In recent decades, we have witnessed the evolution of information technologies from the development of VLSI technologies, to communication and networking infrastructure, to the standardization of multimedia compression and coding schemes, to effective multimedia content search and retrieval. As a result, multimedia devices and digital content have become ubiquitous. This path of technological evolution has naturally led to a critical issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users for legitimate purposes, and to be able to forensically prove with high confludence when otherwise. When security is compromised, intellectual rights are violated, or authenticity is forged, forensic methodologies and tools are employed to reconstruct what has happened to digital content in order to answer who has done what, when, where, and how. The goal of this paper is to provide an overview on what has been done over the last decade in the new and emerging flueld of information forensics regarding theories, methodologies, state-of-the-Art techniques, major applications, and to provide an outlook of the future. © 2013 IEEE.
CITATION STYLE
Stamm, M. C., Wu, M., & Liu, K. J. R. (2013). Information forensics: An overview of the first decade. IEEE Access, 1, 167–200. https://doi.org/10.1109/ACCESS.2013.2260814
Mendeley helps you to discover research relevant for your work.