Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Shangde Gao, Xin Liao, Xuchong Liu |
Real-time detecting one specific tampering operation in multiple operator chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Real Time Image Process. ![In: J. Real Time Image Process. 16(3), pp. 741-750, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Alejandro Cabrera Aldaya, Billy Bob Brumley, Alejandro Cabrera Sarmiento, Santiago Sánchez-Solano |
Memory Tampering Attack on Binary GCD Based Inversion Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Parallel Program. ![In: Int. J. Parallel Program. 47(4), pp. 621-640, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Robin Elizabeth Yancey |
Bilinear Faster RCNN with ELA for Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.08484, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Tom Everitt, Marcus Hutter |
Reward Tampering Problems and Solutions in Reinforcement Learning: A Causal Influence Diagram Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1908.04734, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Erwan Le Merrer, Gilles Trédan |
TamperNN: Efficient Tampering Detection of Deployed Neural Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1903.00317, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Ayush Jain 0002, Ziqi Zhou, Ujjwal Guin |
TAAL: Tampering Attack on Any Key-based Logic Locked Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1909.07426, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte |
EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.09516, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang |
Non-Malleable Secret Sharing against Affine Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1902.06195, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Lianying Zhao, Mohammad Mannan |
TEE-aided Write Protection Against Privileged Data Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1905.10723, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici |
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1901.03597, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Antonio Faonio, Daniele Venturi 0001 |
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 105, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Wenbo Xing, Zhichun Du |
数字图像复制粘贴篡改取证 (Digital Image Forensics for Copy and Paste Tampering). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 46(6A), pp. 380-384, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Yuejun Liu, Rui Zhang 0002, Yongbin Zhou |
Predicate encryption against master-key tampering attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecur. ![In: Cybersecur. 2(1), pp. 22, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Shruti Singhania, Arju N. A, Raina Singh |
Image Tampering Detection Using Convolutional Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Synth. Emot. ![In: Int. J. Synth. Emot. 10(1), pp. 54-63, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Rajesh Kumar Shrivastava, Sanket Mishra, V. E. Archana, Chittaranjan Hota |
Preventing data tampering in IoT networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS ![In: 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2019, Goa, India, December 16-19, 2019, pp. 1-6, 2019, IEEE, 978-1-7281-3715-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Flavio Toffalini, Martín Ochoa, Jun Sun 0001, Jianying Zhou 0001 |
Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019, pp. 231-242, 2019, ACM, 978-1-4503-6099-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Keyu Sun, Gang Cao, Qian Zhao, Jianglong Zhang |
Differential Abnormality-Based Tampering Detection in Digital Document Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: 18th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2019, Beijing, China, June 17-19, 2019, pp. 145-149, 2019, IEEE, 978-1-7281-0801-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Junaid Iqbal, Ratinder Kaur, Natalia Stakhanova |
PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019., pp. 17:1-17:10, 2019, ACM, 978-1-4503-7164-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici |
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019., pp. 461-478, 2019, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Lianying Zhao, Mohammad Mannan |
TEE-aided Write Protection Against Privileged Data Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019, 2019, The Internet Society, 1-891562-55-X. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Chen Li 0033, Yamei Sun, Xuebo Meng, Lihua Tian |
Homologous Audio Copy-move Tampering Detection Method Based on Pitch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCT ![In: 19th IEEE International Conference on Communication Technology, ICCT 2019, Xi'an, China, October 16-19, 2019, pp. 530-534, 2019, IEEE, 978-1-7281-0535-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Sipei Zhou, Yiliang Tang, Yiwen Wu, Yunkai Wei, Supeng Leng |
Capability Modeling of Information Deceiving and Achieving in Message Tampering Confrontations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCT ![In: 19th IEEE International Conference on Communication Technology, ICCT 2019, Xi'an, China, October 16-19, 2019, pp. 1311-1316, 2019, IEEE, 978-1-7281-0535-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Elena-Carmen Tentea, Valeriu Manuel Ionescu |
Online quiz implementation using blockchain technology for result tampering prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAI ![In: 11th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2019, Pitesti, Romania, June 27-29, 2019, pp. 1-6, 2019, IEEE, 978-1-7281-1624-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Mubashar Iqbal 0001, Raimundas Matulevicius |
Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BPM (Blockchain and CEE Forum) ![In: Business Process Management: Blockchain and Central and Eastern Europe Forum - BPM 2019 Blockchain and CEE Forum, Vienna, Austria, September 1-6, 2019, Proceedings, pp. 13-28, 2019, Springer, 978-3-030-30428-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Erwan Le Merrer, Gilles Trédan |
TamperNN: Efficient Tampering Detection of Deployed Neural Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 30th IEEE International Symposium on Software Reliability Engineering, ISSRE 2019, Berlin, Germany, October 28-31, 2019, pp. 424-434, 2019, IEEE, 978-1-7281-4982-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Pranav Mantini, Shishir K. Shah |
UHCTD: A Comprehensive Dataset for Camera Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: 16th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2019, Taipei, Taiwan, September 18-21, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-0990-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Diptendu Mohan Kar, Indrajit Ray |
That's My DNA: Detecting Malicious Tampering of Synthesized DNA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security and Privacy XXXIII - 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings, pp. 61-80, 2019, Springer, 978-3-030-22478-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin |
Non-Malleable Codes Against Bounded Polynomial Time Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I, pp. 501-530, 2019, Springer, 978-3-030-17652-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Vineet Mishra, Stephen S. Yau, Chandralekha Yenugunti |
Recovering Decentralized Critical Archival Data From Tampering in Smart City Environment Using Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI ![In: 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019, Leicester, United Kingdom, August 19-23, 2019, pp. 1972-1977, 2019, IEEE, 978-1-7281-4034-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Han Pu, Tianqiang Huang, Gongde Guo, Bin Weng 0001, Lijun You |
Video Tampering Detection Algorithm Based on Spatial Constraints and Stable Feature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UKCI ![In: Advances in Computational Intelligence Systems - Contributions Presented at the 19th UK Workshop on Computational Intelligence, September 4-6, 2019, Portsmouth, UK, pp. 541-553, 2019, Springer, 978-3-030-29932-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Puspita Majumdar, Akshay Agarwal 0001, Richa Singh 0001, Mayank Vatsa |
Evading Face Recognition via Partial Tampering of Faces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR Workshops ![In: IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops 2019, Long Beach, CA, USA, June 16-20, 2019, pp. 11-20, 2019, Computer Vision Foundation / IEEE. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Xiuru Hua, Weimin Wei, Siqian Li, Xueling Chu |
Image Copy-Paste Tampering Detection Based on Superpixel Segmentation and Feature Extraction Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISP-BMEI ![In: 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2019, Suzhou, China, October 19-21, 2019, pp. 1-6, 2019, IEEE, 978-1-7281-4852-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Mohamed Alji, Khalid Chougdali |
Detection of Timestamps Tampering in NTFS using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSPN/ICTH ![In: The 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, Coimbra, Portugal, November 4-7, 2019., pp. 778-784, 2019, Elsevier. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Wei Zhang 0128, Bing Bu, Hongwei Wang 0008 |
An Intrusion Detection Method of Data Tampering Attack in Communication-Based Train Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITSC ![In: 2019 IEEE Intelligent Transportation Systems Conference, ITSC 2019, Auckland, New Zealand, October 27-30, 2019, pp. 345-350, 2019, IEEE, 978-1-5386-7024-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Yi Shen, Lu Zhang |
Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHIP (2) ![In: Advanced Hybrid Information Processing - Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21-22, 2019, Proceedings, Part II, pp. 82-89, 2019, Springer, 978-3-030-36404-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Boubacar Diallo, Thierry Urruty, Pascal Bourdon, Christine Fernandez-Maloigne |
Improving Robustness of Image Tampering Detection for Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM (1) ![In: MultiMedia Modeling - 25th International Conference, MMM 2019, Thessaloniki, Greece, January 8-11, 2019, Proceedings, Part I, pp. 387-398, 2019, Springer, 978-3-030-05709-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Suvradip Chakraborty, C. Pandu Rangan |
Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings, pp. 23-43, 2019, Springer, 978-3-030-12611-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Kritika Rani, Chinmay Sharma |
Tampering Detection of Distributed Databases using Blockchain Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3 ![In: 2019 Twelfth International Conference on Contemporary Computing, IC3 2019, Noida, India, August 8-10, 2019, pp. 1-4, 2019, IEEE, 978-1-7281-3591-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Patrick Mabadie, Marcel Ohanga Odhiambo |
Implementation of Current Capacitance Resonant Circuit to Monitor Telecommunication and Utility Cable Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAS ![In: Conference on Information Communications Technology and Society, ICTAS 2019, Durban, South Africa, March 6-8, 2019, pp. 1-6, 2019, IEEE, 978-1-5386-7365-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Antonio Faonio, Daniele Venturi 0001 |
Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (2) ![In: Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part II, pp. 448-479, 2019, Springer, 978-3-030-26950-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Divya Gupta 0001, Hemanta K. Maji, Mingyuan Wang 0001 |
Explicit Rate-1 Non-malleable Codes for Local Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part I, pp. 435-466, 2019, Springer, 978-3-030-26947-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Pranav Mantini, Shishir K. Shah |
Camera Tampering Detection using Generative Reference Model and Deep Learned Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VISIGRAPP (5: VISAPP) ![In: Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, VISIGRAPP 2019, Volume 5: VISAPP, Prague, Czech Republic, February 25-27, 2019., pp. 85-95, 2019, SciTePress, 978-989-758-354-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Ahmad M. Nagm, Mohamed Torky, Mohammed Mahmoud Abo Ghazala, Hosam Eldin Fawzan Sayed |
Image Protection Against Forgery and Pixel Tampering Based on a Triple Hybrid Security Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISI ![In: Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019, AISI 2019, Cairo, Egypt, 26-28 October 2019., pp. 588-597, 2019, Springer, 978-3-030-31128-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Pamela Johnston |
Beyond the pixels: learning and utilising video compression features for localisation of digital tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
17 | Sowmya K. N., H. R. Chennamma, Lalitha Rangarajan |
Video authentication using spatio temporal relationship for tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 41, pp. 159-169, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Ye Yao, Cai-Xia Yu, Li Yang, Chin-Chen Chang 0001 |
Computer-Aided Annotation for Video Tampering Dataset of Forensic Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 9(3), pp. 768-774, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Felix C. Freiling, Leonhard Hösch |
Controlled experiments in digital evidence tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 24 Supplement, pp. S83-S92, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | G. Deepa, P. Santhi Thilagam, Furqan Ahmed Khan, Amit Praseed, Alwyn R. Pais, Nushafreen Palsetia |
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 17(1), pp. 105-120, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | S. Periyanayagi, V. Sumathy |
Swarm-based defense technique for tampering and cheating attack in WSN using CPHS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 22(5-6), pp. 1165-1179, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | V. T. Manu, Babu M. Mehtre |
Copy-move tampering detection using affine transformation property preservation on clustered keypoints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Image Video Process. ![In: Signal Image Video Process. 12(3), pp. 549-556, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Vahideh Amanipour, Shahrokh Ghaemmaghami |
Video-Tampering Detection and Content Reconstruction via Self-Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Instrum. Meas. ![In: IEEE Trans. Instrum. Meas. 67(3), pp. 505-515, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Haichao Chen, Yan Wo, Guoqiang Han |
Multi-granularity geometrically robust video hashing for tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 77(5), pp. 5303-5321, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Chi-Man Pun, Cai-Ping Yan, Xiaochen Yuan |
Robust image hashing using progressive feature selection for tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 77(10), pp. 11609-11633, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Chuan Qin 0001, Ping Ji 0004, Chin-Chen Chang 0001, Jing Dong 0003, Xingming Sun |
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Multim. ![In: IEEE Multim. 25(3), pp. 36-48, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Nicoletta Noceti, Luca Zini, Francesca Odone |
A multi-camera system for damage and tampering detection in a postal security framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Image Video Process. ![In: EURASIP J. Image Video Process. 2018, pp. 11, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Priyanka Singh, Balasubramanian Raman, Nishant Agarwal |
Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 28(9), pp. 2116-2130, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | V. Thirunavukkarasu, J. Satheeshkumar 0001, Gyoo-Soo Chae, J. Kishorkumar |
Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 98(4), pp. 3039-3057, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Ye Yao |
Computer-Aided Annotation for Video Tampering Dataset of Forensic Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1802.02308, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Michele Alberti, Vinaychandran Pondenkandath, Marcel Würsch, Manuel Bouillon, Mathias Seuret, Rolf Ingold, Marcus Liwicki |
Are You Tampering With My Data? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1808.06809, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Saeed Mahloujifar, Mohammad Mahmoody, Ameer Mohammed |
Multi-party Poisoning through Generalized p-Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1809.03474, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin |
Non-Malleable Codes Against Bounded Polynomial Time Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 1015, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Saeed Mahloujifar, Mohammad Mahmoody, Ameer Mohammed |
Multi-party Poisoning through Generalized p-Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 854, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Suvradip Chakraborty, C. Pandu Rangan |
