{"title":"Session details: Biometrics and surveillance","authors":"S. Battiato","doi":"10.1145/3258347","DOIUrl":"https://doi.org/10.1145/3258347","url":null,"abstract":"","PeriodicalId":425603,"journal":{"name":"Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115098983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Near copy detection","authors":"A. Ulges","doi":"10.1145/3258345","DOIUrl":"https://doi.org/10.1145/3258345","url":null,"abstract":"","PeriodicalId":425603,"journal":{"name":"Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121470868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Image forgery detection","authors":"S. Battiato","doi":"10.1145/3258350","DOIUrl":"https://doi.org/10.1145/3258350","url":null,"abstract":"","PeriodicalId":425603,"journal":{"name":"Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128848756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Keynote address","authors":"S. Battiato","doi":"10.1145/3258344","DOIUrl":"https://doi.org/10.1145/3258344","url":null,"abstract":"","PeriodicalId":425603,"journal":{"name":"Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence","volume":"15 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132914454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Security of multimedia data","authors":"S. Emmanuel","doi":"10.1145/3258346","DOIUrl":"https://doi.org/10.1145/3258346","url":null,"abstract":"","PeriodicalId":425603,"journal":{"name":"Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122051327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Forensic process support","authors":"A. Ulges","doi":"10.1145/3258349","DOIUrl":"https://doi.org/10.1145/3258349","url":null,"abstract":"","PeriodicalId":425603,"journal":{"name":"Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}