Artificial Intelligence-Driven Forensic Analysis of Digital Images for Cybersecurity Investigations
Keywords:
Artificial Intelligence, Forensic Analysis, Digital Images, Cybersecurity Investigations, Image Tampering, Deep Learning, Feature Extraction, Image Forgery Detection, Interpretability, Adversarial ResilienceAbstract
The current world is highly circumscribed by these numerous threats hence providing a basis for developing better ways of handling images for cybersecurity purposes specifically in the field of cyber forensics. This paper aims to compare and analyse how AI can be implemented to increase the effectiveness and timeframe of forensic analysis of digital images. By employing machine learning methods, we describe the current and emerging trends in image forensics, identifying the key issues regarding image tampering detection and attribution. In this paper, we establish a justification of the use of AI methods in the manipulation of forged images, with the aim of using such findings to help in cybercrime investigations. In addition, identifying the pros and cons of the integration of AI technologies within forensic analysis, we also highlight the ethical concerns and legal consequences that arise with the use of AI technologies in analysis. Overall, this work aims to progress the knowledge regarding AI utilization in the context of cybersecurity and offer suggestions for future study of this essential field.
Downloads
References
S. Baluja, A. Fischer, and M. Muja, "Learning to defly: Generalization of adversarial defenses," in Advances in Neural Information Processing Systems, pp. 5976-5986, 2017.
S. Chen, D. Güera, and M. Lee, "A comprehensive survey on deep learning in remote sensing: Theories, tools, and challenges for the community," Journal of Applied Remote Sensing, vol. 13, no. 4, p. 042406, 2019.
M. Goljan, J. Fridrich, and M. Chen, "Detecting digital image forgeries using sensor pattern noise," IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2054-2066, 2014.
Y. Li and S. Lyu, "Exposing deepfake videos by detecting face warping artifacts," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 22-30, 2019.
B. Bayar and M. C. Stamm, "A deep learning approach to universal image manipulation detection using a new convolutional layer," in Proceedings of the ACM workshop on information hiding and multimedia security, pp. 5-10, 2016.
H. Farid, "Deepfakes: A new threat to face recognition?" ACM Multimedia Systems, vol. 25, no. 4, pp. 367-369, 2019.
J. Fridrich, J. Kodovsky, and M. Goljan, "Digital image forensics via non-parametric demosaicing and interpolation feature analysis," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 614-625, 2012.
A. C. Popescu, H. Farid, and A. Robison, "Exposing digital forgeries in complex lighting environments," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 392-401, 2019.
R. Raghavendra, K. B. Raja, and C. Busch, "AI-enabled biometric forensics: A survey on recent advances and future trends," IEEE Access, vol. 8, pp. 51751-51770, 2020.
S. K. Selvaraj, Z. C. Lipton, and A. Jabri, "Fairness and accountability in AI-enabled forensic analysis," arXiv preprint arXiv:2103.00990, 2021.
M. Smith, N. Patel, and D. Avrahami, "Cyber security trends in 2020," Retrieved from https://www.mcafee.com/enterprise/en-us/assets/reports/rp-cyber-security-trends-2020.pdf, 2020.
J. Soo, K. K. R. Choo, and L. Liu, "Deep learning in digital forensics: A comprehensive review," Digital Investigation, vol. 34, p. 101963, 2020.
A. Tiwari and M. Dabas, "Image tamper detection using deep learning: A survey," Journal of Imaging, vol. 5, no. 1, p. 1, 2019.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.