Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
93 | Masaru Takesue |
A tampering protocol for reducing the coherence transactions in regular computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 1997 International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN '97), 18-20 December 1997, Taipei, Taiwan, pp. 465-471, 1997, IEEE Computer Society, 0-8186-8259-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
tampering protocol, coherence transactions, regular computation, latency of communication, protocols, multiprocessor, cache-coherence protocol, RTL simulator |
81 | Wei Wang 0025, Jing Dong 0003, Tieniu Tan |
A Survey of Passive Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings, pp. 308-322, 2009, Springer, 978-3-642-03687-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Image Tampering, Image Tampering Detection, Imaging Process, Image Model |
72 | Hongxia Jin, Jeffery Lotspiech |
Proactive Software Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 352-365, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Dun-Yu Hsiao, Soo-Chang Pei |
Detecting Digital Tampering by Blur Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan, pp. 264-278, 2005, IEEE Computer Society, 0-7695-2478-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Xianfeng Zhao, Weinong Wang, Kefei Chen |
Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 4th International Conference, WAIM 2003, Chengdu, China, August 17-19, 2003, Proceedings, pp. 483-494, 2003, Springer, 3-540-40715-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Ying Chen, Yuping Wang |
Exposing Digital Forgeries by Detecting Traces of Smoothing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1440-1445, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Sujoy Roy, Qibin Sun |
Robust Hash for Detecting and Localizing Image Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (6) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 117-120, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Ashwin Swaminathan, Min Wu 0001, K. J. Ray Liu |
Image Tampering Identification using Blind Deconvolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 2309-2312, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos Papanikolopoulos, Richard M. Voyles |
Real-Time Detection of Camera Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: Advanced Video and Signal Based Surveillance, 2006 IEEE International Conference on Video and Signal Based Surveillance (AVSS'06), 22-24 November 2006, Sydney, Australia., pp. 10, 2006, IEEE Computer Society, 0-7695-2688-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Huajian Liu, Martin Steinebach |
Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AXMEDIS ![In: Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, AXMEDIS 2006, Leeds, UK, December 13-15, 2006, pp. 143-152, 2006, IEEE Computer Society, 0-7695-2625-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Fangyong Hou, Zhiying Wang, Zhen Liu, Yun Liu |
Avoid Powerful Tampering by Malicious Host. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 907-915, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Yao-Chung Lin, David P. Varodayan, Bernd Girod |
Video quality monitoring for mobile multicast peers using distributed source coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiMedia ![In: Proceedings of the 5th International Conference on Mobile Multimedia Communications, MobiMedia 2009, London, UK, September 7-9, 2009, 2009, ICST, 978-963-9799-62-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
peer-to-peer multicast video streaming, video quality estimation, transcoding, distributed source coding, tampering detection |
43 | Hany Farid |
Exposing digital forgeries in scientific images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006, pp. 29-36, 2006, ACM, 1-59593-493-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
digital forensics, digital tampering |
43 | Micah K. Johnson, Hany Farid |
Exposing digital forgeries through chromatic aberration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006, pp. 48-55, 2006, ACM, 1-59593-493-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
digital forensics, digital tampering |
39 | Yao-Chung Lin, David P. Varodayan, Torsten Fink, Erwin B. Bellers, Bernd Girod |
Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 2204-2207, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tubaro |
Localization of sparse image tampering via random projections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 2092-2095, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi |
Physical Security Bounds Against Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 253-267, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Tamper-Proof Hardware, Fault Prevention, Fault Detection, Error Detection, Fault Analysis, Physical Security, Adversarial Model, Implementation Attack |
39 | Kyriacos E. Pavlou, Richard T. Snodgrass |
Forensic analysis of database tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Chicago, Illinois, USA, June 27-29, 2006, pp. 109-120, 2006, ACM, 1-59593-256-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
append-only, corruption diagram, forensic strength, cryptographic hash function |
38 | Xuping Huang, Isao Echizen, Akira Nishimura |
A New Approach of Reversible Acoustic Steganography for Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 538-542, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Reversible acoustic steganography, feature extraction (hash), tampering detection |
33 | Richa Singh 0001, Mayank Vatsa, Sanjay Kumar Singh, Saurabh Upadhyay |
Integrating SVM classification with SVD watermarking for intelligent video authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 40(1-2), pp. 5-15, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Video authentication, Relative correlation, Support vector machine, Watermarking, Singular value decomposition |
33 | Ali Saglam, Alptekin Temizel |
Real-Time Adaptive Camera Tamper Detection for Video Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2009, 2-4 September 2009, Genova, Italy, pp. 430-435, 2009, IEEE Computer Society, 978-0-7695-3718-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Hongjie He, Jiashu Zhang, Fan Chen 0003 |
A self-recovery fragile watermarking scheme for image authentication with superior localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(10), pp. 1487-1507, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
tamper recovery, probability of false rejection, probability of false acceptance, digital watermarking |
33 | Parag Agarwal, Balakrishnan Prabhakaran 0001 |
Tamper proofing mechanisms for motion capture data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 91-100, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
watermarking, encoding, decoding, blind, spatial |
33 | Weihong Wang, Hany Farid |
Exposing Digital Forgeries in Interlaced and Deinterlaced Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 2(3-1), pp. 438-449, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Seok Min Yoon, Seung Wook Lee, Hongmoon Wang, Jong Tae Kim |
Encoding-Based Tamper-Resistant Algorithm for Mobile Device Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part IV, pp. 578-581, 2007, Springer, 978-3-540-72589-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Mobile Device, Tamper-resistant |
33 | Huajian Liu, Martin Steinebach |
Digital Watermarking for Image Authentication with Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 1973-1976, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Kun Zhang 0006, Tao Zhang 0037, Santosh Pande |
Memory Protection through Dynamic Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-39 2006), 9-13 December 2006, Orlando, Florida, USA, pp. 123-134, 2006, IEEE Computer Society, 0-7695-2732-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Xiaotong Zhuang, Tao Zhang 0037, Santosh Pande |
Using Branch Correlation to Identify Infeasible Paths for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-39 2006), 9-13 December 2006, Orlando, Florida, USA, pp. 113-122, 2006, IEEE Computer Society, 0-7695-2732-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Vidyasagar M. Potdar, Chen Wu 0001, Elizabeth Chang 0001 |
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 273-278, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Asnat Dadon-Elichai |
RDS: Remote Distributed Scheme for Protecting Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 19-23 August 2004, New York, NY, USA, pp. 354-361, 2004, IEEE Computer Society, 1-58113-864-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security, mobile agents, secret - sharing |
33 | Gene Itkis |
Cryptographic tamper evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 355-364, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
evolving cryptosystems, key evolution, tamper evidence, digital signatures, exposures |
33 | Yuichi Nakai |
Semi Fragile Watermarking Based on Wavelet Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pacific Rim Conference on Multimedia ![In: Advances in Multimedia Information Processing - PCM 2001, Second IEEE Pacific Rim Conference on Multimedia, Bejing, China, October 24-26, 2001, Proceedings, pp. 796-803, 2001, Springer, 3-540-42680-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Eshan Chattopadhyay, Xin Li 0006 |
Non-malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (3) ![In: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part III, pp. 584-613, 2020, Springer, 978-3-030-64380-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
33 | Eshan Chattopadhyay, Xin Li 0006 |
Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 1069, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
32 | Dhruv Mahajan 0001, Ravi Ramamoorthi, Brian Curless |
A Theory Of Frequency Domain Invariants: Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 30(2), pp. 197-213, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Frequency Domain Invariants, Spherical harmonic identities, Convolution, Relighting, Inverse rendering, Image Forensics, Tampering |
32 | Micah K. Johnson, Hany Farid |
Detecting Photographic Composites of People. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 19-33, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Digital Forensics, Digital Tampering |
32 | Weihong Wang, Hany Farid |
Exposing digital forgeries in video by detecting duplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 35-42, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
digital forensics, digital tampering |
32 | Marwan Abi-Antoun, Daniel Wang, Peter Torr |
Checking threat modeling data flow diagrams for implementation conformance and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), November 5-9, 2007, Atlanta, Georgia, USA, pp. 393-396, 2007, ACM, 978-1-59593-882-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing |
32 | Micah K. Johnson, Hany Farid |
Exposing Digital Forgeries Through Specular Highlights on the Eye. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 311-325, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Digital Forensics, Digital Tampering |
32 | Shih-Fu Chang |
Blind Passive Media Forensics: Motivation and Opportunity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCAM ![In: Multimedia Content Analysis and Mining, International Workshop, MCAM 2007, Weihai, China, June 30 - July 1, 2007, Proceedings, pp. 57-59, 2007, Springer. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
media forensics, detection of image forgery and tampering, media security |
32 | Chin-Chen Chang 0001, Chih-Chiang Tsou, Yung-Chen Chou |
A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2007, 8th Pacific Rim Conference on Multimedia, Hong Kong, China, December 11-14, 2007, Proceedings, pp. 446-449, 2007, Springer, 978-3-540-77254-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
quad-tree segmentation, Image authentication, tampering detection |
32 | Kerstin Lemke-Rust, Christof Paar |
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, pp. 131-143, 2006, Springer, 3-540-46250-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Tamper-Proof Hardware, Fault Analysis, Physical Security, Adversarial Model, Tampering, Implementation Attack |
32 | Micah K. Johnson, Hany Farid |
Exposing digital forgeries by detecting inconsistencies in lighting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 1-10, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
digital forensics, digital tampering |
32 | Hao-Tian Wu, Yiu-ming Cheung |
A fragile watermarking scheme for 3D meshes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 117-124, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
dither modulation, mesh authentication, mesh centroid, fragile watermarking, tampering detection |
28 | Pin Zhang, Xiangwei Kong |
Detecting Image Tampering Using Feature Fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 335-340, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Kyriacos E. Pavlou, Richard T. Snodgrass |
Forensic analysis of database tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 33(4), pp. 30:1-30:47, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Monochromatic algorithm, Polychromatic algorithm, RGBY algorithm, Tiled Bitmap algorithm, a3D algorithm, compliant records, forensic analysis algorithm, forensic cost |
28 | Yi-Lei Chen, Chiou-Ting Hsu |
Image tampering detection by blocking periodicity analysis in JPEG compressed images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMSP ![In: International Workshop on Multimedia Signal Processing, MMSP 2008, October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia, pp. 803-808, 2008, IEEE Signal Processing Society, 978-1-4244-2295-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere |
Run-Time Randomization to Mitigate Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 153-168, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Mohsen Sharifi, Mohammad Zoroufi, Alireza Saberi |
How to Counter Control Flow Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan, pp. 815-818, 2007, IEEE Computer Society, 1-4244-1030-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao |
A control flow obfuscation method to discourage malicious tampering of software codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 362, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation |
28 | S. Prasad, K. Ramakrishnan |
On Resampling Detection and its Application to Detect Image Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, ICME 2006, July 9-12 2006, Toronto, Ontario, Canada, pp. 1325-1328, 2006, IEEE Computer Society, 1-4244-0367-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara |
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings, pp. 279-293, 2009, Springer, 978-3-642-03687-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
tampered-MSB localization, tampered-LSB localization, Image authentication, fragile watermarking |
22 | Siyue Chen, Henry Leung |
Chaotic Watermarking for Video Authentication in Surveillance Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 18(5), pp. 704-709, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha |
Architectural support for securing application data in embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2008 IEEE International Conference on Electro/Information Technology, EIT 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008, pp. 19-24, 2008, IEEE, 978-1-4244-2030-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono |
FlexBox: Sandboxing internet servers based on layer-7 contexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 386-391, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Irfan A. Siddavatam, Jayant Gadge |
Comprehensive test mechanism to detect attack on Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Debasri Saha, Susmita Sur-Kolay |
Fast Robust Intellectual Property Protection for VLSI Physical Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 10th International Conference on Information Technology, ICIT 2007, Roukela, India, 17-20 December 2007, pp. 1-6, 2007, IEEE Computer Society, 0-7695-3068-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
fingerprint- ing, VLSI physical design, watermarking, Intellectual property, electronic design automation |
22 | Andrew B. T. Hopkins, Klaus D. McDonald-Maier, Evangelos Papoutsis, W. Gareth J. Howells |
Ensuring data integrity via ICmetrics based security infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHS ![In: Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), August 5-8, 2007, University of Edinburgh, Scotland, United Kingdom, pp. 75-81, 2007, IEEE Computer Society, 0-7695-2866-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Arati Baliga, Pandurang Kamat, Liviu Iftode |
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 246-251, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Linna Zhou, Dongming Wang, Yunbiao Guo, Jingfei Zhang |
Blur Detection of Digital Forgery Using Mathematical Morphology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 990-998, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
safety content management application, mathematical morphology, blur, image forensics, security agent |
22 | Neerja Bhatnagar, Ethan L. Miller |
Designing a secure reliable file system for sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, StorageSS 2007, Alexandria, VA, USA, October 29, 2007, pp. 19-24, 2007, ACM, 978-1-59593-891-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
sensor network file system, secure, reliable |
22 | Yongdong Wu |
Tamper-Localization Watermarking with Systematic Error Correcting Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 1965-1968, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Weiqi Luo 0001, Jiwu Huang, Guoping Qiu |
Robust Detection of Region-Duplication Forgery in Digital Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (4) ![In: 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, pp. 746-749, 2006, IEEE Computer Society, 0-7695-2521-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Hongxia Jin |
Higher Dependability and Security for Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 89-103, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Weihong Wang, Hany Farid |
Exposing digital forgeries in video by detecting double MPEG compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006, pp. 37-47, 2006, ACM, 1-59593-493-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
digital tamperin, digital forensics |
22 | Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai, David A. Wagner 0001 |
Private Circuits II: Keeping Secrets in Tamperable Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pp. 308-327, 2006, Springer, 3-540-34546-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Farinaz Koushanfar, Inki Hong, Miodrag Potkonjak |
Behavioral synthesis techniques for intellectual property protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 10(3), pp. 523-545, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
watermarking, behavioral synthesis, Intellectual property protection |
22 | Aydan R. Yumerefendi, Jeffrey S. Chase |
Trust but verify: accountability for network services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS European Workshop ![In: Proceedings of the 11st ACM SIGOPS European Workshop, Leuven, Belgium, September 19-22, 2004, pp. 37, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Alin C. Popescu, Hany Farid |
Statistical Tools for Digital Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, pp. 128-147, 2004, Springer, 3-540-24207-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Ee-Chien Chang, Mohan S. Kankanhalli, Xin Guan, Zhiyong Huang, Yinghui Wu |
Robust image authentication using content based compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 9(2), pp. 121-130, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Security, Wavelets, Watermarking, Digital signature, Signal processing |
22 | G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas |
AEGIS: architecture for tamper-evident and tamper-resistant processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Proceedings of the 17th Annual International Conference on Supercomputing, ICS 2003, San Francisco, CA, USA, June 23-26, 2003, pp. 160-171, 2003, ACM, 1-58113-733-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
software licensing, secure processors, certified execution |
22 | Paolo Maggi, Riccardo Sisto |
A configurable mobile agent data protection protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 851-858, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
mobile agents, data integrity, cryptographic protocols, data authenticity |
22 | Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg |
Natural Language Watermarking and Tamperproofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 196-212, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Liehua Xie, Gonzalo R. Arce, R. F. Graveman |
Approximate image message authentication codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 3(2), pp. 242-252, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Faisal Alturki, Russell M. Mersereau |
Secure fragile digital watermarking technique for image authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the 2001 International Conference on Image Processing, ICIP 2001, Thessaloniki, Greece, October 7-10, 2001, pp. 1031-1034, 2001, IEEE, 0-7803-6725-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Shuihua Han, Stephen Leung, Zongwei Luo |
Tamper Detection in the EPC Network Using Digital Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(5), pp. 62-69, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
data tampering, RFID, watermarking, EPC |
21 | Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi |
A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 192-197, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data integrity, web application, web based-systems, HMAC, security vulnerabilities, tampering, Web authentication |
21 | Xinpeng Zhang 0001, Shuozhong Wang, Guorui Feng |
Fragile Watermarking Scheme with Extensive Content Restoration Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings, pp. 268-278, 2009, Springer, 978-3-642-03687-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
content restoration, tampering rate, fragile watermarking |
21 | Eric Kee, Hany Farid |
Printer profiling for forensics and ballistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 3-10, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
document authentication, printer ballistics, digital forensics, digital tampering |
21 | Weihong Wang, Hany Farid |
