Information forensics: An overview of the first decade

318Citations
Citations of this article
177Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In recent decades, we have witnessed the evolution of information technologies from the development of VLSI technologies, to communication and networking infrastructure, to the standardization of multimedia compression and coding schemes, to effective multimedia content search and retrieval. As a result, multimedia devices and digital content have become ubiquitous. This path of technological evolution has naturally led to a critical issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users for legitimate purposes, and to be able to forensically prove with high confludence when otherwise. When security is compromised, intellectual rights are violated, or authenticity is forged, forensic methodologies and tools are employed to reconstruct what has happened to digital content in order to answer who has done what, when, where, and how. The goal of this paper is to provide an overview on what has been done over the last decade in the new and emerging flueld of information forensics regarding theories, methodologies, state-of-the-Art techniques, major applications, and to provide an outlook of the future. © 2013 IEEE.

Cite

CITATION STYLE

APA

Stamm, M. C., Wu, M., & Liu, K. J. R. (2013). Information forensics: An overview of the first decade. IEEE Access, 1, 167–200. https://doi.org/10.1109/ACCESS.2013.2260814

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free