-
1
-
-
33744736314
-
Digital camera identification from sensor pattern noise
-
June
-
J. Lukas, J. Fridrich, and M. Goljan, "Digital camera identification from sensor pattern noise," IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 205-214, June 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 205-214
-
-
Lukas, J.1
Fridrich, J.2
Goljan, M.3
-
2
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
March
-
M. Chen, J. Fridrich, M. Goljan, J. Lukas, "Determining Image Origin and Integrity Using Sensor Noise," IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74-90, March 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
3
-
-
84863933240
-
Efficient sensor fingerprint matching through fingerprint binarization
-
Aug
-
S. Bayram, H. T. Sencar, and N. D. Memon, "Efficient Sensor Fingerprint Matching Through Fingerprint Binarization," IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1404-1413, Aug. 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.4
, pp. 1404-1413
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.D.3
-
4
-
-
84856241325
-
Exploring compression effects for improved source camera identification using strongly compressed video
-
Sept
-
W. Chuang, H. Su, and M. Wu, "Exploring compression effects for improved source camera identification using strongly compressed video," ICIP 2011, pp. 1953-1956, Sept. 2011.
-
(2011)
ICIP 2011
, pp. 1953-1956
-
-
Chuang, W.1
Su, H.2
Wu, M.3
-
5
-
-
84875833638
-
A context adaptive predictor of sensor pattern noise for camera source identification
-
Orlando, USA, Sept
-
G. Wu, X. Kang, and K. J. R. Liu, "A context adaptive predictor of sensor pattern noise for camera source identification," ICIP 2012, Orlando, USA, Sept. 2012
-
(2012)
ICIP 2012
-
-
Wu, G.1
Kang, X.2
Liu, K.J.R.3
-
6
-
-
37849032097
-
Can we trust digital image forensics
-
Sept
-
T. Gloe, M. Kirchner, A. Winkler, and R. Bohme, "Can we trust digital image forensics?" Multimedia '07, pp. 78-86, Sept. 2007.
-
(2007)
Multimedia '07
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Bohme, R.4
-
7
-
-
79951834941
-
Defending against fingerprint-copy attack in sensor-based camera identification
-
M. Goljan, J. Fridrich, and M. Chen, "Defending against fingerprint-copy attack in sensor-based camera identification," IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 227-236, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.1
, pp. 227-236
-
-
Goljan, M.1
Fridrich, J.2
Chen, M.3
-
8
-
-
84867619278
-
A game theoretic approach to Source Identification with known statistics
-
Kyoto, March
-
M. Barni, "A game theoretic approach to Source Identification with known statistics," ICASSP 2012, pp. 1745-1748, Kyoto, March 2012.
-
(2012)
ICASSP 2012
, pp. 1745-1748
-
-
Barni, M.1
-
9
-
-
84864034865
-
Forensics vs antiforensics: A decision and game theoretic framework
-
Kyoto, March
-
M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Forensics vs. antiforensics: A decision and game theoretic framework," ICASSP 2012, pp. 1749-1752, Kyoto, March 2012.
-
(2012)
ICASSP 2012
, pp. 1749-1752
-
-
Stamm, M.C.1
Lin, W.S.2
Liu, K.J.R.3
-
10
-
-
77953701773
-
Risk-distortion analysis for video collusion attacks: A mouse-And-cat game
-
July
-
Y. Chen, W. S. Lin, K. J. R. Liu, "Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-And-Cat Game," IEEE Transactions on Image Processing, vol. 19, no. 7, pp. 1798-1807, July 2010
-
(2010)
IEEE Transactions on Image Processing
, vol.19
, Issue.7
, pp. 1798-1807
-
-
Chen, Y.1
Lin, W.S.2
Liu, K.J.R.3
-
11
-
-
84863371433
-
Enhancing source camera identification performance with a camera reference phase sensor pattern noise
-
Apr
-
X. Kang, Y. Li, Z. Qu and J. Huang, "Enhancing source camera identification performance with a camera reference phase sensor pattern noise," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, Apr. 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
-
-
Kang, X.1
Li, Y.2
Qu, Z.3
Huang, J.4
-
12
-
-
70350511588
-
Large scale test of sensor fingerprint camera identification
-
Jan
-
M. Goljan, J. Fridrich, and T. Filler, "Large Scale Test of Sensor Fingerprint Camera Identification," SPIE 2009, Media Forensics and Security XI, vol. 7254, pp. 0I-0J, Jan. 2009.
-
(2009)
SPIE 2009, Media Forensics and Security XI
, vol.7254
-
-
Goljan, M.1
Fridrich, J.2
Filler, T.3
-
15
-
-
36849072045
-
Graph implementations for nonsmooth convex programs
-
Lecture Notes in Control and Information Sciences, Springer
-
M. Grant and S. Boyd, "Graph implementations for nonsmooth convex programs," Recent Advances in Learning and Control, pp. 95-110, Lecture Notes in Control and Information Sciences, Springer, 2008.
-
(2008)
Recent Advances in Learning and Control
, pp. 95-110
-
-
Grant, M.1
Boyd, S.2
-
16
-
-
79955401108
-
The dresden image database for benchmarking digital image forensics
-
T. Gloe and R. Bohme, "The dresden image database for benchmarking digital image forensics," Journal of Digital Forensic Practice, vol. 3, no. 2-4, pp. 150-159, 2010.
-
(2010)
Journal of Digital Forensic Practice
, vol.3
, Issue.2-4
, pp. 150-159
-
-
Gloe, T.1
Bohme, R.2
|