Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Sebastian Faust, Pratyay Mukherjee, Daniele Venturi 0001, Daniel Wichs |
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings, pp. 111-128, 2014, Springer, 978-3-642-55219-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Johannes Blömer, Peter Günther 0001, Gennadij Liske |
Tampering Attacks in Pairing-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014, pp. 1-7, 2014, IEEE Computer Society, 978-1-4799-6292-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Korak, Michael Hoefler |
On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014, pp. 8-17, 2014, IEEE Computer Society, 978-1-4799-6292-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Shanshan Yang, Chuan Qin 0001, Zhenxing Qian, Boqing Xu |
Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014, Kitakyushu, Japan, August 27-29, 2014, pp. 130-133, 2014, IEEE, 978-1-4799-5390-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Mahdi Cheraghchi, Venkatesan Guruswami |
Non-Malleable Coding Against Bit-wise and Split-State Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR13, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
17 | Mahdi Cheraghchi, Venkatesan Guruswami |
Non-Malleable Coding Against Bit-wise and Split-State Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1309.1151, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
17 | Young-Long Chen, Her-Terng Yau, Guo-Jheng Yang |
A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 15(8), pp. 3170-3185, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Faust, Pratyay Mukherjee, Daniele Venturi 0001, Daniel Wichs |
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 702, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
17 | Mahdi Cheraghchi, Venkatesan Guruswami |
Non-Malleable Coding Against Bit-wise and Split-State Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 565, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
17 | Jonny Karlsson, Laurence S. Dooley, Göran Pulkkis |
Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 13(5), pp. 6651-6668, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Gouenou Coatrieux, Hui Huang 0012, Huazhong Shu, Limin Luo, Christian Roux |
A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Biomed. Health Informatics ![In: IEEE J. Biomed. Health Informatics 17(6), pp. 1057-1067, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Xiaojun Tong, Yang Liu 0053, Miao Zhang, Yue Chen |
A novel chaos-based fragile watermarking for image tampering detection and self-recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. Image Commun. ![In: Signal Process. Image Commun. 28(3), pp. 301-308, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Nazari Skrupsky, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck |
TamperProof: a server-agnostic defense for parameter tampering attacks on web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013, pp. 129-140, 2013, ACM, 978-1-4503-1890-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Yaoran Huo, Hongjie He, Fan Chen 0003 |
Semi-fragile watermarking scheme with discriminating general tampering from collage attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSIPA ![In: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013, Kaohsiung, Taiwan, October 29 - November 1, 2013, pp. 1-6, 2013, IEEE, 978-1-4799-2794-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Diego García-Ordás, Laura Fernández-Robles, Enrique Alegre, María Teresa García-Ordás, Oscar García-Olalla |
Automatic Tampering Detection in Spliced Images with Different Compression Levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IbPRIA ![In: Pattern Recognition and Image Analysis - 6th Iberian Conference, IbPRIA 2013, Funchal, Madeira, Portugal, June 5-7, 2013. Proceedings, pp. 416-423, 2013, Springer, 978-3-642-38627-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Natthanan Tangsunantham, Suchat Ngamchuen, Varunyou Nontaboot, Somchai Thepphaeng, Chaiyod Pirak |
Experimental performance analysis of current bypass anti-tampering in smart energy meters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATNAC ![In: Australasian Telecommunication Networks and Applications Conference, ATNAC 2013, Christchurch, New Zealand, November 20-22, 2013, pp. 124-129, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Vinod Mall, Anil K. Roy, Suman K. Mitra |
Digital image tampering detection and localization using singular value decomposition technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCVPRIPG ![In: Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, NCVPRIPG 2013, Jodhpur, India, December 18-21, 2013, pp. 1-4, 2013, IEEE, 978-1-4799-1588-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Luca Cuccovillo, Sebastian Mann, Marco Tagliasacchi, Patrick Aichroth |
