Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Paulo Max Gil Innocencio Reis, João Paulo Carvalho Lustosa da Costa, Ricardo Kehrle Miranda, Giovanni Del Galdo |
ESPRIT-Hilbert-Based Audio Tampering Detection With SVM Classifier for Forensic Analysis via Electrical Network Frequency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 12(4), pp. 853-864, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi 0001 |
Non-Malleable Codes for Space-Bounded Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 530, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin |
Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1061, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Saeed Mahloujifar, Mohammad Mahmoody |
Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 950, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Vincent Haupert, Tilo Müller |
Rest in Protection - A Kernel-level Approach to Mitigate RIP Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017., pp. 25-37, 2017, SciTePress, 978-989-758-209-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Jianfeng Lu 0005, Peng Gao, Shanqing Zhang, Li Li 0014, Wenqiang Yuan, Qili Zhou |
Tampering Detection in Oral History Video Using Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS (1) ![In: Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I, pp. 98-109, 2017, Springer, 978-3-319-68504-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Jessada Karnjana, Kasorn Galajit, Pakinee Aimmanee, Chai Wutiwiwatchai, Masashi Unoki |
Speech watermarking scheme based on singular-spectrum analysis for tampering detection and identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSIPA ![In: 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2017, Kuala Lumpur, Malaysia, December 12-15, 2017, pp. 193-202, 2017, IEEE, 978-1-5386-1542-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing |
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITS ![In: Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings, pp. 1-25, 2017, Springer, 978-3-319-72088-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Saeed Mahloujifar, Mohammad Mahmoody |
Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (2) ![In: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II, pp. 245-279, 2017, Springer, 978-3-319-70502-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Xiaodan Lin, Xiangui Kang |
Supervised audio tampering detection using an autoregressive model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017, New Orleans, LA, USA, March 5-9, 2017, pp. 2142-2146, 2017, IEEE, 978-1-5090-4117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Songpon Teerakanok, Tetsutaro Uehara |
Digital Media Tampering Detection Techniques: An Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 2, pp. 170-174, 2017, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Takamichi Saito, Koki Yasuda, Kazuhisa Tanabe, Kazushi Takahashi |
Web Browser Tampering: Inspecting CPU Features from Side-Channel Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BWCCA ![In: Advances on Broad-Band Wireless Computing, Communication and Applications, Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, BWCCA 2017, Barcelona, Spain, November 8-10, 2017., pp. 392-403, 2017, Springer, 978-3-319-69810-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Kui Ye, Xiaobo Sun, Jindong Xu, Jing Dong 0003, Tieniu Tan |
Influence Evaluation for Image Tampering Using Saliency Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCCV (1) ![In: Computer Vision - Second CCF Chinese Conference, CCCV 2017, Tianjin, China, October 11-14, 2017, Proceedings, Part I, pp. 518-527, 2017, Springer, 978-981-10-7298-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Cédric Maigrot, Ewa Kijak, Ronan Sicre, Vincent Claveau |
Tampering Detection and Localization in Images from Social Networks: A CBIR Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP (1) ![In: Image Analysis and Processing - ICIAP 2017 - 19th International Conference, Catania, Italy, September 11-15, 2017, Proceedings, Part I, pp. 750-761, 2017, Springer, 978-3-319-68559-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Aras Asaad, Sabah Jassim |
Topological Data Analysis for Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings, pp. 136-146, 2017, Springer, 978-3-319-64184-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Shau-Yu Chou, Yu-Shiang Chen, Jun-Hao Chang, Yu-Der Chih, Tsung-Yung Jonathan Chang |
11.3 A 10nm 32Kb low-voltage logic-compatible anti-fuse one-time-programmable memory with anti-tampering sensing scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSCC ![In: 2017 IEEE International Solid-State Circuits Conference, ISSCC 2017, San Francisco, CA, USA, February 5-9, 2017, pp. 200-201, 2017, IEEE, 978-1-5090-3758-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Luca Bondi, Silvia Lameri, David Guera, Paolo Bestagini, Edward J. Delp, Stefano Tubaro |
Tampering Detection and Localization Through Clustering of Camera-Based CNN Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR Workshops ![In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops 2017, Honolulu, HI, USA, July 21-26, 2017, pp. 1855-1864, 2017, IEEE Computer Society, 978-1-5386-0733-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Bor-Chun Chen, Pallabi Ghosh, Vlad I. Morariu, Larry S. Davis |
Detection of Metadata Tampering Through Discrepancy Between Image Content and Metadata Using Multi-task Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR Workshops ![In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops 2017, Honolulu, HI, USA, July 21-26, 2017, pp. 1872-1880, 2017, IEEE Computer Society, 978-1-5386-0733-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Ali A. Elrowayati, Mohammad Faiz Liew Abdullah, Azizah Abd Manaf, Abdalrahman S. Alfagi |
