The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Tampering with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1999 (18) 2000-2001 (17) 2002-2003 (32) 2004 (20) 2005 (33) 2006 (44) 2007 (56) 2008 (55) 2009 (29) 2010 (18) 2011 (23) 2012 (16) 2013 (22) 2014 (29) 2015 (23) 2016 (31) 2017 (35) 2018 (43) 2019 (53) 2020 (47) 2021 (50) 2022 (47) 2023 (50) 2024 (15)
Publication types (Num. hits)
article(319) incollection(2) inproceedings(481) phdthesis(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 323 occurrences of 220 keywords

Results
Found 806 publication records. Showing 806 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
93Masaru Takesue A tampering protocol for reducing the coherence transactions in regular computation. Search on Bibsonomy ISPAN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF tampering protocol, coherence transactions, regular computation, latency of communication, protocols, multiprocessor, cache-coherence protocol, RTL simulator
81Wei Wang 0025, Jing Dong 0003, Tieniu Tan A Survey of Passive Image Tampering Detection. Search on Bibsonomy IWDW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Image Tampering, Image Tampering Detection, Imaging Process, Image Model
72Hongxia Jin, Jeffery Lotspiech Proactive Software Tampering Detection. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
61Dun-Yu Hsiao, Soo-Chang Pei Detecting Digital Tampering by Blur Estimation. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Xianfeng Zhao, Weinong Wang, Kefei Chen Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. Search on Bibsonomy WAIM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
55Ying Chen, Yuping Wang Exposing Digital Forgeries by Detecting Traces of Smoothing. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Sujoy Roy, Qibin Sun Robust Hash for Detecting and Localizing Image Tampering. Search on Bibsonomy ICIP (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Ashwin Swaminathan, Min Wu 0001, K. J. Ray Liu Image Tampering Identification using Blind Deconvolution. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos Papanikolopoulos, Richard M. Voyles Real-Time Detection of Camera Tampering. Search on Bibsonomy AVSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Huajian Liu, Martin Steinebach Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability. Search on Bibsonomy AXMEDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Fangyong Hou, Zhiying Wang, Zhen Liu, Yun Liu Avoid Powerful Tampering by Malicious Host. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Yao-Chung Lin, David P. Varodayan, Bernd Girod Video quality monitoring for mobile multicast peers using distributed source coding. Search on Bibsonomy MobiMedia The full citation details ... 2009 DBLP  DOI  BibTeX  RDF peer-to-peer multicast video streaming, video quality estimation, transcoding, distributed source coding, tampering detection
43Hany Farid Exposing digital forgeries in scientific images. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital forensics, digital tampering
43Micah K. Johnson, Hany Farid Exposing digital forgeries through chromatic aberration. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital forensics, digital tampering
39Yao-Chung Lin, David P. Varodayan, Torsten Fink, Erwin B. Bellers, Bernd Girod Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tubaro Localization of sparse image tampering via random projections. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi Physical Security Bounds Against Tampering. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Tamper-Proof Hardware, Fault Prevention, Fault Detection, Error Detection, Fault Analysis, Physical Security, Adversarial Model, Implementation Attack
39Kyriacos E. Pavlou, Richard T. Snodgrass Forensic analysis of database tampering. Search on Bibsonomy SIGMOD Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF append-only, corruption diagram, forensic strength, cryptographic hash function
38Xuping Huang, Isao Echizen, Akira Nishimura A New Approach of Reversible Acoustic Steganography for Tampering Detection. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Reversible acoustic steganography, feature extraction (hash), tampering detection
33Richa Singh 0001, Mayank Vatsa, Sanjay Kumar Singh, Saurabh Upadhyay Integrating SVM classification with SVD watermarking for intelligent video authentication. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Video authentication, Relative correlation, Support vector machine, Watermarking, Singular value decomposition
33Ali Saglam, Alptekin Temizel Real-Time Adaptive Camera Tamper Detection for Video Surveillance. Search on Bibsonomy AVSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Hongjie He, Jiashu Zhang, Fan Chen 0003 A self-recovery fragile watermarking scheme for image authentication with superior localization. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tamper recovery, probability of false rejection, probability of false acceptance, digital watermarking
