Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
93 | Masaru Takesue |
A tampering protocol for reducing the coherence transactions in regular computation. |
ISPAN |
1997 |
DBLP DOI BibTeX RDF |
tampering protocol, coherence transactions, regular computation, latency of communication, protocols, multiprocessor, cache-coherence protocol, RTL simulator |
81 | Wei Wang 0025, Jing Dong 0003, Tieniu Tan |
A Survey of Passive Image Tampering Detection. |
IWDW |
2009 |
DBLP DOI BibTeX RDF |
Image Tampering, Image Tampering Detection, Imaging Process, Image Model |
72 | Hongxia Jin, Jeffery Lotspiech |
Proactive Software Tampering Detection. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Dun-Yu Hsiao, Soo-Chang Pei |
Detecting Digital Tampering by Blur Estimation. |
SADFE |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Xianfeng Zhao, Weinong Wang, Kefei Chen |
Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. |
WAIM |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Ying Chen, Yuping Wang |
Exposing Digital Forgeries by Detecting Traces of Smoothing. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Sujoy Roy, Qibin Sun |
Robust Hash for Detecting and Localizing Image Tampering. |
ICIP (6) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Ashwin Swaminathan, Min Wu 0001, K. J. Ray Liu |
Image Tampering Identification using Blind Deconvolution. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos Papanikolopoulos, Richard M. Voyles |
Real-Time Detection of Camera Tampering. |
AVSS |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Huajian Liu, Martin Steinebach |
Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability. |
AXMEDIS |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Fangyong Hou, Zhiying Wang, Zhen Liu, Yun Liu |
Avoid Powerful Tampering by Malicious Host. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Yao-Chung Lin, David P. Varodayan, Bernd Girod |
Video quality monitoring for mobile multicast peers using distributed source coding. |
MobiMedia |
2009 |
DBLP DOI BibTeX RDF |
peer-to-peer multicast video streaming, video quality estimation, transcoding, distributed source coding, tampering detection |
43 | Hany Farid |
Exposing digital forgeries in scientific images. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
digital forensics, digital tampering |
43 | Micah K. Johnson, Hany Farid |
Exposing digital forgeries through chromatic aberration. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
digital forensics, digital tampering |
39 | Yao-Chung Lin, David P. Varodayan, Torsten Fink, Erwin B. Bellers, Bernd Girod |
Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tubaro |
Localization of sparse image tampering via random projections. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi |
Physical Security Bounds Against Tampering. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Tamper-Proof Hardware, Fault Prevention, Fault Detection, Error Detection, Fault Analysis, Physical Security, Adversarial Model, Implementation Attack |
39 | Kyriacos E. Pavlou, Richard T. Snodgrass |
Forensic analysis of database tampering. |
SIGMOD Conference |
2006 |
DBLP DOI BibTeX RDF |
append-only, corruption diagram, forensic strength, cryptographic hash function |
38 | Xuping Huang, Isao Echizen, Akira Nishimura |
A New Approach of Reversible Acoustic Steganography for Tampering Detection. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
Reversible acoustic steganography, feature extraction (hash), tampering detection |
33 | Richa Singh 0001, Mayank Vatsa, Sanjay Kumar Singh, Saurabh Upadhyay |
Integrating SVM classification with SVD watermarking for intelligent video authentication. |
Telecommun. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Video authentication, Relative correlation, Support vector machine, Watermarking, Singular value decomposition |
33 | Ali Saglam, Alptekin Temizel |
Real-Time Adaptive Camera Tamper Detection for Video Surveillance. |
AVSS |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Hongjie He, Jiashu Zhang, Fan Chen 0003 |
A self-recovery fragile watermarking scheme for image authentication with superior localization. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
tamper recovery, probability of false rejection, probability of false acceptance, digital watermarking |
33 | Parag Agarwal, Balakrishnan Prabhakaran 0001 |
Tamper proofing mechanisms for motion capture data. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
watermarking, encoding, decoding, blind, spatial |
33 | Weihong Wang, Hany Farid |
Exposing Digital Forgeries in Interlaced and Deinterlaced Video. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Seok Min Yoon, Seung Wook Lee, Hongmoon Wang, Jong Tae Kim |
Encoding-Based Tamper-Resistant Algorithm for Mobile Device Security. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
Security, Mobile Device, Tamper-resistant |
33 | Huajian Liu, Martin Steinebach |
Digital Watermarking for Image Authentication with Localization. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Kun Zhang 0006, Tao Zhang 0037, Santosh Pande |
Memory Protection through Dynamic Access Control. |
MICRO |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Xiaotong Zhuang, Tao Zhang 0037, Santosh Pande |
Using Branch Correlation to Identify Infeasible Paths for Anomaly Detection. |
MICRO |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Vidyasagar M. Potdar, Chen Wu 0001, Elizabeth Chang 0001 |
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Asnat Dadon-Elichai |
RDS: Remote Distributed Scheme for Protecting Mobile Agents. |
AAMAS |
2004 |
DBLP DOI BibTeX RDF |
Security, mobile agents, secret - sharing |
33 | Gene Itkis |
Cryptographic tamper evidence. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
evolving cryptosystems, key evolution, tamper evidence, digital signatures, exposures |
33 | Yuichi Nakai |
Semi Fragile Watermarking Based on Wavelet Transform. |
IEEE Pacific Rim Conference on Multimedia |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Eshan Chattopadhyay, Xin Li 0006 |
Non-malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering. |
TCC (3) |
2020 |
DBLP DOI BibTeX RDF |
|
33 | Eshan Chattopadhyay, Xin Li 0006 |
Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
32 | Dhruv Mahajan 0001, Ravi Ramamoorthi, Brian Curless |
A Theory Of Frequency Domain Invariants: Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2008 |
DBLP DOI BibTeX RDF |
Frequency Domain Invariants, Spherical harmonic identities, Convolution, Relighting, Inverse rendering, Image Forensics, Tampering |
32 | Micah K. Johnson, Hany Farid |
Detecting Photographic Composites of People. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
Digital Forensics, Digital Tampering |
32 | Weihong Wang, Hany Farid |
Exposing digital forgeries in video by detecting duplication. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
digital forensics, digital tampering |
32 | Marwan Abi-Antoun, Daniel Wang, Peter Torr |
Checking threat modeling data flow diagrams for implementation conformance and security. |
ASE |
2007 |
DBLP DOI BibTeX RDF |
reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing |
32 | Micah K. Johnson, Hany Farid |
Exposing Digital Forgeries Through Specular Highlights on the Eye. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
Digital Forensics, Digital Tampering |
32 | Shih-Fu Chang |
Blind Passive Media Forensics: Motivation and Opportunity. |
MCAM |
2007 |
DBLP DOI BibTeX RDF |
media forensics, detection of image forgery and tampering, media security |
32 | Chin-Chen Chang 0001, Chih-Chiang Tsou, Yung-Chen Chou |
A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
quad-tree segmentation, Image authentication, tampering detection |
32 | Kerstin Lemke-Rust, Christof Paar |
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
Tamper-Proof Hardware, Fault Analysis, Physical Security, Adversarial Model, Tampering, Implementation Attack |
32 | Micah K. Johnson, Hany Farid |
Exposing digital forgeries by detecting inconsistencies in lighting. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
digital forensics, digital tampering |
32 | Hao-Tian Wu, Yiu-ming Cheung |
A fragile watermarking scheme for 3D meshes. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
dither modulation, mesh authentication, mesh centroid, fragile watermarking, tampering detection |
28 | Pin Zhang, Xiangwei Kong |
Detecting Image Tampering Using Feature Fusion. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Kyriacos E. Pavlou, Richard T. Snodgrass |
Forensic analysis of database tampering. |
ACM Trans. Database Syst. |
2008 |
DBLP DOI BibTeX RDF |
Monochromatic algorithm, Polychromatic algorithm, RGBY algorithm, Tiled Bitmap algorithm, a3D algorithm, compliant records, forensic analysis algorithm, forensic cost |
28 | Yi-Lei Chen, Chiou-Ting Hsu |
Image tampering detection by blocking periodicity analysis in JPEG compressed images. |
MMSP |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere |
Run-Time Randomization to Mitigate Tampering. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Mohsen Sharifi, Mohammad Zoroufi, Alireza Saberi |
How to Counter Control Flow Tampering Attacks. |
AICCSA |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao |
A control flow obfuscation method to discourage malicious tampering of software codes. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation |
28 | S. Prasad, K. Ramakrishnan |
On Resampling Detection and its Application to Detect Image Tampering. |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara |
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking. |
IWDW |
