Sciweavers

27 search results - page 3 / 6
» Fingerprinting and forensic analysis of multimedia
Sort
View
SADFE
2008
IEEE
14 years 1 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...
TIFS
2008
148views more  TIFS 2008»
13 years 7 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
MEDIAFORENSICS
2010
13 years 9 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 1 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.
ICIP
2010
IEEE
13 years 5 months ago
Performance impact of ordinal ranking on content fingerprinting
Content fingerprinting provides a compact representation of multimedia objects for copy identification. This paper analyzes the impact of the ordinal-ranking based feature encodin...
Wei-Hong Chuang, Avinash L. Varna, Min Wu