Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis
暂无分享,去创建一个
[1] Min Wu,et al. “Seeing” ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing , 2013, IEEE Transactions on Information Forensics and Security.
[2] Monson H. Hayes,et al. Statistical Digital Signal Processing and Modeling , 1996 .
[3] W. Marsden. I and J , 2012 .
[4] R. O. Schmidt,et al. Multiple emitter location and signal Parameter estimation , 1986 .
[5] Min Wu,et al. Spectrum Combining for ENF Signal Estimation , 2013, IEEE Signal Processing Letters.
[6] Mauro Barni,et al. The Source Identification Game: An Information-Theoretic Perspective , 2013, IEEE Transactions on Information Forensics and Security.
[7] Mauro Barni,et al. A Dempster-Shafer framework for decision fusion in image forensics , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[8] Carey Nachenberg,et al. Computer virus-antivirus coevolution , 1997, Commun. ACM.
[9] Thomas Kailath,et al. ESPRIT-estimation of signal parameters via rotational invariance techniques , 1989, IEEE Trans. Acoust. Speech Signal Process..
[10] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[11] Yan Sun,et al. Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..
[12] Catalin Grigoras. Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis. , 2007, Forensic science international.
[13] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[14] Asaf Cohen,et al. Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model , 2013, IEEE Transactions on Information Forensics and Security.
[15] Zeno J. M. H. Geradts,et al. Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings , 2009, IWCF.
[16] P. K. Chaturvedi,et al. Communication Systems , 2002, IFIP — The International Federation for Information Processing.
[17] K. J. Ray Liu,et al. Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.
[18] Daniel Patricio Nicolalde Rodríguez,et al. Audio Authenticity: Detecting ENF Discontinuity With High Precision Phase Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[19] Mo Chen,et al. Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Transactions on Information Forensics and Security.
[20] Johan Karlsson,et al. ENF Extraction From Digital Recordings Using Adaptive Techniques and Frequency Tracking , 2012, IEEE Transactions on Information Forensics and Security.
[21] Daniel Rappaport,et al. Analytical Framework for Digital Audio Authentication , 2012 .
[22] Min Wu,et al. How secure are power network signature based time stamps? , 2012, CCS.
[23] Min Wu,et al. Robustness of Color Interpolation Identification against Anti-forensic Operations , 2012, Information Hiding.
[24] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .