Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Abstract. We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers....
The compositing of two or more people into a single image is a common form of manipulation. We describe how such composites can be detected by estimating a camera’s intrinsic par...
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting ...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...