Information forensics: An overview of the first decade

MC Stamm, M Wu, KJR Liu - IEEE access, 2013 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …

Detecting compressed deepfake videos in social networks using frame-temporality two-stream convolutional network

J Hu, X Liao, W Wang, Z Qin - IEEE Transactions on Circuits …, 2021 - ieeexplore.ieee.org
The development of technologies that can generate Deepfake videos is expanding rapidly.
These videos are easily synthesized without leaving obvious traces of manipulation. Though …

Network forensics: an analysis of techniques, tools, and trends

R Hunt, S Zeadally - Computer, 2012 - ieeexplore.ieee.org
Network Forensics – An Analysis of Techniques, Tools, and Trends Page 1 1 Network
Forensics – An Analysis of Techniques, Tools, and Trends Ray Hunt Department of …

Stackelberg game for bandwidth allocation in cloud-based wireless live-streaming social networks

G Nan, Z Mao, M Yu, M Li, H Wang… - IEEE Systems …, 2013 - ieeexplore.ieee.org
Multimedia social networks have been introduced as a new technology to enrich people's
lives through enhanced multimedia distribution. On the other hand, a media cloud system …

Digital image source coder forensics via intrinsic fingerprints

WS Lin, SK Tjoa, HV Zhao… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Recent development in multimedia processing and network technologies has facilitated the
distribution and sharing of multimedia through networks, and increased the security …

Social multimedia computing

Y Tian, J Srivastava, T Huang, N Contractor - Computer, 2010 - ieeexplore.ieee.org
Social Multimedia Computing Page 1 27 AUGUST 2010 Published by the IEEE Computer
Society 0018-9162/10/$26.00 © 2010 IEEE COVER FEATURE thereby creating asynchronous …