The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for tampering with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1999 (18) 2000-2001 (17) 2002-2003 (32) 2004 (20) 2005 (33) 2006 (44) 2007 (56) 2008 (55) 2009 (29) 2010 (18) 2011 (23) 2012 (16) 2013 (22) 2014 (29) 2015 (23) 2016 (31) 2017 (35) 2018 (43) 2019 (53) 2020 (47) 2021 (50) 2022 (47) 2023 (50) 2024 (15)
Publication types (Num. hits)
article(319) incollection(2) inproceedings(481) phdthesis(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 323 occurrences of 220 keywords

Results
Found 806 publication records. Showing 806 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Shangde Gao, Xin Liao, Xuchong Liu Real-time detecting one specific tampering operation in multiple operator chains. Search on Bibsonomy J. Real Time Image Process. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Alejandro Cabrera Aldaya, Billy Bob Brumley, Alejandro Cabrera Sarmiento, Santiago Sánchez-Solano Memory Tampering Attack on Binary GCD Based Inversion Algorithms. Search on Bibsonomy Int. J. Parallel Program. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Robin Elizabeth Yancey Bilinear Faster RCNN with ELA for Image Tampering Detection. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
17Tom Everitt, Marcus Hutter Reward Tampering Problems and Solutions in Reinforcement Learning: A Causal Influence Diagram Perspective. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
17Erwan Le Merrer, Gilles Trédan TamperNN: Efficient Tampering Detection of Deployed Neural Nets. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
17Ayush Jain 0002, Ziqi Zhou, Ujjwal Guin TAAL: Tampering Attack on Any Key-based Logic Locked Circuits. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
17Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
17Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang Non-Malleable Secret Sharing against Affine Tampering. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
17Lianying Zhao, Mohammad Mannan TEE-aided Write Protection Against Privileged Data Tampering. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
17Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
17Antonio Faonio, Daniele Venturi 0001 Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
17Wenbo Xing, Zhichun Du 数字图像复制粘贴篡改取证 (Digital Image Forensics for Copy and Paste Tampering). Search on Bibsonomy 计算机科学 The full citation details ... 2019 DBLP  BibTeX  RDF
17Yuejun Liu, Rui Zhang 0002, Yongbin Zhou Predicate encryption against master-key tampering attacks. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Shruti Singhania, Arju N. A, Raina Singh Image Tampering Detection Using Convolutional Neural Network. Search on Bibsonomy Int. J. Synth. Emot. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Rajesh Kumar Shrivastava, Sanket Mishra, V. E. Archana, Chittaranjan Hota Preventing data tampering in IoT networks. Search on Bibsonomy ANTS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Flavio Toffalini, Martín Ochoa, Jun Sun 0001, Jianying Zhou 0001 Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Keyu Sun, Gang Cao, Qian Zhao, Jianglong Zhang Differential Abnormality-Based Tampering Detection in Digital Document Images. Search on Bibsonomy ICIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Junaid Iqbal, Ratinder Kaur, Natalia Stakhanova PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2019 DBLP  BibTeX  RDF
17Lianying Zhao, Mohammad Mannan TEE-aided Write Protection Against Privileged Data Tampering. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
17Chen Li 0033, Yamei Sun, Xuebo Meng, Lihua Tian Homologous Audio Copy-move Tampering Detection Method Based on Pitch. Search on Bibsonomy ICCT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Sipei Zhou, Yiliang Tang, Yiwen Wu, Yunkai Wei, Supeng Leng Capability Modeling of Information Deceiving and Achieving in Message Tampering Confrontations. Search on Bibsonomy ICCT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Elena-Carmen Tentea, Valeriu Manuel Ionescu Online quiz implementation using blockchain technology for result tampering prevention. Search on Bibsonomy ECAI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Mubashar Iqbal 0001, Raimundas Matulevicius Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk. Search on Bibsonomy BPM (Blockchain and CEE Forum) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Erwan Le Merrer, Gilles Trédan TamperNN: Efficient Tampering Detection of Deployed Neural Nets. Search on Bibsonomy ISSRE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Pranav Mantini, Shishir K. Shah UHCTD: A Comprehensive Dataset for Camera Tampering Detection. Search on Bibsonomy AVSS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Diptendu Mohan Kar, Indrajit Ray That's My DNA: Detecting Malicious Tampering of Synthesized DNA. Search on Bibsonomy DBSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin Non-Malleable Codes Against Bounded Polynomial Time Tampering. