Index of /2016autumn/paper

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[   ]A Strategy of Clustering Modification Directions.pdf29-Oct-2018 13:38 5.5M 
[   ]Accurate Detection of Demosaicing Regularity for(1).pdf29-Oct-2018 13:38 1.3M 
[   ]Detecting Double JPEG Compression With the Same.pdf29-Oct-2018 13:38 894K 
[   ]Detection of Double-Compression in JPEG.pdf29-Oct-2018 13:38 625K 
[   ]Detection of Nonaligned Double JPEG Compression.pdf29-Oct-2018 13:38 797K 
[   ]Digital Image Forensics via Intrinsic Fingerprints.pdf29-Oct-2018 13:38 1.8M 
[   ]Digital camera identification from sensor pattern noise.pdf29-Oct-2018 13:38 1.1M 
[   ]Digital single lens reflex camera identification from traces of sensor dust.pdf29-Oct-2018 13:38 1.5M 
[   ]Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise.pdf29-Oct-2018 13:38 2.3M 
[   ]Exposing.pdf29-Oct-2018 13:38 3.0M 
[   ]Fast copy-move forgery detection.pdf29-Oct-2018 13:38 1.6M 
[   ]Image Forgery Localization via Block-Grained.pdf29-Oct-2018 13:38 3.1M 
[   ]Image Forgery Localization via Fine-GrainedAnalysis of CFA Artifacts.pdf29-Oct-2018 13:38 2.6M 
[   ]JPEG Error Analysis and Its Applications to Digital Image Forensics.pdf29-Oct-2018 13:38 1.6M 
[   ]Manipulation Detection on Image Patches Using FusionBoost.pdf29-Oct-2018 13:38 1.7M 
[   ]On Antiforensic Concealability With.pdf29-Oct-2018 13:38 2.9M 
[   ]Open Set Source Camera Attribution and Device Linking.pdf29-Oct-2018 13:38 5.4M 
[   ]Physics-motivated.pdf29-Oct-2018 13:38 1.7M 
[   ]SIFT_Forensics.pdf29-Oct-2018 13:38 1.5M 
[   ]Temporal Forensics and Anti-Forensics for Motion.pdf29-Oct-2018 13:38 2.1M 
[   ]detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection.pdf29-Oct-2018 13:38 2.0M 
[   ]how realistic is photoralistic.pdf29-Oct-2018 13:38 2.5M 

Apache Server at dcmc.ee.ncku.edu.tw Port 80