Audio tampering detection via microphone classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMSP ![In: 15th IEEE International Workshop on Multimedia Signal Processing, MMSP 2013, Pula, Sardinia, Italy, September 30 - Oct. 2, 2013, pp. 177-182, 2013, IEEE, 978-1-4799-0125-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro |
Local tampering detection in video sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMSP ![In: 15th IEEE International Workshop on Multimedia Signal Processing, MMSP 2013, Pula, Sardinia, Italy, September 30 - Oct. 2, 2013, pp. 488-493, 2013, IEEE, 978-1-4799-0125-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Yousof Erfani, Ramin Pichevar, Jean Rouat |
Audio tampering localization using modified iss watermarking in sparse-domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GlobalSIP ![In: IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013, Austin, TX, USA, December 3-5, 2013, pp. 249-252, 2013, IEEE, 978-1-4799-0248-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Chao-Ching Shih, Shen-Chi Chen, Cheng-Feng Hung, Kuan-Wen Chen, Shih-Yao Lin 0001, Chih-Wei Lin, Yi-Ping Hung |
Real-time camera tampering detection using two-stage scene matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, ICME 2013, San Jose, CA, USA, July 15-19, 2013, pp. 1-6, 2013, IEEE Computer Society, 978-1-4799-0015-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Tien-Ying Kuo, Yi-Chung Lo, Ssu-Neng Huang |
Image forgery detection for region duplication tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, ICME 2013, San Jose, CA, USA, July 15-19, 2013, pp. 1-6, 2013, IEEE Computer Society, 978-1-4799-0015-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Mann, Luca Cuccovillo, Patrick Aichroth, Christian Dittmar |
Combining ENF Phase Discontinuity Checking and Temporal Pattern Matching for Audio Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI-Jahrestagung ![In: 43. Jahrestagung der Gesellschaft für Informatik, Informatik angepasst an Mensch, Organisation und Umwelt, INFORMATIK 2013, Koblenz, Germany, September 16-20, 2013, pp. 2917-2927, 2013, GI, 978-3-88579-614-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
17 | Qingzhong Liu, Peter A. Cooper, Bing Zhou 0002 |
An improved approach to detecting content-aware scaling-based tampering in JPEG images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ChinaSIP ![In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013, Beijing, China, July 6-10, 2013, pp. 432-436, 2013, IEEE, 978-1-4799-1043-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Jing Dong 0003, Wei Wang 0025, Tieniu Tan |
CASIA Image Tampering Detection Evaluation Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ChinaSIP ![In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013, Beijing, China, July 6-10, 2013, pp. 422-426, 2013, IEEE, 978-1-4799-1043-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Lanying Wu, Xiangwei Kong, Bo Wang 0024, Shize Shang |
Image tampering localization via estimating the non-aligned double JPEG compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Media Watermarking, Security, and Forensics ![In: Media Watermarking, Security, and Forensics 2013, Burlingame, CA, USA, February 5-7, 2013, Proceedings, pp. 86650R, 2013, SPIE, 978-0-8194-9438-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Qiong Dong, Gaobo Yang, Ningbo Zhu |
A MCEA based passive forensics scheme for detecting frame-based video tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 9(2), pp. 151-159, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Adonis P. H. Fung, K. W. Cheung 0003, Tsz-Yeung Wong |
FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1204.1216, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
17 | Sebastiano Battiato, Giovanni Maria Farinella, Enrico Messina, Giovanni Puglisi |
Robust Image Alignment for Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 7(4), pp. 1105-1117, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Dana Dachman-Soled, Yael Tauman Kalai |
Securing Circuits Against Constant-Rate Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 366, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
17 | Sachin Mehta, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy |
Tampering resistant self recoverable watermarking method using error correction codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 5(1), pp. 28-47, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Pawel Korus, Andrzej Dziech |
Reconfigurable self-embedding with high quality restoration under extensive tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: 19th IEEE International Conference on Image Processing, ICIP 2012, Lake Buena Vista, Orlando, FL, USA, September 30 - October 3, 2012, pp. 2193-2196, 2012, IEEE, 978-1-4673-2534-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Andrea Moio, Attilio Giordana, Dino Mendola |
