03.08.2013 Views

Slides

Slides

Slides

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Attacks: practical considerations<br />

Who is that guy in the pixel next to you?<br />

◮ successful attacks against particular forensic algorithms are available<br />

[Gloe et al., 2007; Kirchner & Böhme, 2008, 2009]<br />

◮ defeating a whole set of forensic approaches is a much more challenging task<br />

⊲ attacks may introduce new detectable artifacts<br />

⊲ attacks may interfere with each other<br />

⊲ competition for the best model<br />

Attacks in terms of plausible<br />

post-processing<br />

◮ in practice, plausible image statistics<br />

might be enough<br />

⊲ downscaling and / or lossy compression<br />

are likely to smooth out and destroy most<br />

of the subtle traces we are looking for<br />

Gloe & Kirchner Digital Image Forensics slide 57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!