Author:
Barni Mauro,Fontani Marco,Tondi Benedetta
Publisher
Springer International Publishing
Reference17 articles.
1. Barni, M., Tondi, B.: The source identification game: an information-theoretic perspective. IEEE Trans. Inf. Forensics Secur. 8(3), 450–463 (2013)
2. Barni, M., Fontani, M., Tondi, B.: A universal technique to hide traces of histogram-based image manipulations. In: Proceedings of MM&Sec 2012, 14th ACM workshop on Multimedia & Security, pp. 97–104. ACM, New York (2012)
3. Barni, M., Tondi, B.: Multiple-observation hypothesis testing under adversarial conditions. In: Proceedings of WIFS 2013, IEEE International Workshop on Information Forensics and Security, pp. 91–96, November 2013
4. Bonami, P., Kilinc, M., Linderoth, J., et al.: Algorithms and software for convex mixed integer nonlinear programs. Computer Sciences Department, University of Wisconsin-Madison. Techical report (2009)
5. Comesana-Alfaro, P., Perez-Gonzalez, F.: Optimal counterforensics for histogram-based forensics. In: Proceedings of ICASSP 2013, IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3048–3052, May 2013
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献