Author:
Johnson Rob,Walsh Leif,Lamb Michael
Publisher
Springer Berlin Heidelberg
Reference39 articles.
1. Lecture Notes in Computer Science;G. Ateniese,2005
2. Chan, G.: Scaling artifacts and resolution,
http://www.glennchan.info/broadcast-monitors/scaling-artifacts/scaling-artifacts.htm
3. Chen, W., Shi, Y.Q., Xuan, G.: Identifying computer graphics using hsv color model and statistical moments of characteristic functions. In: Proceedings of the 2007 IEEE International Conference on Multimedia (2007)
4. Daily, G.: Sickle’s witness tree (November 2008),
http://www.gettysburgdaily.com/?p=856
5. Daviel, A.: Trusted digital camera,
http://andrew.triumf.ca/trustcam
(viewed 2/6/2006)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital Signatures for Authenticating Compressed JPEG Images;Proceedings of the 1st Workshop on Security-Centric Strategies for Combating Information Disorder;2024-07
2. AILocker;Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing;2019-04-08
3. Efficient Invisible and Unlinkable Sanitizable Signatures;Public-Key Cryptography – PKC 2019;2019
4. Efficient unlinkable sanitizable signatures from signatures with re‐randomizable keys;IET Information Security;2018-05
5. Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys;Public-Key Cryptography – PKC 2016;2016