In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are ...In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes.展开更多
Deep learning related technologies,especially generative adversarial network,are widely used in the fields of face image tampering and forgery.Forensics researchers have proposed a variety of passive forensic and rela...Deep learning related technologies,especially generative adversarial network,are widely used in the fields of face image tampering and forgery.Forensics researchers have proposed a variety of passive forensic and related anti-forensic methods for image tampering and forgery,especially face images,but there is still a lack of overview of anti-forensic methods at this stage.Therefore,this paper will systematically discuss the anti-forensic methods for face image tampering and forgery.Firstly,this paper expounds the relevant background,including the relevant tampering and forgery methods and forensic schemes of face images.The former mainly includes four aspects:conventional processing,fake face generation,face editing and face swapping;The latter is mainly the relevant forensic means based on spatial domain and frequency domain using deep learning technology.Then,this paper divides the existing anti-forensic works into three categories according to their method characteristics,namely hiding operation traces,forgery reconstruction and adversarial attack.Finally,this paper summarizes the limitations and prospects of the existing anti-forensic technologies.展开更多
文摘In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes.
文摘Deep learning related technologies,especially generative adversarial network,are widely used in the fields of face image tampering and forgery.Forensics researchers have proposed a variety of passive forensic and related anti-forensic methods for image tampering and forgery,especially face images,but there is still a lack of overview of anti-forensic methods at this stage.Therefore,this paper will systematically discuss the anti-forensic methods for face image tampering and forgery.Firstly,this paper expounds the relevant background,including the relevant tampering and forgery methods and forensic schemes of face images.The former mainly includes four aspects:conventional processing,fake face generation,face editing and face swapping;The latter is mainly the relevant forensic means based on spatial domain and frequency domain using deep learning technology.Then,this paper divides the existing anti-forensic works into three categories according to their method characteristics,namely hiding operation traces,forgery reconstruction and adversarial attack.Finally,this paper summarizes the limitations and prospects of the existing anti-forensic technologies.