Sciweavers

985 search results - page 92 / 197
» On the validity of digital signatures
Sort
View
SAC
2010
ACM
13 years 8 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
IEEEMSP
2002
IEEE
125views Multimedia» more  IEEEMSP 2002»
14 years 3 months ago
Wireless multimedia error resilience via a data hiding technique
Abstract—Transmission of digital contents in unavoidable noiseprone environments demands sophisticated error detection and concealment techniques to restore the perceptual qualit...
Chun-Shien Lu
DRM
2008
Springer
13 years 11 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
GIS
2004
ACM
14 years 11 months ago
A new approach for a topographic feature-based characterization of digital elevation data
Triangular Irregular Network (TIN) and Regular Square Grid (RSG) are widely used for representing 2.5 dimensional spatial data. However, these models are not defined from the topo...
Eric Saux, Ki-Joune Li, Min-Hwan Kim, Rémy ...
IFIP
2005
Springer
14 years 3 months ago
Content-Based Image Retrieval for Digital Forensics
Digital forensic investigators are often faced with the task of manually examining a large number of (photographic) images in order to identify potential evidence. The task can be...
Yixin Chen, Vassil Roussev, Golden G. Richard III,...