems, individuals are not identified by something that they have or they know, but by what they are. While such an approach entails some clear advantages, an important question remains: is what we are today the same as what we will be tomorrow? This paper addresses such a key problem in the fingerprint modality based on a database of over 400K impressions coming from more than 250K different fingers.

Read more

Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services

Nowadays, mobile devices, such as smartphones, have been widely used all over the world. In addition, the performance of image recognition has drastically increased with deep learning technologies. From these backgrounds, some photo-based information services provided in a client-server architecture are getting popular: client users take a photo of a certain spot and send it to a server, while the server identifies the spot with an image recognizer and returns its related information to the users.

Read more