Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information forensics
biblio
Morphological Filter Detector for Image Forensics Applications
Submitted by grigby1 on Thu, 04/08/2021 - 5:14pm
image filtering
Morphology
digital image forensics
binary image compression
binary level documents
deterministic approach
feature extractor
gray level documents
grayscale image compression
mathematical morphology
image forensic identification
image manipulations
media authentication
morphological filter detection
morphological filter detector
noise removal
nonlinear image operators
trained SVM classifier
image classification
Human behavior
Metrics
resilience
Resiliency
Scalability
Support vector machines
Kernel
feature extraction
pubcrawl
Detectors
image colour analysis
Image forensics
information forensics
Image coding
data compression
Transform coding
Gray-scale
biblio
A Deep Learning Approach in the Discrete Cosine Transform Domain to Median Filtering Forensics
Submitted by grigby1 on Thu, 04/08/2021 - 5:14pm
maxout function
frequency-domain analysis
discrete cosine transforms
median filters
adaptive filtering layer
AFL
batch normalization operations
classification layer
convolutional stream
discrete cosine transform domain
main frequency range
signal classification
median filtering
median filtering forensics
median filtering manipulation
multiscale convolutional block
multiscale feature fusion strategy
multiscale manipulation features
operational traces
resultant features
Softmax function
Resiliency
Training
feature extraction
CNN
convolution
convolutional neural nets
pubcrawl
Human behavior
Metrics
resilience
learning (artificial intelligence)
Scalability
sensor fusion
deep learning
Kernel
Forensics
convolutional neural network
convolutional neural networks
Image forensics
information forensics
biblio
Forensic Similarity for Digital Images
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
digital images
two-part deep-learning system
three-layer neural network
similarity network
multimedia forensics
manipulation parameter
image patches
forgery detection
forensic trace
forensic similarity decision
forensic similarity approach
editing operation
digital image forensics approach
database consistency verification
convolutional neural network-based feature extractor
camera model
deep learning
Forgery
information forensics
Image forensics
Cameras
Forensics
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
convolutional neural nets
feature extraction
Training
learning (artificial intelligence)
biblio
Composition of Visual Feature Vector Pattern for Deep Learning in Image Forensics
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
pubcrawl
information forensics
learning (artificial intelligence)
Least squares approximations
least-squares solution
machine learning
median filter residual
median filtering detection
median filters
Metrics
inception module
residual block
resilience
Resiliency
Scalability
suspicious image
visual feature vector pattern
visualization
visualized feature vector patterns
window size
feature vector
CNN deep learning
CNN hybrid model
CNN net layer
CNN structure
convolution
convolutional neural nets
deep learning
extraction method
feature extraction
CNN
Filtering
Forgery
forgery image
forgery images
Human behavior
image classification
Image forensics
image forensics detection scheme
biblio
Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
phase encoding framework
decoder estimate
distributed source coding
distributed source coding perspective
Fourier-Mellin transform
hash security
image hashing
minimal hash size
minimal information exchange
central server
Phase spectrum
reference image
rigid image registration
rigid image registration technique
secure image hash-based geometric transformations estimation
signal processing applications
transformation parameters
computational complexity
information security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Bandwidth
Cryptography
Forensics
image registration
source coding
information forensics
Image coding
secure communication
secure transmission
biblio
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification
Submitted by grigby1 on Thu, 04/08/2021 - 5:12pm
invariant image features
Camera Identification
CASIA database
CMOS image sensor-based PUF
CMOS image sensors
digital content creation
digital image forensics
forgery content detection
geometric transformations
image acquisition timestamp
image hash
image processing operations
image tampering problems
Bernoulli random space
perceptual data-device hash
Perceptual Image Hash
PUF-based data-device hash
size 180.0 nm
source camera identification
standard content-preserving manipulations
tamper-resistant random PUF response
tampered image detection
TSMC technology
video footage
video watermarking
object detection
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Forensics
Cameras
digital devices
Image forensics
information forensics
feature extraction
image watermarking
Watermarking
copy protection
Physical Unclonable Function
digital images
integrated circuit modelling
video coding
image capture
Forgery
acquisition device identification
benign content
biblio
A Review of Mobile Forensic Investigation Process Models
Submitted by grigby1 on Thu, 04/08/2021 - 5:11pm
information forensics
reviews
redundant investigation processes
mobile-based services
mobile scenarios
mobile forensics field
mobile forensics
mobile forensic tools
mobile forensic investigation process models
MFIPMs
MF transitions
MF field
forensic practitioners
investigation process model
tools
mobile devices
Unified modeling language
smart phones
mobile computing
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Digital Forensics
biblio
Media Forensics and DeepFakes: An Overview
Submitted by grigby1 on Thu, 04/08/2021 - 5:11pm
fake media
Media
multimedia computing
Deepfakes
Information integrity
data-driven forensic methods
deep learning tools
digital image forensics
elections
Videos
false multimedia content
forensic tools
Media Forensics
real media
realistic fake images
synthetic media
Video Forensics
visual media integrity verification
fraud
learning (artificial intelligence)
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
deep learning
security threats
neural nets
Forensics
software packages
public opinion
information forensics
generative adversarial networks
biblio
On the Information Leakage in Private Information Retrieval Systems
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
chaotic communication
total leakage
private information retrieval systems
PIR systems
individual message leakage
common randomness
coding schemes
information forensics
Information Leakage
encryption
information retrieval
security
privacy
Scalability
data privacy
Indexes
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Categorization and Organization of Database Forensic Investigation Processes
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Databases
preparation and pre-response category
Planning
investigation process model
harmonized DBFI process
design science research methodology
database forensics
database forensic investigation processes
Database forensic investigation
analysis and reconstruction category
acquisition and preservation category
Terminology
information forensics
Adaptation models
digital data
Data models
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Digital Forensics
Servers
database management systems
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »