-
3
-
-
46449095467
-
A survey on digital camera image forensic methods
-
T. V. Lanh, K.-S. Chong, S. Emmanuel, and M. S. Kankanhalli, "A survey on digital camera image forensic methods," in ICME, 2007, pp. 16-19.
-
(2007)
ICME
, pp. 16-19
-
-
Lanh, T.V.1
Chong, K.-S.2
Emmanuel, S.3
Kankanhalli, M.S.4
-
4
-
-
70349303469
-
Multimedia forensics is not computer forensics
-
R. Böhme, F. C. Freiling, T. Gloe, and M. Kirchner, "Multimedia forensics is not computer forensics," in IWCF, 2009, pp. 90-103.
-
(2009)
IWCF
, pp. 90-103
-
-
Böhme, R.1
Freiling, F.C.2
Gloe, T.3
Kirchner, M.4
-
7
-
-
77952591585
-
Source camera identification using enhanced sensor pattern noise
-
-, "Source camera identification using enhanced sensor pattern noise," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 280-287, 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 280-287
-
-
Li, C.-T.1
-
9
-
-
69749111736
-
Intrinsic sensor noise features for forensic analysis on scanners and scanned images
-
September Online. Available
-
H. Gou, A. Swaminathan, and M. Wu, "Intrinsic sensor noise features for forensic analysis on scanners and scanned images," Trans. Info. For. Sec., vol. 4, pp. 476-491, September 2009. [Online]. Available: http://portal.acm.org/citation.cfm?id=1651180.1651198
-
(2009)
Trans. Info. For. Sec.
, vol.4
, pp. 476-491
-
-
Gou, H.1
Swaminathan, A.2
Wu, M.3
-
10
-
-
70149088782
-
Source video camera identification for multiply compressed videos originating from youtube
-
W. van Houten and Z. Geradts, "Source video camera identification for multiply compressed videos originating from youtube," Digital Investigation, vol. 6, no. 1-2, pp. 48-60, 2009.
-
(2009)
Digital Investigation
, vol.6
, Issue.1-2
, pp. 48-60
-
-
Van Houten, W.1
Geradts, Z.2
-
11
-
-
50649103674
-
What, where and who? Classifying events by scene and object recognition
-
vol. 0
-
L.-J. Li and L. Fei-Fei, "What, where and who? classifying events by scene and object recognition," Computer Vision, IEEE International Conference on, vol. 0, pp. 1-8, 2007.
-
(2007)
Computer Vision, IEEE International Conference on
, pp. 1-8
-
-
Li, L.-J.1
Fei-Fei, L.2
-
12
-
-
77957897252
-
Recognizing picture-taking environment from satellite images: A feasibility study
-
J. Luo, W. Hao, D. McIntyre, D. Joshi, and J. Yu, "Recognizing picture-taking environment from satellite images: A feasibility study," in ICPR, 2008, pp. 1-4.
-
(2008)
ICPR
, pp. 1-4
-
-
Luo, J.1
Hao, W.2
McIntyre, D.3
Joshi, D.4
Yu, J.5
-
13
-
-
51949085938
-
Where am i: Place instance and category recognition using spatial pact
-
vol. 0
-
J. Wu and J. M. Rehg, "Where am i: Place instance and category recognition using spatial pact," Computer Vision and Pattern Recognition, IEEE Computer Society Conference on, vol. 0, pp. 1-8, 2008.
-
(2008)
Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
, pp. 1-8
-
-
Wu, J.1
Rehg, J.M.2
-
14
-
-
79960716929
-
Centrist: A visual descriptor for scene categorization
-
no. PrePrints
-
-, "Centrist: A visual descriptor for scene categorization," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 99, no. PrePrints, pp. 1-14, 2010.
-
(2010)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.99
, pp. 1-14
-
-
Wu, J.1
Rehg, J.M.2
-
15
-
-
70450161428
-
An empirical study of context in object detection
-
vol. 0
-
S. Divvala, D. Hoiem, J. Hays, A. Efros, and M. Hebert, "An empirical study of context in object detection," Computer Vision and Pattern Recognition, IEEE Computer Society Conference on, vol. 0, pp. 1271-1278, 2009.
