-
1
-
-
64549143298
-
Special Issue on Recent Advances in Distributed Multimedia Communications
-
C.W. Chen, W. Zeng, and R. Steinmetz (eds), January
-
C.W. Chen, W. Zeng, and R. Steinmetz (eds), "Special Issue on Recent Advances in Distributed Multimedia Communications," Proc. of IEEE, vol.96, no.1, January 2008.
-
(2008)
Proc. of IEEE
, vol.96
, Issue.1
-
-
-
2
-
-
85032751542
-
Special Issue on Forensics Analysis of Digital Evidence
-
E. Delp; N. Memon; M. Wu (eds), March
-
E. Delp; N. Memon; M. Wu (eds), "Special Issue on Forensics Analysis of Digital Evidence," IEEE Signal Processing Magazine, vol.26, no.2, March 2009.
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, Issue.2
-
-
-
5
-
-
33847748167
-
Non-Intrusive Component Forensics of Visual Sensors Using Output Images
-
March
-
A. Swaminathan, M.Wu and K. J. Ray Liu, "Non-Intrusive Component Forensics of Visual Sensors Using Output Images," IEEE Trans. of Information Forensics and Security, vol.2, no.1, pp. 91-106, March 2007.
-
(2007)
IEEE Trans. of Information Forensics and Security
, vol.2
, Issue.1
, pp. 91-106
-
-
Swaminathan, A.1
Wu, M.2
Ray Liu, K.J.3
-
6
-
-
13244251141
-
Exposing Digital Forgeries by Detecting Traces of Re-Sampling
-
A. C. Popescu and H. Farid, "Exposing Digital Forgeries by Detecting Traces of Re-Sampling," IEEE Trans. Signal Processing, vol.53, no.2. pp. 758-767, 2005.
-
(2005)
IEEE Trans. Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
9
-
-
0034444578
-
Robust Image Hashing
-
R. Venkatesan, S. M. Koon, M. H. Jakubowski and P. Moulin, "Robust Image Hashing," Proc. of IEEE Int. Conf. on Image Processing, vol.3, pp. 664-666, 2000.
-
(2000)
Proc. of IEEE Int. Conf. on Image Processing
, vol.3
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
11
-
-
33744764278
-
Robust and Secure Image Hashing
-
June
-
A. Swaminathan, Y. Mao, and M. Wu, "Robust and Secure Image Hashing", IEEE Trans. on Information Forensics and Security, vol.1, no.2, pp. 215-230, June 2006.
-
(2006)
IEEE Trans. on Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
12
-
-
48149093483
-
Robust Hash for Detecting and Localizing Image Tampering
-
S. Roy and Q. Sun, "Robust Hash for Detecting and Localizing Image Tampering," Proc. of IEEE Int. Conf. on Image Processing, vol.6, pp. 117-120, 2007.
-
(2007)
Proc. of IEEE Int. Conf. on Image Processing
, vol.6
, pp. 117-120
-
-
Roy, S.1
Sun, Q.2
-
13
-
-
3042535216
-
Distinctive Image Features from Scale-Invariant Keypoints
-
D. Lowe, "Distinctive Image Features from Scale-Invariant Keypoints," Int. J. Computer. Vision, vol.60, pp. 91-110, 2004.
-
(2004)
Int. J. Computer. Vision
, vol.60
, pp. 91-110
-
-
Lowe, D.1
-
14
-
-
70349194551
-
Distributed Source Coding Authentication of Images with Affine Warping
-
Y.-C. Lin, D. Varodayan, and B. Girod, "Distributed Source Coding Authentication of Images with Affine Warping," Proc. of IEEE Int. Conf. on Acoustic, Speech, and Signal Processing (ICASSP), 2009.
-
Proc. of IEEE Int. Conf. on Acoustic, Speech, and Signal Processing (ICASSP), 2009
-
-
Lin, Y.-C.1
Varodayan, D.2
Girod, B.3
|