2013 IEEE International Workshop on Information Forensics and Security (WIFS) 2013
DOI: 10.1109/wifs.2013.6707807
|View full text |Cite
|
Sign up to set email alerts
|

Exploring color information to characterize camcorder piracy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 4 publications
0
2
0
1
Order By: Relevance
“…It is incarnated by typical dark/bright stripes that scroll up/down the pirate video. In prior work, research efforts have been dedicated to detect the presence of such flicker [13,14,11,3]. Indeed, this tell-tale artifact provides clues about the piracy path and can be exploited by the forensic analyst to select which watermark detector to use.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is incarnated by typical dark/bright stripes that scroll up/down the pirate video. In prior work, research efforts have been dedicated to detect the presence of such flicker [13,14,11,3]. Indeed, this tell-tale artifact provides clues about the piracy path and can be exploited by the forensic analyst to select which watermark detector to use.…”
Section: Introductionmentioning
confidence: 99%
“…Back-light frequency fBL computed either by leveraging on the piracy identity with Equation(11) or by exploiting frequency aliasing to refine the rough estimate with Equation(12). Figures in italic indicate LCD screen identification errors.…”
mentioning
confidence: 99%
“…Larabi, Rosselli e Fernandez Maloigne (2009) propõem uma técnica de adição de ruído com fins de evitar a gravação de filmes em salas de cinema. Um novo campo de estudo emergiu com esta problemática, composto pela análise forense de vídeos pirateados, buscando a partir da avaliação de detalhes técnicos dos sinais luminosos dos vídeos extrair meios de identificar os agentes que o piratearam, frequentemente pessoas que o gravaram em salas de cinema (RUDMAN et al, 2016;BAUDRY, CHUPEAU e LEFèBVRE, 2009;HAJJ-AHMAD et al, 2017;THAKUR e KUMAR, 2015;MOREIRA-PéREZ et al, 2013;ROOPALAKSHMI e REDDY, 2012;CHUPEAU, BAUDRY e DOERR, 2014).…”
Section: Protocolo Para Revisão Sistemática Da Primeira Etapaunclassified