-
(2009)
Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
, pp. 1271-1278
-
-
Divvala, S.1
Hoiem, D.2
Hays, J.3
Efros, A.4
Hebert, M.5
-
16
-
-
38849151499
-
Digital audio forensics: A first practical evaluation on microphone and environment classification
-
New York, NY, USA: Online. Available
-
C. Kraetzer, A. Oermann, J. Dittmann, and A. Lang, "Digital audio forensics: a first practical evaluation on microphone and environment classification," in Proceedings of the 9th workshop on Multimedia & security, ser. MM-Sec '07. New York, NY, USA: ACM, 2007, pp. 63-74. [Online]. Available: http://doi.acm.org/10.1145/1288869.1288879
-
(2007)
Proceedings of the 9th Workshop on Multimedia & Security, Ser. MM-Sec '07
, pp. 63-74
-
-
Kraetzer, C.1
Oermann, A.2
Dittmann, J.3
Lang, A.4
-
18
-
-
77955689262
-
Audio authenticity: Detecting enf discontinuity with high precision phase analysis
-
September Online. Available
-
D. P. N. Rodríguez, J. A. Apolinário, and L. W. P. Biscainho, "Audio authenticity: detecting enf discontinuity with high precision phase analysis," Trans. Info. For. Sec., vol. 5, pp. 534-543, September 2010. [Online]. Available: http://dx.doi.org/10.1109/TIFS.2010.2051270
-
(2010)
Trans. Info. For. Sec.
, vol.5
, pp. 534-543
-
-
Rodríguez, D.P.N.1
Apolinário, J.A.2
Biscainho, L.W.P.3
-
19
-
-
79960733678
-
-
Diamond Cut Productions, Inc., Tech. Rep. Application Notes, AN-4
-
C. Grigoras, "Digital audio recording analysis the electric network frequency criterion," Diamond Cut Productions, Inc., Tech. Rep. Application Notes, AN-4, 2003.
-
(2003)
Digital Audio Recording Analysis the Electric Network Frequency Criterion
-
-
Grigoras, C.1
-
20
-
-
79960715987
-
-
Name Unknown, February Online; Status 25/08/2010
-
Name Unknown, "Polizei zerschlägt Kinderporno-Ring mit 2360 Verdächtigen," http://www.spiegel.de/panorama/justiz/0,1518,464920,00. html, February 2007, [Online; Status 25/08/2010].
-
(2007)
Polizei Zerschlägt Kinderporno-Ring Mit 2360 Verdächtigen
-
-
-
21
-
-
72449170537
-
Detecting pornographic video content by combining image features with motion information
-
C. Jansohn, A. Ulges, and T. M. Breuel, "Detecting pornographic video content by combining image features with motion information," in ACM Multimedia, 2009, pp. 601-604.
-
(2009)
ACM Multimedia
, pp. 601-604
-
-
Jansohn, C.1
Ulges, A.2
Breuel, T.M.3
-
22
-
-
79960737022
-
Searching in space and time: A system for forensic analysis of large video repositories
-
ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Online. Available
-
A. van den Hengel, R. Hill, H. Detmold, and A. Dick, "Searching in space and time: a system for forensic analysis of large video repositories," in Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, ser. e-Forensics '08. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 4:1-4:6. [Online]. Available: http://portal.acm.org/citation.cfm?id=1363217.1363223
-
(2008)
Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, Ser. E-Forensics '08
-
-
Van Den Hengel, A.1
Hill, R.2
Detmold, H.3
Dick, A.4
-
23
-
-
14944374982
-
Forensic video reconstruction
-
New York, NY, USA: Online. Available
-
L. Huston, R. Sukthankar, J. Campbell, and P. Pillai, "Forensic video reconstruction," in Proceedings of the ACM 2nd international workshop on Video surveillance & sensor networks, ser. VSSN '04. New York, NY, USA: ACM, 2004, pp. 20-28. [Online]. Available: http://doi.acm.org/10.1145/1026799. 1026805
-
(2004)
Proceedings of the ACM 2nd International Workshop on Video Surveillance & Sensor Networks, Ser. VSSN '04
, pp. 20-28
-
-
Huston, L.1
Sukthankar, R.2
Campbell, J.3
Pillai, P.4
-
24
-
-
78449271408
-
Nudetective: A forensic tool to help combat child pornography through automatic nudity detection
-
M. de Castro Polastro and P. M. da Silva Eleuterio, "Nudetective: A forensic tool to help combat child pornography through automatic nudity detection," in DEXA Workshops, 2010, pp. 349-353.
-
DEXA Workshops, 2010
, pp. 349-353
-
-
De Castro Polastro, M.1
Da Silva Eleuterio, P.M.2
-
26
-
-
77957951513
-
Bag-of-visual-words models for adult image classification and filtering
-
T. Deselaers, L. Pimenidis, and H. Ney, "Bag-of-visual-words models for adult image classification and filtering," in ICPR, 2008, pp. 1-4.
