The SCEAS System
Navigation Menu

Conferences in DBLP

(mediaforensics)
2010 (conf/mediaforensics/2010)


  1. On information leakage in fuzzy commitment. [Citation Graph (, )][DBLP]


  2. Exploring image dependencies: a new challenge in image forensics. [Citation Graph (, )][DBLP]


  3. Better security levels for broken arrows. [Citation Graph (, )][DBLP]


  4. Joint reversible data hiding and image encryption. [Citation Graph (, )][DBLP]


  5. SIFT features in semi-fragile video watermarks. [Citation Graph (, )][DBLP]


  6. Detecting double compression of audio signal. [Citation Graph (, )][DBLP]


  7. Digital image authentication from thumbnails. [Citation Graph (, )][DBLP]


  8. Improving re-sampling detection by adding noise. [Citation Graph (, )][DBLP]


  9. On the security of biohashing. [Citation Graph (, )][DBLP]


  10. Reversible transformations may improve the quality of reversible watermarking. [Citation Graph (, )][DBLP]


  11. Multimodal object authentication with random projections: a worst-case approach. [Citation Graph (, )][DBLP]


  12. Detecting content adaptive scaling of images for forensic applications. [Citation Graph (, )][DBLP]


  13. JPEG recompression detection. [Citation Graph (, )][DBLP]


  14. Audio annotation watermarking with robustness against DA/AD conversion. [Citation Graph (, )][DBLP]


  15. Feature point based image watermarking with insertions, deletions, and substitution codes. [Citation Graph (, )][DBLP]


  16. IT and SLT characterizations of secured biometric authentication systems. [Citation Graph (, )][DBLP]


  17. Automatic counterfeit protection system code classification. [Citation Graph (, )][DBLP]


  18. Biometric template transformation: a security analysis. [Citation Graph (, )][DBLP]


  19. Human visual system-based color image steganography using the contourlet transform. [Citation Graph (, )][DBLP]


  20. Forensic hash for multimedia information. [Citation Graph (, )][DBLP]


  21. Audio watermarking forensics: detecting malicious re-embedding. [Citation Graph (, )][DBLP]


  22. Sensor noise camera identification: countering counter-forensics. [Citation Graph (, )][DBLP]


  23. Alignment and bit extraction for secure fingerprint biometrics. [Citation Graph (, )][DBLP]


  24. Robust minutiae hash for fingerprint template protection. [Citation Graph (, )][DBLP]


  25. Texture based attacks on intrinsic signature based printer identification. [Citation Graph (, )][DBLP]


  26. Modern steganalysis can detect YASS. [Citation Graph (, )][DBLP]


  27. Subset selection circumvents the square root law. [Citation Graph (, )][DBLP]


  28. Feature selection for steganalysis using the Mahalanobis distance. [Citation Graph (, )][DBLP]


  29. Minimizing embedding impact in steganography using trellis-coded quantization. [Citation Graph (, )][DBLP]


  30. Image forensic analyses that elude the human visual system. [Citation Graph (, )][DBLP]


  31. Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics. [Citation Graph (, )][DBLP]


  32. Managing a large database of camera fingerprints. [Citation Graph (, )][DBLP]


  33. Efficient techniques for sensor fingerprint matching in large image and video databases. [Citation Graph (, )][DBLP]


  34. On detection of median filtering in digital images. [Citation Graph (, )][DBLP]


  35. Efficient estimation of CFA pattern configuration in digital camera images. [Citation Graph (, )][DBLP]


  36. A framework for theoretical analysis of content fingerprinting. [Citation Graph (, )][DBLP]


  37. Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels. [Citation Graph (, )][DBLP]


  38. On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations. [Citation Graph (, )][DBLP]


  39. Fast identification of highly distorted images. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002