期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
1
作者 Ding Ning Gu Dawu Liu Zhiqiang 《China Communications》 SCIE CSCD 2010年第6期56-63,共8页
In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are ... In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes. 展开更多
关键词 symmetric encryption OBFUSCATION anti-forensics
下载PDF
A Survey of Anti-forensic for Face Image Forgery
2
作者 Haitao Zhang 《Journal of Information Hiding and Privacy Protection》 2022年第1期41-51,共11页
Deep learning related technologies,especially generative adversarial network,are widely used in the fields of face image tampering and forgery.Forensics researchers have proposed a variety of passive forensic and rela... Deep learning related technologies,especially generative adversarial network,are widely used in the fields of face image tampering and forgery.Forensics researchers have proposed a variety of passive forensic and related anti-forensic methods for image tampering and forgery,especially face images,but there is still a lack of overview of anti-forensic methods at this stage.Therefore,this paper will systematically discuss the anti-forensic methods for face image tampering and forgery.Firstly,this paper expounds the relevant background,including the relevant tampering and forgery methods and forensic schemes of face images.The former mainly includes four aspects:conventional processing,fake face generation,face editing and face swapping;The latter is mainly the relevant forensic means based on spatial domain and frequency domain using deep learning technology.Then,this paper divides the existing anti-forensic works into three categories according to their method characteristics,namely hiding operation traces,forgery reconstruction and adversarial attack.Finally,this paper summarizes the limitations and prospects of the existing anti-forensic technologies. 展开更多
关键词 anti-forensics face tempering and forgery FORENSICS generative adversarial network
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部