Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis

The electrical network frequency (ENF) signal is a time stamp that has been used by an emerging class of approaches for determining the creation time of digital audio and video recordings. However, in adversarial environments, anti-forensic operations may be conducted to manipulate ENF-based time stamps, and it is crucial to understand the resilience of ENF analysis against anti-forensics. This paper explores possible anti-forensic operations that can remove and alter the ENF signal while trying to preserve the host signal, and devises detection methods targeting these operations. Concealment techniques that can circumvent detection are also discussed and their corresponding trade-offs are examined. Based on the understanding of individual anti-forensic operations and countermeasures, this paper further characterizes the dynamic interplay between forensic analysts and adversaries by providing an evolutionary perspective and a game-theoretical perspective as well as studying representative scenarios and the optimal forensic/anti-forensic strategies.

[1]  Min Wu,et al.  “Seeing” ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing , 2013, IEEE Transactions on Information Forensics and Security.

[2]  Monson H. Hayes,et al.  Statistical Digital Signal Processing and Modeling , 1996 .

[3]  W. Marsden I and J , 2012 .

[4]  R. O. Schmidt,et al.  Multiple emitter location and signal Parameter estimation , 1986 .

[5]  Min Wu,et al.  Spectrum Combining for ENF Signal Estimation , 2013, IEEE Signal Processing Letters.

[6]  Mauro Barni,et al.  The Source Identification Game: An Information-Theoretic Perspective , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Mauro Barni,et al.  A Dempster-Shafer framework for decision fusion in image forensics , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[8]  Carey Nachenberg,et al.  Computer virus-antivirus coevolution , 1997, Commun. ACM.

[9]  Thomas Kailath,et al.  ESPRIT-estimation of signal parameters via rotational invariance techniques , 1989, IEEE Trans. Acoust. Speech Signal Process..

[10]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[11]  Yan Sun,et al.  Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..

[12]  Catalin Grigoras Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis. , 2007, Forensic science international.

[13]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[14]  Asaf Cohen,et al.  Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model , 2013, IEEE Transactions on Information Forensics and Security.

[15]  Zeno J. M. H. Geradts,et al.  Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings , 2009, IWCF.

[16]  P. K. Chaturvedi,et al.  Communication Systems , 2002, IFIP — The International Federation for Information Processing.

[17]  K. J. Ray Liu,et al.  Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.

[18]  Daniel Patricio Nicolalde Rodríguez,et al.  Audio Authenticity: Detecting ENF Discontinuity With High Precision Phase Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[19]  Mo Chen,et al.  Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Johan Karlsson,et al.  ENF Extraction From Digital Recordings Using Adaptive Techniques and Frequency Tracking , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Daniel Rappaport,et al.  Analytical Framework for Digital Audio Authentication , 2012 .

[22]  Min Wu,et al.  How secure are power network signature based time stamps? , 2012, CCS.

[23]  Min Wu,et al.  Robustness of Color Interpolation Identification against Anti-forensic Operations , 2012, Information Hiding.

[24]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .