


default search action
IWCF 2010: Tokyo, Japan
- Hiroshi Sako, Katrin Franke, Shuji Saitoh:
Computational Forensics - 4th International Workshop, IWCF 2010, Tokyo, Japan, November 11-12, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6540, Springer 2011, ISBN 978-3-642-19375-0
Invited Talks
- Mario Köppen:
Gestalt Aspects of Security Patterns. 1-12 - Minoru Sakairi:
Physical Security Technologies at Hitachi. 13-30
Authentication
- Fernando Alonso-Fernandez
, Julian Fiérrez
, Javier Galbally
, Javier Ortega-Garcia
:
Exploiting Character Class Information in Forensic Writer Identification. 31-42 - Wenjie Cai, Seiichi Uchida
, Hiroaki Sakoe:
Toward Forensics by Stroke Order Variation - Performance Evaluation of Stroke Correspondence Methods. 43-55 - Xiaoyang Wang, Youbin Chen:
A Novel Seal Imprint Verification Method Based on Analysis of Difference Images and Symbolic Representation. 56-67
Biometrics 1
- Ryuichi Yanagisawa, Shinichiro Omachi
:
Extraction of 3D Shape of a Tooth from Dental CT Images with Region Growing Method. 68-77 - MinYi Jeong, Andrew Beng Jin Teoh
:
Cancellable Face Biometrics System by Combining Independent Component Analysis Coefficients. 78-87 - Yi Tang, Sargur N. Srihari, Harish Kasiviswanathan, Jason J. Corso
:
Footwear Print Retrieval System for Real Crime Scene Marks. 88-100
Documents
- Yoshinori Akao, Atsushi Yamamoto, Yoshiyasu Higashikawa:
Improvement of Inkjet Printer Spur Gear Teeth Number Estimation by Fixing the Order in Maximum Entropy Spectral Analysis. 101-113 - Takeshi Furukawa:
Detecting Indentations on Documents Pressed by Pen Tip Force Using a Near Infrared Light Emitting Diode (NIR LED) and Shape from Shading. 114-125
Multimedia
- Weihan Sun, Koichi Kise:
Similar Partial Copy Detection of Line Drawings Using a Cascade Classifier and Feature Matching. 126-137 - Francesco Di Cerbo, Andrea Girardello, Florian Michahelles, Svetlana Voronkova:
Detection of Malicious Applications on Android OS. 138-149 - Babak Mahdian, Stanislav Saic, Radim Nedbal:
JPEG Quantization Tables Forensics: A Statistical Approach. 150-159
Biometrics 2
- Chen Yu, Thomas A. Busey, John Vanderkolk:
Discovering Correspondences between Fingerprints Based on the Temporal Dynamics of Eye Movements from Experts. 160-172 - Chang Su, Sargur N. Srihari:
Latent Fingerprint Rarity Analysis in Madrid Bombing Case. 173-184 - Lukasz Wieclaw:
Fingerprint Directional Image Enhancement. 185-192
Evaluation
- Yoko Seki:
What Kind of Strategies Does a Document Examiner Take in Handwriting Identification? 193-199 - York Yannikos
, Frederik Franke, Christian Winter, Markus Schneider:
3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data. 200-211

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.