The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for tampering with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1999 (18) 2000-2001 (17) 2002-2003 (32) 2004 (20) 2005 (33) 2006 (44) 2007 (56) 2008 (55) 2009 (29) 2010 (18) 2011 (23) 2012 (16) 2013 (22) 2014 (29) 2015 (23) 2016 (31) 2017 (35) 2018 (43) 2019 (53) 2020 (47) 2021 (50) 2022 (47) 2023 (50) 2024 (15)
Publication types (Num. hits)
article(319) incollection(2) inproceedings(481) phdthesis(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 323 occurrences of 220 keywords

Results
Found 806 publication records. Showing 806 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Sebastian Faust, Pratyay Mukherjee, Daniele Venturi 0001, Daniel Wichs Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits. Search on Bibsonomy EUROCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Johannes Blömer, Peter Günther 0001, Gennadij Liske Tampering Attacks in Pairing-Based Cryptography. Search on Bibsonomy FDTC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Thomas Korak, Michael Hoefler On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms. Search on Bibsonomy FDTC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Shanshan Yang, Chuan Qin 0001, Zhenxing Qian, Boqing Xu Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism. Search on Bibsonomy IIH-MSP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Mahdi Cheraghchi, Venkatesan Guruswami Non-Malleable Coding Against Bit-wise and Split-State Tampering. Search on Bibsonomy Electron. Colloquium Comput. Complex. The full citation details ... 2013 DBLP  BibTeX  RDF
17Mahdi Cheraghchi, Venkatesan Guruswami Non-Malleable Coding Against Bit-wise and Split-State Tampering. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
17Young-Long Chen, Her-Terng Yau, Guo-Jheng Yang A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection. Search on Bibsonomy Entropy The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Sebastian Faust, Pratyay Mukherjee, Daniele Venturi 0001, Daniel Wichs Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
17Mahdi Cheraghchi, Venkatesan Guruswami Non-Malleable Coding Against Bit-wise and Split-State Tampering. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
17Jonny Karlsson, Laurence S. Dooley, Göran Pulkkis Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm. Search on Bibsonomy Sensors The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Gouenou Coatrieux, Hui Huang 0012, Huazhong Shu, Limin Luo, Christian Roux A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization. Search on Bibsonomy IEEE J. Biomed. Health Informatics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Xiaojun Tong, Yang Liu 0053, Miao Zhang, Yue Chen A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Search on Bibsonomy Signal Process. Image Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Nazari Skrupsky, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck TamperProof: a server-agnostic defense for parameter tampering attacks on web applications. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Yaoran Huo, Hongjie He, Fan Chen 0003 Semi-fragile watermarking scheme with discriminating general tampering from collage attack. Search on Bibsonomy APSIPA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Diego García-Ordás, Laura Fernández-Robles, Enrique Alegre, María Teresa García-Ordás, Oscar García-Olalla Automatic Tampering Detection in Spliced Images with Different Compression Levels. Search on Bibsonomy IbPRIA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Natthanan Tangsunantham, Suchat Ngamchuen, Varunyou Nontaboot, Somchai Thepphaeng, Chaiyod Pirak Experimental performance analysis of current bypass anti-tampering in smart energy meters. Search on Bibsonomy ATNAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Vinod Mall, Anil K. Roy, Suman K. Mitra Digital image tampering detection and localization using singular value decomposition technique. Search on Bibsonomy NCVPRIPG The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Luca Cuccovillo, Sebastian Mann, Marco Tagliasacchi, Patrick Aichroth Audio tampering detection via microphone classification. Search on Bibsonomy MMSP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro Local tampering detection in video sequences. Search on Bibsonomy MMSP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Yousof Erfani, Ramin Pichevar, Jean Rouat Audio tampering localization using modified iss watermarking in sparse-domain. Search on Bibsonomy GlobalSIP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Chao-Ching Shih, Shen-Chi Chen, Cheng-Feng Hung, Kuan-Wen Chen, Shih-Yao Lin 0001, Chih-Wei Lin, Yi-Ping Hung Real-time camera tampering detection using two-stage scene matching. Search on Bibsonomy ICME The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Tien-Ying Kuo, Yi-Chung Lo, Ssu-Neng Huang Image forgery detection for region duplication tampering. Search on Bibsonomy ICME The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Sebastian Mann, Luca Cuccovillo, Patrick Aichroth, Christian Dittmar Combining ENF Phase Discontinuity Checking and Temporal Pattern Matching for Audio Tampering Detection. Search on Bibsonomy GI-Jahrestagung The full citation details ... 2013 DBLP  BibTeX  RDF
