Welcome to:   Multimedia Forensics Group   |   Computer Science Department   

• Home

• Teaching

• Research

• Publications

• Downloads

• Resources

Research

Multimedia Forensics    |    Knowledge Discovery and Information Assurance    |    Bioinformatics


Multimedia Forensics

Our current study in multimedia forensics is supported by the U.S. NATIONAL INSTITUTE OF JUSTICE, DEPARTMENT OF JUSTICE , and the OFFICE OF RESEARCH ADN SPONSOR PROGRAMS, SAM HOUSTON STATE UNIVERSITY.

Our previous projects at New Mexico Tech, under Dr. ANDREW H. SUNG 's supervision, were sponsored by the U.S. NATIONAL SCIENCE FOUNDATION, DEPARTMENT OF HOMELAND SECURITY and DEPARTMENT OF DEFENSE,

We briefly introduce our project by showing some examples as follows:

1.     FORGERY

A. Image forgery examples. Do you doubt the authenticity of the following two images?

Ground truth: Both images have been manipulated. Can you reconginze the forgery?

B. Audio forgery examples. You may compare the following two MP3 audio clips. Please notice the difference of these two voices.

Comparison 1:

      

 

Comparison 2:

      

Ground truth: In above comparisons, some voices have been manipulated to change the meaning. It may be easy for you to tell the difference. The challege is: given a MP3/AAC audio file without any comparison reference, how do you make a decision and reconginze the forgery?

C. MPEG forgery example. Has the following MPEG clip been doctored?

  

Note: Above clip is from Internet. You may click the start button to watch.

    

2.     STEGANOGRPAHY

Image Steganogram:

Ground truth: The following message is hidden in the above JPEG image.

   Alzheimer's: The Mysteries of the Most Common Form of Dementia In November of nineteen ninety-four, Ronald Reagan wrote a letter to the American people. The former president shared the news that he had Alzheimer’s disease. Mister Reagan began what he called his journey into the sunset of his life. That ten year journey ended on June fifth, two thousand four, at the age of ninety-three. In his letter, America's fortieth President wrote about the fears and difficulties presented by Alzheimer’s disease. He said that he and his wife Nancy hoped their public announcement would lead to greater understanding of the condition among individuals and families affected by it. Ronald Reagan was probably the most famous person to suffer from Alzheimer's disease. In the United States, about four million five hundred thousand people have the disease. Many millions more are expected to have it in years to come. Doctors describe Alzheimer's as a slowly increasing brain disorder. It affects memory and personality -- those qualities that make a person an individual. There is no known cure. Victims slowly lose their abilities to deal with everyday life. At first they forget simple things, like where they put something or a person’s name. As time passes, they forget more and more. They forget the names of their husband, wife or children. Then they forget who they are. Finally, they remember nothing. It is as if their brain dies before the other parts of the body. Victims of Alzheimer’s do die from the disease, but it may take many years.

  

If you are interested in our detection, you may take a look at our recent papers:

·  Q. Liu and Z. Chen, “Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery in JPEG images", ACM Transactions on Intelligent Systems and Technology, to appear.

 ·  M. Qiao, A. sung and Q. Liu, “MP3 audio steganalysis", Information Sciences, to appear.

·  Q. Liu (2011), “Steganalysis of DCT-embedding based adaptive steganography and YASS”, in Proc. ACM Workshop on Multimedia & Security, Buffalo, NY, September 29-30, 2011.

·  Q. Liu (2011), “Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery”, in Proc. ACM Multimedia Workshop on Multimedia Forensics and Intelligence, Scottsdale, Arizona, USA, November 29, 2011

·  Q. Liu , A. Sung, and M. Qiao (2011), “Neighboring joint density-based JPEG Steganalysis”, ACM Transactions on Intelligent Systems and Technology, 2(2), article 16:1-16.

·  Q. Liu , A. Sung, and M. Qiao (2011), “Derivative-based Audio Steganalysis”, ACM Transactions on Multimedia Computing, Communications and Applications. 7(3), article 18:1-19.

  

Note: Our database and source codes are available here.


Knowledge Discovery and Information Assurance

Coming soon.


Bioinformatics

Coming soon.

Home   |    Teaching   |    Research   |    Publications   |    People   |    Downloads   |    Resources

Copyright © 2011. All Rights Reserved. Site designed by Multimedia Forensics Group .