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 883, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | K. R. Chetan, Shivananda Nirmala |
An Adaptive Curvelet Based Semi-Fragile Watermarking Scheme for Effective and Intelligent Tampering Classification and Recovery of Digital Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Rough Sets Data Anal. ![In: Int. J. Rough Sets Data Anal. 5(2), pp. 69-94, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Jürgen Pfeffer, Katja Mayer, Fred Morstatter |
Tampering with Twitter's Sample API. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPJ Data Sci. ![In: EPJ Data Sci. 7(1), pp. 50:1-50:21, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Richard Skowyra, Lei Xu 0024, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi, James Landry |
Effective Topology Tampering Attacks and Defenses in Software-Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, Luxembourg City, Luxembourg, June 25-28, 2018, pp. 374-385, 2018, IEEE Computer Society, 978-1-5386-5596-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Xuping Huang |
Mechanism and Implementation of Watermarked Sample Scanning Method for Speech Data Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MPS@CCS ![In: Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018, pp. 54-60, 2018, ACM, 978-1-4503-5988-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Heeseo Chae, Chang Seong Lee, Tae Hyoung Kim |
The Anti-tampering Process and Case Study by the Operating Mode of Various Unmanned Ground Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIM ![In: 2018 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, AIM 2018, Auckland, New Zealand, July 9-12, 2018, pp. 1432-1437, 2018, IEEE, 978-1-5386-1854-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Darshit Mehta, Liang Zhou 0004, Kenji Aono, Shantanu Chakrabartty |
Self-powered Sensing and Time-Stamping of Tampering Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWSCAS ![In: IEEE 61st International Midwest Symposium on Circuits and Systems, MWSCAS 2018, Windsor, ON, Canada, August 5-8, 2018, pp. 968-971, 2018, IEEE, 978-1-5386-7392-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Ziener, Jutta Pirkl, Jürgen Teich |
Configuration Tampering of BRAM-based AES Implementations on FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ReConFig ![In: 2018 International Conference on ReConFigurable Computing and FPGAs, ReConFig 2018, Cancun, Mexico, December 3-5, 2018, pp. 1-7, 2018, IEEE, 978-1-7281-1968-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody |
Learning under $p$-Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALT ![In: Algorithmic Learning Theory, ALT 2018, 7-9 April 2018, Lanzarote, Canary Islands, Spain, pp. 572-596, 2018, PMLR. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Yashas Annadani, C. V. Jawahar |
Augment and Adapt: A Simple Approach to Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 24th International Conference on Pattern Recognition, ICPR 2018, Beijing, China, August 20-24, 2018, pp. 2983-2988, 2018, IEEE Computer Society, 978-1-5386-3788-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Francisco Cruz 0003, Nicolas Sidère, Mickaël Coustaty, Vincent Poulain D'Andecy, Jean-Marc Ogier |
Categorization of Document Image Tampering Techniques and How to Identify Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVAUI/IWCF/MIPPSNA@ICPR ![In: Pattern Recognition and Information Forensics - ICPR 2018 International Workshops, CVAUI, IWCF, and MIPPSNA, Beijing, China, August 20-24, 2018, Revised Selected Papers, pp. 117-124, 2018, Springer, 978-3-030-05791-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Quentin Bammey, Rafael Grompone von Gioi, Jean-Michel Morel |
Automatic Detection of Demosaicing Image Artifacts and Its Use in Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIPR ![In: IEEE 1st Conference on Multimedia Information Processing and Retrieval, MIPR 2018, Miami, FL, USA, April 10-12, 2018, pp. 424-429, 2018, IEEE, 978-1-5386-1857-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Alexey Sidnev, Marina Barinova, Sergei Nosov |
Efficient Camera Tampering Detection with Automatic Parameter Calibration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2018, Auckland, New Zealand, November 27-30, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-9294-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson |
Malicious IoT Implants: Tampering with Serial Communication over the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings, pp. 535-555, 2018, Springer, 978-3-030-00469-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin |
Non-malleable Codes from Average-Case Hardness: $${\mathsf {A}}{\mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (3) ![In: Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, pp. 618-650, 2018, Springer, 978-3-319-78371-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, Dong Hoon Lee |
Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings, pp. 141-161, 2018, Springer, 978-3-319-93410-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Mitchell B. Singleton, Qingzhong Liu |
Detecting Digital Photo Tampering with Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLICOM ![In: Machine Learning and Intelligent Communications - Third International Conference, MLICOM 2018, Hangzhou, China, July 6-8, 2018, Proceedings, pp. 480-489, 2018, Springer, 978-3-030-00556-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Divya Gupta 0001, Hemanta K. Maji, Mingyuan Wang 0001 |
