-
1
-
-
36549070448
-
Watermarking security: A survey
-
L. Perez-Freire, P. Comesana, J. Troncoso-Pastoriza, and F. Perez-Gonzalez, "Watermarking security: a survey," Transactions on Data Hiding and Multimedia Security I, pp. 41-72, 2006.
-
(2006)
Transactions on Data Hiding and Multimedia Security i
, pp. 41-72
-
-
Perez-Freire, L.1
Comesana, P.2
Troncoso-Pastoriza, J.3
Perez-Gonzalez, F.4
-
2
-
-
84873669138
-
The source identification game: An information-theoretic perspective
-
March
-
M. Barni and B. Tondi, "The source identification game: an information-theoretic perspective," IEEE Trans. Information Forensics and Security, vol. 8, no. 3, pp. 450-463, March 2013.
-
(2013)
IEEE Trans. Information Forensics and Security
, vol.8
, Issue.3
, pp. 450-463
-
-
Barni, M.1
Tondi, B.2
-
3
-
-
84873623957
-
Counter-forensics: Attacking image forensics
-
H. T. Sencar and N. Memon, Eds. Springer Berlin / Heidelberg
-
R. Bohme and M. Kirchner, "Counter-forensics: Attacking image forensics," in Digital Image Forensics, H. T. Sencar and N. Memon, Eds. Springer Berlin / Heidelberg, 2012.
-
(2012)
Digital Image Forensics
-
-
Bohme, R.1
Kirchner, M.2
-
5
-
-
78049530550
-
The security of machine learning
-
M. Barreno, B. Nelson, A. D. Joseph, and J. D. Tygar, "The security of machine learning," Machine Learning, vol. 81, pp. 121-148, 2010.
-
(2010)
Machine Learning
, vol.81
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.D.3
Tygar, J.D.4
-
7
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
J. Deng, R. Han, and S. Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks," in Int. Conf. Security and Privacy for Emerging Areas in Comm. Networks, 2005, pp. 113-126.
-
(2005)
Int. Conf. Security and Privacy for Emerging Areas in Comm. Networks
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
8
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
K. M. C. Tan, K. S. Killourhy, and R. A. Maxion, "Undermining an anomaly-based intrusion detection system using common exploits," in In Recent advances in intrusion detection (RAID), 2002, pp. 54-73.
-
(2002)
Recent Advances in Intrusion Detection (RAID)
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
9
-
-
72949092882
-
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
-
March
-
Y. Yang, Y. L. Sun, S. Kay, and Q. Yang, "Defending online reputation systems against collaborative unfair raters through signal modeling and trust," in Proc. of ACM Symp. on Applied Computing, March 2009.
-
(2009)
Proc. of ACM Symp. on Applied Computing
-
-
Yang, Y.1
Sun, Y.L.2
Kay, S.3
Yang, Q.4
-
10
-
-
80052671835
-
Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks
-
W. Wang, H. Li, Y. Sun, and Z. Han, "Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks," EURASIP J. on Advances in Signal Processing, vol. 2010, 2010.
-
(2010)
EURASIP J. on Advances in Signal Processing, Vol. 2010
-
-
Wang, W.1
Li, H.2
Sun, Y.3
Han, Z.4
-
11
-
-
78650895906
-
Deluding image recognition in SIFT-based CBIR systems
-
T-T. Do, E. Kijak, T. Furon, and L. Amsaleg, "Deluding image recognition in SIFT-based CBIR systems," in Proc. MiFor '10 ACM workshop on Multimedia in forensics, security and intelligence, 2010.
-
(2010)
Proc. MiFor '10 ACM Workshop on Multimedia in Forensics, Security and Intelligence
-
-
Do, T.-T.1
Kijak, E.2
Furon, T.3
Amsaleg, L.4
-
12
-
-
0007751316
-
Analysis of the sensitivity attack against electronic watermarks in images
-
J-P. M. G. Linnartz and M. Van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. Information Hiding, LNCS Vol. 1525, 1998, pp. 258-272.
-
(1998)
Proc. Information Hiding, LNCS
, vol.1525
, pp. 258-272
-
-
Linnartz, J.-P.M.G.1
Van Dijk, M.2
-
13
-
-
33645680170
-
Blind newton sensitivity attack
-
P. Comesana, L. Perez-Freire, and F. Perez-Gonzalez, "Blind Newton sensitivity attack," in IEE Proc. on Information Security. IET, 2006, vol. 153, pp. 115-125.
