Sciweavers

IMF
2008
13 years 6 months ago
Reconstructing People's Lives: A Case Study in Teaching Forensic Computing
Abstract: In contrast to the USA and the UK, the academic field of forensic computing is still in its infancy in Germany. To foster the exchange of experiences, we report on lesson...
Felix C. Freiling, Thorsten Holz, Martin Mink
MEDIAFORENSICS
2010
13 years 6 months ago
Image forensic analyses that elude the human visual system
While historically we may have been overly trusting of photographs, in recent years there has been a backlash of sorts and the authenticity of photographs is now routinely questio...
Hany Farid, Mary J. Bravo
MEDIAFORENSICS
2010
13 years 6 months ago
Fast identification of highly distorted images
In this paper, we consider a low complexity identification system for highly distorted images. The performance of the proposed identification system is analyzed based on the avera...
Taras Holotyak, Sviatoslav Voloshynovskiy, Fokko B...
MEDIAFORENSICS
2010
13 years 6 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
MEDIAFORENSICS
2010
13 years 6 months ago
On detection of median filtering in digital images
In digital image forensics, it is generally accepted that intentional manipulations of the image content are most critical and hence numerous forensic methods focus on the detecti...
Matthias Kirchner, Jessica J. Fridrich
MEDIAFORENSICS
2010
13 years 6 months ago
Improving re-sampling detection by adding noise
Current image re-sampling detectors can reliably detect re-sampling in JPEG images only up to a Quality Factor (QF) of 95 or higher. At lower QFs, periodic JPEG blocking artifacts...
Lakshmanan Nataraj, Anindya Sarkar, B. S. Manjunat...
MEDIAFORENSICS
2010
13 years 6 months ago
Efficient estimation of CFA pattern configuration in digital camera images
This paper proposes an efficient method to determine the concrete configuration of the color filter array (CFA) from demosaiced images. This is useful to decrease the degrees of f...
Matthias Kirchner
MEDIAFORENSICS
2010
13 years 6 months ago
Texture based attacks on intrinsic signature based printer identification
Several methods exist for printer identification from a printed document. We have developed a system that performs printer identification using intrinsic signatures of the printer...
Aravind K. Mikkilineni, Nitin Khanna, Edward J. De...
MEDIAFORENSICS
2010
13 years 6 months ago
Detecting content adaptive scaling of images for forensic applications
Content-aware resizing methods have recently been developed, among which, seam-carving has achieved the most widespread use. Seam-carving's versatility enables deliberate obj...
Claude Fillion, Gaurav Sharma
MEDIAFORENSICS
2010
13 years 6 months ago
Multimodal object authentication with random projections: a worst-case approach
In this paper, we consider a forensic multimodal authentication framework based on binary hypothesis testing in random projections domain. We formulate a generic authentication pr...
Oleksiy J. Koval, Sviatoslav Voloshynovskiy