2016
DOI: 10.1109/lsp.2016.2537201
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Power Signatures for Camera Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(38 citation statements)
references
References 13 publications
0
38
0
Order By: Relevance
“…Camera forensics has become a significant field of research for various applications such as verification query image/video pairs can be attributed to the same source camera, and verification the source of a suspicious image/video [23], [24]. To the best of our knowledge, the only work exploiting ENF for camera forensics is that of Hajj-Ahmad et al [18]. They basically compute camera read-out time per frame based on vertical phase analysis [21].…”
Section: Idle Period Estimationmentioning
confidence: 99%
See 4 more Smart Citations
“…Camera forensics has become a significant field of research for various applications such as verification query image/video pairs can be attributed to the same source camera, and verification the source of a suspicious image/video [23], [24]. To the best of our knowledge, the only work exploiting ENF for camera forensics is that of Hajj-Ahmad et al [18]. They basically compute camera read-out time per frame based on vertical phase analysis [21].…”
Section: Idle Period Estimationmentioning
confidence: 99%
“…where L is number of rows) for each single row [18]. Φ [l] can be extracted through the Fourier Transform of the lthrow time-series that can be obtained by using the lth-row mean intensity of each frame of the video.…”
Section: A State-of-the-art Approachmentioning
confidence: 99%
See 3 more Smart Citations