TY - GEN
T1 - First digit law and its application to digital forensics
AU - Shi, Yun Q.
PY - 2009
Y1 - 2009
N2 - Digital data forensics, which gathers evidence of data composition, origin, and history, is crucial in our digital world. Although this new research field is still in its infancy stage, it has started to attract increasing attention from the multimedia-security research community. This lecture addresses the first digit law and its applications to digital forensics. First, the Benford and generalized Benford laws, referred to as first digit law, are introduced. Then, the application of first digit law to detection of JPEG compression history for a given BMP image and detection of double JPEG compressions are presented. Finally, applying first digit law to detection of double MPEG video compressions is discussed. It is expected that the first digit law may play an active role in other task of digital forensics. The lesson learned is that statistical models play an important role in digital forensics and for a specific forensic task different models may provide different performance.
AB - Digital data forensics, which gathers evidence of data composition, origin, and history, is crucial in our digital world. Although this new research field is still in its infancy stage, it has started to attract increasing attention from the multimedia-security research community. This lecture addresses the first digit law and its applications to digital forensics. First, the Benford and generalized Benford laws, referred to as first digit law, are introduced. Then, the application of first digit law to detection of JPEG compression history for a given BMP image and detection of double JPEG compressions are presented. Finally, applying first digit law to detection of double MPEG video compressions is discussed. It is expected that the first digit law may play an active role in other task of digital forensics. The lesson learned is that statistical models play an important role in digital forensics and for a specific forensic task different models may provide different performance.
UR - http://www.scopus.com/inward/record.url?scp=78650389780&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650389780&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-04438-0_37
DO - 10.1007/978-3-642-04438-0_37
M3 - Conference contribution
AN - SCOPUS:78650389780
SN - 3642044379
SN - 9783642044373
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 448
EP - 453
BT - Digital Watermarking - 7th International Workshop, IWDW 2008, Selected Papers
T2 - 7th International Workshop on Digital Watermarking, IWDW 2008
Y2 - 10 November 2008 through 12 November 2008
ER -