17Qingzhong Liu, Peter A. Cooper, Bing Zhou 0002 An improved approach to detecting content-aware scaling-based tampering in JPEG images. Search on Bibsonomy ChinaSIP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Jing Dong 0003, Wei Wang 0025, Tieniu Tan CASIA Image Tampering Detection Evaluation Database. Search on Bibsonomy ChinaSIP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Lanying Wu, Xiangwei Kong, Bo Wang 0024, Shize Shang Image tampering localization via estimating the non-aligned double JPEG compression. Search on Bibsonomy Media Watermarking, Security, and Forensics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Qiong Dong, Gaobo Yang, Ningbo Zhu A MCEA based passive forensics scheme for detecting frame-based video tampering. Search on Bibsonomy Digit. Investig. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Adonis P. H. Fung, K. W. Cheung 0003, Tsz-Yeung Wong FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
17Sebastiano Battiato, Giovanni Maria Farinella, Enrico Messina, Giovanni Puglisi Robust Image Alignment for Tampering Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Dana Dachman-Soled, Yael Tauman Kalai Securing Circuits Against Constant-Rate Tampering. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
17Sachin Mehta, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy Tampering resistant self recoverable watermarking method using error correction codes. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Pawel Korus, Andrzej Dziech Reconfigurable self-embedding with high quality restoration under extensive tampering. Search on Bibsonomy ICIP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Andrea Moio, Attilio Giordana, Dino Mendola An Anti-tampering Algorithm Based on an Artificial Intelligence Approach. Search on Bibsonomy ISMIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc Tampering with Java Card Exceptions - The Exception Proves the Rule. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
17Sergio Bravo-Solorio, Asoke K. Nandi Two-layer fragilewatermarking method for enhanced tampering localisation. Search on Bibsonomy ICASSP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Hervé Chabanne, Gérard D. Cohen, Alain Patey Secure network coding and non-malleable codes: Protection against linear tampering. Search on Bibsonomy ISIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo, Issa Traoré Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks. Search on Bibsonomy GLOBECOM Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Luyi Chen, Shilin Wang, Shenghong Li 0001, Jianhua Li 0001 Countering Universal Image Tampering Detection with Histogram Restoration. Search on Bibsonomy IWDW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Yichang Shih, Abe Davis, Samuel W. Hasinoff, Frédo Durand, William T. Freeman Laser speckle photography for surface tampering detection. Search on Bibsonomy CVPR The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Daw-Tung Lin, Chung-Han Wu Real-Time Active Tampering Detection of Surveillance Camera and Implementation on Digital Signal Processor. Search on Bibsonomy IIH-MSP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Masashi Unoki, Ryota Miyauchi Detection of Tampering in Speech Signals with Inaudible Watermarking Technique. Search on Bibsonomy IIH-MSP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Dana Dachman-Soled, Yael Tauman Kalai Securing Circuits against Constant-Rate Tampering. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang 0001, Weimin Wei Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection. Search on Bibsonomy Fundam. Informaticae The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Sergio Bravo-Solorio, Asoke K. Nandi Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Search on Bibsonomy Signal Process. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Kyung-Su Kim 0001, Min-Jeong Lee, Ji Won Lee, Tae-Woo Oh, Hae-Yeoun Lee Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging. Search on Bibsonomy Comput. Vis. Image Underst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Patchara Sutthiwan, Yun Q. Shi 0001, Hong Zhao, Tian-Tsong Ng, Wei Su 0001 Markovian Rake Transform for Digital Image Tampering Detection. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Y.-L. Chen, C.-T. Hsu Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Mihir Bellare, David Cash, Rachel Miller Cryptography Secure Against Related-Key Attacks and Tampering. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
