Index of /2016autumn/paper

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]how realistic is photoralistic.pdf2016-12-13 13:43 2.5M 
[   ]detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection.pdf2016-12-13 13:43 2.0M 
[   ]Temporal Forensics and Anti-Forensics for Motion.pdf2016-12-13 13:43 2.1M 
[   ]SIFT_Forensics.pdf2016-12-13 13:43 1.5M 
[   ]Physics-motivated.pdf2016-12-13 13:43 1.7M 
[   ]Open Set Source Camera Attribution and Device Linking.pdf2016-12-13 13:43 5.4M 
[   ]On Antiforensic Concealability With.pdf2016-12-13 13:43 2.9M 
[   ]Manipulation Detection on Image Patches Using FusionBoost.pdf2016-12-13 13:43 1.7M 
[   ]JPEG Error Analysis and Its Applications to Digital Image Forensics.pdf2016-12-13 13:43 1.6M 
[   ]Image Forgery Localization via Fine-GrainedAnalysis of CFA Artifacts.pdf2016-12-13 13:43 2.6M 
[   ]Image Forgery Localization via Block-Grained.pdf2016-12-13 13:43 3.1M 
[   ]Fast copy-move forgery detection.pdf2016-12-13 13:43 1.6M 
[   ]Exposing.pdf2016-12-13 13:43 3.0M 
[   ]Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise.pdf2016-12-13 13:43 2.3M 
[   ]Digital single lens reflex camera identification from traces of sensor dust.pdf2016-12-13 13:43 1.5M 
[   ]Digital camera identification from sensor pattern noise.pdf2016-12-13 13:43 1.1M 
[   ]Digital Image Forensics via Intrinsic Fingerprints.pdf2016-12-13 13:43 1.8M 
[   ]Detection of Nonaligned Double JPEG Compression.pdf2016-12-13 13:43 797K 
[   ]Detection of Double-Compression in JPEG.pdf2016-12-13 13:43 625K 
[   ]Detecting Double JPEG Compression With the Same.pdf2016-12-13 13:43 894K 
[   ]Accurate Detection of Demosaicing Regularity for(1).pdf2016-12-13 13:43 1.3M 
[   ]A Strategy of Clustering Modification Directions.pdf2016-12-13 13:43 5.5M 

Apache/2.4.10 (Ubuntu) Server at dcmc.ee.ncku.edu.tw Port 80