Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference24 articles.
1. Ohaneme CO, Eke J, Azubogu AC, Ifeagwu EN, Ohaneme LC (2012) Design and implementation of an IP-based security surveillance system. IJCSI Int J Comput Sci Issues 9(5):393
2. Mondaini N, Caldelli R, Piva A, Barni M, Cappellini V (2007) Detection of malevolent changes in digital video for forensic applications. Security, Steganography, and Watermarking of Multimedia Contents IX, vol 6505, p 65050T. International Society for Optics and Photonics
3. Bayram S, Sencar H, Memon N (2008) Video copy detection based on source device characteristics: a complementary approach to content-based methods. In: 1st ACM International Conference on Multimedia Information Retrieval. ACM, pp 435–442
4. Conotter V, O’Brien JF, Farid H (2012) Exposing digital forgeries in ballistic motion. IEEE Trans Inf Forensic Secur 7(1):283–296
5. Stamm MC, Lin WS, Liu KR (2012) Temporal forensics and anti-forensics for motion compensated video. IEEE Trans Inf Forensic Secur 7(4):1315–1329