2013 IEEE International Workshop on Information Forensics and Security (WIFS) 2013
DOI: 10.1109/wifs.2013.6707805
|View full text |Cite
|
Sign up to set email alerts
|

The watchful forensic analyst: Multi-clue information fusion with background knowledge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…As it is possible to observe from Table 2 the score obtained by the three approaches used in this work are comparatively good. In the future research we will focus especially on the fusion of the available information by a more effective strategy [22,23,24] than the empirical rules used in this contest. Demosaicking [21] 0.1013 Table 2: Comparisons of the three approaches described in this work with some state-of-the-art methods.…”
Section: Decision Fusion and Resultsmentioning
confidence: 99%
“…As it is possible to observe from Table 2 the score obtained by the three approaches used in this work are comparatively good. In the future research we will focus especially on the fusion of the available information by a more effective strategy [22,23,24] than the empirical rules used in this contest. Demosaicking [21] 0.1013 Table 2: Comparisons of the three approaches described in this work with some state-of-the-art methods.…”
Section: Decision Fusion and Resultsmentioning
confidence: 99%
“…In order to define the mapping from the localization maps to BBAs (Eq. ( 4)), we adopt the method proposed in [13], choosing the following set of properties to locally characterize the reliability of each tool τ : the value of the last compression factor (if any) q 2 , the mean value µ and the std. deviation σ of pixels intensity and the the first compression factor q 1 , if present.…”
Section: Resultsmentioning
confidence: 99%
“…The generic analysis block is thus described by the vector v = (o τ , q 2 , µ, σ, q 1 ), where o τ denotes the value of the block in the map produced by tool τ (in our case, τ ∈ T = {AJPEG; NAJPEG; CFA}). By applying the approach proposed in [13], each vector is associated to scalar values L τ , N τ and D τ (see Eq. 4); as to the parameters required in [13], we used α = 0.85 and k = 12 for all tools, whereas γ = 0.5 for CFA tool, γ = 512 for AJPEG tool and γ = 2048 for NAJPEG tool.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations