A. James Clark School of Engineering
Permanent URI for this communityhttp://hdl.handle.net/1903/1654
The collections in this community comprise faculty research works, as well as graduate theses and dissertations.
Browse
3 results
Search Results
Item Digital Multimedia Forensics and Anti-Forensics(2012) Stamm, Matthew Christopher; Liu, K. J. Ray; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)As the use of digital multimedia content such as images and video has increased, so has the means and the incentive to create digital forgeries. Presently, powerful editing software allows forgers to create perceptually convincing digital forgeries. Accordingly, there is a great need for techniques capable of authenticating digital multimedia content. In response to this, researchers have begun developing digital forensic techniques capable of identifying digital forgeries. These forensic techniques operate by detecting imperceptible traces left by editing operations in digital multimedia content. In this dissertation, we propose several new digital forensic techniques to detect evidence of editing in digital multimedia content. We begin by identifying the fingerprints left by pixel value mappings and show how these can be used to detect the use of contrast enhancement in images. We use these fingerprints to perform a number of additional forensic tasks such as identifying cut-and-paste forgeries, detecting the addition of noise to previously JPEG compressed images, and estimating the contrast enhancement mapping used to alter an image. Additionally, we consider the problem of multimedia security from the forger's point of view. We demonstrate that an intelligent forger can design anti-forensic operations to hide editing fingerprints and fool forensic techniques. We propose an anti-forensic technique to remove compression fingerprints from digital images and show that this technique can be used to fool several state-of-the-art forensic algorithms. We examine the problem of detecting frame deletion in digital video and develop both a technique to detect frame deletion and an anti-forensic technique to hide frame deletion fingerprints. We show that this anti-forensic operation leaves behind fingerprints of its own and propose a technique to detect the use of frame deletion anti-forensics. The ability of a forensic investigator to detect both editing and the use of anti-forensics results in a dynamic interplay between the forger and forensic investigator. We use develop a game theoretic framework to analyze this interplay and identify the set of actions that each party will rationally choose. Additionally, we show that anti-forensics can be used protect against reverse engineering. To demonstrate this, we propose an anti-forensic module that can be integrated into digital cameras to protect color interpolation methods.Item Multimedia Social Networks: Game Theoretic Modeling and Equilibrium Analysis(2011) Chen, Yan; Liu, K. J. Ray; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)Multimedia content sharing and distribution over multimedia social networks is more popular now than ever before: we download music from Napster, share our images on Flickr, view user-created video on YouTube, and watch peer-to-peer television using Coolstreaming, PPLive and PPStream. Within these multimedia social networks, users share, exchange, and compete for scarce resources such as multimedia data and bandwidth, and thus influence each other's decision and performance. Therefore, to provide fundamental guidelines for the better system design, it is important to analyze the users' behaviors and interactions in a multimedia social network, i.e., how users interact with and respond to each other. Game theory is a mathematical tool that analyzes the strategic interactions among multiple decision makers. It is ideal and essential for studying, analyzing, and modeling the users' behaviors and interactions in social networking. In this thesis, game theory will be used to model users' behaviors in social networks and analyze the corresponding equilibria. Specifically, in this thesis, we first illustrate how to use game theory to analyze and model users' behaviors in multimedia social networks by discussing the following three different scenarios. In the first scenario, we consider a non-cooperative multimedia social network where users in the social network compete for the same resource. We use multiuser rate allocation social network as an example for this scenario. In the second scenario, we consider a cooperative multimedia social network where users in the social network cooperate with each other to obtain the content. We use cooperative peer-to-peer streaming social network as an example for this scenario. In the third scenario, we consider how to use the indirect reciprocity game to stimulate cooperation among users. We use the packet forwarding social network as an example. Moreover, the concept of ``multimedia social networks" can be applied into the field of signal and image processing. If each pixel/sample is treated as a user, then the whole image/signal can be regarded as a multimedia social network. From such a perspective, we introduce a new paradigm for signal and image processing, and develop generalized and unified frameworks for classical signal and image problems. In this thesis, we use image denoising and image interpolation as examples to illustrate how to use game theory to re-formulate the classical signal and image processing problems.Item Cross-Layer Resource Allocation Protocols for Multimedia CDMA Networks(2004-11-11) Kwasinski, Andres; Farvardin, Nariman; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)The design of mechanisms to efficiently allow many users to maintain simultaneous communications while sharing the same transmission medium is a crucial step during a wireless network design. The resource allocation process needs to meet numerous requirements that are sometimes conflicting, such as high efficiency, network utilization and flexibility and good communication quality. Due to limited resources, wireless cellular networks are normally seen as having some limit on the network capacity, in terms of the maximum number of calls that may be supported. Being able to dynamically extend network operation beyond the set limit at the cost of a smooth and small increase in distortion is a valuable and useful idea because it provides the means to flexibly adjust the network to situations where it is more important to service a call rather than to guarantee the best quality. In this thesis we study designs for resource allocation in CDMA networks carrying conversational-type calls. The designs are based on a cross-layer approach where the source encoder, the channel encoder and, in some cases, the processing gains are adapted. The primary focus of the study is on optimally multiplexing multimedia sources. Therefore, we study optimal resource allocation to resolve interference-generated congestion for an arbitrary set of real-time variable-rate source encoders in a multimedia CDMA network. Importantly, we show that the problem could be viewed as the one of statistical multiplexing in source-adapted multimedia CDMA. We present analysis and optimal solutions for different system setups. The result is a flexible system that sets an efficient tradeoff between end-to-end distortion and number of users. Because in the presented cross-layer designs channel-induced errors are kept at a subjectively acceptable level, the proposed designs are able to outperform equivalent CDMA systems where capacity is increased in the traditional way, by allowing a reduction in SINR. An important application and part of this study, is the use of the proposed designs to extend operation of the CDMA network beyond a defined congestion operating point. Also, the general framework for statistical multiplexing in CDMA is used to study some issues in integrated real-time/data networks.