Sciweavers

195 search results - page 7 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
ICIP
2006
IEEE
15 years 11 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao
ICIP
2005
IEEE
15 years 11 months ago
Risk minimization in traitors within traitors in multimedia forensics
In digital fingerprinting and multimedia forensic systems, it is possible that multiple adversaries mount attacks collectively and effectively to undermine the forensic system...
H. Vicky Zhao, K. J. Ray Liu
ICIP
2006
IEEE
15 years 11 months ago
Scalable Multimedia Fingerprinting Forensics with Side Information
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
AUSFORENSICS
2003
14 years 11 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
ICMCS
2007
IEEE
206views Multimedia» more  ICMCS 2007»
15 years 4 months ago
A Survey on Digital Camera Image Forensic Methods
There are two main interests in Image Forensics, namely source identification and forgery detection. In this paper, we first briefly
Tran Van Lanh, Kai-Sen Chong, Sabu Emmanuel, Mohan...