First digit law and its application to digital forensics

Yun Q. Shi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Digital data forensics, which gathers evidence of data composition, origin, and history, is crucial in our digital world. Although this new research field is still in its infancy stage, it has started to attract increasing attention from the multimedia-security research community. This lecture addresses the first digit law and its applications to digital forensics. First, the Benford and generalized Benford laws, referred to as first digit law, are introduced. Then, the application of first digit law to detection of JPEG compression history for a given BMP image and detection of double JPEG compressions are presented. Finally, applying first digit law to detection of double MPEG video compressions is discussed. It is expected that the first digit law may play an active role in other task of digital forensics. The lesson learned is that statistical models play an important role in digital forensics and for a specific forensic task different models may provide different performance.

Original languageEnglish (US)
Title of host publicationDigital Watermarking - 7th International Workshop, IWDW 2008, Selected Papers
Pages448-453
Number of pages6
DOIs
StatePublished - 2009
Event7th International Workshop on Digital Watermarking, IWDW 2008 - Busan, Korea, Republic of
Duration: Nov 10 2008Nov 12 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5450 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other7th International Workshop on Digital Watermarking, IWDW 2008
Country/TerritoryKorea, Republic of
CityBusan
Period11/10/0811/12/08

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'First digit law and its application to digital forensics'. Together they form a unique fingerprint.

Cite this