Skip to feedback

Award Abstract # 1029703
Forensic Hash for Assured Cyber-based Sensing and Communications

NSF Org: ECCS
Division of Electrical, Communications and Cyber Systems
Recipient: UNIVERSITY OF MARYLAND, COLLEGE PARK
Initial Amendment Date: September 2, 2010
Latest Amendment Date: September 2, 2010
Award Number: 1029703
Award Instrument: Standard Grant
Program Manager: Zhi Tian
ECCS
 Division of Electrical, Communications and Cyber Systems
ENG
 Directorate for Engineering
Start Date: September 15, 2010
End Date: August 31, 2014 (Estimated)
Total Intended Award Amount: $344,338.00
Total Awarded Amount to Date: $344,338.00
Funds Obligated to Date: FY 2010 = $344,338.00
History of Investigator:
  • Min Wu (Principal Investigator)
    minwu@umd.edu
Recipient Sponsored Research Office: University of Maryland, College Park
3112 LEE BUILDING
COLLEGE PARK
MD  US  20742-5100
(301)405-6269
Sponsor Congressional District: 04
Primary Place of Performance: University of Maryland, College Park
3112 LEE BUILDING
COLLEGE PARK
MD  US  20742-5100
Primary Place of Performance
Congressional District:
04
Unique Entity Identifier (UEI): NPU8ULVAAS23
Parent UEI: NPU8ULVAAS23
NSF Program(s): CCSS-Comms Circuits & Sens Sys
Primary Program Source: 01001011DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s):
Program Element Code(s): 756400
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.041

ABSTRACT

The objective of this research is to address the challenge in trustworthy sensing and communications, as content-rich audio-visual streams become increasingly adapted on-the-fly for individual receivers. The proposed project develops a novel framework of Forensic Hash for Information Assurance (FASHION) in sensing and communications. The framework utilizes a strategically designed compact string and the associated decision mechanism to transcend the capabilities of conventional hash and non-intrusive forensics. Offering more forensic answers about data integrity, origin, and processing history in higher accuracy and efficiency, the proposed framework overcomes the current one-size-fit-all dilemma to enable trust assessment to a high level. The main investigations include: what evidentiary information to form forensic hash; theories and algorithms on how to compactly and securely encode forensic hash, and robustly and securely associate it with source data; attack strategies and counter-attacks; and developing a Testbed for experimental evaluation of the proposed framework.

The intellectual merit lies in exploring the unchartered area of Information Forensic Hash that transcends from prior art, advancing theories and algorithms of assured cyber sensing and communications, and providing new capabilities and tools to the community. In particular, the proposal leverages recent advances in non-intrusive forensics to add flexibility and reveal richer information for trustworthiness assessment of cyber-based sensing and communications. The proposed research has the potential to open a new research area in information forensics which is very relevant to the health and development of the cyber-infrastructure.

The proposed research, if successful, could have significant impact on many applications of national interests, including the US IT infrastructure, as sensing and communicating audio-visual data have become a central part in government operations and in services by the high-tech industry, whose continuing success is critical to U.S.'s economic prosperity.

The broader impact comes from the seamlessly integration of research with education/outreach through the framework's Testbed and special honor programs, to actively attract and nurture under-represented students to develop a successful engineering career.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

A.L. Varna and M. Wu "Modeling and Analysis of Correlated Binary Fingerprints for Content Identification" IEEE Trans. on Info. Forensics and Security , v.6 , 2011 , p.1146-1159 10.1109/TIFS.2011.2152394
M. Stamm, M. Wu, and K.J.R. Liu "Information Forensics: An Overview of the First Decade" IEEE Access, invited paper for inaugural issue , v.vol. 1 , 2013 10.1109/ACCESS.2013.2260814
M. Stamm, M. Wu, and K.J.R. Liu "Information Forensics: An Overview of the First Decade" IEEE Access (invited paper for the inaugural issue) , v.1 , 2013 10.1109/ACCESS.2013.2260814

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

In recent decades, we have witnessed the advancement of information technologies leading to the ubiquitous availability of multimedia devices and digital content. This path of technological evolution has naturally led to a critical issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users for legitimate purposes, and to be able to forensically prove with high confidence when otherwise. When security is compromised or authenticity is forged, forensic methodologies and tools are employed to reconstruct what has happened to digital content in order to answer who has done what, when, where, and how.

In order to verify the integrity of a digital document, security practice often creates a piece of digital reference known as a hash.  A hash is generated based on the document content using cryptographically sound operations so that only an authorized user (such as document owner or sender) can develop a valid hash, attach with the document, and later the hash can be used by others as a reference. When the document content is tampered, the result from a verifying operation would show inconsistency with the attached hash, thus revealing the content tampering.  Authenticating multimedia content, however, is more sophisticated than text data, because not only can multimedia content can be stored in substantially different format, they are also transcoded in various ways, for example, to reduce the bitrate when transmission bandwidth is limited, to a different size when the end-user has a display device of different size and shape than the senders. An example of size change combined with content tampering is shown in the attached Figure 1.

This NSF supported project tackles the verification of digital data through a novel framework of forensic hash, which is a small-size reference of about a few hundred of bytes that can help reveal more information about the processing history of the data under question and facilitate answering questions about what has been done on the data.  Forensic hash constructions developed through our research provides robust geometric transform estimation, accurate tampering localization, excellent discrimination capability and a novel capability to estimate seam carving – the state-of-the-art resizing tools for images and video. With such capabilities in answering a broad scope of forensic questions in an accurate and efficient way, our proposed forensic hash can be a valuable tool to help evaluate the trustworthiness of electronic media and signals.

We have further leverage the new forensic hash framework and extend it to address an important problem beyond security. Increasingly, images transmitted and rendered at receivers’ end may have a different size and aspect ratio from those of the original, in order to meet the heterogeneous situations and needs of transmission bandwidth and display capabilities.  This calls for automatically monitoring and evaluation of image quality for Quality-of-Service (QoS) assurance in broadband communications and online/mobile media applications.  We use “retargeted images” having undergone content-adaptive resizing as an example and made novel use of the forensic hash framework from this research project to tackle the new challenge of quality assessment for retargeted images. For the U.S. wireless and communication industry to address the market’s needs and global competition, the research outcome from this project contributes to technology innovations. Furthermore, the mentoring and engagement of the undergraduate and graduate students who participated in this research (including female and under-represented minorities) have contributed to the work force development in STEM areas that is critical for sustained technological advancement and prosperity.

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page