17N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar Towards Checking Tampering of Software. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction. Search on Bibsonomy CCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Jingting Zhou, Daniel Garcia-Romero, Carol Y. Espy-Wilson Automatic Speech Codec Identification with Applications to Tampering Detection of Speech Recordings. Search on Bibsonomy INTERSPEECH The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Peng Zheng, Weihua Wang, Juan Wang A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks. Search on Bibsonomy IPTC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Wei Wang 0025, Jing Dong 0003, Tieniu Tan Exploring DCT coefficient quantization effect for image tampering localization. Search on Bibsonomy WIFS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Masaya Sato, Toshihiro Yamauchi VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss. Search on Bibsonomy ARES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Sachin Mehta, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images. Search on Bibsonomy ADCONS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Sebastiano Battiato, Giovanni Maria Farinella, Enrico Messina, Giovanni Puglisi Robust image registration and tampering localization exploiting bag of features based forensic signature. Search on Bibsonomy ACM Multimedia The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Gowun Jeong, Hyun Seung Yang Efficiently secure image transmission against tampering in wireless visual sensor networks. Search on Bibsonomy AVSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Mihir Bellare, David Cash, Rachel Miller Cryptography Secure against Related-Key Attacks and Tampering. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Babak Mahdian, Stanislav Saic Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment. Search on Bibsonomy ISABEL The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Luyi Chen, Shilin Wang, Shenghong Li 0001, Jianhua Li 0001 New Feature Presentation of Transition Probability Matrix for Image Tampering Detection. Search on Bibsonomy IWDW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Zhenli Liu, Xiaofeng Wang, Jing Chen Passive Forensics Method to Detect Tampering for Double JPEG Compression Image. Search on Bibsonomy ISM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Juxian Zuo, Shengjun Pan, Benyong Liu, Xiang Liao Tampering detection for composite images based on re-sampling and JPEG compression. Search on Bibsonomy ACPR The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Lu Li, Jianru Xue, Xiaofeng Wang, Lihua Tian A Robust Approach to Detect Tampering by Exploring Correlation Patterns. Search on Bibsonomy CAIP (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Che-Wei Lee, Wen-Hsiang Tsai A Grayscale Image Authentication Method with a Pixel-level Self-recovering Capability against Image Tampering. Search on Bibsonomy MVA The full citation details ... 2011 DBLP  BibTeX  RDF
17Sergio Bravo-Solorio, Lu Gan 0002, Asoke K. Nandi, Maurice F. Aburdene Secure private fragile watermarking scheme with improved tampering localisation accuracy. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Filippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo Tampering in RFID: A Survey on Risks and Defenses. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Yuanyuan Hu, Hao Luo, Xiamu Niu Image hashing framework for tampering localization in distorted images. Search on Bibsonomy IEICE Electron. Express The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Wei Wang 0025, Jing Dong 0003, Tieniu Tan Image tampering detection based on stationary distribution of Markov chain. Search on Bibsonomy ICIP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, K. J. Ray Liu Undetectable image tampering through JPEG compression anti-forensics. Search on Bibsonomy ICIP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, Radoslaw Bobrowicz, V. N. Venkatakrishnan NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications. Search on Bibsonomy CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Guo-Shiang Lin, Min-Kuan Chang A passive scheme for tampering detection based on quantization table estimation. Search on Bibsonomy VCIP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, Giuseppe Serra 0001 Geometric tampering estimation by means of a SIFT-based forensic analysis. Search on Bibsonomy ICASSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Chu-Hsing Lin, Jung-Chun Liu, Wei-Cheng Hsu, Hsing-Weng Wang, Wei-Chih Lin, Jian-Wei Li Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks. Search on Bibsonomy ACN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Hong