—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Abstract. This article describes techniques of vocal forgery able to affect automatic speaker recognition system in a forensic context. Vocal forgery covers two main aspects: voice...
Patrick Perrot, Mathieu Morel, Joseph Razik, G&eac...
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...