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Vineet Mishra, Stephen S. Yau, Chandralekha Yenugunti Recovering Decentralized Critical Archival Data From Tampering in Smart City Environment Using Blockchain. Search on Bibsonomy SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Han Pu, Tianqiang Huang, Gongde Guo, Bin Weng 0001, Lijun You Video Tampering Detection Algorithm Based on Spatial Constraints and Stable Feature. Search on Bibsonomy UKCI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Puspita Majumdar, Akshay Agarwal 0001, Richa Singh 0001, Mayank Vatsa Evading Face Recognition via Partial Tampering of Faces. Search on Bibsonomy CVPR Workshops The full citation details ... 2019 DBLP  BibTeX  RDF
17Xiuru Hua, Weimin Wei, Siqian Li, Xueling Chu Image Copy-Paste Tampering Detection Based on Superpixel Segmentation and Feature Extraction Algorithm. Search on Bibsonomy CISP-BMEI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Mohamed Alji, Khalid Chougdali Detection of Timestamps Tampering in NTFS using Machine Learning. Search on Bibsonomy EUSPN/ICTH The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Wei Zhang 0128, Bing Bu, Hongwei Wang 0008 An Intrusion Detection Method of Data Tampering Attack in Communication-Based Train Control System. Search on Bibsonomy ITSC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Yi Shen, Lu Zhang Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis. Search on Bibsonomy ADHIP (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Boubacar Diallo, Thierry Urruty, Pascal Bourdon, Christine Fernandez-Maloigne Improving Robustness of Image Tampering Detection for Compression. Search on Bibsonomy MMM (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Suvradip Chakraborty, C. Pandu Rangan Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Kritika Rani, Chinmay Sharma Tampering Detection of Distributed Databases using Blockchain Technology. Search on Bibsonomy IC3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Patrick Mabadie, Marcel Ohanga Odhiambo Implementation of Current Capacitance Resonant Circuit to Monitor Telecommunication and Utility Cable Tampering. Search on Bibsonomy ICTAS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Antonio Faonio, Daniele Venturi 0001 Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. Search on Bibsonomy CRYPTO (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Divya Gupta 0001, Hemanta K. Maji, Mingyuan Wang 0001 Explicit Rate-1 Non-malleable Codes for Local Tampering. Search on Bibsonomy CRYPTO (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Pranav Mantini, Shishir K. Shah Camera Tampering Detection using Generative Reference Model and Deep Learned Features. Search on Bibsonomy VISIGRAPP (5: VISAPP) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Ahmad M. Nagm, Mohamed Torky, Mohammed Mahmoud Abo Ghazala, Hosam Eldin Fawzan Sayed Image Protection Against Forgery and Pixel Tampering Based on a Triple Hybrid Security Approach. Search on Bibsonomy AISI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Pamela Johnston Beyond the pixels: learning and utilising video compression features for localisation of digital tampering. Search on Bibsonomy 2019   RDF
17Sowmya K. N., H. R. Chennamma, Lalitha Rangarajan Video authentication using spatio temporal relationship for tampering detection. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Ye Yao, Cai-Xia Yu, Li Yang, Chin-Chen Chang 0001 Computer-Aided Annotation for Video Tampering Dataset of Forensic Research. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2018 DBLP  BibTeX  RDF