Cao, Alex C. Kot Detection of Tampering Inconsistencies on Mobile Photos. Search on Bibsonomy IWDW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Mauro Barni, Andrea Costanzo, Lara Sabatini Identification of cut & paste tampering by means of double-JPEG detection and image segmentation. Search on Bibsonomy ISCAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Patchara Sutthiwan, Yun-Qing Shi 0001, Jing Dong 0003, Tieniu Tan, Tian-Tsong Ng New developments in color image tampering detection. Search on Bibsonomy ISCAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Fei Ren, Zhiguang Qin, Jinfeng Yang A New Technique of Anti-tampering Technology Based on AVS Video. Search on Bibsonomy CIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Sergio Bravo-Solorio, Asoke K. Nandi Fragile watermarking with improved tampering localisation and self-recovery capabilities. Search on Bibsonomy EUSIPCO The full citation details ... 2010 DBLP  BibTeX  RDF
17Giuseppe Valenzise, Giorgio Prandi, Marco Tagliasacchi, Augusto Sarti Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques. Search on Bibsonomy EURASIP J. Image Video Process. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Yoann Guillot, Alexandre Gazet Semi-automatic binary protection tampering. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tubaro Hash-Based Identification of Sparse Image Tampering. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tubaro, Giacomo Cancelli, Mauro Barni A compressive-sensing based watermarking scheme for sparse image tampering identification. Search on Bibsonomy ICIP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Wei-Hong Chuang, Ashwin Swaminathan, Min Wu 0001 Tampering identification using Empirical Frequency Response. Search on Bibsonomy ICASSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Hongjie He, Jiashu Zhang, Heng-Ming Tai Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block-neighborhood characterization, constant-average attack, fragile watermarking, self-recovery
17Xinghao Jiang, Tanfeng Sun, Jiaqi Feng, Zhigao Lin, Huan Lu A Novel Differential Energy Watermarking Scheme Based on FSM Model against Video Time-Space Tampering. Search on Bibsonomy PCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Raphael Chung-Wei Phan Tampering with a watermarking-based image authentication scheme. Search on Bibsonomy Pattern Recognit. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Yu-Jie Chang, Ran-Zan Wang, Ja-Chen Lin A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering. Search on Bibsonomy EURASIP J. Adv. Signal Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Marie-Charlotte Poilpré, Patrick Perrot, Hugues Talbot Image tampering detection using Bayer interpolation and JPEG compression. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Yu-Feng Hsu, Shih-Fu Chang Statistical fusion of multiple cues for image tampering detection. Search on Bibsonomy ACSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Patrick Bas, Gwenaël J. Doërr Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dirty paper trellis watermarking, security, attack
17Adam J. Rocke, Ronald F. DeMara, Simon Foo 0001 Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2007 DBLP  BibTeX  RDF
17Xunzhan Zhu, Anthony T. S. Ho, Pina Marziliano A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Search on Bibsonomy Signal Process. Image Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Hongmei Gou, Ashwin Swaminathan, Min Wu 0001 Noise Features for Image Tampering Detection and Steganalysis. Search on Bibsonomy ICIP (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Yao-Chung Lin, David P. Varodayan, Bernd Girod Image Authentication and Tampering Localization using Distributed Source Coding. Search on Bibsonomy MMSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha K. Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Yoav Goldberg, Michael Elhadad SVM Model Tampering and Anchored Learning: A Case Study in Hebrew NP Chunking. Search on Bibsonomy ACL The full citation details ... 2007 DBLP  BibTeX  RDF
17Chin-Chen Chang 0001, Yih-Shin Hu, Tzu-Chuen Lu A watermarking-based image ownership and tampering authentication scheme. Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Huijuan Yang, Alex ChiChung Kot Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier. Search on Bibsonomy IEEE Signal Process. Lett. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Huijuan Yang, Alex C. Kot Two-Layer Binary Image Authentication With Tampering Localization. Search on Bibsonomy ICASSP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Bin Fu, Golden G. Richard III, Yixin Chen 0002 Some new approaches for preventing software tampering. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 806 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license