|
Conferences in DBLP
On information leakage in fuzzy commitment. [Citation Graph (, )][DBLP]
Exploring image dependencies: a new challenge in image forensics. [Citation Graph (, )][DBLP]
Better security levels for broken arrows. [Citation Graph (, )][DBLP]
Joint reversible data hiding and image encryption. [Citation Graph (, )][DBLP]
SIFT features in semi-fragile video watermarks. [Citation Graph (, )][DBLP]
Detecting double compression of audio signal. [Citation Graph (, )][DBLP]
Digital image authentication from thumbnails. [Citation Graph (, )][DBLP]
Improving re-sampling detection by adding noise. [Citation Graph (, )][DBLP]
On the security of biohashing. [Citation Graph (, )][DBLP]
Reversible transformations may improve the quality of reversible watermarking. [Citation Graph (, )][DBLP]
Multimodal object authentication with random projections: a worst-case approach. [Citation Graph (, )][DBLP]
Detecting content adaptive scaling of images for forensic applications. [Citation Graph (, )][DBLP]
JPEG recompression detection. [Citation Graph (, )][DBLP]
Audio annotation watermarking with robustness against DA/AD conversion. [Citation Graph (, )][DBLP]
Feature point based image watermarking with insertions, deletions, and substitution codes. [Citation Graph (, )][DBLP]
IT and SLT characterizations of secured biometric authentication systems. [Citation Graph (, )][DBLP]
Automatic counterfeit protection system code classification. [Citation Graph (, )][DBLP]
Biometric template transformation: a security analysis. [Citation Graph (, )][DBLP]
Human visual system-based color image steganography using the contourlet transform. [Citation Graph (, )][DBLP]
Forensic hash for multimedia information. [Citation Graph (, )][DBLP]
Audio watermarking forensics: detecting malicious re-embedding. [Citation Graph (, )][DBLP]
Sensor noise camera identification: countering counter-forensics. [Citation Graph (, )][DBLP]
Alignment and bit extraction for secure fingerprint biometrics. [Citation Graph (, )][DBLP]
Robust minutiae hash for fingerprint template protection. [Citation Graph (, )][DBLP]
Texture based attacks on intrinsic signature based printer identification. [Citation Graph (, )][DBLP]
Modern steganalysis can detect YASS. [Citation Graph (, )][DBLP]
Subset selection circumvents the square root law. [Citation Graph (, )][DBLP]
Feature selection for steganalysis using the Mahalanobis distance. [Citation Graph (, )][DBLP]
Minimizing embedding impact in steganography using trellis-coded quantization. [Citation Graph (, )][DBLP]
Image forensic analyses that elude the human visual system. [Citation Graph (, )][DBLP]
Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics. [Citation Graph (, )][DBLP]
Managing a large database of camera fingerprints. [Citation Graph (, )][DBLP]
Efficient techniques for sensor fingerprint matching in large image and video databases. [Citation Graph (, )][DBLP]
On detection of median filtering in digital images. [Citation Graph (, )][DBLP]
Efficient estimation of CFA pattern configuration in digital camera images. [Citation Graph (, )][DBLP]
A framework for theoretical analysis of content fingerprinting. [Citation Graph (, )][DBLP]
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels. [Citation Graph (, )][DBLP]
On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations. [Citation Graph (, )][DBLP]
Fast identification of highly distorted images. [Citation Graph (, )][DBLP]
|