


default search action
IWCF 2010: Tokyo, Japan
- Hiroshi Sako, Katrin Franke, Shuji Saitoh:

Computational Forensics - 4th International Workshop, IWCF 2010, Tokyo, Japan, November 11-12, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6540, Springer 2011, ISBN 978-3-642-19375-0
Invited Talks
- Mario Köppen:

Gestalt Aspects of Security Patterns. 1-12 - Minoru Sakairi:

Physical Security Technologies at Hitachi. 13-30
Authentication
- Fernando Alonso-Fernandez

, Julian Fiérrez
, Javier Galbally
, Javier Ortega-Garcia
:
Exploiting Character Class Information in Forensic Writer Identification. 31-42 - Wenjie Cai, Seiichi Uchida

, Hiroaki Sakoe:
Toward Forensics by Stroke Order Variation - Performance Evaluation of Stroke Correspondence Methods. 43-55 - Xiaoyang Wang, Youbin Chen:

A Novel Seal Imprint Verification Method Based on Analysis of Difference Images and Symbolic Representation. 56-67
Biometrics 1
- Ryuichi Yanagisawa, Shinichiro Omachi

:
Extraction of 3D Shape of a Tooth from Dental CT Images with Region Growing Method. 68-77 - MinYi Jeong, Andrew Beng Jin Teoh

:
Cancellable Face Biometrics System by Combining Independent Component Analysis Coefficients. 78-87 - Yi Tang, Sargur N. Srihari, Harish Kasiviswanathan, Jason J. Corso

:
Footwear Print Retrieval System for Real Crime Scene Marks. 88-100
Documents
- Yoshinori Akao, Atsushi Yamamoto, Yoshiyasu Higashikawa:

Improvement of Inkjet Printer Spur Gear Teeth Number Estimation by Fixing the Order in Maximum Entropy Spectral Analysis. 101-113 - Takeshi Furukawa:

Detecting Indentations on Documents Pressed by Pen Tip Force Using a Near Infrared Light Emitting Diode (NIR LED) and Shape from Shading. 114-125
Multimedia
- Weihan Sun, Koichi Kise:

Similar Partial Copy Detection of Line Drawings Using a Cascade Classifier and Feature Matching. 126-137 - Francesco Di Cerbo, Andrea Girardello, Florian Michahelles, Svetlana Voronkova:

Detection of Malicious Applications on Android OS. 138-149 - Babak Mahdian, Stanislav Saic, Radim Nedbal:

JPEG Quantization Tables Forensics: A Statistical Approach. 150-159
Biometrics 2
- Chen Yu

, Thomas A. Busey, John Vanderkolk:
Discovering Correspondences between Fingerprints Based on the Temporal Dynamics of Eye Movements from Experts. 160-172 - Chang Su, Sargur N. Srihari:

Latent Fingerprint Rarity Analysis in Madrid Bombing Case. 173-184 - Lukasz Wieclaw:

Fingerprint Directional Image Enhancement. 185-192
Evaluation
- Yoko Seki:

What Kind of Strategies Does a Document Examiner Take in Handwriting Identification? 193-199 - York Yannikos

, Frederik Franke, Christian Winter, Markus Schneider:
3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data. 200-211

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














