Loading
Cookies help us deliver our services. By using our services, you agree to our use of cookies. Learn more

ImageCLEF 2019 Security - Forged file discovery

Identify forged images


138 days left
0
Submissions
6
Participants
140
Views

Overview

Note: ImageCLEF Security 2019 is divided into 3 subtasks (challenges):

  • Task 1: Forged File Discovery

  • Task 2: Stego Image Discovery

  • Task 3: Secret Message Discovery

This challenge is about Forged File Discovery(task 1). For information on the Stego Image Discovery(task 2) challenge click here . For information on the Secret Message Discovery(task 3) challenge click here . All of these challenges share the same scenario. Registering for one of these challenges will automatically give you access to the other ones.

Note: Do not forget to read the Rules section on this page.

Motivation

File Forgery Detection (FFD) is a serious problem concerning digital forensics examiners. Fraud or counterfeits are common causes for altering files. Another example is a child predator who hides porn images by altering the image extension and in some cases by changing the image signature. Many proposals have been made to solve this problem and the most promising ones concentrate on the image content. It is also common that anyone who wants to hide any kind of information in plain sight without being perceived to use steganography. Steganography is the practice of concealing a file, message, image or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning “covered” and graphein (γράφειν) meaning “writing”. The most usual cover medium for hiding data are images.

Challenge description

You are a professional digital forensic examiner collaborating with the police, who suspects that there is an ongoing fraud in the Central Bank. After obtaining a court order, police gain access to a suspect’s computer in the bank with the purpose to look for images proving the suspect guilty. However, police suspects that he has managed to change extension and signature of some images, so that they look like pdf files. Additionally, it is highly probable that the suspect has used steganography software to hide messages within some images that could reveal valuable information of his collaborators.

The goal of this challenge is to examine if an image has been forged. Perform detection of altered (forged) images (both extension and signature) and predict the actual type of the forged file.

Data

Training set for forged file discovery (i.e.task 1) consists of 2400 files. 1200 of them are true pdf files and the rest seem to be pdf files but actually they are images (400 of each image type i.e. jpg , png and gif).

Submission instructions


As soon as the submission is open, you will find a “Create Submission” button on this page (just next to the tabs)


Identify Forged Images

For the submission of the task we expect the following format: <Figure-ID>;<initial Image type>

e.g.:

1741_01;jpg if the document classified as a forged one, initially jpg file

1742_01;pdf if the document classified as a NO forged one

1743_01;png if the document classified as a forged one, initially png file

You need to respect the following constraints:

  • The separator between the figure ID and the concepts has to be a semicolon (;).

  • The file to upload must be a .txt file.

  • The initially images can be jpg or gif or png.

  • Each figure ID of the test set must be included in the runfile exactly once (even if there is no result).

  • The result cannot be specified more than once for the same figure ID.

Citations

Information will be posted after the challenge ends.

Evaluation

For assessing performance, classic metrics are used: Precision, Recall and F1.

Precision In pattern recognition, information retrieval and binary classification, precision is the fraction of relevant instances among the retrieved instances. Precision could be defined as the fraction of actual detected altered images among all the images detected as altered:

Precision = nº of actual detected altered images /Total detections of altered images

Recall In pattern recognition, information retrieval and binary classification, recall is the fraction of relevant instances that have been retrieved over the total amount of relevant instances. Recall could be defined as the fraction of actual detected altered images among all the altered images:

Recall = nº of actual detected altered images /Total altered images

F-measure F-measure is the harmonic mean of precision and recall, mathematically expressed as

F_1=2∙(Precision ∙ Recall)/(Precision + Recall )

Rules

Note: In order to participate in this challenge you have to agree on the terms & conditions You will find more information on the ‘Dataset’ tab.

ImageCLEF lab is part of the Conference and Labs of the Evaluation Forum: CLEF 2019. CLEF 2019 consists of independent peer-reviewed workshops on a broad range of challenges in the fields of multilingual and multimodal information access evaluation, and a set of benchmarking activities carried in various labs designed to test different aspects of mono and cross-language Information retrieval systems. More details about the conference can be found here .

Submitting a working note with the full description of the methods used in each run is mandatory. Any run that could not be reproduced thanks to its description in the working notes might be removed from the official publication of the results. Working notes are published within CEUR-WS proceedings, resulting in an assignment of an individual DOI (URN) and an indexing by many bibliography systems including DBLP. According to the CEUR-WS policies, a light review of the working notes will be conducted by ImageCLEF organizing committee to ensure quality. As an illustration, ImageCLEF 2018 working notes (task overviews and participant working notes) can be found within CLEF 2019 CEUR-WS proceedings.

Important

Participants of this challenge will automatically be registered at CLEF 2019. In order to be compliant with the CLEF registration requirements, please edit your profile by providing the following additional information:

  • First name

  • Last name

  • Affiliation

  • Address

  • City

  • Country

  • Regarding the username, please choose a name that represents your team.

This information will not be publicly visible and will be exclusively used to contact you and to send the registration data to CLEF, which is the main organizer of all CLEF labs

Participating as an individual (non affiliated) researcher

We welcome individual researchers, i.e. not affiliated to any institution, to participate. We kindly ask you to provide us with a motivation letter containing the following information:

  • the presentation of your most relevant research activities related to the task/tasks

  • your motivation for participating in the task/tasks and how you want to exploit the results

  • a list of the most relevant 5 publications (if applicable)

  • the link to your personal webpage

The motivation letter should be directly concatenated to the End User Agreement document or sent as a PDF file to bionescu at imag dot pub dot ro. The request will be analyzed by the ImageCLEF organizing committee. We reserve the right to refuse any applicants whose experience in the field is too narrow, and would therefore most likely prevent them from being able to finish the task/tasks.

Prizes

ImageCLEF 2019 is an evaluation campaign that is being organized as part of the CLEF initiative labs. The campaign offers several research tasks that welcome participation from teams around the world. The results of the campaign appear in the working notes proceedings, published by CEUR Workshop Proceedings (CEUR-WS.org). Selected contributions among the participants, will be invited for publication in the following year in the Springer Lecture Notes in Computer Science (LNCS) together with the annual lab overviews.

Resources

Contact us

We strongly encourage you to use the public channels mentioned above for communications between the participants and the organizers. In extreme cases, if there are any queries or comments that you would like to make using a private communication channel, then you can send us an email at :

  • Narciso Garcia, Professor, Dr., Grupo de Tratamiento de Imágenes, Dpto. Señales, Sistemas y Radiocomunicaciones, E.T.S. Ingenieros Telecomunicación, Spain, narciso@gti.ssr.upm.es

  • Ergina Kavallieratou, Associate Professor, Dr, AIlab, Department of Information & Communication Systems Engineering, University of the Aegean, Greece, kavallieratou@aegean.gr

  • Carlos Roberto del Blanco, Assistant Professor, Dr., Grupo de Tratamiento de Imágenes, Dpto. Señales, Sistemas y Radiocomunicaciones, E.T.S. Ingenieros de Telecomunicación, cda@gti.ssr.upm.es

  • Carlos Cuevas Rodríguez, Assistant Professor, Dr., Grupo de Tratamiento de Imágenes, Dpto. Señales, Sistemas y Radiocomunicaciones, E.T.S. Ingenieros de Telecomunicación, Spain, ccr@gti.ssr.upm.es

  • Nikos Vasillopoulos, Phd, Postdoc, AIlab, Department of Information & Communication Systems Engineering, University of the Aegean, Greece, ~~~ nvasilopoulos@aegean.gr

  • Konstantinos Karampidis, Msc, Phd student, University of the Aegean, Greece, karampidis@aegean.gr

For questions over the Security task e-mail: Imageclefsecurity@aegean.gr

More information

You can find additional information on the challenge here: https://www.imageclef.org/2019/security