Found: 16
Select item for more details and to access through your institution.
ENF Based Video Forgery Detection Algorithm.
- Published in:
- International Journal of Digital Crime & Forensics, 2020, v. 12, n. 1, p. N.PAG, doi. 10.4018/IJDCF.2020010107
- By:
- Publication type:
- Article
Robust and Fair Undersea Target Detection with Automated Underwater Vehicles for Biodiversity Data Collection.
- Published in:
- Remote Sensing, 2022, v. 14, n. 15, p. 3680, doi. 10.3390/rs14153680
- By:
- Publication type:
- Article
A fast source-oriented image clustering method for digital forensics.
- Published in:
- EURASIP Journal on Image & Video Processing, 2017, v. 2017, n. 1, p. 1, doi. 10.1186/s13640-017-0217-y
- By:
- Publication type:
- Article
Fast source camera identification using matching signs between query and reference fingerprints.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 18, p. 7405, doi. 10.1007/s11042-014-1985-3
- By:
- Publication type:
- Article
Gait recognition based on the golden ratio.
- Published in:
- EURASIP Journal on Image & Video Processing, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13640-016-0126-5
- By:
- Publication type:
- Article
Jointly learning and training: using style diversification to improve domain generalization for deepfake detection.
- Published in:
- Electronic Research Archive, 2024, v. 31, n. 3, p. 1, doi. 10.3934/era.2024090
- By:
- Publication type:
- Article
Exploring Static–Dynamic ID Matching and Temporal Static ID Inconsistency for Generalizable Deepfake Detection.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/2024/2280143
- By:
- Publication type:
- Article
On view‐invariant gait recognition: a feature selection solution.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2018, v. 7, n. 4, p. 287, doi. 10.1049/iet-bmt.2017.0151
- By:
- Publication type:
- Article
Human gait identification from extremely low‐quality videos: an enhanced classifier ensemble method.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2014, v. 3, n. 2, p. 84, doi. 10.1049/iet-bmt.2013.0062
- By:
- Publication type:
- Article
WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU.
- Published in:
- International Journal of Parallel Programming, 2019, v. 47, n. 4, p. 644, doi. 10.1007/s10766-017-0533-y
- By:
- Publication type:
- Article
Contention-aware prediction for performance impact of task co-running in multicore computers.
- Published in:
- Wireless Networks (10220038), 2022, v. 28, n. 3, p. 1293, doi. 10.1007/s11276-018-01902-7
- By:
- Publication type:
- Article
Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems.
- Published in:
- Mathematical Biosciences & Engineering, 2019, v. 16, n. 5, p. 3367, doi. 10.3934/mbe.2019168
- By:
- Publication type:
- Article
Source Camera Identification with a Robust Device Fingerprint: Evolution from Image-Based to Video-Based Approaches.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 17, p. 7385, doi. 10.3390/s23177385
- By:
- Publication type:
- Article
Beyond PRNU: Learning Robust Device-Specific Fingerprint for Source Camera Identification.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 20, p. N.PAG, doi. 10.3390/s22207871
- By:
- Publication type:
- Article
Medical Images Authentication through Repetitive Index Modulation Based Watermarking.
- Published in:
- International Journal of Digital Crime & Forensics, 2009, v. 1, n. 4, p. 32, doi. 10.4018/jdcf.2009062403
- By:
- Publication type:
- Article
Protection of Digital Mammograms on PACSs Using Data Hiding Techniques.
- Published in:
- International Journal of Digital Crime & Forensics, 2009, v. 1, n. 1, p. 75, doi. 10.4018/jdcf.2009010105
- By:
- Publication type:
- Article