2009 |
DBLP DOI BibTeX RDF |
tampered-MSB localization, tampered-LSB localization, Image authentication, fragile watermarking |
22 | Siyue Chen, Henry Leung |
Chaotic Watermarking for Video Authentication in Surveillance Applications. |
IEEE Trans. Circuits Syst. Video Technol. |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha |
Architectural support for securing application data in embedded systems. |
EIT |
2008 |
DBLP DOI BibTeX RDF |
|
22 | A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono |
FlexBox: Sandboxing internet servers based on layer-7 contexts. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Irfan A. Siddavatam, Jayant Gadge |
Comprehensive test mechanism to detect attack on Web Services. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Debasri Saha, Susmita Sur-Kolay |
Fast Robust Intellectual Property Protection for VLSI Physical Design. |
ICIT |
2007 |
DBLP DOI BibTeX RDF |
fingerprint- ing, VLSI physical design, watermarking, Intellectual property, electronic design automation |
22 | Andrew B. T. Hopkins, Klaus D. McDonald-Maier, Evangelos Papoutsis, W. Gareth J. Howells |
Ensuring data integrity via ICmetrics based security infrastructure. |
AHS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Arati Baliga, Pandurang Kamat, Liviu Iftode |
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Linna Zhou, Dongming Wang, Yunbiao Guo, Jingfei Zhang |
Blur Detection of Digital Forgery Using Mathematical Morphology. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
safety content management application, mathematical morphology, blur, image forensics, security agent |
22 | Neerja Bhatnagar, Ethan L. Miller |
Designing a secure reliable file system for sensor networks. |
StorageSS |
2007 |
DBLP DOI BibTeX RDF |
sensor network file system, secure, reliable |
22 | Yongdong Wu |
Tamper-Localization Watermarking with Systematic Error Correcting Code. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Weiqi Luo 0001, Jiwu Huang, Guoping Qiu |
Robust Detection of Region-Duplication Forgery in Digital Image. |
ICPR (4) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Hongxia Jin |
Higher Dependability and Security for Mobile Applications. |
SPC |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Weihong Wang, Hany Farid |
Exposing digital forgeries in video by detecting double MPEG compression. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
digital tamperin, digital forensics |
22 | Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai, David A. Wagner 0001 |
Private Circuits II: Keeping Secrets in Tamperable Circuits. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Farinaz Koushanfar, Inki Hong, Miodrag Potkonjak |
Behavioral synthesis techniques for intellectual property protection. |
ACM Trans. Design Autom. Electr. Syst. |
2005 |
DBLP DOI BibTeX RDF |
watermarking, behavioral synthesis, Intellectual property protection |
22 | Aydan R. Yumerefendi, Jeffrey S. Chase |
Trust but verify: accountability for network services. |
ACM SIGOPS European Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Alin C. Popescu, Hany Farid |
Statistical Tools for Digital Forensics. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Ee-Chien Chang, Mohan S. Kankanhalli, Xin Guan, Zhiyong Huang, Yinghui Wu |
Robust image authentication using content based compression. |
Multim. Syst. |
2003 |
DBLP DOI BibTeX RDF |
Security, Wavelets, Watermarking, Digital signature, Signal processing |
22 | G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas |
AEGIS: architecture for tamper-evident and tamper-resistant processing. |
ICS |
2003 |
DBLP DOI BibTeX RDF |
software licensing, secure processors, certified execution |
22 | Paolo Maggi, Riccardo Sisto |
A configurable mobile agent data protection protocol. |
AAMAS |
2003 |
DBLP DOI BibTeX RDF |
mobile agents, data integrity, cryptographic protocols, data authenticity |
22 | Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg |
Natural Language Watermarking and Tamperproofing. |
Information Hiding |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Liehua Xie, Gonzalo R. Arce, R. F. Graveman |
Approximate image message authentication codes. |
IEEE Trans. Multim. |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Faisal Alturki, Russell M. Mersereau |
Secure fragile digital watermarking technique for image authentication. |
ICIP (3) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Shuihua Han, Stephen Leung, Zongwei Luo |
Tamper Detection in the EPC Network Using Digital Watermarking. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
data tampering, RFID, watermarking, EPC |
21 | Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi |
A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation. |
ICDS |
2010 |
DBLP DOI BibTeX RDF |
data integrity, web application, web based-systems, HMAC, security vulnerabilities, tampering, Web authentication |
21 | Xinpeng Zhang 0001, Shuozhong Wang, Guorui Feng |
Fragile Watermarking Scheme with Extensive Content Restoration Capability. |
IWDW |
2009 |
DBLP DOI BibTeX RDF |
content restoration, tampering rate, fragile watermarking |
21 | Eric Kee, Hany Farid |
Printer profiling for forensics and ballistics. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
document authentication, printer ballistics, digital forensics, digital tampering |
21 | Weihong Wang, Hany Farid |
Detecting Re-projected Video. |
Information Hiding |
2008 |
DBLP DOI BibTeX RDF |
Digital Forensics, Digital Tampering |
21 | Walter Geisselhardt, Taswar Iqbal |
High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
Smart IDs, data tampering, entertainment tickets protection, printing scanning, 2-D Bar codes, HD-DataStripe, data encoding in background images, biometrics, watermarking, copy detection, counterfeiting, halftone images |
21 | Yun Q. Shi 0001, Chunhua Chen 0001, Guorong Xuan, Wei Su 0001 |
Steganalysis Versus Splicing Detection. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
splicing detection, natural image model, Steganography, steganalysis, digital forensics, tampering detection |
21 | Ross J. Anderson |
On the Security of Digital Tachographs. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
tachographs, smartcard, fraud, tampering |
17 | Zihan Yuan, Xinpeng Zhang 0001, Zichi Wang, Zhaoxia Yin |
Semi-fragile neural network watermarking for content authentication and tampering localization. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Ifeoluwapo Aribilola, Brian Lee 0001, Mamoona Naveed Asghar |
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices. |
Internet Things |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Victor Fedoseev, Anna Denisova |
A Reversible Medical Image Watermarking Scheme for Advanced Image Tampering Detection. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Ankit Yadav, Dhruv Gupta, Dinesh Kumar Vishwakarma |
Uncovering visual attention-based multi-level tampering traces for face forgery detection. |
Signal Image Video Process. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Zhihui Zhao, Sen Zhao, Fei Lyu 0001, Shuaizong Si, Hongsong Zhu, Limin Sun |
RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Sunen Chakraborty, Kingshuk Chatterjee, Paramita Dey |
Detection of Image Tampering Using Deep Learning, Error Levels and Noise Residuals. |
Neural Process. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Amal Hammami, Amal Ben Hamida, Chokri Ben Amar, Henri Nicolas |
Blind Semi-fragile Hybrid Domain-Based Dual Watermarking System for Video Authentication and Tampering Localization. |
Circuits Syst. Signal Process. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Tao Chen, Zhitao Liu, Hongye Su |
Tampering attack detection for remote interval observer. |
J. Frankl. Inst. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Li Dong 0006, Weipeng Liang, Rangding Wang |
Robust Text Image Tampering Localization via Forgery Traces Enhancement and Multiscale Attention. |
IEEE Trans. Consumer Electron. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Guandong Li, Xian Yang, Wenpin Ma |
A Two-Stage Dual-Path Framework for Text Tampering Detection and Recognition. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Giovanni Pasqualino, Luca Guarnera, Alessandro Ortis, Sebastiano Battiato |
MITS-GAN: Safeguarding Medical Imaging from Tampering with Generative Adversarial Networks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Ian D. Kretz, Clare C. Parran, John D. Ramsdell, Paul D. Rowe |
Evidence Tampering and Chain of Custody in Layered Attestations. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Junlin Gu, Yihan Xu, Juan Sun, Weiwei Liu |
Image tampering detection based on feature consistency attention. |
Int. J. Inf. Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Eunseok Lee 0002, Xibi Chen, Maitreyi Ashok, Jae-Yeon Won, Anantha P. Chandrakasan, Ruonan Han 0001 |
12.5 A Packageless Anti-Tampering Tag Utilizing Unclonable Sub-THz Wave Scattering at the Chip-Item Interface. |
ISSCC |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Alexander Naumann, Felix Hertlein, Laura Dörr, Kai Furmans |
TAMPAR: Visual Tampering Detection for Parcel Logistics in Postal Supply Chains. |
WACV |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Marco Fabris, Daniel Zelazo |
A Robustness Analysis to Structured Channel Tampering Over Secure-by-Design Consensus Networks. |
IEEE Control. Syst. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Xiaofan Xia, Songsong Zhang, Kunshu Wang, Tiegang Gao |
A novel color image tampering detection and self-recovery based on fragile watermarking. |
J. Inf. Secur. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|