Sciweavers

7544 search results - page 24 / 1509
» Network Forensics Analysis
Sort
View
IJDE
2002
67views more  IJDE 2002»
13 years 8 months ago
Error, Uncertainty and Loss in Digital Evidence
Despite the potentially grave ramifications of relying on faulty information in the investigative or probabitive stages, the uncertainty in digital evidence is not being evaluated...
Eoghan Casey
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Compressed video stream watermarking for peer-to-peer based content distribution network
Peer-to-peer content distribution provides high network throughput with relatively low server cost and scales better than traditional content distribution networks with respect to...
Dekun Zou, Nicolas Prigent, Jeffrey A. Bloom
ICIP
2006
IEEE
14 years 10 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao
ICIP
2010
IEEE
13 years 6 months ago
Resolving distortion between linear and area sensors for forensic print inspection
: Resolving distortion between linear and area sensors for forensic print inspection Stephen B. Pollard, Guy B. Adams, Steven J. Simske HP Laboratories HPL-2010-172 Security print...
Stephen B. Pollard, Guy B. Adams, Steven J. Simske
EFORENSICS
2009
Springer
14 years 3 months ago
Vocal Forgery in Forensic Sciences
Abstract. This article describes techniques of vocal forgery able to affect automatic speaker recognition system in a forensic context. Vocal forgery covers two main aspects: voice...
Patrick Perrot, Mathieu Morel, Joseph Razik, G&eac...