-
(2008)
ICPR
, pp. 1-4
-
-
Deselaers, T.1
Pimenidis, L.2
Ney, H.3
-
27
-
-
78650300182
-
Original oder manipuliert?
-
10.1007/s00194-010-0669-1
-
F. Ramsthaler, M. Kettner, S. Potente, A. Gehl, K. Kreutz, and M. Verhoff, "Original oder manipuliert?" Rechtsmedizin, vol. 20, pp. 385-392, 2010, 10.1007/s00194-010-0669-1.
-
(2010)
Rechtsmedizin
, vol.20
, pp. 385-392
-
-
Ramsthaler, F.1
Kettner, M.2
Potente, S.3
Gehl, A.4
Kreutz, K.5
Verhoff, M.6
-
29
-
-
79960718594
-
Detecting copy-move forgery in digital images: A survey and analysis of current methods
-
B. L. Shivakumar, "Detecting copy-move forgery in digital images: A survey and analysis of current methods," Global Journal of Computer Science and Technology, vol. 10, pp. 61-65, 2010.
-
(2010)
Global Journal of Computer Science and Technology
, vol.10
, pp. 61-65
-
-
Shivakumar, B.L.1
-
31
-
-
70349199203
-
An efficient and robust method for detecting copy-move forgery
-
Washington, DC, USA: IEEE Computer Society, Online. Available
-
S. Bayram, H. Taha Sencar, and N. Memon, "An efficient and robust method for detecting copy-move forgery," in Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, ser. ICASSP '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 1053-1056. [Online]. Available: http://dx.doi.org/10.1109/ICASSP.2009.4959768
-
(2009)
Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, Ser. ICASSP '09
, pp. 1053-1056
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
32
-
-
77953650817
-
A bibliography on blind methods for identifying image forgery
-
Online. Available
-
B. Mahdian and S. Saic, "A bibliography on blind methods for identifying image forgery," Signal Processing: Image Communication, vol. 25, no. 6, pp. 389-399, 2010. [Online]. Available: http://www.sciencedirect.com/ science/article/B6V08-505N6XX-1/2/da59292ef818716646092b465521f7bc
-
(2010)
Signal Processing: Image Communication
, vol.25
, Issue.6
, pp. 389-399
-
-
Mahdian, B.1
Saic, S.2
-
33
-
-
70350536692
-
A survey of passive image tampering detection
-
Digital Watermarking, ser. A. Ho, Y. Shi, H. Kim, and M. Barni, Eds. Springer Berlin / Heidelberg
-
W. Wang, J. Dong, and T. Tan, "A survey of passive image tampering detection," in Digital Watermarking, ser. Lecture Notes in Computer Science, A. Ho, Y. Shi, H. Kim, and M. Barni, Eds. Springer Berlin / Heidelberg, 2009, vol. 5703, pp. 308-322.
-
(2009)
Lecture Notes in Computer Science
, vol.5703
, pp. 308-322
-
-
Wang, W.1
Dong, J.2
Tan, T.3
-
35
-
-
77950556097
-
Overview of audio forensics
-
Intelligent Multimedia Analysis for Security Applications, ser. H. Sencar, S. Velastin, N. Nikolaidis, and S. Lian, Eds. Springer Berlin / Heidelberg
-
R. Maher, "Overview of audio forensics," in Intelligent Multimedia Analysis for Security Applications, ser. Studies in Computational Intelligence, H. Sencar, S. Velastin, N. Nikolaidis, and S. Lian, Eds. Springer Berlin / Heidelberg, 2010, vol. 282, pp. 127-144.
-
(2010)
Studies in Computational Intelligence
, vol.282
, pp. 127-144
-
-
Maher, R.1
-
36
-
-
85032751728
-
Audio forensic examination: Authenticity, enhancement, and interpretation
-
-, "Audio forensic examination: authenticity, enhancement, and interpretation," in IEEE Signal Processing Magazine, vol. 26, no. 2, 2009, pp. 84-94.
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, Issue.2
, pp. 84-94
-
-
Maher, R.1
-
37
-
-
70349826507
-
Applications of enf analysis in forensic authentication of digital audio and video recordings
-
C. Grigoras, "Applications of enf analysis in forensic authentication of digital audio and video recordings," Journal of Audio Engineering Society, vol. 57, no. 9, pp. 643-661, 2009.
-
(2009)
Journal of Audio Engineering Society
, vol.57
, Issue.9
, pp. 643-661
-
-
Grigoras, C.1
-
38
-
-
0030384775
-
Techniques for data hiding
-
September
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, pp. 313-336, September 1996.
