Sciweavers

7596 search results - page 75 / 1520
» Challenges in forensic computing
Sort
View
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
15 years 3 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
MMSEC
2005
ACM
129views Multimedia» more  MMSEC 2005»
15 years 3 months ago
Exposing digital forgeries by detecting inconsistencies in lighting
When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from the individual photographs. Lighti...
Micah K. Johnson, Hany Farid
ECAI
2008
Springer
14 years 11 months ago
Author Identification Using a Tensor Space Representation
Author identification is a text categorization task with applications in intelligence, criminal law, computer forensics, etc. Usually, in such cases there is shortage of training t...
Spyridon Plakias, Efstathios Stamatatos
ECIR
2003
Springer
14 years 11 months ago
Corpus-Based Thesaurus Construction for Image Retrieval in Specialist Domains
This paper explores the use of texts that are related to an image collection, also known as collateral texts, for building thesauri in specialist domains to aid in image retrieval....
Khurshid Ahmad, Mariam Tariq, Bogdan Vrusias, Chri...
COMPSEC
2006
90views more  COMPSEC 2006»
14 years 9 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...