Search dblp for Publications

export results for "toc:db/conf/eforensics/eforensics2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/eforensics/CaldelliAP09,
  author       = {Roberto Caldelli and
                  Irene Amerini and
                  Francesco Picchioni},
  editor       = {Matthew Sorell},
  title        = {Distinguishing between Camera and Scanned Images by Means of Frequency
                  Analysis},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {95--101},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_11},
  doi          = {10.1007/978-3-642-02312-5\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/CaldelliAP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/CikicLS09,
  author       = {Sabine Cikic and
                  Fritz Lehmann{-}Grube and
                  Jan Sablatnig},
  editor       = {Matthew Sorell},
  title        = {Surveillance and Datenschutz in Virtual Environments},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {212--219},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_24},
  doi          = {10.1007/978-3-642-02312-5\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/CikicLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/FrantiSKKHS09,
  author       = {Pasi Fr{\"{a}}nti and
                  Juhani Saastamoinen and
                  Ismo K{\"{a}}rkk{\"{a}}inen and
                  Tomi Kinnunen and
                  Ville Hautam{\"{a}}ki and
                  Ilja Sidoroff},
  editor       = {Matthew Sorell},
  title        = {Developing Speaker Recognition System: From Prototype to Practical
                  Application},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {102--115},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_12},
  doi          = {10.1007/978-3-642-02312-5\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/FrantiSKKHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/HaltisASB09,
  author       = {Kosta Haltis and
                  Lee Andersson and
                  Matthew Sorell and
                  Russell S. A. Brinkworth},
  editor       = {Matthew Sorell},
  title        = {Surveillance Applications of Biologically-Inspired Smart Cameras},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {65--76},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_8},
  doi          = {10.1007/978-3-642-02312-5\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/HaltisASB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/KnightMS09,
  author       = {Simon Knight and
                  Simon Moschou and
                  Matthew Sorell},
  editor       = {Matthew Sorell},
  title        = {Analysis of Sensor Photo Response Non-Uniformity in {RAW} Images},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {130--141},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_15},
  doi          = {10.1007/978-3-642-02312-5\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/KnightMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/KokkinenN09,
  author       = {Heikki Kokkinen and
                  Janne N{\"{o}}yr{\"{a}}nen},
  editor       = {Matthew Sorell},
  title        = {Forensics for Detecting {P2P} Network Originated {MP3} Files on the
                  User Device},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {10--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_2},
  doi          = {10.1007/978-3-642-02312-5\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/KokkinenN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Li09,
  author       = {Chang{-}Tsun Li},
  editor       = {Matthew Sorell},
  title        = {Detection of Block Artifacts for Digital Forensic Analysis},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {173--178},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_20},
  doi          = {10.1007/978-3-642-02312-5\_20},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/Li09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LiL09,
  author       = {Chang{-}Tsun Li and
                  Yue Li},
  editor       = {Matthew Sorell},
  title        = {Authenticating Medical Images through Repetitive Index Modulation
                  Based Watermarking},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {153--159},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_17},
  doi          = {10.1007/978-3-642-02312-5\_17},
  timestamp    = {Fri, 29 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/LiL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LiL09a,
  author       = {Yue Li and
                  Chang{-}Tsun Li},
  editor       = {Matthew Sorell},
  title        = {Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {166--172},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_19},
  doi          = {10.1007/978-3-642-02312-5\_19},
  timestamp    = {Fri, 29 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/LiL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LuomaL09,
  author       = {Milton H. Luoma and
                  Vicki Miller Luoma},
  editor       = {Matthew Sorell},
  title        = {Complying across Continents: At the Intersection of Litigation Rights
                  and Privacy Rights},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {186--194},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_22},
  doi          = {10.1007/978-3-642-02312-5\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/LuomaL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/MahmoudiEM09,
  author       = {Fariborz Mahmoudi and
                  Rasul Enayatifar and
                  Mohsen Mirzashaeri},
  editor       = {Matthew Sorell},
  title        = {Image Encryption Using Chaotic Signal and Max-Heap Tree},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {19--28},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_3},
  doi          = {10.1007/978-3-642-02312-5\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/MahmoudiEM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/MahmoudiMSF09,
  author       = {Fariborz Mahmoudi and
                  Mohsen Mirzashaeri and
                  Ehsan Shahamatnia and
                  Saed Faridnia},
  editor       = {Matthew Sorell},
  title        = {A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary
                  Neural Network},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_1},
  doi          = {10.1007/978-3-642-02312-5\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/MahmoudiMSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/McGrathGKC09,
