Media forensics tries to determine the originating device of a signal. We apply this paradigm to microphone forensics, determining the microphone model used to record a given audio...
Image splicing detection has been considered as one of the most challenging problems in passive image authentication. In this paper, we propose an automatic detection framework to ...
— We consider a network setting, where a single Service Provider (SP) provides wireless data services to a group of users in the downlink. The transmission model is similar to OF...
— One feature that classification algorithms typically lack is the ability to know what they do not know. With this knowledge an algorithm would be able to operate in any domain...
CWI and University of Twente used PF/Tijah, a flexible XML retrieval system, to evaluate structured document retrieval, multimedia retrieval, and entity ranking tasks in the conte...
Theodora Tsikrika, Pavel Serdyukov, Henning Rode, ...