TOP
Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminare
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Publishing
Innerhalb dieser Seite:
Externe Seiten:
dblp
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp


Dagstuhl-Seminar 23021

Media Forensics and the Challenge of Big Data

( 08. Jan – 13. Jan, 2023 )

(zum Vergrößern in der Bildmitte klicken)

Permalink
Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite: https://www.dagstuhl.de/23021

Organisatoren

Kontakt


Programm

Summary

This summary summarizes the outcomes of our Dagstuhl Seminar. The seminar focused on

  • important issues,
  • relevant problems, and
  • adequate solutions.

In the end, we provide a panorama of the last 20 years of the area, its main advances, and its challenges ahead. We go through several key aspects regarding research and development, the translational gap between academia and industry, and what we need to fill this gap. We also highlight key areas and decisions we must focus on in the years ahead. Digital Forensics is part of our lives, and we need to bring together the best minds to tackle its open problems and challenges.

In our discussions, we confront traditional techniques with a range of new data-driven solutions, clearly pointing out the advantages and disadvantages of each kind of formulation. We also discuss their needs regarding scaling up to deal with ever-growing data sets.

We bring to bear aspects related to the development of fair, accountable, unbiased, and explainable solutions respecting directives such as the General Data Protection Regulation.

Finally, we point out that one of the biggest challenges nowadays in the presence of big data is the emergence of artificial intelligence generative techniques that easily allow the creation of never-seen-before content at unprecedented scale and speed, giving rise to what we have been referring to as synthetic realities. Only an orchestrated effort taking advantage of all different techniques from various formulations will allow us to fight back against such synthesized realities.

Copyright Anderson Rocha

Motivation

With demanding and sophisticated crimes and terrorist threats becoming more common and pervasive, allied with the advent and widespread of fake news, it becomes paramount to design and develop objective and scientific-based criteria to identify the characteristics of investigated materials associated with potential criminal activities. We need effective approaches to help us answer the four most important questions in forensics regarding an event: “who”, “in what circumstances”, “why”, and “how”. In recent years, the rise of social media has resulted in a flood of media content. As well as providing a challenge due to the increase in data that needs fact-checking, it also provides the possibility of leveraging on big-data techniques for forensic analysis. This seminar will discuss the main aspects related to big data when it comes to the design and development of forensics techniques: What is at stake? How to deal with spurious correlations? How to mitigate social and economic bias? How to come up with fair, accountable, and explainable forensics solutions? In addition, we aim to identify aspects in this research area that deserve more attention and concentrated efforts. This Dagstuhl Seminar covers the following topics:

  • Prior work in media tampering detection consists of either retouching, cloning, or splicing modes of analysis. Does an examination of current practices show that new modes of tampering exist?
  • Some existing benchmarks are created by academics and students who are not experts at performing image manipulation, but media tampering by professionals may be more challenging than existing benchmarks. Are the current benchmarks realistic and challenging? How should algorithms’ performance be computed?
  • Currently, much work in media forensics is carried out by researchers in fields separated according to the media (e.g., image forensics, audio forensics). What lessons can be learned from a cross-media approach?
  • What is the consequence of the development and application of deep learning into media forensics?
  • What are the different characteristics of media that have been tampered with using “traditional” methods as compared to forgeries generated using deep learning?
  • How to apply media forensics methods outside of academia?
  • How to explore context when analyzing a digital object? How to spot out inconsistencies when analyzing a pool of objects rather than just a single one?
  • How to deal with the challenges of big data and the unprecedented amount of available information when designing new solutions?
  • How to develop fair, accountable, unbiased, and explainable solutions respecting directives such as the General Data Protection Regulation 2016/679 (GDPR) legislation and other similar regulations?
  • What other methodological issues need to be considered? This will require brainstorming sessions by all participants at the seminar.

The huge amount of data now available has had at least a fourfold impact on media forensics:

  • Scaling up the application of media forensics to huge amounts of data is challenging;
  • Big data has enabled data-driven content generation (visual, textual, auditory), exacerbating the above;
  • There is a split between researchers using data-driven approaches to media forensics and traditional (handcrafted solutions). How can this be bridged/resolved?
  • The design and development of fair, accountable, and explainable forensic solutions are paramount to help us understand the decision-making protocol and also to provide users with fair and explainable decisions.

With all the challenges above, how can we orchestrate the efforts of the research community in such a way that we harness different tools to fight misinformation and the spread of fake content? All of these topics will be touched on during the seminar, raising awareness of these important topics and paving the way for stronger tomorrow's digital forensics methods.

The schedule for the seminar will include sessions on traditional methods, deep learning-based methods, big data, benchmark and performance evaluation, applications and future directions. We plan to have a few overview talks followed by shorter regular talks. In addition, there will be several breakout group discussions and panel discussions.

Copyright Irene Amerini, Anderson de Rezende Rocha, Paul L. Rosin, and Xianfang Sun

Teilnehmer
Vor Ort
  • Irene Amerini (Sapienza University of Rome, IT) [dblp]
  • Mauro Barni (University of Siena, IT) [dblp]
  • Thorsten Beck (HU Berlin, DE)
  • Tiziano Bianchi (Polytechnic University of Turin, IT)
  • Luca Cuccovillo (Fraunhofer IDMT - IIlmenau, DE)
  • Isao Echizen (National Institute of Informatics - Tokyo, JP) [dblp]
  • Benedikt Lorch (Universität Innsbruck, AT) [dblp]
  • Christian Riess (Universität Erlangen-Nürnberg, DE) [dblp]
  • Paul L. Rosin (Cardiff University, GB) [dblp]
  • Martin Steinebach (Fraunhofer SIT - Darmstadt, DE) [dblp]
Remote:
  • Roberto Caldelli (CNIT - Florence, IT)
  • Hongmei Chi (Florida A & M University - Tallahassee, US)
  • Pedro Comesaña Alfaro (University of Vigo, ES) [dblp]
  • Marco Fontani (Amped Software - Trieste, IT) [dblp]
  • Haiying Guan (NIST - Gaithersburg, US)
  • Zulfiqar Habib (Comsats University - Lahore, PK) [dblp]
  • Ngai Fong (Bonnie) Law (Hong Kong Polytechnic University, HK)
  • Sébastien Marcel (Idiap Research Institute - Martigny, CH) [dblp]
  • Daniel Moreira (Loyola University Chicago, US) [dblp]
  • Lakshmanan Nataraj (Trimble Inc. - Chennai, IN)
  • Anh Thu Phan-Ho (Multitel - Mons, BE)
  • Alessandro Piva (University of Florence, IT) [dblp]
  • Anderson Rocha (State University - Campinas, BR) [dblp]
  • Xianfang Sun (Cardiff University, GB) [dblp]
  • Benedetta Tondi (University of Siena, IT) [dblp]
  • Savita Walia (Centre for Development of Advanced Comp. - Mohali, IN) [dblp]
  • Z. Jane Wang (University of British Columbia - Vancouver, CA) [dblp]
  • Simon Woo (Sungkyunkwan University - Suwon, KR)

Klassifikation
  • Artificial Intelligence
  • Computer Vision and Pattern Recognition
  • Multimedia

Schlagworte
  • Image and video forensics
  • Digital forensics
  • Image and video forgery detection
  • Image and video authentication
  • Tampering detection