-
1
-
-
33947379497
-
Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis
-
DOI 10.1016/j.forsciint.2006.06.033, PII S0379073806004312, Selected Articles of the 4th European Academy of Forensic Science Conference (EAFS2006) June 13-16, 2006 Helsinki, Finland
-
C. Grigoras, "Applications of ENF criterion in forensics: Audio, video, computer, and telecommunication analysis," Forensic Sci. Int., vol. 167, pp. 136-145, Apr. 2007. (Pubitemid 46453424)
-
(2007)
Forensic Science International
, vol.167
, Issue.2-3
, pp. 136-145
-
-
Grigoras, C.1
-
3
-
-
77955689262
-
Audio authenticity: Detecting ENF discontinuity with high precision phase analysis
-
Sep.
-
D. P. N. Rodriguez, J. A. Apolinario, and L. W. P. Biscainho, "Audio authenticity: Detecting ENF discontinuity with high precision phase analysis," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 534-543, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 534-543
-
-
Rodriguez, D.P.N.1
Apolinario, J.A.2
Biscainho, L.W.P.3
-
4
-
-
84880765692
-
'Seeing' ENF: Power signature based timestamp for digital multimedia via optical sensing and signal processing
-
Sep.
-
R. Garg, A. L. Varna, A. H. Ahmad, and M. Wu, "'Seeing' ENF: Power signature based timestamp for digital multimedia via optical sensing and signal processing," IEEE Trans. Forensics Inf. Security, vol. 8, no. 9, pp. 1417-1432, Sep. 2013.
-
(2013)
IEEE Trans. Forensics Inf. Security
, vol.8
, Issue.9
, pp. 1417-1432
-
-
Garg, R.1
Varna, A.L.2
Ahmad, A.H.3
Wu, M.4
-
5
-
-
84873623957
-
Counter-forensics: Attacking image forensics
-
H. T. Sencar and N. Memon, Eds. New York, NY, USA: Springer-Verlag
-
M. Kirchner and R. Bohme, "Counter-forensics: Attacking image forensics," in Digital Image Forensics, H. T. Sencar and N. Memon, Eds. New York, NY, USA: Springer-Verlag, 2012.
-
(2012)
Digital Image Forensics
-
-
Kirchner, M.1
Bohme, R.2
-
6
-
-
84869484544
-
Robustness of color interpolation identification against anti-forensic operations
-
W.-H. Chuang and M. Wu, "Robustness of color interpolation identification against anti-forensic operations," in Proc. 14th Inf. Hiding Conf., 2012, pp. 16-30.
-
(2012)
Proc. 14th Inf. Hiding Conf.
, pp. 16-30
-
-
Chuang, W.-H.1
Wu, M.2
-
7
-
-
84888386204
-
Information forensics: An overview of the first decade
-
May
-
M. C. Stamm, M. Wu, and K. J. R. Liu, "Information forensics: An overview of the first decade," IEEE Access, vol. 1, no. 1, pp. 167-200, May 2013.
-
(2013)
IEEE Access
, vol.1
, Issue.1
, pp. 167-200
-
-
Stamm, M.C.1
Wu, M.2
Liu, K.J.R.3
-
8
-
-
84883105653
-
Analytical framework for digital audio authentication
-
Jun.
-
C. Grigoras, D. Rappaport, and J. M. Smith, "Analytical framework for digital audio authentication," in Proc. AES 46th Inter. Conf. Audio Forensics, Jun. 2012, pp. 1-5.
-
(2012)
Proc. AES 46th Inter. Conf. Audio Forensics
, pp. 1-5
-
-
Grigoras, C.1
Rappaport, D.2
Smith, J.M.3
-
9
-
-
84869407144
-
How secure are power network signature based time stamps?
-
W.-H. Chuang, R. Garg, and M. Wu, "How secure are power network signature based time stamps?" in Proc. ACM Conf. CCS, 2012, pp. 1-11.
-
(2012)
Proc. ACM Conf. CCS
, pp. 1-11
-
-
Chuang, W.-H.1
Garg, R.2
Wu, M.3
-
10
-
-
70349333825
-
Using the ENF criterion for determining the time of recording of short digital audio recordings
-
Aug.
-
M. Huijbregtse and Z. Geradts, "Using the ENF criterion for determining the time of recording of short digital audio recordings," in Proc. Int. Workshop Comput. Forensics, Aug. 2009, pp. 116-124.
-
(2009)
Proc. Int. Workshop Comput. Forensics
, pp. 116-124
-
-
Huijbregtse, M.1
Geradts, Z.2
-
12
-
-
84863919973
-
ENF extraction from digital recordings using adaptive techniques and frequency tracking
-
Aug.
-
O. Ojowu, J. Karlsson, J. Li, and Y. Liu, "ENF extraction from digital recordings using adaptive techniques and frequency tracking," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1330-1338, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1330-1338
-
-
Ojowu, O.1
Karlsson, J.2
Li, J.3
Liu, Y.4
-
13
-
-
84876101665
-
Electrical network frequency (ENF) maximum-likelihood estimation via a multitone harmonic model
-
May
-
D. Bykhovsky and A. Cohen, "Electrical network frequency (ENF) maximum-likelihood estimation via a multitone harmonic model," IEEE Trans. Inf. Forensics Security, vol. 8, no. 5, pp. 744-753, May 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.5
, pp. 744-753
-
-
Bykhovsky, D.1
Cohen, A.2
-
14
-
-
84880841551
-
Spectrum combining for ENF signal estimation
-
Sep.
-
A. Hajj-Ahmad, R. Garg, and M. Wu, "Spectrum combining for ENF signal estimation," IEEE Signal Process. Lett., vol. 20, no. 9, pp. 885-888, Sep. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.9
, pp. 885-888
-
-
Hajj-Ahmad, A.1
Garg, R.2
Wu, M.3
-
15
-
-
0022683359
-
Multiple emitter location and signal parameter estimation
-
Mar.
-
R. O. Schmidt, "Multiple emitter location and signal parameter estimation," IEEE Trans. Antennas Propag., vol. 34, no. 3, pp. 276-280, Mar. 1986.
-
(1986)
IEEE Trans. Antennas Propag.
, vol.34
, Issue.3
, pp. 276-280
-
-
Schmidt, R.O.1
-
16
-
-
0024702515
-
ESPRIT-estimation of signal parameters via rotational invariance techniques
-
Jul.
-
R. Roy and T. Kailath, "ESPRIT-estimation of signal parameters via rotational invariance techniques," IEEE Trans. Acoustics, Speech Signal Process., vol. 37, no. 7, pp. 984-995, Jul. 1989.
-
(1989)
IEEE Trans. Acoustics, Speech Signal Process.
, vol.37
, Issue.7
, pp. 984-995
-
-
Roy, R.1
Kailath, T.2
-
17
-
-
0003513556
-
-
2nd ed. Upper Saddle River, NJ, USA: Prentice-Hall
-
A. V. Oppenheim, R. W. Schafer, and J. R. Buck, Discrete-time Signal Process., 2nd ed. Upper Saddle River, NJ, USA: Prentice-Hall, 1999.
-
(1999)
Discrete-time Signal Process.
-
-
Oppenheim, A.V.1
Schafer, R.W.2
Buck, J.R.3
-
19
-
-
84888320755
-
-
[Online]. Available
-
- (2009). Wikipidia Article on 'Mains hum' [Online]. Available: http://en.wikipedia.org/wiki/mains-hum
-
(2009)
Wikipidia Article on 'Mains Hum
-
-
-
20
-
-
0030736223
-
Computer virus-antivirus coevolution
-
Jan.
-
C. Nachenberg, "Computer virus-antivirus coevolution," Commun. ACM, vol. 40, pp. 46-51, Jan. 1997.
-
(1997)
Commun. ACM
, vol.40
, pp. 46-51
-
-
Nachenberg, C.1
-
21
-
-
85032751561
-
Security of online reputation systems: The evolution of attacks and defenses
-
Mar.
-
Y. Sun and Y. Liu, "Security of online reputation systems: The evolution of attacks and defenses," IEEE Signal Process. Mag., vol. 29, no. 2, pp. 87-97, Mar. 2012.
-
(2012)
IEEE Signal Process. Mag.
, vol.29
, Issue.2
, pp. 87-97
-
-
Sun, Y.1
Liu, Y.2
-
23
-
-
84856481580
-
A Dempster- Shafer framework for decision fusion in image forensics
-
Dec.
-
M. Fontani, T. Bianchi, A. D. Rosa, A. Piva, and M. Barni, "A Dempster- Shafer framework for decision fusion in image forensics," in Proc. IEEE Int. Workshop Inf. Forensics Security, Dec. 2011, pp. 1-6.
-
(2011)
Proc. IEEE Int. Workshop Inf. Forensics Security
, pp. 1-6
-
-
Fontani, M.1
Bianchi, T.2
Rosa, A.D.3
Piva, A.4
Barni, M.5
-
24
-
-
84864056133
-
Temporal forensics and antiforensics for motion compensated video
-
Aug.
-
M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Temporal forensics and antiforensics for motion compensated video," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1315-1329, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1315-1329
-
-
Stamm, M.C.1
Lin, W.S.2
Liu, K.J.R.3
-
25
-
-
79951834941
-
Defending against fingerprintcopy attack in sensor-based camera identification
-
Mar.
-
M. Goljan, J. Fridrich, and M. Chen, "Defending against fingerprintcopy attack in sensor-based camera identification," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 227-236, Mar. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.1
, pp. 227-236
-
-
Goljan, M.1
Fridrich, J.2
Chen, M.3
-
26
-
-
84873669138
-
The source identification game: An informationtheoretic perspective
-
Mar.
-
M. Barni and B. Tondi, "The source identification game: An informationtheoretic perspective," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 450-463, Mar. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.3
, pp. 450-463
-
-
Barni, M.1
Tondi, B.2
|