调味品 发表于 2025-3-28 16:22:02

http://reply.papertrans.cn/24/2324/232315/232315_41.png

Lice692 发表于 2025-3-28 19:20:23

http://reply.papertrans.cn/24/2324/232315/232315_42.png

URN 发表于 2025-3-29 01:52:09

http://reply.papertrans.cn/24/2324/232315/232315_43.png

勤劳 发表于 2025-3-29 06:54:12

Detecting the Spur Marks of Ink-Jet Printed Documents Using a Multiband Scanner in NIR Mode and Imagnfrared (NIR) mode and estimations of point spread function (PSF). As estimating PSF we used cepstrum which is inverse Fourier transform of logarithm spectrum. The proposed method provided the clear image of the spur marks.

分发 发表于 2025-3-29 10:11:34

A Computational Discriminability Analysis on Twin Fingerprintsthe general population, the similarity of fingerprints of twins is significantly different from that between genuine prints of the same finger. Twins fingerprints are discriminable with a 1.5%~1.7% higher EER than non-twins. And identical twins can be distinguished by examine fingerprint with a slightly higher error rate than fraternal twins.

量被毁坏 发表于 2025-3-29 15:13:39

Probability of Random Correspondence for FingerprintsC among a random set of . samples (.PRC) and (iii) PRC between a specific sample among . others (specific .PRC). Experimental results show that the theoretical estimates of fingerprint individuality using our model consistently follow the empirical values based on the NIST4 database.

蜿蜒而流 发表于 2025-3-29 18:10:10

http://reply.papertrans.cn/24/2324/232315/232315_47.png

consent 发表于 2025-3-29 22:11:25

Multimedia Forensics Is Not Computer Forensicsrensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.

最低点 发表于 2025-3-30 00:44:42

http://reply.papertrans.cn/24/2324/232315/232315_49.png

传授知识 发表于 2025-3-30 07:36:14

Application to Mathematical Finance,deo files were recorded with various resolutions, and the resulting video files were encoded with different codecs. Depending on video characteristics (e.g. codec quality settings, recording resolution), it is possible to correctly identify cameras based on these videos.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Computational Forensics; Third International Zeno J. M. H. Geradts,Katrin Y. Franke,Cor J. Veen Conference proceedings 2009 Springer-Verla