


default search action
Media Watermarking, Security, and Forensics 2019: Burlingame, CA, USA
- Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics 2019, Burlingame, CA, USA, 13-17 January 2019. Society for Imaging Science and Technology 2019 - Yujian Xu, Jan P. Allebach:
Printed Image Watermarking with Synchronization Using Direct Binary Search. - Ajith M. Kamath, Harish Palani:
Hiding in Plain Sight: Enabling the Vision of Signal Rich Art. - Xinwei Liu, Christophe Charrier, Marius Pedersen, Patrick Bours:
How re-training process affect the performance of no-reference image quality metric for face images. - Benedikt Lorch, Shruti Agarwal, Hany Farid:
Forensic Reconstruction of Severely Degraded License Plates. - Michael Goebel, Arjuna Flenner, Lakshmanan Nataraj, Bangalore S. Manjunath:
Deep Learning Methods for Event Verification and Image Repurposing Detection. - Mohammed Aloraini
, Lingdao Sha, Mehdi Sharifzadeh, Dan Schonfeld:
Dictionary Learning and Sparse Coding for Digital Image Forgery Detection. - Lakshmanan Nataraj, Tajuddin Manhar Mohammed, B. S. Manjunath, Shivkumar Chandrasekaran, Arjuna Flenner, Jawadul H. Bappy, Amit K. Roy-Chowdhury:
Detecting GAN generated Fake Images using Co-occurrence Matrices. - Jan Butora, Jessica J. Fridrich:
Detection of Diversified Stego Sources with CNNs. - Stephanie Reinders, Li Lin, Yong Guan, Min Wu, Jennifer Newman
:
Algorithm Mismatch in Spatial Steganalysis. - Jennifer Newman
, Li Lin, Wenhao Chen, Stephanie Reinders, Yangxiao Wang, Min Wu, Yong Guan:
StegoAppDB: a Steganography Apps Forensics Image Database. - Mehdi Boroumand, Jessica J. Fridrich, Rémi Cogranne
:
Are we there yet? - Hanzhou Wu
, Wei Wang
, Jing Dong, Hongxia Wang:
New Graph-Theoretic Approach to Social Steganography. - Christy Kin-Cleaves, Andrew D. Ker:
Reducing coding loss with irregular syndrome trellis codes. - Scott Craver, Enshirah Altarawneh:
Nondestructive ciphertext injection in document files. - Théo Taburet, Patrick Bas, Wadih Sawaya, Jessica J. Fridrich:
A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain. - Mohammed Aloraini
, Mehdi Sharifzadeh, Chirag Agarwal, Dan Schonfeld:
Statistical Sequential Analysis for Object-based Video Forgery Detection. - Karthick Shankar, Zhi Li, Jan P. Allebach:
Explaining and improving a machine-learning based printer identification system. - Sinan E. Tandogan, Enes Altinisik, Salim Sarimurat, Hüsrev T. Sencar:
Tackling In-Camera Downsizing for Reliable Camera ID Verification. - Reepjyoti Deka, Chiara Galdi
, Jean-Luc Dugelay:
Hybrid G-PRNU: Optimal parameter selection for scale-invariant asymmetric source smartphone identification.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.