Tampering detection of double-compression with the same quantization parameter in HEVC video streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSCE ![In: 7th IEEE International Conference on Control System, Computing and Engineering, ICCSCE 2017, Penang, Malaysia, November 24-26, 2017, pp. 174-179, 2017, IEEE, 978-1-5386-3897-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi 0001 |
Non-Malleable Codes for Space-Bounded Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (2) ![In: Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II, pp. 95-126, 2017, Springer, 978-3-319-63714-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Badal Soni, Pradip K. Das, Dalton Meitei Thounaojam |
Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCT ![In: Proceedings of the 7th International Conference on Computer and Communication Technology, ICCCT-2017, Allahabad, India, November 24-26, 2017, pp. 78-83, 2017, ACM, 978-1-4503-5324-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Pedro Garcia Freitas, Ronaldo Rigoni, Mylène C. Q. Farias |
Secure self-recovery watermarking scheme for error concealment and tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Braz. Comput. Soc. ![In: J. Braz. Comput. Soc. 22(1), pp. 5:1-5:13, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | K. Sitara, Babu M. Mehtre |
Digital video tampering detection: An overview of passive techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 18, pp. 8-22, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Cai-Ping Yan, Chi-Man Pun, Xiaochen Yuan |
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. ![In: Signal Process. 121, pp. 1-16, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Ronaldo Rigoni, Pedro Garcia Freitas, Mylène C. Q. Farias |
Detecting tampering in audio-visual content using QIM watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 328, pp. 127-143, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Alejandro Cabrera Aldaya, Alejandro Cabrera Sarmiento, Santiago Sánchez-Solano |
AES T-Box tampering attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 6(1), pp. 31-48, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Hong Liu, Di Xiao 0001, Yunpeng Xiao, Yushu Zhang |
Robust image hashing with tampering recovery capability via low-rank and sparse representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 75(13), pp. 7681-7696, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Pawel Korus, Jiwu Huang |
Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Signal Process. Lett. ![In: IEEE Signal Process. Lett. 23(1), pp. 169-173, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Archana V. Mire, Sanjay B. Dhok, Naresh J. Mistry, Prakash D. Porey |
Tampering Localization in Double Compressed Images by Investigating Noise Quantization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 8(3), pp. 46-62, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Sharareh Zamanzadeh, Ali Jahanian 0001 |
Security Path: An Emerging Design Methodology to Protect the FPGA IPs Against Passive/Active Design Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 32(3), pp. 329-343, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Faust, Pratyay Mukherjee, Daniele Venturi 0001, Daniel Wichs |
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 62(12), pp. 7179-7194, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos |
Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1606.06698, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Mabrouka Hagui, Mohamed Ali Mahjoub, Ahmed Boukhris |
Comparative study and enhancement of Camera Tampering Detection algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1608.02385, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Cai-Ping Yan, Chi-Man Pun, Xiaochen Yuan |
Quaternion-Based Image Hashing for Adaptive Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 11(12), pp. 2664-2677, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing |
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 397, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Kunlun Li, Shuo Sun |
基于改进SIFT算法的图像复制粘贴篡改检测 (Image Copy-Paste Tampering Detection Based on Improved SIFT Algorithm). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 43(Z6), pp. 179-183, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Pawel Korus, Jiwu Huang |
Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 25(3), pp. 1312-1326, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Musaed A. Alhussein |
Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UKSim ![In: UKSim-AMSS 18th International Conference on Computer Modelling and Simulation, UKSim 2016, Cambridge, United Kingdom, April 6-8, 2016, pp. 196-199, 2016, IEEE Computer Society, 978-1-5090-0888-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart Coppens 0001 |
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRO@CCS ![In: Proceedings of the 2016 ACM Workshop on Software PROtection, SPRO@CCS 2016, Vienna, Austria, October 24-28, 2016, pp. 73-84, 2016, ACM, 978-1-4503-4576-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang 0006 |
Codes for Detection of Limited View Algebraic Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers, pp. 309-320, 2016, Springer, 978-3-319-54704-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Biaoli Tao, Rangding Wang, Diqun Yan, Chao Jin, Yanan Chen, Li Zhang |
Audio Tampering Detection Based on Quantization Artifacts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS (2) ![In: Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II, pp. 430-439, 2016, 978-3-319-48673-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Pawel Korus, Jiwu Huang |
