
NSF Org: |
ECCS Division of Electrical, Communications and Cyber Systems |
Recipient: |
|
Initial Amendment Date: | September 2, 2010 |
Latest Amendment Date: | September 2, 2010 |
Award Number: | 1029703 |
Award Instrument: | Standard Grant |
Program Manager: |
Zhi Tian
ECCS Division of Electrical, Communications and Cyber Systems ENG Directorate for Engineering |
Start Date: | September 15, 2010 |
End Date: | August 31, 2014 (Estimated) |
Total Intended Award Amount: | $344,338.00 |
Total Awarded Amount to Date: | $344,338.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
3112 LEE BUILDING COLLEGE PARK MD US 20742-5100 (301)405-6269 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
3112 LEE BUILDING COLLEGE PARK MD US 20742-5100 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | CCSS-Comms Circuits & Sens Sys |
Primary Program Source: |
|
Program Reference Code(s): | |
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.041 |
ABSTRACT
The objective of this research is to address the challenge in trustworthy sensing and communications, as content-rich audio-visual streams become increasingly adapted on-the-fly for individual receivers. The proposed project develops a novel framework of Forensic Hash for Information Assurance (FASHION) in sensing and communications. The framework utilizes a strategically designed compact string and the associated decision mechanism to transcend the capabilities of conventional hash and non-intrusive forensics. Offering more forensic answers about data integrity, origin, and processing history in higher accuracy and efficiency, the proposed framework overcomes the current one-size-fit-all dilemma to enable trust assessment to a high level. The main investigations include: what evidentiary information to form forensic hash; theories and algorithms on how to compactly and securely encode forensic hash, and robustly and securely associate it with source data; attack strategies and counter-attacks; and developing a Testbed for experimental evaluation of the proposed framework.
The intellectual merit lies in exploring the unchartered area of Information Forensic Hash that transcends from prior art, advancing theories and algorithms of assured cyber sensing and communications, and providing new capabilities and tools to the community. In particular, the proposal leverages recent advances in non-intrusive forensics to add flexibility and reveal richer information for trustworthiness assessment of cyber-based sensing and communications. The proposed research has the potential to open a new research area in information forensics which is very relevant to the health and development of the cyber-infrastructure.
The proposed research, if successful, could have significant impact on many applications of national interests, including the US IT infrastructure, as sensing and communicating audio-visual data have become a central part in government operations and in services by the high-tech industry, whose continuing success is critical to U.S.'s economic prosperity.
The broader impact comes from the seamlessly integration of research with education/outreach through the framework's Testbed and special honor programs, to actively attract and nurture under-represented students to develop a successful engineering career.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
In recent decades, we have witnessed the advancement of information technologies leading to the ubiquitous availability of multimedia devices and digital content. This path of technological evolution has naturally led to a critical issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users for legitimate purposes, and to be able to forensically prove with high confidence when otherwise. When security is compromised or authenticity is forged, forensic methodologies and tools are employed to reconstruct what has happened to digital content in order to answer who has done what, when, where, and how.
In order to verify the integrity of a digital document, security practice often creates a piece of digital reference known as a hash. A hash is generated based on the document content using cryptographically sound operations so that only an authorized user (such as document owner or sender) can develop a valid hash, attach with the document, and later the hash can be used by others as a reference. When the document content is tampered, the result from a verifying operation would show inconsistency with the attached hash, thus revealing the content tampering. Authenticating multimedia content, however, is more sophisticated than text data, because not only can multimedia content can be stored in substantially different format, they are also transcoded in various ways, for example, to reduce the bitrate when transmission bandwidth is limited, to a different size when the end-user has a display device of different size and shape than the senders. An example of size change combined with content tampering is shown in the attached Figure 1.
This NSF supported project tackles the verification of digital data through a novel framework of forensic hash, which is a small-size reference of about a few hundred of bytes that can help reveal more information about the processing history of the data under question and facilitate answering questions about what has been done on the data. Forensic hash constructions developed through our research provides robust geometric transform estimation, accurate tampering localization, excellent discrimination capability and a novel capability to estimate seam carving – the state-of-the-art resizing tools for images and video. With such capabilities in answering a broad scope of forensic questions in an accurate and efficient way, our proposed forensic hash can be a valuable tool to help evaluate the trustworthiness of electronic media and signals.
We have further leverage the new forensic hash framework and extend it to address an important problem beyond security. Increasingly, images transmitted and rendered at receivers’ end may have a different size and aspect ratio from those of the original, in order to meet the heterogeneous situations and needs of transmission bandwidth and display capabilities. This calls for automatically monitoring and evaluation of image quality for Quality-of-Service (QoS) assurance in broadband communications and online/mobile media applications. We use “retargeted images” having undergone content-adaptive resizing as an example and made novel use of the forensic hash framework from this research project to tackle the new challenge of quality assessment for retargeted images. For the U.S. wireless and communication industry to address the market’s needs and global competition, the research outcome from this project contributes to technology innovations. Furthermore, the mentoring and engagement of the undergraduate and graduate students who participated in this research (including female and under-represented minorities) have contributed to the work force development in STEM areas that is critical for sustained technological advancement and prosperity.
Please report errors in award information by writing to: awardsearch@nsf.gov.