-
(1996)
IBM Syst. J.
, vol.35
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
39
-
-
79960141184
-
-
Ph.D. dissertation, Dartmouth College, Hanover, NH, USA, adviser-Farid, Hany
-
W. Wang, "Digital video forensics," Ph.D. dissertation, Dartmouth College, Hanover, NH, USA, 2009, adviser-Farid, Hany.
-
(2009)
Digital Video Forensics
-
-
Wang, W.1
-
40
-
-
38849195462
-
Exposing digital forgeries in video by detecting duplication
-
New York, NY, USA: Online. Available
-
W. Wang and H. Farid, "Exposing digital forgeries in video by detecting duplication," in Proceedings of the 9th workshop on Multimedia & security, ser. MM-Sec '07. New York, NY, USA: ACM, 2007, pp. 35-42. [Online]. Available: http://doi.acm.org/10.1145/1288869.1288876
-
(2007)
Proceedings of the 9th Workshop on Multimedia & Security, Ser. MM-Sec '07
, pp. 35-42
-
-
Wang, W.1
Farid, H.2
-
41
-
-
70449629685
-
Exposing digital forgeries in video by detecting double quantization
-
New York, NY, USA: Online. Available
-
-, "Exposing digital forgeries in video by detecting double quantization," in Proceedings of the 11th ACM workshop on Multimedia and security, ser. MM-Sec '09. New York, NY, USA: ACM, 2009, pp. 39-48. [Online]. Available: http://doi.acm.org/10.1145/1597817.1597826
-
(2009)
Proceedings of the 11th ACM Workshop on Multimedia and Security, Ser. MM-Sec '09
, pp. 39-48
-
-
Wang, W.1
Farid, H.2
-
42
-
-
60149105669
-
Detecting video forgeries based on noise characteristics
-
Advances in Image and Video Technology, ser. T. Wada, F. Huang, and S. Lin, Eds. Springer Berlin / Heidelberg
-
M. Kobayashi, T. Okabe, and Y. Sato, "Detecting video forgeries based on noise characteristics," in Advances in Image and Video Technology, ser. Lecture Notes in Computer Science, T. Wada, F. Huang, and S. Lin, Eds. Springer Berlin / Heidelberg, 2009, vol. 5414, pp. 306-317.
-
(2009)
Lecture Notes in Computer Science
, vol.5414
, pp. 306-317
-
-
Kobayashi, M.1
Okabe, T.2
Sato, Y.3
-
46
-
-
77954698591
-
Making sense of unstructured flash-memory dumps
-
D. Billard and R. Hauri, "Making sense of unstructured flash-memory dumps," in SAC, 2010, pp. 1579-1583.
-
(2010)
SAC
, pp. 1579-1583
-
-
Billard, D.1
Hauri, R.2
-
48
-
-
77955400664
-
Scalpel: A frugal, high performance file carver
-
G. G. R. III and V. Roussev, "Scalpel: A frugal, high performance file carver," in DFRWS, 2005.
-
(2005)
DFRWS
-
-
R III, G.G.1
Roussev, V.2
-
49
-
-
36448997450
-
In-place file carving
-
G. G. R. III, V. Roussev, and L. Marziale, "In-place file carving," in IFIP Int. Conf. Digital Forensics, 2007, pp. 217-230.
-
IFIP Int. Conf. Digital Forensics, 2007
, pp. 217-230
-
-
R III, G.G.1
Roussev, V.2
Marziale, L.3
-
50
-
-
84870667487
-
-
Online; Status 22/10/2010
-
"Fuse: Filesystem in userspace," http://fuse.sourceforge.net, [Online; Status 22/10/2010].
