default search action
8th WIFS 2016: Abu Dhabi, United Arab Emirates
- IEEE International Workshop on Information Forensics and Security, WIFS 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016. IEEE 2016, ISBN 978-1-5090-1138-4
- Shishir Sharma, A. Venkata Subramanyam, Monika Jain, Ambuj Mehrish, Sabu Emmanuel:
Anti-forensic technique for median filtering using L1-L2 TV model. 1-6 - Yaohui Ding, Arun Ross:
An ensemble of one-class SVMs for fingerprint spoof detection across different fabrication materials. 1-6 - Jeffrey Pawlick, Quanyan Zhu:
A Stackelberg game perspective on the conflict between machine learning and data obfuscation. 1-6 - Yan Sun, Hayreddin Çeker, Shambhu J. Upadhyaya:
Shared keystroke dataset for continuous authentication. 1-6 - Gabriel Maciá-Fernández, José Camacho, Pedro Garcia-Teodoro, Rafael A. Rodríguez-Gómez:
Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection. 1-6 - Tomás Komárek, Martin Grill, Tomás Pevný:
Passive NAT detection using HTTP access logs. 1-6 - Minh Thanh Vu, Tobias J. Oechtering, Mikael Skoglund:
Polar code for secure Wyner-Ziv coding. 1-6 - Pawel Korus, Jiwu Huang:
Evaluation of random field models in multi-modal unsupervised tampering localization. 1-6 - Jiaju Huang, Daqing Hou, Stephanie Schuckers, Shambhu J. Upadhyaya:
Effects of text filtering on authentication performance of keystroke biometrics. 1-6 - Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu, Guorui Feng:
Defining cost functions for adaptive steganography at the microscale. 1-6 - Xiaoting Wu, Elhocine Boutellaa, Miguel Bordallo López, Xiaoyi Feng, Abdenour Hadid:
On the usefulness of color for kinship verification from face images. 1-6 - Mauro Barni, Zhipeng Chen, Benedetta Tondi:
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder. 1-6 - Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
Dynamic content selection-and-prediction framework applied to reversible data hiding. 1-6 - Grigory Kabatiansky, Marcel Fernandez, Elena Egorova:
Multimedia fingerprinting codes resistant against colluders and noise. 1-5 - Patrick Bas:
Steganography via cover-source switching. 1-6 - Filipe de Oliveira Costa, Silvia Lameri, Paolo Bestagini, Zanoni Dias, Stefano Tubaro, Anderson Rocha:
Hash-based frame selection for video phylogeny. 1-6 - Qiong Gui, Wei Yang, Zhanpeng Jin, Maria V. Ruiz-Blondet, Sarah Laszlo:
A residual feature-based replay attack detection approach for brainprint biometric systems. 1-6 - Amel Tuama, Frédéric Comby, Marc Chaumont:
Camera model identification with the use of deep convolutional neural networks. 1-6 - Simone Milani, Paolo Bestagini, Stefano Tubaro:
Phylogenetic analysis of near-duplicate and semantically-similar images using viewpoint localization. 1-6 - Francesco Marra, Giovanni Poggi, Carlo Sansone, Luisa Verdoliva:
Correlation clustering for PRNU-based blind image source identification. 1-6 - Yuan Rao, Jiangqun Ni:
A deep learning approach to detection of splicing and copy-move forgeries in images. 1-6 - Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Cryptographic randomness on a CC2538: A case study. 1-6 - Niklas Büscher, David Kretzmer, Arnav Jindal, Stefan Katzenbeisser:
Scalable secure computation from ANSI-C. 1-6 - Majid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk:
Efficient and secure equality tests. 1-6 - Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Image denoising in the encrypted domain. 1-6 - Salam Ismail Rasheed Khanji, Raja Jabir, Farkhund Iqbal, Andrew Marrington:
Forensic analysis of xbox one and playstation 4 gaming consoles. 1-6 - Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
Source camera attribution using stabilized video. 1-6 - Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov, Taras Holotyak:
Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes. 1-6 - Marc Coudriau, Abdelkader Lahmadi, Jérôme François:
Topological analysis and visualisation of network monitoring data: Darknet case study. 1-6 - Davide Cozzolino, Luisa Verdoliva:
Single-image splicing localization through autoencoder-based anomaly detection. 1-6 - Panagiotis Andriotis, Martina Angela Sasse, Gianluca Stringhini:
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. 1-6 - Amnol Monga, Quanyan Zhu:
On solving large-scale low-rank zero-sum security games of incomplete information. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.