Sciweavers

94 search results - page 9 / 19
» Performance Forensics
Sort
View
IH
2005
Springer
14 years 1 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
MEDIAFORENSICS
2010
13 years 9 months ago
Multimodal object authentication with random projections: a worst-case approach
In this paper, we consider a forensic multimodal authentication framework based on binary hypothesis testing in random projections domain. We formulate a generic authentication pr...
Oleksiy J. Koval, Sviatoslav Voloshynovskiy
JEI
2006
125views more  JEI 2006»
13 years 7 months ago
Image manipulation detection
Abstract. Techniques and methodologies for validating the authenticity of digital images and testing for the presence of doctoring and manipulation operations on them has recently ...
Sevinc Bayram, Ismail Avcibas, Bülent Sankur,...
ICASSP
2010
IEEE
13 years 7 months ago
Beyond Doddington menagerie, a first step towards
During the last decade, speaker verification systems have shown significant progress and have reached a level of performance and accuracy that support their utilization in pract...
Juliette Kahn, Solange Rossato, Jean-Franço...
NSPW
2004
ACM
14 years 28 days ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman