Sciweavers

37 search results - page 2 / 8
» On the Security of Image Manipulation Forensics
Sort
View
ACSAC
2005
IEEE
13 years 10 months ago
Building Evidence Graphs for Network Forensics Analysis
In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated reasoning. We propose the...
Wei Wang, Thomas E. Daniels
DOCENG
2010
ACM
13 years 6 months ago
Document imaging security and forensics ecosystem considerations
: Document Imaging Security and Forensics Ecosystem Considerations Steven Simske, Margaret Sturgill, Guy Adams, Paul Everest HP Laboratories HPL-2010-156 Security, Forensics, Colo...
Steven J. Simske, Margaret Sturgill, Guy Adams, Pa...
ICASSP
2010
IEEE
13 years 5 months ago
Geometric tampering estimation by means of a SIFT-based forensic analysis
In many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watcher’s opi...
Irene Amerini, Lamberto Ballan, Roberto Caldelli, ...
IWDW
2007
Springer
13 years 11 months ago
Detecting Photographic Composites of People
The compositing of two or more people into a single image is a common form of manipulation. We describe how such composites can be detected by estimating a camera’s intrinsic par...
Micah K. Johnson, Hany Farid
ICASSP
2010
IEEE
13 years 5 months ago
Forensic estimation and reconstruction of a contrast enhancement mapping
Due to the ease with which convincing digital image forgeries can be created, a need has arisen for digital forensic techniques capable of detecting image manipulation. Once image...
Matthew C. Stamm, K. J. Ray Liu