Evaluation of random field models in multi-modal unsupervised tampering localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIFS ![In: IEEE International Workshop on Information Forensics and Security, WIFS 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-1138-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos |
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016., pp. 379-395, 2016, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Eiichiro Fujisaki, Keita Xagawa |
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, pp. 908-938, 2016, 978-3-662-53886-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Abdul Razaque, Fathi H. Amsaad 0001, Musbah Abdulgader, Vijay Chand Mannava, Ibrahim Elwarfalli, Pavan Teja Kilari |
Automatic Tampering Detection Paradigm to Support Personal Health Record. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHASE ![In: Proceedings of the First IEEE International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016, Washington, DC, USA, June 27-29, 2016, pp. 388-393, 2016, IEEE Computer Society, 978-1-5090-0943-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Jian Li, Wenhuan Lu, Chen Zhang, Jianguo Wei, Xiaochun Cao, Jianwu Dang 0001 |
A Study on Detection and Recovery of Speech Signal Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trustcom/BigDataSE/ISPA ![In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016, pp. 678-682, 2016, IEEE, 978-1-5090-3205-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Aron Laszka, Bradley Potteiger, Yevgeniy Vorobeychik, Saurabh Amin, Xenofon D. Koutsoukos |
Vulnerability of Transportation Networks to Traffic-Signal Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCPS ![In: 7th ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS 2016, Vienna, Austria, April 11-14, 2016, pp. 16:1-16:10, 2016, IEEE Computer Society, 978-1-5090-1772-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Steven Paley, Tamzidul Hoque, Swarup Bhunia |
Active protection against PCB physical tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 17th International Symposium on Quality Electronic Design, ISQED 2016, Santa Clara, CA, USA, March 15-16, 2016, pp. 356-361, 2016, IEEE, 978-1-5090-1213-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Roshan Sai Ayyalasomayajula, Vinod Pankajakshan |
Differentiating Photographic and PRCG Images Using Tampering Localization Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVIP (2) ![In: Proceedings of International Conference on Computer Vision and Image Processing - CVIP 2016, Indian Institute of Technology Roorkee, February 26-28, 2016, Volume 2, pp. 429-438, 2016, Springer, 978-981-10-2106-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Wessam Mesbah |
Detection and correction of tampering attempts of smart electricity meters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT Europe ![In: IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2016, Ljubljana, Slovenia, October 9-12, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-3358-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Muhammad Naveed Aman, Kashif Javed, Biplab Sikdar 0001, Kee Chaing Chua |
Detecting data tampering attacks in synchrophasor networks using time hopping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT Europe ![In: IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2016, Ljubljana, Slovenia, October 9-12, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-3358-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Daniele Venturi 0001 |
Tampering in wonderland. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
17 | Shengbei Wang, Ryota Miyauchi, Masashi Unoki, Nam Soo Kim |
Tampering Detection Scheme for Speech Signals using Formant Enhancement based Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 6(6), pp. 1264-1283, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
17 | Stefan Wild, Fabian Wiedemann, Sebastian Heil, Alexey Tschudnowsky, Martin Gaedke |
ProProtect3: An Approach for Protecting User Profile Data from Disclosure, Tampering, and Improper Use in the Context of WebID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Large Scale Data Knowl. Centered Syst. ![In: Transactions on Large-Scale Data- and Knowledge-Centered Systems XIX - Special Issue on Big Data and Open Data, pp. 87-127, 2015, Springer, 978-3-662-46561-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Jay Liebowitz, Robert Schaller |
Biological Warfare: Tampering with Implantable Medical Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 17(5), pp. 70-72, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Jonathan Goh, Vrizlynn L. L. Thing |
A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Secur. Digit. Forensics ![In: Int. J. Electron. Secur. Digit. Forensics 7(1), pp. 76-104, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Min Long, Yan Liu, Fei Peng |
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 7(3), pp. 1-18, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Archana V. Mire, Sanjay B. Dhok, Narendra J. Mistry, Prakash D. Porey |
Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 7(4), pp. 33-54, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | N. M. Masoodhu Banu, S. Sujatha |
Improved Tampering Detection for Image Authentication Based on Image Partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 84(1), pp. 69-85, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Hui Xu 0009, Yangfan Zhou, Michael R. Lyu |
N-Version Obfuscation: Impeding Software Tampering Replication with Program Diversity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1506.03032, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
17 | Bo Zhao 0005, Guihe Qin, Pingping Liu |
A Robust Image Tampering Detection Method Based on Maximum Entropy Criteria. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 17(12), pp. 7948-7966, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun |
Tampering with the Delivery of Blocks and Transactions in Bitcoin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 578, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
17 | Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer |
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 442, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
17 | Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Lei Chen 0029 |
Exposing Image Tampering with the Same Quantization Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multimedia Data Mining and Analytics ![In: Multimedia Data Mining and Analytics - Disruptive Innovation, pp. 327-343, 2015, Springer, 978-3-319-14997-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Jiayuan Fan, Tao Chen 0003, Jiuwen Cao |
Image tampering detection using noise histogram features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSP ![In: 2015 IEEE International Conference on Digital Signal Processing, DSP 2015, Singapore, July 21-24, 2015, pp. 1044-1048, 2015, IEEE, 978-1-4799-8058-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Rupali D. Patil, Shilpa Metkar |
Fragile video watermarking for tampering detection and localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACCI ![In: 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, Kochi, India, August 10-13, 2015, pp. 1661-1666, 2015, IEEE, 978-1-4799-8790-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun |
Tampering with the Delivery of Blocks and Transactions in Bitcoin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pp. 692-705, 2015, ACM, 978-1-4503-3832-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Leiva Casemiro Oliveira, Eduardo G. Pereira, Ravena C. Oliveira, Marcos R. A. Morais, Antonio M. N. Lima, Helmut Neff |
SPR sensor for tampering detection in biofuels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I2MTC ![In: 2015 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, Pisa, Italy, May 11-14, 2015, pp. 1471-1476, 2015, IEEE, 978-1-4799-6114-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Shashank Agrawal, Divya Gupta 0001, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran 0001 |
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (1) ![In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, pp. 375-397, 2015, Springer, 978-3-662-46493-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Hugues Mercier, Maxime Augier, Arjen K. Lenstra |
STEP-archival: Storage integrity and anti-tampering using data entanglement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIT ![In: IEEE International Symposium on Information Theory, ISIT 2015, Hong Kong, China, June 14-19, 2015, pp. 1590-1594, 2015, IEEE, 978-1-4673-7704-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Songpon Teerakanok, Tetsutaro Uehara |
Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: 39th Annual Computer Software and Applications Conference, COMPSAC Workshops 2015, Taichung, Taiwan, July 1-5, 2015, pp. 35-39, 2015, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Íñigo Monedero, Félix Biscarri, Juán I. Guerrero, Moisés Roldán, Carlos León 0001 |
An Approach to Detection of Tampering in Water Meters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, KES 2015, Singapore, 7-9 September 2015, pp. 413-421, 2015, Elsevier. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Lu Yu 0001, Juan Deng, Richard R. Brooks, SeokBae Yun |
Automobile ECU Design to Avoid Data Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 10:1-10:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Adriano Gaibotti, Claudio Marchisio, Alexandro Sentinelli, Giacomo Boracchi |
Tampering Detection in Low-Power Smart Cameras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EANN ![In: Engineering Applications of Neural Networks - 16th International Conference, EANN 2015, Rhodes, Greece, September 25-28, 2015, Proceedings, pp. 243-252, 2015, Springer, 978-3-319-23981-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Shashank Agrawal, Divya Gupta 0001, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran 0001 |
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, pp. 538-557, 2015, Springer, 978-3-662-47988-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Luca Calderoni, Dario Maio |
Cloning and tampering threats in e-Passports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 41(11), pp. 5066-5070, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Deng-Yuan Huang, Chao-Ho Chen, Tsong-Yi Chen, Wu-Chih Hu, Bo-Cin Chen |
Rapid detection of camera tampering and abnormal disturbance for video surveillance system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Commun. Image Represent. ![In: J. Vis. Commun. Image Represent. 25(8), pp. 1865-1877, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, Jiying Zhao |
Tampering Detection in Compressed Digital Video Using Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Instrum. Meas. ![In: IEEE Trans. Instrum. Meas. 63(5), pp. 1057-1072, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Eshan Chattopadhyay, David Zuckerman |
Non-Malleable Codes Against Constant Split-State Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR14, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
17 | Mohammad S. Obaidat, Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo |
A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 7(2), pp. 376-384, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Wei Wang 0025, Jing Dong 0003, Tieniu Tan |
