Sciweavers

68 search results - page 2 / 14
» Attacks and Forensic Analysis for Multimedia Content Protect...
Sort
View
MMSEC
2006
ACM
115views Multimedia» more  MMSEC 2006»
14 years 6 days ago
An improvement to a biometric.based multimedia content protection scheme
A biometric-based method for multimedia content protection was recently proposed. The method relies on biometric data of the user and a layered encryption mechanism to achieve con...
Daniel Socek, Michal Sramka, Oge Marques, Dubravko...
CCS
2011
ACM
12 years 6 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
ICIP
2010
IEEE
13 years 4 months ago
Multimedia forensic hash based on visual words
In recent years, digital images and videos have become increasingly popular over the internet and bring great social impact to a wide audience. In the meanwhile, technology advanc...
Wenjun Lu, Min Wu
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
14 years 17 days ago
Attacking Some Perceptual Image Hash Algorithms
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robustness, such techniques might not work well when malicious attack is perceptuall...
Li Weng, Bart Preneel
ICASSP
2010
IEEE
13 years 6 months ago
Geometric tampering estimation by means of a SIFT-based forensic analysis
In many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watcher’s opi...
Irene Amerini, Lamberto Ballan, Roberto Caldelli, ...