Non-malleable Codes Against Lookahead Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings, pp. 307-328, 2018, Springer, 978-3-030-05377-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Bardia Azizian, Shahrokh Ghaemmaghami |
Tampering Detection and Restoration of Compressed Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCISC ![In: 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2018, Tehran, Iran, August 28-29, 2018, pp. 1-5, 2018, IEEE, 978-1-5386-7582-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Pamela Johnston, Eyad Elyan, Chrisina Jayne |
Toward Video Tampering Exposure: Inferring Compression Parameters from Pixels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EANN ![In: Engineering Applications of Neural Networks - 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings, pp. 44-57, 2018, Springer, 978-3-319-98203-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Michele Alberti, Vinaychandran Pondenkandath, Marcel Würsch, Manuel Bouillon, Mathias Seuret, Rolf Ingold, Marcus Liwicki |
Are You Tampering with My Data? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCV Workshops (2) ![In: Computer Vision - ECCV 2018 Workshops - Munich, Germany, September 8-14, 2018, Proceedings, Part II, pp. 296-312, 2018, Springer, 978-3-030-11011-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody |
Learning under p-Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAIM ![In: International Symposium on Artificial Intelligence and Mathematics, ISAIM 2018, Fort Lauderdale, Florida, USA, January 3-5, 2018., 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
17 | Dongsheng Li 0002, Yingying Zhao, Yawen Zhang, Qin Lv, Li Shang |
An Algorithmic Method for Tampering-Proof and Privacy-Preserving Smart Metering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDIN ![In: 16th IEEE International Conference on Industrial Informatics, INDIN 2018, Porto, Portugal, July 18-20, 2018, pp. 459-465, 2018, IEEE, 978-1-5386-4829-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | James Wagner, Alexander Rasin, Tanu Malik, Karen Heart, Jacob D. Furst, Jonathan Grier |
Detecting Database File Tampering through Page Carving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Proceedings of the 21st International Conference on Extending Database Technology, EDBT 2018, Vienna, Austria, March 26-29, 2018., pp. 121-132, 2018, OpenProceedings.org, 978-3-89318-078-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Diego Renza, Camilo Lemus, Dora M. Ballesteros L. |
Audio Authenticity and Tampering Detection based on Information Hiding and Collatz p-bit Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 8(6), pp. 1294-1304, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Farzad Rajaei Salmasi |
A Self-Healing Induction Motor Drive With Model Free Sensor Tampering and Sensor Fault Detection, Isolation, and Compensation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Electron. ![In: IEEE Trans. Ind. Electron. 64(8), pp. 6105-6115, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Priyanka Singh, Balasubramanian Raman, Nishant Agarwal, Pradeep K. Atrey |
Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Multim. Comput. Commun. Appl. ![In: ACM Trans. Multim. Comput. Commun. Appl. 13(3), pp. 23:1-23:23, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Xuping Huang, Nobutaka Ono, Akira Nishimura, Isao Echizen |
Reversible Audio Information Hiding for Tampering Detection and Localization Using Sample Scanning Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 25, pp. 469-476, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Oussama Benrhouma, Houcemeddine Hermassi, Safya Belghith |
Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 76(20), pp. 21133-21156, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Javad Abbasi Aghamaleki, Alireza Behrad |
Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 76(20), pp. 20691-20717, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Mahdi Cheraghchi, Venkatesan Guruswami |
Non-malleable Coding Against Bit-Wise and Split-State Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 30(1), pp. 191-241, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Shifeng Sun 0001, Dawu Gu, Udaya Parampalli, Yu Yu 0001, Baodong Qin |
Public key encryption resilient to leakage and tampering attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Syst. Sci. ![In: J. Comput. Syst. Sci. 89, pp. 142-156, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Raahat Devender Singh, Naveen Aggarwal |
Optical Flow and Prediction Residual Based Hybrid Forensic System for Inter-Frame Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Circuits Syst. Comput. ![In: J. Circuits Syst. Comput. 26(7), pp. 1750107:1-1750107:37, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Xiaodan Lin, Xiangui Kang |
Exposing speech tampering via spectral phase analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Signal Process. ![In: Digit. Signal Process. 60, pp. 63-74, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody |
Learning under p-Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1711.03707, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Chi-Man Pun, Cai-Ping Yan, Xiaochen Yuan |
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 12(2), pp. 377-391, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Pawel Korus, Jiwu Huang |
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 12(4), pp. 809-824, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Haodong Li 0001, Weiqi Luo 0001, Xiaoqing Qiu, Jiwu Huang |
Image Forgery Localization via Integrating Tampering Possibility Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 12(5), pp. 1240-1252, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|