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 9(10), pp. 1653-1666, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Shashank Agrawal, Divya Gupta 0001, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran 0001 |
Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 842, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
17 | Sajjad Dadkhah, Azizah Abd Manaf, Yoshiaki Hori, Aboul Ella Hassanien, Somayeh Sadeghi |
An effective SVD-based image tampering detection and self-recovery using active watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. Image Commun. ![In: Signal Process. Image Commun. 29(10), pp. 1197-1210, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan |
Automated detection of parameter tampering opportunities and vulnerabilities in web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 22(3), pp. 415-465, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Giuseppe Cattaneo, Gianluca Roscigno |
A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: 17th International Conference on Network-Based Information Systems, NBiS 2014, Salerno, Italy, September 10-12, 2014, pp. 279-286, 2014, IEEE Computer Society, 978-1-4799-4224-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Adonis P. H. Fung, Tielei Wang, K. W. Cheung 0003, Tsz-Yeung Wong |
Scanning of real-world web applications for parameter tampering vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 341-352, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Jie Lin, Chuanyi Liu, Binxing Fang |
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pp. 1466-1468, 2014, ACM, 978-1-4503-2957-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Shengbei Wang, Masashi Unoki, Nam Soo Kim |
Formant enhancement based speech watermarking for tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERSPEECH ![In: INTERSPEECH 2014, 15th Annual Conference of the International Speech Communication Association, Singapore, September 14-18, 2014, pp. 1366-1370, 2014, ISCA. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Yan-Li Huang, Shao-Zhang Liu, Jian-Cheng Zou, Lin-Na Zhou |
Forensics of image tampering based on the consistency of illuminant chromaticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSIPA ![In: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2014, Chiang Mai, Thailand, December 9-12, 2014, pp. 1-4, 2014, IEEE, 978-6-1636-1823-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Luisa Verdoliva, Davide Cozzolino, Giovanni Poggi |
A feature-based approach for image tampering detection and localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIFS ![In: 2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, Atlanta, GA, USA, December 3-5, 2014, pp. 149-154, 2014, IEEE, 978-1-4799-8882-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Lorenzo Gaborini, Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro |
Multi-Clue Image Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIFS ![In: 2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, Atlanta, GA, USA, December 3-5, 2014, pp. 125-130, 2014, IEEE, 978-1-4799-8882-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Dana Dachman-Soled, Yael Tauman Kalai |
Securing Circuits and Protocols against 1/poly(k) Tampering Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 540-565, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Mahdi Cheraghchi, Venkatesan Guruswami |
Non-malleable Coding against Bit-Wise and Split-State Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 440-464, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Eshan Chattopadhyay, David Zuckerman |
Non-malleable Codes against Constant Split-State Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 55th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2014, Philadelphia, PA, USA, October 18-21, 2014, pp. 306-315, 2014, IEEE Computer Society, 978-1-4799-6517-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Silvia Mella, Filippo Melzani, Andrea Visconti |
Differential Fault Attacks against AES Tampering with the Instruction Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014, pp. 439-444, 2014, SciTePress, 978-989-758-045-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Simone Milani, Pier Francesco Piazza, Paolo Bestagini, Stefano Tubaro |
Audio tampering detection using multimodal features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, Florence, Italy, May 4-9, 2014, pp. 4563-4567, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Khosro Bahrami, Alex C. Kot |
Image tampering detection by exposing blur type inconsistency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, Florence, Italy, May 4-9, 2014, pp. 2654-2658, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Guanshuo Xu, Jingyu Ye, Yun-Qing Shi 0001 |
New Developments in Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers, pp. 3-17, 2014, Springer, 978-3-319-19320-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Ronaldo Rigoni, Pedro Garcia Freitas, Mylène C. Q. Farias |
Tampering Detection of Audio-Visual Content Using Encrypted Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIBGRAPI ![In: 27th SIBGRAPI Conference on Graphics, Patterns and Images, SIBGRAPI 2014, Rio de Janeiro, Brazil, August 27-30, 2014, pp. 196-203, 2014, IEEE Computer Society, 978-1-4799-4258-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Xudong Zhao, Jianhua Li 0001, Shilin Wang, Shenghong Li 0001 |
A Distributed Local Margin Learning based scheme for high-dimensional feature processing in image tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: IEEE International Conference on Multimedia and Expo, ICME 2014, Chengdu, China, July 14-18, 2014, pp. 1-6, 2014, IEEE Computer Society, 978-1-4799-4761-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|