17Felix C. Freiling, Leonhard Hösch Controlled experiments in digital evidence tampering. Search on Bibsonomy Digit. Investig. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17G. Deepa, P. Santhi Thilagam, Furqan Ahmed Khan, Amit Praseed, Alwyn R. Pais, Nushafreen Palsetia Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17S. Periyanayagi, V. Sumathy Swarm-based defense technique for tampering and cheating attack in WSN using CPHS. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17V. T. Manu, Babu M. Mehtre Copy-move tampering detection using affine transformation property preservation on clustered keypoints. Search on Bibsonomy Signal Image Video Process. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Vahideh Amanipour, Shahrokh Ghaemmaghami Video-Tampering Detection and Content Reconstruction via Self-Embedding. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Haichao Chen, Yan Wo, Guoqiang Han Multi-granularity geometrically robust video hashing for tampering detection. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Chi-Man Pun, Cai-Ping Yan, Xiaochen Yuan Robust image hashing using progressive feature selection for tampering detection. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Chuan Qin 0001, Ping Ji 0004, Chin-Chen Chang 0001, Jing Dong 0003, Xingming Sun Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery. Search on Bibsonomy IEEE Multim. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Nicoletta Noceti, Luca Zini, Francesca Odone A multi-camera system for damage and tampering detection in a postal security framework. Search on Bibsonomy EURASIP J. Image Video Process. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Priyanka Singh, Balasubramanian Raman, Nishant Agarwal Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17V. Thirunavukkarasu, J. Satheeshkumar 0001, Gyoo-Soo Chae, J. Kishorkumar Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Ye Yao Computer-Aided Annotation for Video Tampering Dataset of Forensic Research. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
17Michele Alberti, Vinaychandran Pondenkandath, Marcel Würsch, Manuel Bouillon, Mathias Seuret, Rolf Ingold, Marcus Liwicki Are You Tampering With My Data? Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
17Saeed Mahloujifar, Mohammad Mahmoody, Ameer Mohammed Multi-party Poisoning through Generalized p-Tampering. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
17Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin Non-Malleable Codes Against Bounded Polynomial Time Tampering. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
17Saeed Mahloujifar, Mohammad Mahmoody, Ameer Mohammed Multi-party Poisoning through Generalized p-Tampering. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
17Suvradip Chakraborty, C. Pandu Rangan Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
17K. R. Chetan, Shivananda Nirmala An Adaptive Curvelet Based Semi-Fragile Watermarking Scheme for Effective and Intelligent Tampering Classification and Recovery of Digital Images. Search on Bibsonomy Int. J. Rough Sets Data Anal. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Jürgen Pfeffer, Katja Mayer, Fred Morstatter Tampering with Twitter's Sample API. Search on Bibsonomy EPJ Data Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Richard Skowyra, Lei Xu 0024, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi, James Landry Effective Topology Tampering Attacks and Defenses in Software-Defined Networks. Search on Bibsonomy DSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Xuping Huang Mechanism and Implementation of Watermarked Sample Scanning Method for Speech Data Tampering Detection. Search on Bibsonomy MPS@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Heeseo Chae, Chang Seong Lee, Tae Hyoung Kim The Anti-tampering Process and Case Study by the Operating Mode of Various Unmanned Ground Vehicles. Search on Bibsonomy AIM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Darshit Mehta, Liang Zhou 0004, Kenji Aono, Shantanu Chakrabartty Self-powered Sensing and Time-Stamping of Tampering Events. Search on Bibsonomy MWSCAS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Daniel Ziener, Jutta Pirkl, Jürgen Teich Configuration Tampering of BRAM-based AES Implementations on FPGAs. Search on Bibsonomy ReConFig The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody Learning under $p$-Tampering Attacks. Search on Bibsonomy ALT The full citation details ... 2018 DBLP  BibTeX  RDF
