Videntifier" Forensic: large-scale video identification in practice
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Deluding image recognition in sift-based cbir systems
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Semantic object watermark re-synchronization based on skeleton vertex corresponds
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
A game-theoretic system security design for the visible watermarking
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Imputing human descriptions in semantic biometrics
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Privacy preserving video surveillance using pedestrian tracking mechanism
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Semi-interactive tracing of persons in real-life surveillance data
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Further improvements on secret image sharing scheme
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Copy-move forgery detection via texture description
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Bags of phrases with codebooks alignment for near duplicate image detection
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
A visual tool for forensic analysis of mobile phone traffic
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Copy detection of immersed content in video databases
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Measuring sample distortions in face recognition
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Estimating QP and motion vectors in H.264/AVC video from decoded pixels
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Combining dynamic texture and structural features for speaker identification
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
An automatic transcription system of hearings in Italian courtrooms
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Augmented crime scenes: virtual annotation of physical environments for forensic investigation
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Building fingerprints with information from three color bands for source camera identification
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
On the influence of denoising in PRNU based forgery detection
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Hi-index | 0.00 |
This paper introduces the context of the workshop and the associated papers.