-
Fuse: Filesystem in Userspace
-
-
-
51
-
-
34447513980
-
Carving contiguous and fragmented files with fast object validation
-
Online. Available
-
S. L. Garfinkel, "Carving contiguous and fragmented files with fast object validation," Digital Investigation, vol. 4, no. Supplement 1, pp. 2-12, 2007. [Online]. Available: http://www.sciencedirect.com/science/article/ B7CW4-4P06CJD-1/2/48c9cdedb7d3e76b5880b58c871110be
-
(2007)
Digital Investigation
, vol.4
, Issue.SUPPL. 1
, pp. 2-12
-
-
Garfinkel, S.L.1
-
52
-
-
48749129422
-
Detecting file fragmentation point using sequential hypothesis testing
-
the Proceedings of the Eighth Annual DFRWS Conference. [Online]. Available
-
A. Pal, H. T. Sencar, and N. Memon, "Detecting file fragmentation point using sequential hypothesis testing," Digital Investigation, vol. 5, no. Supplement 1, pp. S2-S13, 2008, the Proceedings of the Eighth Annual DFRWS Conference. [Online]. Available: http://www.sciencedirect.com/science/article/ B7CW4-4T5SYCF-3/2/3ce3ceeea25479675b0156d1cfc5ae6b
-
(2008)
Digital Investigation
, vol.5
, Issue.SUPPL. 1
-
-
Pal, A.1
Sencar, H.T.2
Memon, N.3
-
53
-
-
31144464783
-
Automated reassembly of file fragmented images using greedy algorithms
-
A. Pal and N. D. Memon, "Automated reassembly of file fragmented images using greedy algorithms," IEEE Transactions on Image Processing, vol. 15, no. 2, pp. 385-393, 2006.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.2
, pp. 385-393
-
-
Pal, A.1
Memon, N.D.2
-
54
-
-
84944746002
-
Automatic reassembly of document fragments via context based statistical models
-
2003
-
K. Shanmugasundaram and N. Memon, "Automatic reassembly of document fragments via context based statistical models," in Context Based Statistical Models ACSAC, 2003, 2003, pp. 152-159.
-
(2003)
Context Based Statistical Models ACSAC
, pp. 152-159
-
-
Shanmugasundaram, K.1
Memon, N.2
-
56
-
-
61649116456
-
Reassembly of fragmented jpeg images containing restart markers
-
vol. 0
-
M. Karresand and N. Shahmehri, "Reassembly of fragmented jpeg images containing restart markers," Computer Network Defense, European Conference on, vol. 0, pp. 25-32, 2008.
-
(2008)
Computer Network Defense, European Conference on
, pp. 25-32
-
-
Karresand, M.1
Shahmehri, N.2
-
57
-
-
78650688275
-
Fragmentation point detection of jpeg images at dht using validator
-
Future Generation Information Technology, ser. Y.-h. Lee, T.-h. Kim, W.-c. Fang, and D. Slezak, Eds. Springer Berlin / Heidelberg
-
K. Mohamad and M. Deris, "Fragmentation point detection of jpeg images at dht using validator," in Future Generation Information Technology, ser. Lecture Notes in Computer Science, Y.-h. Lee, T.-h. Kim, W.-c. Fang, and D. Slezak, Eds. Springer Berlin / Heidelberg, 2009, vol. 5899, pp. 173-180.
-
(2009)
Lecture Notes in Computer Science
, vol.5899
, pp. 173-180
-
-
Mohamad, K.1
Deris, M.2
-
58
-
-
68649121876
-
Identification and recovery of jpeg files with missing fragments
-
the Proceedings of the Ninth Annual DFRWS Conference. [Online]. Available
-
H. T. Sencar and N. Memon, "Identification and recovery of jpeg files with missing fragments," Digital Investigation, vol. 6, no. Supplement 1, pp. S88-S98, 2009, the Proceedings of the Ninth Annual DFRWS Conference. [Online]. Available: http://www.sciencedirect.com/science/article/ B7CW4-4X1HY5C-D/2/7b6b8f0c39bb4f301335cb3a5e6ca946
-
(2009)
Digital Investigation
, vol.6
, Issue.SUPPL. 1
-
-
Sencar, H.T.1
Memon, N.2
-
59
-
-
79960730123
-
-
Online. Available
-
Automated reassembly of fragmented images, vol. 1, 2003. [Online]. Available: http://isis.poly.edu/kulesh/research/pubs/icassp- 2003.pdf
-
(2003)
Automated Reassembly of Fragmented Images
, vol.1
-
-
-
60
-
-
79960717181
-
-
Online; Status 22/10/2010
-
"Adroit photo forensics 2010," http://digital-assembly.com, [Online; Status 22/10/2010].
-
Adroit Photo Forensics 2010
-
-
-
61
-
-
84969524602
-
Content based file type detection algorithms
-
Washington, DC, USA: IEEE Computer Society
-
M. McDaniel and M. H. Heydari, "Content based file type detection algorithms," in HICSS '03: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 9. Washington, DC, USA: IEEE Computer Society, 2003, p. 332.1.
