A survey of machine learning techniques in adversarial image forensics

Autor: Reza M. Parizi, Ehsan Nowroozi, Ali Dehghantanha, Kim-Kwang Raymond Choo
Jazyk: angličtina
Rok vydání: 2020
Předmět:
FOS: Computer and information sciences
Computer Science - Machine Learning
Computer Science - Cryptography and Security
General Computer Science
Computer Science - Artificial Intelligence
Computer science
Computer Vision and Pattern Recognition (cs.CV)
Computer Science - Computer Vision and Pattern Recognition
Vulnerability
ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION
Image forensics
ComputingMilieux_LEGALASPECTSOFCOMPUTING
02 engineering and technology
Machine learning
computer.software_genre
Criminal investigation
Machine Learning (cs.LG)
Adversarial system
Robustness (computer science)
Image forensics
Adversarial machine learning
Adversarial learning
Adversarial setting
Image manipulation detection
Cyber security

0202 electrical engineering
electronic engineering
information engineering

business.industry
Civil litigation
020206 networking & telecommunications
Artificial Intelligence (cs.AI)
Conviction
ComputingMilieux_COMPUTERSANDSOCIETY
020201 artificial intelligence & image processing
Artificial intelligence
business
Cryptography and Security (cs.CR)
Law
computer
DOI: 10.5281/zenodo.4560205
Popis: Image forensic plays a crucial role in both criminal investigations (e.g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (e.g., defamation). Increasingly, machine learning approaches are also utilized in image forensics. However, there are also a number of limitations and vulnerabilities associated with machine learning-based approaches, for example how to detect adversarial (image) examples, with real-world consequences (e.g., inadmissible evidence, or wrongful conviction). Therefore, with a focus on image forensics, this paper surveys techniques that can be used to enhance the robustness of machine learning-based binary manipulation detectors in various adversarial scenarios.
37 pages, 24 figures, Accepted to the Journal Computer and Security (Elsevier)
Databáze: OpenAIRE