On the Security and Applicability of Fragile Camera Fingerprints
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Sensor-fingerprint based identification of images corrected for lens distortion , 2012, Other Conferences.
[2] Matthias Kirchner,et al. Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study , 2012, MM&Sec '12.
[3] Felix C. Freiling,et al. Multimedia Forensics Is Not Computer Forensics , 2009, IWCF.
[4] K. J. Ray Liu,et al. Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.
[5] Matthias Kirchner,et al. Fragile sensor fingerprint camera identification , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[6] Dimitrios Koutsonikolas,et al. ABC: Enabling Smartphone Authentication with Built-in Camera , 2018, NDSS.
[7] Gabi Nakibly,et al. Mobile Device Identification via Sensor Fingerprinting , 2014, ArXiv.
[8] Le Song,et al. A Kernel Statistical Test of Independence , 2007, NIPS.
[9] Giulia Boato,et al. RAISE: a raw images dataset for digital image forensics , 2015, MMSys.
[10] Jessica Fridrich,et al. Sensor Defects in Digital Image Forensic , 2013 .
[11] Ahmet Emir Dirik,et al. Adaptive photo-response non-uniformity noise removal against image source attribution , 2015, Digit. Investig..
[12] Jessica J. Fridrich,et al. Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.
[13] Enrico Magli,et al. User Authentication via PRNU-Based Physical Unclonable Functions , 2017, IEEE Transactions on Information Forensics and Security.
[14] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[15] Rainer Böhme,et al. Synthesis of color filter array pattern in digital images , 2009, Electronic Imaging.
[16] Fernando Pérez-González,et al. Coping with the enemy: Advances in adversary-aware signal processing , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[17] Jerry D. Gibson,et al. Distributions of the Two-Dimensional DCT Coefficients for Images , 1983, IEEE Trans. Commun..
[18] C.-C. Jay Kuo,et al. Recovering missing coefficients in DCT-transformed images , 2011, 2011 18th IEEE International Conference on Image Processing.
[19] Rainer Böhme,et al. The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.
[20] Matthias Kirchner,et al. Patch-Based Desynchronization of Digital Camera Sensor Fingerprints , 2016, Media Watermarking, Security, and Forensics.
[21] Konrad Rieck,et al. Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[22] Rainer Böhme,et al. Can we trust digital image forensics? , 2007, ACM Multimedia.
[23] Mo Chen,et al. Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Transactions on Information Forensics and Security.
[24] Paul C. van Oorschot,et al. Device fingerprinting for augmenting web authentication: classification and analysis of methods , 2016, ACSAC.
[25] Davide Cozzolino,et al. Attacking the triangle test in sensor-based camera identification , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[26] Ming Zhang,et al. e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy , 2021, IEEE Transactions on Dependable and Secure Computing.
[27] Bernard Widrow,et al. Quantization Noise: A Few Properties of Selected Distributions , 2008 .