Sciweavers

195 search results - page 30 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
ICDAR
2011
IEEE
13 years 9 months ago
Evaluating the Rarity of Handwriting Formations
—Identifying unusual or unique characteristics of an observed sample in useful in forensics in general and handwriting analysis in particular. Rarity is formulated as the probabi...
Sargur N. Srihari
ICIP
2006
IEEE
15 years 11 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu
AVSS
2009
IEEE
15 years 4 months ago
Event Composition with Imperfect Information for Bus Surveillance
—Demand for bus surveillance is growing due to the increased threats of terrorist attack, vandalism and litigation. However, CCTV systems are traditionally used in forensic mode,...
Jianbing Ma, Weiru Liu, Paul Miller, Weiqi Yan
79
Voted
BMCBI
2008
102views more  BMCBI 2008»
14 years 9 months ago
mtDNAmanager: a Web-based tool for the management and quality analysis of mitochondrial DNA control-region sequences
Background: For the past few years, scientific controversy has surrounded the large number of errors in forensic and literature mitochondrial DNA (mtDNA) data. However, recent res...
Hwan Young Lee, Injee Song, Eunho Ha, Sung-Bae Cho...
MEDIAFORENSICS
2010
14 years 8 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain