The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The abundance of information regarding the most of domains makes Internet the best resource. Besides its usefulness, it is however difficult to automate the process of information extraction due to lack of structure in online information. The most commonly used information sharing protocol Hyper Text Transfer Protocol (HTTP) makes it possible to embed a lot of noise (like advertisements, images, headers,...
In this paper, we introduce tamper detection techniques based on artifacts created by color filter array (CFA) processing in most digital cameras. The techniques are based on computing a single feature and a simple threshold based classifier. The efficacy of the approach was tested over thousands of authentic, tampered, and computer generated images. Experimental results demonstrate reasonably low...
The identification of image acquisition source is an important problem in digital image forensics. In this work, we focus on building a classifier to effectively distinguish between digital images taken from digital single lens reflex (DSLR) and compact cameras. Based on the architecture and the imaging features of DSLR and compact cameras, the images taken from different sources may have different...
In this paper, a novel individual source scanner identification scheme is proposed. The scheme uses traces of dust, dirt, and scratches over scanner platen on scanned images to characterize a source scanner. The efficacy of the proposed scheme is substantiated with experimental analysis. The robustness of the scheme to the JPEG compression is also investigated. Experimental results show that proposed...
In a novel method for identifying the source camera of a digital image is proposed. The method is based on first extracting imaging sensor's pattern noise from many images and later verifying its presence in a given image through a correlative procedure. In this paper, we investigate the performance of this method in a more realistic setting and provide results concerning its detection performance...
Cooperative wireless communications offers a new dimension of diversity by emulating transmit antenna diversity to provide reliable communications. In cooperative diversity, single-antenna radios behave as relays between a source and destination, and the performance improvements are due to cooperation of the source and the relay. However, a misbehaving relay can degrade the envisaged performance improvements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.