-
(2003)
HICSS '03: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 9
-
-
McDaniel, M.1
Heydari, M.H.2
-
63
-
-
77955404469
-
Using purpose-built functions and block hashes to enable small block and sub-file forensics
-
the Proceedings of the Tenth Annual DFRWS Conference. [Online]. Available
-
S. Garfinkel, A. Nelson, D. White, and V. Roussev, "Using purpose-built functions and block hashes to enable small block and sub-file forensics," Digital Investigation, vol. 7, no. Supplement 1, pp. S13-S23, 2010, the Proceedings of the Tenth Annual DFRWS Conference. [Online]. Available: http://www.sciencedirect.com/science/article/B7CW4-50NX65H-4/2/ 992954f303e13b95b4d06dde70d19cc9
-
(2010)
Digital Investigation
, vol.7
, Issue.SUPPL. 1
-
-
Garfinkel, S.1
Nelson, A.2
White, D.3
Roussev, V.4
-
64
-
-
74549153311
-
File fragment classification-the case for specialized approaches
-
V. Roussev and S. L. Garfinkel, "File fragment classification-the case for specialized approaches," in SADFE, 2009, pp. 3-14.
-
(2009)
SADFE
, pp. 3-14
-
-
Roussev, V.1
Garfinkel, S.L.2
-
65
-
-
77955421242
-
Classification of steganalysis techniques: A study
-
A. Nissar and A. Mir, "Classification of steganalysis techniques: A study," Digital Signal Processing, vol. 20, no. 6, pp. 1758-1770, 2010.
-
(2010)
Digital Signal Processing
, vol.20
, Issue.6
, pp. 1758-1770
-
-
Nissar, A.1
Mir, A.2
-
66
-
-
70350710022
-
Digital image steganography: Survey and analysis of current methods
-
A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, "Digital image steganography: Survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, 2010.
-
(2010)
Signal Processing
, vol.90
, Issue.3
, pp. 727-752
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Kevitt, P.M.4
-
67
-
-
11844252006
-
Cyber warfare: Steganography vs. steganalysis
-
October
-
H. Wang and S. Wang, "Cyber warfare: steganography vs. steganalysis," Commun. ACM, vol. 47, pp. 76-82, October 2004.
-
(2004)
Commun. ACM
, vol.47
, pp. 76-82
-
-
Wang, H.1
Wang, S.2
-
68
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 111-119, 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
69
-
-
79951835582
-
A review of the audio and video steganalysis algorithms
-
New York, NY, USA: ACM
-
N. Meghanathan and L. Nayak, "A review of the audio and video steganalysis algorithms," in Proceedings of the 48th Annual Southeast Regional Conference, ser. ACM SE 10. New York, NY, USA: ACM, 2010, pp. 81:1-81:5.
-
(2010)
Proceedings of the 48th Annual Southeast Regional Conference, Ser. ACM SE 10
-
-
Meghanathan, N.1
Nayak, L.2
-
70
-
-
21244443111
-
Current trends in steganalysis: A critical survey
-
R. Chandramouli and K. P. Subbalakshmi, "Current trends in steganalysis: a critical survey," in ICARCV, 2004, pp. 964-967.
-
(2004)
ICARCV
, pp. 964-967
-
-
Chandramouli, R.1
Subbalakshmi, K.P.2
-
71
-
-
79960738044
-
A survey on image steganography and steganalysis
-
B. Li, J. He, J. Huang, and Y. Q. Shi, "A survey on image steganography and steganalysis," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, pp. 142-172, 2011.
-
(2011)
Journal of Information Hiding and Multimedia Signal Processing
, vol.2
, Issue.2
, pp. 142-172
-
-
Li, B.1
He, J.2
Huang, J.3
Shi, Y.Q.4
-
72
-
-
79960715481
-
Digital steganalysis: Review on recent approaches
-
I. K. Maitra, S. Nag, B. Datta, and S. K. Bandyopadhyay, "Digital steganalysis: Review on recent approaches," Journal of Global Research in Computer Science, vol. 2, pp. 1-5, 2011.