  author       = {Niall McGrath and
                  Pavel Gladyshev and
                  M. Tahar Kechadi and
                  Joe Carthy},
  editor       = {Matthew Sorell},
  title        = {Investigating Encrypted Material},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {29--35},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_4},
  doi          = {10.1007/978-3-642-02312-5\_4},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/McGrathGKC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/NevilleS09,
  author       = {Timothy Neville and
                  Matthew Sorell},
  editor       = {Matthew Sorell},
  title        = {Audit Log for Forensic Photography},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {142--152},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_16},
  doi          = {10.1007/978-3-642-02312-5\_16},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/NevilleS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/PanB09,
  author       = {Lei Pan and
                  Lynn Margaret Batten},
  editor       = {Matthew Sorell},
  title        = {Robust Correctness Testing for Digital Forensic Tools},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {54--64},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_7},
  doi          = {10.1007/978-3-642-02312-5\_7},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/PanB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ParkCK09,
  author       = {Heum Park and
                  SunHo Cho and
                  Hyuk{-}Chul Kwon},
  editor       = {Matthew Sorell},
  title        = {Cyber Forensics Ontology for Cyber Criminal Investigation},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {160--165},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_18},
  doi          = {10.1007/978-3-642-02312-5\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ParkCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/PerrotMRC09,
  author       = {Patrick Perrot and
                  Mathieu Morel and
                  Joseph Razik and
                  G{\'{e}}rard Chollet},
  editor       = {Matthew Sorell},
  title        = {Vocal Forgery in Forensic Sciences},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {179--185},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_21},
  doi          = {10.1007/978-3-642-02312-5\_21},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/PerrotMRC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/RaghavanCM09,
  author       = {Sriram Raghavan and
                  Andrew J. Clark and
                  George M. Mohay},
  editor       = {Matthew Sorell},
  title        = {{FIA:} An Open Forensic Integration Architecture for Composing Digital
                  Evidence},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {83--94},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_10},
  doi          = {10.1007/978-3-642-02312-5\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/RaghavanCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ShiralkarLT09,
  author       = {Trupti Shiralkar and
                  Michael K. Lavine and
                  Benjamin P. Turnbull},
  editor       = {Matthew Sorell},
  title        = {A Preliminary Approach to the Forensic Analysis of an Ultraportable
                  {ASUS} Eee {PC}},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {116--121},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_13},
  doi          = {10.1007/978-3-642-02312-5\_13},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ShiralkarLT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/SlayS09,
  author       = {Jill Slay and
                  Elena Sitnikova},
  editor       = {Matthew Sorell},
  title        = {The Development of a Generic Framework for the Forensic Analysis of
                  {SCADA} and Process Control Systems},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {77--82},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_9},
  doi          = {10.1007/978-3-642-02312-5\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/SlayS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Sullivan09,
  author       = {Clare Sullivan},
  editor       = {Matthew Sorell},
  title        = {Digital Identity - The Legal Person?},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_23},
  doi          = {10.1007/978-3-642-02312-5\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Sullivan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/TurnbullOS09,
  author       = {Benjamin P. Turnbull and
                  Grant Osborne and
                  Matthew Simon},
  editor       = {Matthew Sorell},
  title        = {Legal and Technical Implications of Collecting Wireless Data as an
                  Evidence Source},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {36--41},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_5},
  doi          = {10.1007/978-3-642-02312-5\_5},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/TurnbullOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/WangC09,
  author       = {Xue{-}Guang Wang and
                  Zhen{-}Chuan Chai},
  editor       = {Matthew Sorell},
  title        = {A Provable Security Scheme of ID-Based Threshold Decryption},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {122--129},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_14},
  doi          = {10.1007/978-3-642-02312-5\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/WangC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/WongGC09,
  author       = {M. L. Dennis Wong and
                  Antionette W.{-}T. Goh and
                  Hong Siang Chua},
  editor       = {Matthew Sorell},
  title        = {Medical Image Authentication Using {DPT} Watermarking: {A} Preliminary
                  Attempt},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {42--53},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_6},
  doi          = {10.1007/978-3-642-02312-5\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/WongGC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eforensics/2009,
  editor       = {Matthew Sorell},
  title        = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5},
  doi          = {10.1007/978-3-642-02312-5},
  isbn         = {978-3-642-02311-8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics