Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3458305.3459599acmconferencesArticle/Chapter ViewAbstractPublication PagesmmsysConference Proceedingsconference-collections
research-article
Open access

AMP: authentication of media via provenance

Published: 15 July 2021 Publication History
  • Get Citation Alerts
  • Abstract

    Advances in graphics and machine learning have led to the general availability of easy-to-use tools for modifying and synthesizing media. The proliferation of these tools threatens to cast doubt on the veracity of all media. One approach to thwarting the flow of fake media is to detect modified or synthesized media through machine learning methods. While detection may help in the short term, we believe that it is destined to fail as the quality of fake media generation continues to improve. Soon, neither humans nor algorithms will be able to reliably distinguish fake versus real content. Thus, pipelines for assuring the source and integrity of media will be required---and increasingly relied upon. We present AMP, a system that ensures the authentication of media via certifying provenance. AMP creates one or more publisher-signed manifests for a media instance uploaded by a content provider. These manifests are stored in a database allowing fast lookup from applications such as browsers. For reference, the manifests are also registered and signed by a permissioned ledger, implemented using the Confidential Consortium Framework (CCF). CCF employs both software and hardware techniques to ensure the integrity and transparency of all registered manifests. AMP, through its use of CCF, enables a consortium of media providers to govern the service while making all its operations auditable. The authenticity of the media can be communicated to the user via visual elements in the browser, indicating that an AMP manifest has been successfully located and verified.

    References

    [1]
    Adobe. 2019. Introducing the Content Authenticity Initiative. https://theblog.adobe.com/content-authenticity-initiative/.
    [2]
    Amber. 2019. Instilling Trust into Video. https://app.ambervideo.co/.
    [3]
    Michael Arnold. 2002. Subjective and objective quality evaluation of watermarked audio tracks. In Second International Conference on Web Delivering of Music, 2002. WEDELMUSIC 2002. Proceedings. IEEE, IEEE Computer Society, USA, 161--167.
    [4]
    Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, and Pramod Viswanath. 2019. Prism: Deconstructing the blockchain to approach physical limits. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA, 585--602.
    [5]
    Arati Baliga, I Subhod, Pandurang Kamat, and Siddhartha Chatterjee. 2018. Performance evaluation of the quorum blockchain platform., 8 pages.
    [6]
    Blockchain. 2020. Ethereum transactions per second. https://blockchair.com/ethereum/charts/transactions-per-second. Accessed: 2020-07-31.
    [7]
    C2PA. 2020. Coalition for Content Provenance and Authenticity. https://c2pa.org/.
    [8]
    Miguel Castro and Barbara Liskov. 1999. Practical Byzantine fault tolerance. In OSDI, Vol. 99. USENIX Association, USA, 173--186.
    [9]
    D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. 2008. RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. https://tools.ietf.org/html/rfc5280.
    [10]
    Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor, Andrew Jenks, Kevin Kane, Elissa Redmiles, Alex Shamis, Isha Sharma, John C. Simmons, Sam Wenker, and Anika Zaman. 2020. AMP: Authentication of Media via Provenance. arXiv:2001.07886 [cs.MM]
    [11]
    Hyperledger Fabric. 2020. A Blockchain Platform for the Enterprise --- hyperledger-fabricdocs master documentation. https://hyperledger-fabric.readthedocs.io/en/release-2.2/. (Accessed on 04/01/2021).
    [12]
    Haya R. Hasan and Khaled Salah. 2019. Combating Deepfake Videos Using Blockchain and Smart Contracts. In IEEE Access, Vol. 7. IEEE, USA, 41596--41606.
    [13]
    Roderick Hodgson. 2020. Preserving Video Truth: an Anti-Deepfakes Narrative. https://www.youtube.com/watch?v=zR-V1nf-dT0.
    [14]
    https://github.com/deepfakes. 2020. faceswap: FaceSwap is a tool that utilizes deep learning to recognize and swap faces in pictures and videos. https://github.com/deepfakes/faceswap/.
    [15]
    Content Authenticity Initiative. 2020. Creating the standard for digital content provenance. https://contentauthenticity.org/.
    [16]
    javascript.com. 2021. ready to try JavaScript. https://www.javascript.com/.
    [17]
    Dia Kayyali. 2017. ProofMode - Verified Visuals Enabled! https://blog.witness.org/2017/04/proofmode-helping-prove-human-rights-abuses-world/.
    [18]
    Pavel Korshunov and Sebastien Marcel. 2018. DeepFakes: a New Threat to Face Recognition? Assessment and Detection.
    [19]
    Marek Kowalski. 2018. FaceSwap. https://github.com/MarekKowalski/FaceSwap/.
    [20]
    Yuezun Li, Ming-Ching Chang, and Siwei Lyu. 2018. In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking. In IEEE Workshop on Information Forensics and Security (WIFS). IEEE Computer Society, USA, 1--7.
    [21]
    Yuezun Li and Siwei Lyu. 2019. Exposing DeepFake Videos By Detecting Face Warping Artifacts. In Workshop on Media Forensics. IEEE, IEEE Computer Society, USA.
    [22]
    H. S. Malvar and D. A. F. Florencio. 2003. Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51, 4 (2003), 898--905.
    [23]
    Scott McCloskey and Michael Albright. 2018. Detecting GAN-generated Imagery using Color Cues.
    [24]
    Microsoft. 2019. CCF: A Framework for Building Confidential Verifiable Replicated Services. https://github.com/microsoft/CCF/blob/master/CCF-TECHNICAL-REPORT.pdf.
    [25]
    Microsoft. 2019. CCF documentation. https://microsoft.github.io/CCF/.
    [26]
    Microsoft. 2019. Confidential Consortium Framework. https://github.com/Microsoft/CCF.
    [27]
    MongoDB. 2020. The database for modern applications. https://www.mongodb.com/.
    [28]
    Lily Hay Newman. 2019. A New Tool Protects Videos from Deepfakes and Tampering. https://www.wired.com/story/amber-authenticate-video-validation-blockchain-tampering-deepfakes/.
    [29]
    Diego Ongaro and John K Ousterhout. 2014. In search of an understandable consensus algorithm. In USENIX Annual Technical Conference (ATC).
    [30]
    Project Origin. 2020. Protecting Trusted Media. https://www.originproject.info/.
    [31]
    Andreas Rössler, Davide Cozzolino, Luisa Verdoliva, Christian Riess, Justus Thies, and Matthias Nießner. 2019. FaceForensics++: Learning to Detect Manipulated Facial Images. In ICCV 2019. IEEE Computer Society, USA, 1--11.
    [32]
    Julia Schwarz and Meredith Morris. 2011. Augmenting web pages and search results to support credibility assessment. In Proceedings of the SIGCHI conference on human factors in computing systems. Association for Computing Machinery, New York, NY, USA, 1245--1254.
    [33]
    Imani N. Sherman, Elissa M. Redmiles, and Jack W. Stokes. 2020. Designing Indicators to Combat Fake Media. arXiv:2010.00544 [cs.HC]
    [34]
    The New York Times. 2019. The News Provenance Project. https://www.newsprovenanceproject.com/.
    [35]
    Truepic. 2019. Photo and video verification you can trust. https://truepic.com.
    [36]
    Luisa Verdoliva. 2020. Media Forensics and DeepFakes: An Overview. In IEEE Journal of Selected Topics in Signal Processing, Vol. 14. IEEE, USA, 910--932.
    [37]
    Xin Yang, Yuezun Li, and Siwei Lyu. 2019. Exposing Deep Fakes Using Inconsistent Head Poses. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE Computer Society, USA, 8261--8265.
    [38]
    Savvas Zannettou, Michael Sirivianos, Jeremy Blackburn, and Nicolas Kourtellis. 2019. The web of false information: Rumors, fake news, hoaxes, clickbait, and various other shenanigans. Journal of Data and Information Quality (JDIQ) 11, 3 (2019), 1--37.
    [39]
    J. Zhang, J. Gao, Z. Wu, W. Yan, Q. Wo, Q. Li, and Z. Chen. 2019. Performance Analysis of the Libra Blockchain: An Experimental Study. In 2019 2nd International Conference on Hot Information-Centric Networking (HotICN). IEEE Computer Society, USA, 77--83.