Detecting Re-projected Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 72-86, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Digital Forensics, Digital Tampering |
21 | Walter Geisselhardt, Taswar Iqbal |
High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 203-221, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Smart IDs, data tampering, entertainment tickets protection, printing scanning, 2-D Bar codes, HD-DataStripe, data encoding in background images, biometrics, watermarking, copy detection, counterfeiting, halftone images |
21 | Yun Q. Shi 0001, Chunhua Chen 0001, Guorong Xuan, Wei Su 0001 |
Steganalysis Versus Splicing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 158-172, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
splicing detection, natural image model, Steganography, steganalysis, digital forensics, tampering detection |
21 | Ross J. Anderson |
On the Security of Digital Tachographs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 111-125, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
tachographs, smartcard, fraud, tampering |
17 | Zihan Yuan, Xinpeng Zhang 0001, Zichi Wang, Zhaoxia Yin |
Semi-fragile neural network watermarking for content authentication and tampering localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 236, pp. 121315, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Ifeoluwapo Aribilola, Brian Lee 0001, Mamoona Naveed Asghar |
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 25, pp. 101058, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Victor Fedoseev, Anna Denisova |
A Reversible Medical Image Watermarking Scheme for Advanced Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(4), pp. 365, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Ankit Yadav, Dhruv Gupta, Dinesh Kumar Vishwakarma |
Uncovering visual attention-based multi-level tampering traces for face forgery detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Image Video Process. ![In: Signal Image Video Process. 18(2), pp. 1259-1272, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Zhihui Zhao, Sen Zhao, Fei Lyu 0001, Shuaizong Si, Hongsong Zhu, Limin Sun |
RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(8), pp. 14771-14788, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Sunen Chakraborty, Kingshuk Chatterjee, Paramita Dey |
Detection of Image Tampering Using Deep Learning, Error Levels and Noise Residuals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Process. Lett. ![In: Neural Process. Lett. 56(2), pp. 112, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Amal Hammami, Amal Ben Hamida, Chokri Ben Amar, Henri Nicolas |
Blind Semi-fragile Hybrid Domain-Based Dual Watermarking System for Video Authentication and Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Circuits Syst. Signal Process. ![In: Circuits Syst. Signal Process. 43(1), pp. 264-301, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Tao Chen, Zhitao Liu, Hongye Su |
Tampering attack detection for remote interval observer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 361(1), pp. 71-84, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Li Dong 0006, Weipeng Liang, Rangding Wang |
Robust Text Image Tampering Localization via Forgery Traces Enhancement and Multiscale Attention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 70(1), pp. 3495-3507, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Guandong Li, Xian Yang, Wenpin Ma |
A Two-Stage Dual-Path Framework for Text Tampering Detection and Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.13545, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Giovanni Pasqualino, Luca Guarnera, Alessandro Ortis, Sebastiano Battiato |
MITS-GAN: Safeguarding Medical Imaging from Tampering with Generative Adversarial Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.09624, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Ian D. Kretz, Clare C. Parran, John D. Ramsdell, Paul D. Rowe |
Evidence Tampering and Chain of Custody in Layered Attestations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.00203, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Junlin Gu, Yihan Xu, Juan Sun, Weiwei Liu |
Image tampering detection based on feature consistency attention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 23(1), pp. 1-15, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Eunseok Lee 0002, Xibi Chen, Maitreyi Ashok, Jae-Yeon Won, Anantha P. Chandrakasan, Ruonan Han 0001 |
12.5 A Packageless Anti-Tampering Tag Utilizing Unclonable Sub-THz Wave Scattering at the Chip-Item Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSCC ![In: IEEE International Solid-State Circuits Conference, ISSCC 2024, San Francisco, CA, USA, February 18-22, 2024, pp. 226-228, 2024, IEEE, 979-8-3503-0620-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Alexander Naumann, Felix Hertlein, Laura Dörr, Kai Furmans |
TAMPAR: Visual Tampering Detection for Parcel Logistics in Postal Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WACV ![In: IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2024, Waikoloa, HI, USA, January 3-8, 2024, pp. 8061-8071, 2024, IEEE, 979-8-3503-1892-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Marco Fabris, Daniel Zelazo |
A Robustness Analysis to Structured Channel Tampering Over Secure-by-Design Consensus Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Control. Syst. Lett. ![In: IEEE Control. Syst. Lett. 7, pp. 2011-2016, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Xiaofan Xia, Songsong Zhang, Kunshu Wang, Tiegang Gao |
A novel color image tampering detection and self-recovery based on fragile watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 78, pp. 103619, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|