![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
8th WIFS 2016: Abu Dhabi, United Arab Emirates
- IEEE International Workshop on Information Forensics and Security, WIFS 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016. IEEE 2016, ISBN 978-1-5090-1138-4
- Shishir Sharma, A. Venkata Subramanyam, Monika Jain, Ambuj Mehrish, Sabu Emmanuel:
Anti-forensic technique for median filtering using L1-L2 TV model. 1-6 - Yaohui Ding, Arun Ross:
An ensemble of one-class SVMs for fingerprint spoof detection across different fabrication materials. 1-6 - Jeffrey Pawlick, Quanyan Zhu:
A Stackelberg game perspective on the conflict between machine learning and data obfuscation. 1-6 - Yan Sun, Hayreddin Çeker, Shambhu J. Upadhyaya:
Shared keystroke dataset for continuous authentication. 1-6 - Gabriel Maciá-Fernández
, José Camacho
, Pedro Garcia-Teodoro, Rafael A. Rodríguez-Gómez
:
Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection. 1-6 - Tomás Komárek, Martin Grill, Tomás Pevný
:
Passive NAT detection using HTTP access logs. 1-6 - Minh Thanh Vu
, Tobias J. Oechtering, Mikael Skoglund:
Polar code for secure Wyner-Ziv coding. 1-6 - Pawel Korus
, Jiwu Huang:
Evaluation of random field models in multi-modal unsupervised tampering localization. 1-6 - Jiaju Huang, Daqing Hou, Stephanie Schuckers
, Shambhu J. Upadhyaya:
Effects of text filtering on authentication performance of keystroke biometrics. 1-6 - Kejiang Chen
, Weiming Zhang, Hang Zhou, Nenghai Yu, Guorui Feng:
Defining cost functions for adaptive steganography at the microscale. 1-6 - Xiaoting Wu, Elhocine Boutellaa, Miguel Bordallo López
, Xiaoyi Feng, Abdenour Hadid:
On the usefulness of color for kinship verification from face images. 1-6 - Mauro Barni, Zhipeng Chen, Benedetta Tondi:
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder. 1-6 - Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
Dynamic content selection-and-prediction framework applied to reversible data hiding. 1-6 - Grigory Kabatiansky, Marcel Fernandez, Elena Egorova:
Multimedia fingerprinting codes resistant against colluders and noise. 1-5 - Patrick Bas:
Steganography via cover-source switching. 1-6 - Filipe de Oliveira Costa, Silvia Lameri, Paolo Bestagini
, Zanoni Dias, Stefano Tubaro, Anderson Rocha:
Hash-based frame selection for video phylogeny. 1-6 - Qiong Gui, Wei Yang, Zhanpeng Jin, Maria V. Ruiz-Blondet, Sarah Laszlo:
A residual feature-based replay attack detection approach for brainprint biometric systems. 1-6 - Amel Tuama
, Frédéric Comby, Marc Chaumont
:
Camera model identification with the use of deep convolutional neural networks. 1-6 - Simone Milani, Paolo Bestagini
, Stefano Tubaro:
Phylogenetic analysis of near-duplicate and semantically-similar images using viewpoint localization. 1-6 - Francesco Marra
, Giovanni Poggi, Carlo Sansone
, Luisa Verdoliva:
Correlation clustering for PRNU-based blind image source identification. 1-6 - Yuan Rao
, Jiangqun Ni:
A deep learning approach to detection of splicing and copy-move forgeries in images. 1-6 - Yan Yan, Elisabeth Oswald, Theo Tryfonas
:
Cryptographic randomness on a CC2538: A case study. 1-6 - Niklas Büscher, David Kretzmer, Arnav Jindal, Stefan Katzenbeisser:
Scalable secure computation from ANSI-C. 1-6 - Majid Nateghizad, Zekeriya Erkin
, Reginald L. Lagendijk:
Efficient and secure equality tests. 1-6 - Alberto Pedrouzo-Ulloa
, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
:
Image denoising in the encrypted domain. 1-6 - Salam Ismail Rasheed Khanji, Raja Jabir, Farkhund Iqbal
, Andrew Marrington:
Forensic analysis of xbox one and playstation 4 gaming consoles. 1-6 - Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon
:
Source camera attribution using stabilized video. 1-6 - Sohrab Ferdowsi, Slava Voloshynovskiy
, Dimche Kostadinov, Taras Holotyak
:
Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes. 1-6 - Marc Coudriau, Abdelkader Lahmadi, Jérôme François:
Topological analysis and visualisation of network monitoring data: Darknet case study. 1-6 - Davide Cozzolino
, Luisa Verdoliva:
Single-image splicing localization through autoencoder-based anomaly detection. 1-6 - Panagiotis Andriotis
, Martina Angela Sasse, Gianluca Stringhini:
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. 1-6 - Amnol Monga, Quanyan Zhu:
On solving large-scale low-rank zero-sum security games of incomplete information. 1-6
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.