Sciweavers

18 search results - page 3 / 4
» Digital Image Forensics via Intrinsic Fingerprints
Sort
View
SADFE
2005
IEEE
13 years 12 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
ICIP
2005
IEEE
14 years 8 months ago
Risk minimization in traitors within traitors in multimedia forensics
In digital fingerprinting and multimedia forensic systems, it is possible that multiple adversaries mount attacks collectively and effectively to undermine the forensic system...
H. Vicky Zhao, K. J. Ray Liu
ICIP
2005
IEEE
13 years 12 months ago
Digital "bullet scratches" for images
The problem investigated in this paper is identification of sensor that was used to obtain a given digital image. We show that the high-medium frequency component of the sensor pa...
Jan Lukás, Jessica J. Fridrich, Miroslav Go...
TIFS
2008
120views more  TIFS 2008»
13 years 6 months ago
Determining Image Origin and Integrity Using Sensor Noise
In this paper, we provide a unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformit...
Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan...
ICIP
2005
IEEE
14 years 8 months ago
Collusion-resistant intentional de-synchronization for digital video fingerprinting
A powerful class of attacks in multimedia fingerprinting is known as collusion attacks, where a clique of colluders, each having a copy of the same multimedia content with differe...
Mehmet Kivanç Mihçak, Yinian Mao