-
(2011)
Journal of Global Research in Computer Science
, vol.2
, pp. 1-5
-
-
Maitra, I.K.1
Nag, S.2
Datta, B.3
Bandyopadhyay, S.K.4
-
73
-
-
79960717180
-
Murder and money: The story of standards, accreditation, and certification in computer forensics
-
Burlington: Syngress, Online. Available
-
J. Wiles, T. Alexander, S. Ashlock, S. Ballou, L. Depew, G. Dominguez, A. Ehuan, R. Green, J. Long, K. Reis, A. Schroader, K. Schuler, and E. Thompson, "Murder and money: The story of standards, accreditation, and certification in computer forensics," in Techno Security's Guide to E-Discovery and Digital Forensics. Burlington: Syngress, 2007, pp. 261-276. [Online]. Available: http://www.sciencedirect.com/science/article/B8KKC-4S03888-H/2/ a095905e619b02e15115dad5e8541783
-
(2007)
Techno Security's Guide to E-Discovery and Digital Forensics
, pp. 261-276
-
-
Wiles, J.1
Alexander, T.2
Ashlock, S.3
Ballou, S.4
Depew, L.5
Dominguez, G.6
Ehuan, A.7
Green, R.8
Long, J.9
Reis, K.10
Schroader, A.11
Schuler, K.12
Thompson, E.13
-
74
-
-
79960731303
-
-
03 Ascld (american society of crime lab directors/laboratory). [Online]. Available
-
ASCLD. (2011, 03) Ascld (american society of crime lab directors/laboratory). [Online]. Available: http://www.ascld.org/
-
(2011)
-
-
-
75
-
-
79960704995
-
Evidential Weight and Legal Admissibility of Information Stored Electronically
-
Online. Available
-
A. Shipman and B. S. Institution, Evidential Weight and Legal Admissibility of Information Stored Electronically. Code of Practice for the Implementation of BS 10008. British Standards Institution, 2008. [Online]. Available: http://shop.bsigroup.com/ProductDetail/?pid=000000000030186227
-
(2008)
Code of Practice for the Implementation of BS 10008
-
-
Shipman, A.1
Institution, B.S.2
-
77
-
-
0003470701
-
-
ISO/IEC 17025:2005 International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC) Std.
-
ISO/IEC 17025:2005 - General requirements for the competence of testing and calibration laboratories, International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC) Std., 2005.
-
(2005)
General Requirements for the Competence of Testing and Calibration Laboratories
-
-
-
78
-
-
79960736782
-
Site Security Handbook
-
Informational, Sep. Online. Available
-
B. Fraser, "Site Security Handbook," RFC 2196 (Informational), Internet Engineering Task Force, Sep. 1997. [Online]. Available: http://www.ietf.org/rfc/rfc2196.txt
-
(1997)
RFC
, vol.2196
-
-
Fraser, B.1
-
79
-
-
70450124985
-
Expectations for Computer Security Incident Response
-
Best Current Practice, Jun. Online. Available
-
N. Brownlee and E. Guttman, "Expectations for Computer Security Incident Response," RFC 2350 (Best Current Practice), Internet Engineering Task Force, Jun. 1998. [Online]. Available: http://www.ietf.org/rfc/rfc2350.txt
-
(1998)
RFC
, vol.2350
-
-
Brownlee, N.1
Guttman, E.2
-
80
-
-
0742292799
-
Internet Security Glossary
-
Informational, May obsoleted by RFC 4949. [Online]. Available
-
R. Shirey, "Internet Security Glossary," RFC 2828 (Informational), Internet Engineering Task Force, May 2000, obsoleted by RFC 4949. [Online]. Available: http://www.ietf.org/rfc/rfc2828.txt
-
(2000)
RFC
, vol.2828
-
-
Shirey, R.1
-
81
-
-
77950555514
-
Guidelines for Evidence Collection and Archiving
-
Best Current Practice, Feb. Online. Available
-
D. Brezinski and T. Killalea, "Guidelines for Evidence Collection and Archiving," RFC 3227 (Best Current Practice), Internet Engineering Task Force, Feb. 2002. [Online]. Available: http://www.ietf.org/rfc/rfc3227.txt
-
(2002)
RFC
, vol.3227
-
-
Brezinski, D.1
Killalea, T.2
-
82
-
-
33847204918
-
Computer forensics: The need for standardization and certification
-
M. Meyers and M. Rogers, "Computer forensics: The need for standardization and certification," IJDE, vol. 3, no. 2, p. , 2004.
-
(2004)
IJDE
, vol.3
, Issue.2
-
-
Meyers, M.1
Rogers, M.2
-
83
-
-
84943542202
-
Towards a formalization of digital forensics
-
G. Peterson and S. Shenoi, Eds. Springer Boston
-
J. Slay, Y.-C. Lin, B. Turnbull, J. Beckett, and P. Lin, "Towards a formalization of digital forensics," in Advances in Digital Forensics V, ser. IFIP Advances in Information and Communication Technology, G. Peterson and S. Shenoi, Eds. Springer Boston, 2009, vol. 306, pp. 37-47.
