메뉴 건너뛰기




Volumn , Issue , 2012, Pages 428-438

How secure are power network signature based time stamps?

Author keywords

Digital recording authentication; Electrical network frequency; Game theory; Information forensics; Time stamp

Indexed keywords

COMPUTER-TO-COMPUTER COMMUNICATION; DETECTION METHODS; DIGITAL AUDIO; DIGITAL RECORDING; ELECTRICAL NETWORKS; EVOLUTIONARY PERSPECTIVE; FORENSIC ANALYST; HOST SIGNALS; INFORMATION FORENSICS; POWER NETWORKS; TIME STAMPS;

EID: 84869407144     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382243     Document Type: Conference Paper
Times cited : (19)

References (12)
  • 2
    • 84869484544 scopus 로고    scopus 로고
    • Robustness of color interpolation identification against anti-forensic operations
    • W. H. Chuang and M. Wu. Robustness of color interpolation identification against anti-forensic operations. In Proc. of 14th Information Hiding Conference, 2012.
    • (2012) Proc. of 14th Information Hiding Conference
    • Chuang, W.H.1    Wu, M.2
  • 3
    • 84455192720 scopus 로고    scopus 로고
    • "Seeing" ENF: Natural time stamp for digital video via optical sensing and signal processing
    • Nov.
    • R. Garg, A. L. Varna, and M. Wu. "Seeing" ENF: Natural time stamp for digital video via optical sensing and signal processing. In Proc. of ACM Multimedia, Nov. 2011.
    • (2011) Proc. of ACM Multimedia
    • Garg, R.1    Varna, A.L.2    Wu, M.3
  • 4
    • 33947379497 scopus 로고    scopus 로고
    • Applications of ENF criterion in forensics: Audio, video, computer, and telecommunication analysis
    • Apr.
    • C. Grigoras. Applications of ENF criterion in forensics: audio, video, computer, and telecommunication analysis. Forensic Science International, 167:136-145, Apr. 2007.
    • (2007) Forensic Science International , vol.167 , pp. 136-145
    • Grigoras, C.1
  • 6
    • 84870651433 scopus 로고    scopus 로고
    • chapter on Counter-Forensics: Attacking Image Forensics. Springer
    • M. Kirchner and R. BÃu″hme. Digital Image Forensics, chapter on Counter-Forensics: Attacking Image Forensics. Springer, 2012.
    • (2012) Digital Image Forensics
    • Kirchner, M.1    Bãühme, R.2
  • 7
    • 0030736223 scopus 로고    scopus 로고
    • Computer virus-antivirus coevolution
    • Jan.
    • C. Nachenberg. Computer virus-antivirus coevolution. Communications on the ACM, 40:46-51, Jan. 1997.
    • (1997) Communications on the ACM , vol.40 , pp. 46-51
    • Nachenberg, C.1
  • 12
    • 85032751561 scopus 로고    scopus 로고
    • Security of online reputation systems: The evolution of attacks and defenses
    • Mar.
    • Y. Sun and Y. Liu. Security of online reputation systems: The evolution of attacks and defenses. IEEE Signal Processing Magazine, 29(2):87 -97, Mar. 2012.
    • (2012) IEEE Signal Processing Magazine , vol.29 , Issue.2 , pp. 87-97
    • Sun, Y.1    Liu, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.