33Parag Agarwal, Balakrishnan Prabhakaran 0001 Tamper proofing mechanisms for motion capture data. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF watermarking, encoding, decoding, blind, spatial
33Weihong Wang, Hany Farid Exposing Digital Forgeries in Interlaced and Deinterlaced Video. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Seok Min Yoon, Seung Wook Lee, Hongmoon Wang, Jong Tae Kim Encoding-Based Tamper-Resistant Algorithm for Mobile Device Security. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Mobile Device, Tamper-resistant
33Huajian Liu, Martin Steinebach Digital Watermarking for Image Authentication with Localization. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Kun Zhang 0006, Tao Zhang 0037, Santosh Pande Memory Protection through Dynamic Access Control. Search on Bibsonomy MICRO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Xiaotong Zhuang, Tao Zhang 0037, Santosh Pande Using Branch Correlation to Identify Infeasible Paths for Anomaly Detection. Search on Bibsonomy MICRO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Vidyasagar M. Potdar, Chen Wu 0001, Elizabeth Chang 0001 Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Asnat Dadon-Elichai RDS: Remote Distributed Scheme for Protecting Mobile Agents. Search on Bibsonomy AAMAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security, mobile agents, secret - sharing
33Gene Itkis Cryptographic tamper evidence. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF evolving cryptosystems, key evolution, tamper evidence, digital signatures, exposures
33Yuichi Nakai Semi Fragile Watermarking Based on Wavelet Transform. Search on Bibsonomy IEEE Pacific Rim Conference on Multimedia The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
33Eshan Chattopadhyay, Xin Li 0006 Non-malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering. Search on Bibsonomy TCC (3) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
33Eshan Chattopadhyay, Xin Li 0006 Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
32Dhruv Mahajan 0001, Ravi Ramamoorthi, Brian Curless A Theory Of Frequency Domain Invariants: Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Frequency Domain Invariants, Spherical harmonic identities, Convolution, Relighting, Inverse rendering, Image Forensics, Tampering
32Micah K. Johnson, Hany Farid Detecting Photographic Composites of People. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Digital Forensics, Digital Tampering
32Weihong Wang, Hany Farid Exposing digital forgeries in video by detecting duplication. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF digital forensics, digital tampering
32Marwan Abi-Antoun, Daniel Wang, Peter Torr Checking threat modeling data flow diagrams for implementation conformance and security. Search on Bibsonomy ASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing
32Micah K. Johnson, Hany Farid Exposing Digital Forgeries Through Specular Highlights on the Eye. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Digital Forensics, Digital Tampering
32Shih-Fu Chang Blind Passive Media Forensics: Motivation and Opportunity. Search on Bibsonomy MCAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF media forensics, detection of image forgery and tampering, media security
32Chin-Chen Chang 0001, Chih-Chiang Tsou, Yung-Chen Chou A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF quad-tree segmentation, Image authentication, tampering detection
32Kerstin Lemke-Rust, Christof Paar An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Tamper-Proof Hardware, Fault Analysis, Physical Security, Adversarial Model, Tampering, Implementation Attack
32Micah K. Johnson, Hany Farid Exposing digital forgeries by detecting inconsistencies in lighting. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF digital forensics, digital tampering
32Hao-Tian Wu, Yiu-ming Cheung A fragile watermarking scheme for 3D meshes. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dither modulation, mesh authentication, mesh centroid, fragile watermarking, tampering detection
28Pin Zhang, Xiangwei Kong Detecting Image Tampering Using Feature Fusion. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Kyriacos E. Pavlou, Richard T. Snodgrass Forensic analysis of database tampering. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Monochromatic algorithm, Polychromatic algorithm, RGBY algorithm, Tiled Bitmap algorithm, a3D algorithm, compliant records, forensic analysis algorithm, forensic cost
28Yi-Lei Chen, Chiou-Ting Hsu Image tampering detection by blocking periodicity analysis in JPEG compressed images. Search on Bibsonomy MMSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere Run-Time Randomization to Mitigate Tampering. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Mohsen Sharifi, Mohammad Zoroufi, Alireza Saberi How to Counter Control Flow Tampering Attacks. Search on Bibsonomy AICCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao A control flow obfuscation method to discourage malicious tampering of software codes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation
28S. Prasad, K. Ramakrishnan On Resampling Detection and its Application to Detect Image Tampering. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking. Search on Bibsonomy IWDW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF tampered-MSB localization, tampered-LSB localization, Image authentication, fragile watermarking
22Siyue Chen, Henry Leung Chaotic Watermarking for Video Authentication in Surveillance Applications. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha Architectural support for securing application data in embedded systems. Search on Bibsonomy EIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono FlexBox: Sandboxing internet servers based on layer-7 contexts. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Irfan A. Siddavatam, Jayant Gadge Comprehensive test mechanism to detect attack on Web Services. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Debasri Saha, Susmita Sur-Kolay Fast Robust Intellectual Property Protection for VLSI Physical Design. Search on Bibsonomy ICIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fingerprint- ing, VLSI physical design, watermarking, Intellectual property, electronic design automation
22Andrew B. T. Hopkins, Klaus D. McDonald-Maier, Evangelos Papoutsis, W. Gareth J. Howells Ensuring data integrity via ICmetrics based security infrastructure. Search on Bibsonomy AHS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Arati Baliga, Pandurang Kamat, Liviu Iftode Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Linna Zhou, Dongming Wang, Yunbiao Guo, Jingfei Zhang Blur Detection of Digital Forgery Using Mathematical Morphology. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF safety content management application, mathematical morphology, blur, image forensics, security agent
22Neerja Bhatnagar, Ethan L. Miller Designing a secure reliable file system for sensor networks. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sensor network file system, secure, reliable
22Yongdong Wu Tamper-Localization Watermarking with Systematic Error Correcting Code. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Weiqi Luo 0001, Jiwu Huang, Guoping Qiu Robust Detection of Region-Duplication Forgery in Digital Image. Search on Bibsonomy ICPR (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Hongxia Jin Higher Dependability and Security for Mobile Applications. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Weihong Wang, Hany Farid Exposing digital forgeries in video by detecting double MPEG compression. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital tamperin, digital forensics
22Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai, David A. Wagner 0001 Private Circuits II: Keeping Secrets in Tamperable Circuits. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Farinaz Koushanfar, Inki Hong, Miodrag Potkonjak Behavioral synthesis techniques for intellectual property protection. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF watermarking, behavioral synthesis, Intellectual property protection
22Aydan R. Yumerefendi, Jeffrey S. Chase Trust but verify: accountability for network services. Search on Bibsonomy ACM SIGOPS European Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Alin C. Popescu, Hany Farid Statistical Tools for Digital Forensics. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Ee-Chien Chang, Mohan S. Kankanhalli, Xin Guan, Zhiyong Huang, Yinghui Wu Robust image authentication using content based compression. Search on Bibsonomy Multim. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Security, Wavelets, Watermarking, Digital signature, Signal processing
22G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas AEGIS: architecture for tamper-evident and tamper-resistant processing. Search on Bibsonomy ICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF software licensing, secure processors, certified execution
22Paolo Maggi, Riccardo Sisto A configurable mobile agent data protection protocol. Search on Bibsonomy AAMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mobile agents, data integrity, cryptographic protocols, data authenticity
22Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg Natural Language Watermarking and Tamperproofing. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Liehua Xie, Gonzalo R. Arce, R. F. Graveman Approximate image message authentication codes. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Faisal Alturki, Russell M. Mersereau Secure fragile digital watermarking technique for image authentication. Search on Bibsonomy ICIP (3) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Shuihua Han, Stephen Leung, Zongwei Luo Tamper Detection in the EPC Network Using Digital Watermarking. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF data tampering, RFID, watermarking, EPC
21Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data integrity, web application, web based-systems, HMAC, security vulnerabilities, tampering, Web authentication
21Xinpeng Zhang 0001, Shuozhong Wang, Guorui Feng Fragile Watermarking Scheme with Extensive Content Restoration Capability. Search on Bibsonomy IWDW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF content restoration, tampering rate, fragile watermarking
21Eric Kee, Hany Farid Printer profiling for forensics and ballistics. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF document authentication, printer ballistics, digital forensics, digital tampering
21Weihong Wang, Hany Farid Detecting Re-projected Video. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Digital Forensics, Digital Tampering
21Walter Geisselhardt, Taswar Iqbal High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart IDs, data tampering, entertainment tickets protection, printing scanning, 2-D Bar codes, HD-DataStripe, data encoding in background images, biometrics, watermarking, copy detection, counterfeiting, halftone images
21Yun Q. Shi 0001, Chunhua Chen 0001, Guorong Xuan, Wei Su 0001 Steganalysis Versus Splicing Detection. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF splicing detection, natural image model, Steganography, steganalysis, digital forensics, tampering detection
21Ross J. Anderson On the Security of Digital Tachographs. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF tachographs, smartcard, fraud, tampering
17Zihan Yuan, Xinpeng Zhang 0001, Zichi Wang, Zhaoxia Yin Semi-fragile neural network watermarking for content authentication and tampering localization. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Ifeoluwapo Aribilola, Brian Lee 0001, Mamoona Naveed Asghar Pixel tampering detection in encrypted surveillance videos on resource-constrained devices. Search on Bibsonomy Internet Things The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Victor Fedoseev, Anna Denisova A Reversible Medical Image Watermarking Scheme for Advanced Image Tampering Detection. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Ankit Yadav, Dhruv Gupta, Dinesh Kumar Vishwakarma Uncovering visual attention-based multi-level tampering traces for face forgery detection. Search on Bibsonomy Signal Image Video Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Zhihui Zhao, Sen Zhao, Fei Lyu 0001, Shuaizong Si, Hongsong Zhu, Limin Sun RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Sunen Chakraborty, Kingshuk Chatterjee, Paramita Dey Detection of Image Tampering Using Deep Learning, Error Levels and Noise Residuals. Search on Bibsonomy Neural Process. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Amal Hammami, Amal Ben Hamida, Chokri Ben Amar, Henri Nicolas Blind Semi-fragile Hybrid Domain-Based Dual Watermarking System for Video Authentication and Tampering Localization. Search on Bibsonomy Circuits Syst. Signal Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Tao Chen, Zhitao Liu, Hongye Su Tampering attack detection for remote interval observer. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Li Dong 0006, Weipeng Liang, Rangding Wang Robust Text Image Tampering Localization via Forgery Traces Enhancement and Multiscale Attention. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Guandong Li, Xian Yang, Wenpin Ma A Two-Stage Dual-Path Framework for Text Tampering Detection and Recognition. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Giovanni Pasqualino, Luca Guarnera, Alessandro Ortis, Sebastiano Battiato MITS-GAN: Safeguarding Medical Imaging from Tampering with Generative Adversarial Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Ian D. Kretz, Clare C. Parran, John D. Ramsdell, Paul D. Rowe Evidence Tampering and Chain of Custody in Layered Attestations. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Junlin Gu, Yihan Xu, Juan Sun, Weiwei Liu Image tampering detection based on feature consistency attention. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Eunseok Lee 0002, Xibi Chen, Maitreyi Ashok, Jae-Yeon Won, Anantha P. Chandrakasan, Ruonan Han 0001 12.5 A Packageless Anti-Tampering Tag Utilizing Unclonable Sub-THz Wave Scattering at the Chip-Item Interface. Search on Bibsonomy ISSCC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Alexander Naumann, Felix Hertlein, Laura Dörr, Kai Furmans TAMPAR: Visual Tampering Detection for Parcel Logistics in Postal Supply Chains. Search on Bibsonomy WACV The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Marco Fabris, Daniel Zelazo A Robustness Analysis to Structured Channel Tampering Over Secure-by-Design Consensus Networks. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Xiaofan Xia, Songsong Zhang, Kunshu Wang, Tiegang Gao A novel color image tampering detection and self-recovery based on fragile watermarking. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 806 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license