-
(2009)
Advances in Digital Forensics V, Ser. IFIP Advances in Information and Communication Technology
, vol.306
, pp. 37-47
-
-
Slay, J.1
Lin, Y.-C.2
Turnbull, B.3
Beckett, J.4
Lin, P.5
-
84
-
-
77955374828
-
Digital forensics research: The next 10 years
-
the Proceedings of the Tenth Annual DFRWS Conference. [Online]. Available
-
S. L. Garfinkel, "Digital forensics research: The next 10 years," Digital Investigation, vol. 7, no. Supplement 1, pp. S64-S73, 2010, the Proceedings of the Tenth Annual DFRWS Conference. [Online]. Available: http://www.sciencedirect.com/science/article/B7CW4-50NX65H-B/2/ 19b42d7f2ccc4be6794c5a1330a551bb
-
(2010)
Digital Investigation
, vol.7
, Issue.SUPPL. 1
-
-
Garfinkel, S.L.1
-
85
-
-
68649110054
-
Bringing science to digital forensics with standardized forensic corpora
-
the Proceedings of the Ninth Annual DFRWS Conference. [Online]. Available
-
S. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, "Bringing science to digital forensics with standardized forensic corpora," Digital Investigation, vol. 6, no. Supplement 1, pp. S2-S11, 2009, the Proceedings of the Ninth Annual DFRWS Conference. [Online]. Available: http://www. sciencedirect.com/science/article/B7CW4-4X1HY5C-3/2/ 090ebc16025d598c775d87c8abbb7ae5
-
(2009)
Digital Investigation
, vol.6
, Issue.SUPPL. 1
-
-
Garfinkel, S.1
Farrell, P.2
Roussev, V.3
Dinolt, G.4
-
86
-
-
84943526145
-
Digital forensic research: The good, the bad and the unaddressed
-
G. Peterson and S. Shenoi, Eds. Springer Boston, 10.1007/978-3-642-04155- 6 2
-
N. Beebe, "Digital forensic research: The good, the bad and the unaddressed," in Advances in Digital Forensics V, ser. IFIP Advances in Information and Communication Technology, G. Peterson and S. Shenoi, Eds. Springer Boston, 2009, vol. 306, pp. 17-36, 10.1007/978-3-642-04155-6 2;.
-
(2009)
Advances in Digital Forensics V, Ser. IFIP Advances in Information and Communication Technology
, vol.306
, pp. 17-36
-
-
Beebe, N.1
-
87
-
-
78650760560
-
Digital forensics: Defining a research agenda
-
vol. 0
-
K. Nance, B. Hay, and M. Bishop, "Digital forensics: Defining a research agenda," Hawaii International Conference on System Sciences, vol. 0, pp. 1-6, 2009.
-
(2009)
Hawaii International Conference on System Sciences
, pp. 1-6
-
-
Nance, K.1
Hay, B.2
Bishop, M.3
-
88
-
-
77951743889
-
Digital forensics: Defining an education agenda
-
K. Nance, H. Armstrong, and C. J. Armstrong, "Digital forensics: Defining an education agenda," in HICSS, 2010, pp. 1-10.
-
(2010)
HICSS
, pp. 1-10
-
-
Nance, K.1
Armstrong, H.2
Armstrong, C.J.3
-
89
-
-
46649098260
-
Virtualization and digital forensics: A research and education agenda
-
M. Pollitt, K. L. Nance, B. Hay, R. C. Dodge, P. Craiger, P. Burke, C. Marberry, and B. Brubaker, "Virtualization and digital forensics: A research and education agenda," J. Digital Forensic Practice, vol. 2, no. 2, pp. 62-73, 2008.
-
(2008)
J. Digital Forensic Practice
, vol.2
, Issue.2
, pp. 62-73
-
-
Pollitt, M.1
Nance, K.L.2
Hay, B.3
Dodge, R.C.4
Craiger, P.5
Burke, P.6
Marberry, C.7
Brubaker, B.8
-
90
-
-
77955384148
-
-
Online; Status 02/11/2010
-
Digital Forensics Association, "Formal education: College education in digital forensics," http://www.digitalforensicsassociation.org/formal- education/, 2010, [Online; Status 02/11/2010].
-
(2010)
Formal Education: College Education in Digital Forensics
-
-
-
91
-
-
77957252051
-
Software architecture for real-time steganography in auditive media
-
M. Nutzinger and R. Poisel, "Software architecture for real-time steganography in auditive media," in IEEE International Conference on Computational Technologies in Electrical and Electronics Engineering, Irkutsk Listvyanka, Russia, 2010, pp. 100-105.
-
IEEE International Conference on Computational Technologies in Electrical and Electronics Engineering, Irkutsk Listvyanka, Russia, 2010
, pp. 100-105
-
-
Nutzinger, M.1
Poisel, R.2
|