-
(2006)
IEE Proc. on Information Security. IET
, vol.153
, pp. 115-125
-
-
Comesana, P.1
Perez-Freire, L.2
Perez-Gonzalez, F.3
-
16
-
-
0037851028
-
An asymmetric watermarking method
-
T. Furon and P. Duhamel, "An asymmetric watermarking method," IEEE Trans. on Signal Processing, vol. 5, no. 4, pp. 981-995, 2003.
-
(2003)
IEEE Trans. on Signal Processing
, vol.5
, Issue.4
, pp. 981-995
-
-
Furon, T.1
Duhamel, P.2
-
17
-
-
84864034865
-
Forensics vs anti-forensics: A decision and game theoretic framework
-
Kyoto, Japan, 25-30 March
-
M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Forensics vs anti-forensics: a decision and game theoretic framework," in ICASSP 2012, IEEE International Conference on Acoustics, Speech and Signal Processing, Kyoto, Japan, 25-30 March 2012.
-
(2012)
ICASSP 2012, IEEE International Conference on Acoustics, Speech and Signal Processing
-
-
Stamm, M.C.1
Lin, W.S.2
Liu, K.J.R.3
-
19
-
-
78649284505
-
Anomaly detection in feedbackbased reputation systems through temporal and correlation analysis
-
August
-
Y. Liu and Y. Sun, "Anomaly detection in feedbackbased reputation systems through temporal and correlation analysis," in Proc. of 2nd IEEE Int. Conf. on Social Computing, August 2010.
-
(2010)
Proc. of 2nd IEEE Int. Conf. on Social Computing
-
-
Liu, Y.1
Sun, Y.2
-
20
-
-
0003302360
-
Public watermarks and resistance to tampering
-
October
-
I. J. Cox and J. P. M. G. Linnartz, "Public watermarks and resistance to tampering," in IEEE International Conference on Image Processing ICIP'97, Santa Barbara, California, USA, October 1997, vol. 3, pp. 3-6.
-
(1997)
IEEE International Conference on Image Processing ICIP'97, Santa Barbara, California, USA
, vol.3
, pp. 3-6
-
-
Cox, I.J.1
Linnartz, J.P.M.G.2
-
21
-
-
34249290091
-
Noniterative algorithms for sensitivity analysis attacks
-
M. El Choubassi and P. Moulin, "Noniterative algorithms for sensitivity analysis attacks," IEEE Trans. on Information Forensics and Security, vol. 2, no. 2, pp. 113-126, 2007.
-
(2007)
IEEE Trans. on Information Forensics and Security
, vol.2
, Issue.2
, pp. 113-126
-
-
El Choubassi, M.1
Moulin, P.2
-
24
-
-
77950246678
-
Biometric system security
-
A.K. Jain, P. Flynn, and A.A. Ross, Eds.Springer
-
A. Adler, "Biometric system security," in Handbook of biometrics, A.K. Jain, P. Flynn, and A.A. Ross, Eds., pp. 381-402. Springer, 2008.
-
(2008)
Handbook of Biometrics
, pp. 381-402
-
-
Adler, A.1
-
25
-
-
0036448239
-
LMS-based attack on watermark public detectors
-
September
-
M. F. Mansour and A. H. Tewfik, "LMS-based attack on watermark public detectors," in IEEE International Conference on Image Processing, ICIP'02, September 2002, vol. 3, pp. 649-652.
-
(2002)
IEEE International Conference on Image Processing, ICIP'02
, vol.3
, pp. 649-652
-
-
Mansour, M.F.1
Tewfik, A.H.2
-
28
-
-
84874075921
-
Optimum forensic and counterforensic strategies for source identification with training data
-
M. Barni and B. Tondi, "Optimum forensic and counterforensic strategies for source identification with training data," in WIFS 2013, IEEE Int. Work. on Information Forensics and Security, Tenerife, Spain, 2013.
-
(2013)
WIFS 2013, IEEE Int. Work. on Information Forensics and Security, Tenerife, Spain
-
-
Barni, M.1
Tondi, B.2
-
29
-
-
84867821467
-
Afriat's test for detecting malicious agents
-
V. Krishnamurthy and W. Hoiles, "Afriat's test for detecting malicious agents," IEEE Signal Processing Letters, vol. 19, no. 12, pp. 801-804, 2012.
-
(2012)
IEEE Signal Processing Letters
, vol.19
, Issue.12
, pp. 801-804
-
-
Krishnamurthy, V.1
Hoiles, W.2
|