Dagstuhl Seminar Wiki
- Dagstuhl Seminar Wiki (Use personal credentials as created in DOOR to log in)
- Dagstuhl Materials Page (Use personal credentials as created in DOOR to log in)
With demanding and sophisticated crimes and terrorist threats becoming more common and pervasive, allied with the advent and widespread of fake news, it becomes paramount to design and develop objective and scientific-based criteria to identify the characteristics of investigated materials associated with potential criminal activities. We need effective approaches to help us answer the four most important questions in forensics regarding an event: “who”, “in what circumstances”, “why”, and “how”. In recent years, the rise of social media has resulted in a flood of media content. As well as providing a challenge due to the increase in data that needs fact-checking, it also provides the possibility of leveraging on big-data techniques for forensic analysis. This seminar will discuss the main aspects related to big data when it comes to the design and development of forensics techniques: What is at stake? How to deal with spurious correlations? How to mitigate social and economic bias? How to come up with fair, accountable, and explainable forensics solutions? In addition, we aim to identify aspects in this research area that deserve more attention and concentrated efforts. This Dagstuhl Seminar covers the following topics:
- Prior work in media tampering detection consists of either retouching, cloning, or splicing modes of analysis. Does an examination of current practices show that new modes of tampering exist?
- Some existing benchmarks are created by academics and students who are not experts at performing image manipulation, but media tampering by professionals may be more challenging than existing benchmarks. Are the current benchmarks realistic and challenging? How should algorithms’ performance be computed?
- Currently, much work in media forensics is carried out by researchers in fields separated according to the media (e.g., image forensics, audio forensics). What lessons can be learned from a cross-media approach?
- What is the consequence of the development and application of deep learning into media forensics?
- What are the different characteristics of media that have been tampered with using “traditional” methods as compared to forgeries generated using deep learning?
- How to apply media forensics methods outside of academia?
- How to explore context when analyzing a digital object? How to spot out inconsistencies when analyzing a pool of objects rather than just a single one?
- How to deal with the challenges of big data and the unprecedented amount of available information when designing new solutions?
- How to develop fair, accountable, unbiased, and explainable solutions respecting directives such as the General Data Protection Regulation 2016/679 (GDPR) legislation and other similar regulations?
- What other methodological issues need to be considered? This will require brainstorming sessions by all participants at the seminar.
The huge amount of data now available has had at least a fourfold impact on media forensics:
- Scaling up the application of media forensics to huge amounts of data is challenging;
- Big data has enabled data-driven content generation (visual, textual, auditory), exacerbating the above;
- There is a split between researchers using data-driven approaches to media forensics and traditional (handcrafted solutions). How can this be bridged/resolved?
- The design and development of fair, accountable, and explainable forensic solutions are paramount to help us understand the decision-making protocol and also to provide users with fair and explainable decisions.
With all the challenges above, how can we orchestrate the efforts of the research community in such a way that we harness different tools to fight misinformation and the spread of fake content? All of these topics will be touched on during the seminar, raising awareness of these important topics and paving the way for stronger tomorrow's digital forensics methods.
The schedule for the seminar will include sessions on traditional methods, deep learning-based methods, big data, benchmark and performance evaluation, applications and future directions. We plan to have a few overview talks followed by shorter regular talks. In addition, there will be several breakout group discussions and panel discussions.
- Irene Amerini (Sapienza University of Rome, IT) [dblp]
- Mauro Barni (University of Siena, IT) [dblp]
- Thorsten Beck (HU Berlin, DE)
- Tiziano Bianchi (Polytechnic University of Turin, IT)
- Luca Cuccovillo (Fraunhofer IDMT - IIlmenau, DE)
- Isao Echizen (National Institute of Informatics - Tokyo, JP) [dblp]
- Benedikt Lorch (Universität Innsbruck, AT) [dblp]
- Christian Riess (Universität Erlangen-Nürnberg, DE) [dblp]
- Paul L. Rosin (Cardiff University, GB) [dblp]
- Martin Steinebach (Fraunhofer SIT - Darmstadt, DE) [dblp]
- Roberto Caldelli (CNIT - Florence, IT)
- Hongmei Chi (Florida A & M University - Tallahassee, US)
- Pedro Comesaña Alfaro (University of Vigo, ES) [dblp]
- Marco Fontani (Amped Software - Trieste, IT) [dblp]
- Haiying Guan (NIST - Gaithersburg, US)
- Zulfiqar Habib (Comsats University - Lahore, PK) [dblp]
- Ngai Fong (Bonnie) Law (Hong Kong Polytechnic University, HK)
- Sébastien Marcel (Idiap Research Institute - Martigny, CH) [dblp]
- Daniel Moreira (Loyola University Chicago, US) [dblp]
- Lakshmanan Nataraj (Trimble Inc. - Chennai, IN)
- Anh Thu Phan-Ho (Multitel - Mons, BE)
- Alessandro Piva (University of Florence, IT) [dblp]
- Anderson Rocha (State University - Campinas, BR) [dblp]
- Xianfang Sun (Cardiff University, GB) [dblp]
- Benedetta Tondi (University of Siena, IT) [dblp]
- Savita Walia (Centre for Development of Advanced Comp. - Mohali, IN) [dblp]
- Z. Jane Wang (University of British Columbia - Vancouver, CA) [dblp]
- Simon Woo (Sungkyunkwan University - Suwon, KR)
- Artificial Intelligence
- Computer Vision and Pattern Recognition
- Image and video forensics
- Digital forensics
- Image and video forgery detection
- Image and video authentication
- Tampering detection