4.7 Article

Content-Aware Detection of Temporal Metadata Manipulation

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2022.3159154

关键词

Visualization; Metadata; Task analysis; Transient analysis; Satellites; Meteorology; Sun; Timestamp verification; metadata manipulation detection; digital forensics; temporal metadata manipulation

资金

  1. Sao Paulo Research Foundation (FAPESP) [DejaVu 2017/12646-3, 2017/21957-2, 2019/15822-2]
  2. U.S. National Science Foundation [IIS-1553116]

向作者/读者索取更多资源

This study presents the problem of detecting timestamp manipulation and proposes an end-to-end approach using supervised consistency verification to verify the consistency of image capture time, content, and geographic location. Through experiments, the method shows significant improvement in classification accuracy on a large dataset and demonstrates the ability to estimate possible capture time in scenarios with missing metadata.
Most pictures shared online are accompanied by temporal metadata (i.e., the day and time they were taken), which makes it possible to associate an image content with real-world events. Maliciously manipulating this metadata can convey a distorted version of reality. In this work, we present the emerging problem of detecting timestamp manipulation. We propose an end-to-end approach to verify whether the purported time of capture of an outdoor image is consistent with its content and geographic location. We consider manipulations done in the hour and/or month of capture of a photograph. The central idea is the use of supervised consistency verification, in which we predict the probability that the image content, capture time, and geographical location are consistent. We also include a pair of auxiliary tasks, which can be used to explain the network decision. Our approach improves upon previous work on a large benchmark dataset, increasing the classification accuracy from 59.0% to 81.1%. We perform an ablation study that highlights the importance of various components of the method, showing what types of tampering are detectable using our approach. Finally, we demonstrate how the proposed method can be employed to estimate a possible time-of-capture in scenarios in which the timestamp is missing from the metadata.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据