    Cited By

    View all

    Index Terms

    1. AMP: authentication of media via provenance

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MMSys '21: Proceedings of the 12th ACM Multimedia Systems Conference
      June 2021
      254 pages
      ISBN:9781450384346
      DOI:10.1145/3458305
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 July 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. deepfakes
      2. media authentication
      3. media security
      4. provenance

      Qualifiers

      • Research-article

      Conference

      MMSys '21
      Sponsor:
      MMSys '21: 12th ACM Multimedia Systems Conference
      September 28 - October 1, 2021
      Istanbul, Turkey

      Acceptance Rates

      MMSys '21 Paper Acceptance Rate 18 of 55 submissions, 33%;
      Overall Acceptance Rate 176 of 530 submissions, 33%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)349
      • Downloads (Last 6 weeks)55
      Reflects downloads up to 11 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Data Provenance in Security and PrivacyACM Computing Surveys10.1145/359329455:14s(1-35)Online publication date: 22-Apr-2023
      • (2023)Ensuring privacy in provenance information for images2023 24th International Conference on Digital Signal Processing (DSP)10.1109/DSP58604.2023.10167902(1-5)Online publication date: 11-Jun-2023
      • (2023)Deepfakes: evolution and trendsSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-023-08605-y27:16(11295-11318)Online publication date: 15-Jun-2023
      • (2022)On the Horizon: Interactive and Compositional DeepfakesProceedings of the 2022 International Conference on Multimodal Interaction10.1145/3536221.3558175(653-661)Online publication date: 7-Nov-2022
      • (2022)Multimedia Objects and Forensic Determinations of Criminal Responsibility2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)10.1109/SETIT54465.2022.9875452(36-44)Online publication date: 28-May-2022

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media