Sciweavers

195 search results - page 26 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
NSPW
2004
ACM
15 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ACSAC
1999
IEEE
15 years 1 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
15 years 3 months ago
Improvements on Sensor Noise Based Source Camera Identification
In [1], a novel method for identifying the source camera of a digital image is proposed. The method is based on first extracting imaging sensor’s pattern noise from many images...
Yagiz Sutcu, Sevinc Bayram, Husrev T. Sencar, Nasi...
JIPS
2010
110views more  JIPS 2010»
14 years 4 months ago
A License Audit Model for Secure DRM Systems in IP-based Environments
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by c...
Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin
ICMCS
2010
IEEE
149views Multimedia» more  ICMCS 2010»
14 years 9 months ago
Single-view recaptured image detection based on physics-based features
In daily life, we can see images of real-life objects on posters, television, or virtually any type of smooth physical surfaces. We seldom confuse these images with the objects pe...
Xinting Gao, Tian-Tsong Ng, Bo Qiu, Shih-Fu Chang