An Anti-tampering Algorithm Based on an Artificial Intelligence Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems - 20th International Symposium, ISMIS 2012, Macau, China, December 4-7, 2012. Proceedings, pp. 1-10, 2012, Springer, 978-3-642-34623-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc |
Tampering with Java Card Exceptions - The Exception Proves the Rule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 55-63, 2012, SciTePress, 978-989-8565-24-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
17 | Sergio Bravo-Solorio, Asoke K. Nandi |
Two-layer fragilewatermarking method for enhanced tampering localisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2012, Kyoto, Japan, March 25-30, 2012, pp. 2245-2248, 2012, IEEE, 978-1-4673-0046-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Hervé Chabanne, Gérard D. Cohen, Alain Patey |
Secure network coding and non-malleable codes: Protection against linear tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIT ![In: Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 2546-2550, 2012, IEEE, 978-1-4673-2580-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo, Issa Traoré |
Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM Workshops ![In: Workshops Proceedings of the Global Communications Conference, GLOBECOM 2012, 3-7 December 2012, Anaheim, California, USA, pp. 1037-1041, 2012, IEEE, 978-1-4673-4942-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Luyi Chen, Shilin Wang, Shenghong Li 0001, Jianhua Li 0001 |
Countering Universal Image Tampering Detection with Histogram Restoration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers, pp. 282-289, 2012, Springer, 978-3-642-40098-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Yichang Shih, Abe Davis, Samuel W. Hasinoff, Frédo Durand, William T. Freeman |
Laser speckle photography for surface tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, June 16-21, 2012, pp. 33-40, 2012, IEEE Computer Society, 978-1-4673-1226-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Daw-Tung Lin, Chung-Han Wu |
Real-Time Active Tampering Detection of Surveillance Camera and Implementation on Digital Signal Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012, Piraeus-Athens, Greece, July 18-20, 2012, pp. 383-386, 2012, IEEE, 978-1-4673-1741-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Masashi Unoki, Ryota Miyauchi |
Detection of Tampering in Speech Signals with Inaudible Watermarking Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012, Piraeus-Athens, Greece, July 18-20, 2012, pp. 118-121, 2012, IEEE, 978-1-4673-1741-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Dana Dachman-Soled, Yael Tauman Kalai |
Securing Circuits against Constant-Rate Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, pp. 533-551, 2012, Springer, 978-3-642-32008-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang 0001, Weimin Wei |
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fundam. Informaticae ![In: Fundam. Informaticae 106(1), pp. 75-91, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Sergio Bravo-Solorio, Asoke K. Nandi |
Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. ![In: Signal Process. 91(4), pp. 728-739, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Kyung-Su Kim 0001, Min-Jeong Lee, Ji Won Lee, Tae-Woo Oh, Hae-Yeoun Lee |
Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Vis. Image Underst. ![In: Comput. Vis. Image Underst. 115(9), pp. 1308-1323, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Patchara Sutthiwan, Yun Q. Shi 0001, Hong Zhao, Tian-Tsong Ng, Wei Su 0001 |
Markovian Rake Transform for Digital Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Transactions on Data Hiding and Multimedia Security VI, pp. 1-17, 2011, Springer, 978-3-642-24555-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Y.-L. Chen, C.-T. Hsu |
Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 6(2), pp. 396-406, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Mihir Bellare, David Cash, Rachel Miller |
Cryptography Secure Against Related-Key Attacks and Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 252, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
17 | N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar |
Towards Checking Tampering of Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 204-219, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan |
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, pp. 575-586, 2011, ACM, 978-1-4503-0948-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Jingting Zhou, Daniel Garcia-Romero, Carol Y. Espy-Wilson |
Automatic Speech Codec Identification with Applications to Tampering Detection of Speech Recordings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERSPEECH ![In: INTERSPEECH 2011, 12th Annual Conference of the International Speech Communication Association, Florence, Italy, August 27-31, 2011, pp. 2533-2536, 2011, ISCA. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Peng Zheng, Weihua Wang, Juan Wang |