17Yashas Annadani, C. V. Jawahar Augment and Adapt: A Simple Approach to Image Tampering Detection. Search on Bibsonomy ICPR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Francisco Cruz 0003, Nicolas Sidère, Mickaël Coustaty, Vincent Poulain D'Andecy, Jean-Marc Ogier Categorization of Document Image Tampering Techniques and How to Identify Them. Search on Bibsonomy CVAUI/IWCF/MIPPSNA@ICPR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Quentin Bammey, Rafael Grompone von Gioi, Jean-Michel Morel Automatic Detection of Demosaicing Image Artifacts and Its Use in Tampering Detection. Search on Bibsonomy MIPR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Alexey Sidnev, Marina Barinova, Sergei Nosov Efficient Camera Tampering Detection with Automatic Parameter Calibration. Search on Bibsonomy AVSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson Malicious IoT Implants: Tampering with Serial Communication over the Internet. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin Non-malleable Codes from Average-Case Hardness: $${\mathsf {A}}{\mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering. Search on Bibsonomy EUROCRYPT (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, Dong Hoon Lee Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Mitchell B. Singleton, Qingzhong Liu Detecting Digital Photo Tampering with Deep Learning. Search on Bibsonomy MLICOM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Divya Gupta 0001, Hemanta K. Maji, Mingyuan Wang 0001 Non-malleable Codes Against Lookahead Tampering. Search on Bibsonomy INDOCRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Bardia Azizian, Shahrokh Ghaemmaghami Tampering Detection and Restoration of Compressed Video. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Pamela Johnston, Eyad Elyan, Chrisina Jayne Toward Video Tampering Exposure: Inferring Compression Parameters from Pixels. Search on Bibsonomy EANN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Michele Alberti, Vinaychandran Pondenkandath, Marcel Würsch, Manuel Bouillon, Mathias Seuret, Rolf Ingold, Marcus Liwicki Are You Tampering with My Data? Search on Bibsonomy ECCV Workshops (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody Learning under p-Tampering Attacks. Search on Bibsonomy ISAIM The full citation details ... 2018 DBLP  BibTeX  RDF
17Dongsheng Li 0002, Yingying Zhao, Yawen Zhang, Qin Lv, Li Shang An Algorithmic Method for Tampering-Proof and Privacy-Preserving Smart Metering. Search on Bibsonomy INDIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17James Wagner, Alexander Rasin, Tanu Malik, Karen Heart, Jacob D. Furst, Jonathan Grier Detecting Database File Tampering through Page Carving. Search on Bibsonomy EDBT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Diego Renza, Camilo Lemus, Dora M. Ballesteros L. Audio Authenticity and Tampering Detection based on Information Hiding and Collatz p-bit Code. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2017 DBLP  BibTeX  RDF
17Farzad Rajaei Salmasi A Self-Healing Induction Motor Drive With Model Free Sensor Tampering and Sensor Fault Detection, Isolation, and Compensation. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Priyanka Singh, Balasubramanian Raman, Nishant Agarwal, Pradeep K. Atrey Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Xuping Huang, Nobutaka Ono, Akira Nishimura, Isao Echizen Reversible Audio Information Hiding for Tampering Detection and Localization Using Sample Scanning Method. Search on Bibsonomy J. Inf. Process. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Oussama Benrhouma, Houcemeddine Hermassi, Safya Belghith Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Javad Abbasi Aghamaleki, Alireza Behrad Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Mahdi Cheraghchi, Venkatesan Guruswami Non-malleable Coding Against Bit-Wise and Split-State Tampering. Search on Bibsonomy J. Cryptol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Shifeng Sun 0001, Dawu Gu, Udaya Parampalli, Yu Yu 0001, Baodong Qin Public key encryption resilient to leakage and tampering attacks. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Raahat Devender Singh, Naveen Aggarwal Optical Flow and Prediction Residual Based Hybrid Forensic System for Inter-Frame Tampering Detection. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Xiaodan Lin, Xiangui Kang Exposing speech tampering via spectral phase analysis. Search on Bibsonomy Digit. Signal Process. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody Learning under p-Tampering Attacks. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
17Chi-Man Pun, Cai-Ping Yan, Xiaochen Yuan Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Pawel Korus, Jiwu Huang Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Haodong Li 0001, Weiqi Luo 0001, Xiaoqing Qiu, Jiwu Huang Image Forgery Localization via Integrating Tampering Possibility Maps. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 806 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license