A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPTC ![In: 2nd International Symposium on Intelligence Information Processing and Trusted Computing, IPTC 2011, Wuhan, China, October 22-23, 2011, pp. 111-114, 2011, IEEE Computer Society, 978-1-4577-1130-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Wei Wang 0025, Jing Dong 0003, Tieniu Tan |
Exploring DCT coefficient quantization effect for image tampering localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIFS ![In: 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011, pp. 1-6, 2011, IEEE Computer Society, 978-1-4577-1017-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Masaya Sato, Toshihiro Yamauchi |
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings, pp. 176-190, 2011, Springer, 978-3-642-23299-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Sachin Mehta, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy |
Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADCONS ![In: Advanced Computing, Networking and Security - International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers, pp. 575-582, 2011, Springer, 978-3-642-29279-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Sebastiano Battiato, Giovanni Maria Farinella, Enrico Messina, Giovanni Puglisi |
Robust image registration and tampering localization exploiting bag of features based forensic signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28 - December 1, 2011, pp. 1245-1248, 2011, ACM, 978-1-4503-0616-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Gowun Jeong, Hyun Seung Yang |
Efficiently secure image transmission against tampering in wireless visual sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, AVSS 2011, Klagenfurt, Austria, August 30 - September 2, 2011, pp. 172-177, 2011, IEEE Computer Society, 978-1-4577-0845-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Mihir Bellare, David Cash, Rachel Miller |
Cryptography Secure against Related-Key Attacks and Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, pp. 486-503, 2011, Springer, 978-3-642-25384-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Babak Mahdian, Stanislav Saic |
Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISABEL ![In: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL '11, Barcelona, Spain, October 26-29, 2011, pp. 176:1-176:5, 2011, ACM, 978-1-4503-0913-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Luyi Chen, Shilin Wang, Shenghong Li 0001, Jianhua Li 0001 |
New Feature Presentation of Transition Probability Matrix for Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Forensics and Watermarking - 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised Selected Papers, pp. 376-386, 2011, Springer, 978-3-642-32204-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Zhenli Liu, Xiaofeng Wang, Jing Chen |
Passive Forensics Method to Detect Tampering for Double JPEG Compression Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: 2011 IEEE International Symposium on Multimedia, ISM 2011, Dana Point, CA, USA, December 5-7, 2011, pp. 185-189, 2011, IEEE Computer Society, 978-1-4577-2015-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Juxian Zuo, Shengjun Pan, Benyong Liu, Xiang Liao |
Tampering detection for composite images based on re-sampling and JPEG compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACPR ![In: First Asian Conference on Pattern Recognition, ACPR 2011, Beijing, China, 28-28 November, 2011, pp. 169-173, 2011, IEEE, 978-1-4577-0122-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Lu Li, Jianru Xue, Xiaofeng Wang, Lihua Tian |
A Robust Approach to Detect Tampering by Exploring Correlation Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAIP (2) ![In: Computer Analysis of Images and Patterns - 14th International Conference, CAIP 2011, Seville, Spain, August 29-31, 2011, Proceedings, Part II, pp. 515-522, 2011, Springer, 978-3-642-23677-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Che-Wei Lee, Wen-Hsiang Tsai |
A Grayscale Image Authentication Method with a Pixel-level Self-recovering Capability against Image Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MVA ![In: Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2011), Nara Centennial Hall, Nara, Japan, June 13-15, 2011, pp. 328-331, 2011, 978-4-901122-11-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
17 | Sergio Bravo-Solorio, Lu Gan 0002, Asoke K. Nandi, Maurice F. Aburdene |
Secure private fragile watermarking scheme with improved tampering localisation accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 4(3), pp. 137-148, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Filippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo |
Tampering in RFID: A Survey on Risks and Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 15(4), pp. 502-516, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Yuanyuan Hu, Hao Luo, Xiamu Niu |
Image hashing framework for tampering localization in distorted images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Electron. Express ![In: IEICE Electron. Express 7(22), pp. 1679-1685, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Wei Wang 0025, Jing Dong 0003, Tieniu Tan |
Image tampering detection based on stationary distribution of Markov chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2010, September 26-29, Hong Kong, China, pp. 2101-2104, 2010, IEEE, 978-1-4244-7994-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, K. J. Ray Liu |
Undetectable image tampering through JPEG compression anti-forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2010, September 26-29, Hong Kong, China, pp. 2109-2112, 2010, IEEE, 978-1-4244-7994-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, Radoslaw Bobrowicz, V. N. Venkatakrishnan |
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, pp. 607-618, 2010, ACM, 978-1-4503-0245-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Guo-Shiang Lin, Min-Kuan Chang |
A passive scheme for tampering detection based on quantization table estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VCIP ![In: Visual Communications and Image Processing 2010, VCIP 2010, Huangshan, China, 11-14 July 2010, pp. 774433, 2010, SPIE, 9780819482341. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, Giuseppe Serra 0001 |
Geometric tampering estimation by means of a SIFT-based forensic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010, 14-19 March 2010, Sheraton Dallas Hotel, Dallas, Texas, USA, pp. 1702-1705, 2010, IEEE, 978-1-4244-4296-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Chu-Hsing Lin, Jung-Chun Liu, Wei-Cheng Hsu, Hsing-Weng Wang, Wei-Chih Lin, Jian-Wei Li |
Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACN ![In: Advanced Communication and Networking - Second International Conference, ACN 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings, pp. 134-143, 2010, 978-3-642-13404-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Hong Cao, Alex C. Kot |
Detection of Tampering Inconsistencies on Mobile Photos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking - 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers, pp. 105-119, 2010, Springer, 978-3-642-18404-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Mauro Barni, Andrea Costanzo, Lara Sabatini |
Identification of cut & paste tampering by means of double-JPEG detection and image segmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2010), May 30 - June 2, 2010, Paris, France, pp. 1687-1690, 2010, IEEE, 978-1-4244-5308-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Patchara Sutthiwan, Yun-Qing Shi 0001, Jing Dong 0003, Tieniu Tan, Tian-Tsong Ng |
New developments in color image tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2010), May 30 - June 2, 2010, Paris, France, pp. 3064-3067, 2010, IEEE, 978-1-4244-5308-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Fei Ren, Zhiguang Qin, Jinfeng Yang |
A New Technique of Anti-tampering Technology Based on AVS Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010, pp. 386-389, 2010, IEEE Computer Society, 978-1-4244-9114-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Sergio Bravo-Solorio, Asoke K. Nandi |
Fragile watermarking with improved tampering localisation and self-recovery capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSIPCO ![In: 18th European Signal Processing Conference, EUSIPCO 2010, Aalborg, Denmark, August 23-27, 2010, pp. 820-824, 2010, IEEE. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
17 | Giuseppe Valenzise, Giorgio Prandi, Marco Tagliasacchi, Augusto Sarti |
Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Image Video Process. ![In: EURASIP J. Image Video Process. 2009, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yoann Guillot, Alexandre Gazet |
Semi-automatic binary protection tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(2), pp. 119-149, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tubaro |
Hash-Based Identification of Sparse Image Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 18(11), pp. 2491-2504, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tubaro, Giacomo Cancelli, Mauro Barni |
A compressive-sensing based watermarking scheme for sparse image tampering identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2009, 7-10 November 2009, Cairo, Egypt, pp. 1265-1268, 2009, IEEE, 978-1-4244-5654-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Wei-Hong Chuang, Ashwin Swaminathan, Min Wu 0001 |
Tampering identification using Empirical Frequency Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2009, 19-24 April 2009, Taipei, Taiwan, pp. 1517-1520, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Hongjie He, Jiashu Zhang, Heng-Ming Tai |
Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers, pp. 132-145, 2009, Springer, 978-3-642-04430-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
block-neighborhood characterization, constant-average attack, fragile watermarking, self-recovery |
17 | Xinghao Jiang, Tanfeng Sun, Jiaqi Feng, Zhigao Lin, Huan Lu |
A Novel Differential Energy Watermarking Scheme Based on FSM Model against Video Time-Space Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2009, 10th Pacific Rim Conference on Multimedia, Bangkok, Thailand, December 15-18, 2009 Proceedings, pp. 1306-1312, 2009, Springer, 978-3-642-10466-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Raphael Chung-Wei Phan |
Tampering with a watermarking-based image authentication scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. ![In: Pattern Recognit. 41(11), pp. 3493-3496, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Yu-Jie Chang, Ran-Zan Wang, Ja-Chen Lin |
A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Adv. Signal Process. ![In: EURASIP J. Adv. Signal Process. 2008, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Marie-Charlotte Poilpré, Patrick Perrot, Hugues Talbot |
Image tampering detection using Bayer interpolation and JPEG compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 17, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Yu-Feng Hsu, Shih-Fu Chang |
Statistical fusion of multiple cues for image tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSCC ![In: 42nd Asilomar Conference on Signals, Systems and Computers, ACSSC 2008, Pacific Grove, CA, USA, October 26-29, 2008, pp. 1386-1390, 2008, IEEE, 978-1-4244-2940-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Patrick Bas, Gwenaël J. Doërr |
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 227-232, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dirty paper trellis watermarking, security, attack |
17 | Adam J. Rocke, Ronald F. DeMara, Simon Foo 0001 |
Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 5(1), pp. 21-31, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
17 | Xunzhan Zhu, Anthony T. S. Ho, Pina Marziliano |
A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. Image Commun. ![In: Signal Process. Image Commun. 22(5), pp. 515-528, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Hongmei Gou, Ashwin Swaminathan, Min Wu 0001 |
Noise Features for Image Tampering Detection and Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (6) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 97-100, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yao-Chung Lin, David P. Varodayan, Bernd Girod |
Image Authentication and Tampering Localization using Distributed Source Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMSP ![In: IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007, Chania, Crete, Greece, October 1-3, 2007, pp. 393-396, 2007, IEEE, 978-1-4244-1274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha K. Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan |
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 30-39, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yoav Goldberg, Michael Elhadad |
SVM Model Tampering and Anchored Learning: A Case Study in Hebrew NP Chunking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL ![In: ACL 2007, Proceedings of the 45th Annual Meeting of the Association for Computational Linguistics, June 23-30, 2007, Prague, Czech Republic, 2007, The Association for Computational Linguistics. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
17 | Chin-Chen Chang 0001, Yih-Shin Hu, Tzu-Chuen Lu |
A watermarking-based image ownership and tampering authentication scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. Lett. ![In: Pattern Recognit. Lett. 27(5), pp. 439-446, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Huijuan Yang, Alex ChiChung Kot |
Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Signal Process. Lett. ![In: IEEE Signal Process. Lett. 13(12), pp. 741-744, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Huijuan Yang, Alex C. Kot |
Two-Layer Binary Image Authentication With Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP (2) ![In: 2006 IEEE International Conference on Acoustics Speech and Signal Processing, ICASSP 2006, Toulouse, France, May 14-19, 2006, pp. 309-312, 2006, IEEE, 1-4244-0469-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Bin Fu, Golden G. Richard III, Yixin Chen 0002 |
Some new approaches for preventing software tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 44st Annual Southeast Regional Conference, 2006, Melbourne, Florida, USA, March 10-12, 2006, pp. 655-660, 2006, ACM, 1-59593-315-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|