CORDIS oferuje możliwość skorzystania z odnośników do publicznie dostępnych publikacji i rezultatów projektów realizowanych w ramach programów ramowych HORYZONT.
Odnośniki do rezultatów i publikacji związanych z poszczególnymi projektami 7PR, a także odnośniki do niektórych konkretnych kategorii wyników, takich jak zbiory danych i oprogramowanie, są dynamicznie pobierane z systemu OpenAIRE .
Rezultaty
Report describing the results of the empirical study.
Report on hybrid computing solutions (Initial)The initial version of the report that will define a description of the architecture of the set of tools that should be integrated locally and remotely according to their technical specifications.
Report on CoC, logging/auditing (Initial)Initial report on chain of custody logging and auditing functionalities requirements and guidelines for integration of components
UNCOVER Ethics and Privacy HandbookThis handbook will provide both the code of good practice and the ethical and privacy documentation requirements necessary for partners to carry out their activities
Report on CoC, logging/auditing (Final)Final report on chain of custody, logging and auditing functionalities, requirements and guidelines for integration of components, review of UNCOVER platform and tools as implemented with respect to these components; including, e.g., a “lessons learned” analysis.
Dissemination and communication report (Final)In three iterations, an overview on the developed dissemination material and communication activities is reported, ensuring an ongoing monitoring of activities and materials. This deliverable is the final report on this activity.
Toolbox of publicly releasable detectors developed in T5.1The final version of detectors based on security holes, releasable to the public, will be provided, together with a report explaining the logic behind each of the detector. The set of releasable detectors will be determined by the SAB.
Dissemination and communication report (initial)In three iterations an overview on the developed dissemination material and communication activities is reported ensuring an ongoing monitoring of activities and materials This deliverable is the first report The second report is foreseen at M24 The final update will be an official deliverable D811 delivered at M36
Data Management Plan (Intermediate)This report provides the first update of the data management life cycle for the data collection generation exploitation processing and preservation
Report on hybrid computing solutions (Final)The final version of the report that will define a description of the architecture of the set of tools that should be integrated locally and remotely according to their technical specifications.
Legal requirements reportThe legal requirements report of UNCOVER will be based on relevant international and national regulation It will contain an indepth analysis of European regulation and of the countries participating in the consortium in the field of criminal investigations through digital and technological methods
Report on factors contributing to the CSM (Public)A publicly available report on the analysis of the elements contributing to the CSM for image, audio and video steganalysis will be provided. Different steganalysis strategies (based on feature extractors, based on deep-learning, statistical steganalysis) and different databases will be used in order to assess the impact of each factor.
Data Management Plan (Initial)This deliverable describes the data management life cycle for the data collection generation exploitation processing and preservation An internal update will be delivered to the consortium partners at M18 and a final official deliverable at M36
Dissemination and communication report (Intermediate)In three iterations, an overview on the developed dissemination material and communication activities is reported, ensuring an ongoing monitoring of activities and materials. This deliverable is the second report on this activity.
This deliverable reports the implementation of the open informationhub as well as the planned and already set up social media channels and activities
Steganalysis contest and analysis report: ContestThe actual contest will start at M20 and last until M24. The report on the analysis of the results is foreseen in M30.The initial deliverable consists of making available the data for the contest.
Steganalysis contest and analysis report: ReportThe actual contest will start at M20 and last until M24. The report on the analysis of the results is foreseen in M30.The current deliverable consists of the report describes the analysis of the results of the contest.
Publikacje
Autorzy:
Etienne Levecque, Patrick Bas, Jan Butora
Opublikowane w:
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2024, Strona(/y) 29-35
Wydawca:
ACM
DOI:
10.1145/3577163.3595093
Autorzy:
Alexander Schlögl, Nora Hofer and Rainer Böhme
Opublikowane w:
37th Conference on Neural Information Processing Systems, 2023
Wydawca:
Conference on Neural Information Processing Systems
Autorzy:
Cogranne, Rémi
Opublikowane w:
ERI Network & Telcom - EUt+ Workshop, 2022
Wydawca:
EUt+ European Telecommunications and Networks Institute
Autorzy:
Christian Kraetzer, Mario Hildebrandt
Opublikowane w:
Proceedings of the 19th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2024, Strona(/y) 585-592, ISBN 978-989-758-679-8
Wydawca:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0012423800003660
Autorzy:
Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný
Opublikowane w:
2023 IEEE International Workshop on Information Forensics and Security (WIFS), 2024
Wydawca:
IEEE
DOI:
10.1109/wifs58808.2023.10374944
Autorzy:
Mallet, Antoine; Cogranne, Rémi; Bas, Patrick; Giboulot, Quentin
Opublikowane w:
XXIXème Colloque Francophone de Traitement du Signal et des Images, Université de Grenoble; Association Gretsi, Aug 2023, Grenoble, France, Numer 16, 2023
Wydawca:
GRETSI
Autorzy:
Rony Abecidan, Vincent Itier, Jérémie Boulanger, and Patrick Bas
Opublikowane w:
Groupe de Recherche et d'Etudes de Traitement du Signal et des Images (GRETSI), 2022
Wydawca:
GRETSI
Autorzy:
Elena Rodriguez-Lois, David Vazquez-Pad ́ın, Fernando Perez-Gonzalez, Pedro Comesana-Alfaro
Opublikowane w:
European Signal Processing Conference (EUSIPCO 2022), 2022
Wydawca:
EUSIPCO 2022
Autorzy:
Quentin Giboulot, Patrick Bas, Rémi Cogranne, and Dirk Borghys.
Opublikowane w:
European Signal Processing Conference, 2022
Wydawca:
EUSIPCO
Autorzy:
Antoine Mallet, Rémi Cogranne, Patrick Bas
Opublikowane w:
Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security, 2024, Strona(/y) 31-39
Wydawca:
ACM
DOI:
10.1145/3658664.3659643
Autorzy:
Jan Butora, Patrick Bas, Rémi Cogranne
Opublikowane w:
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2024, Strona(/y) 59-66
Wydawca:
ACM
DOI:
10.1145/3577163.3595092
Autorzy:
Jan Butora
Opublikowane w:
The 10th ACM Workshop on Information Hiding and Multimedia Security, 2022
Wydawca:
10th ACM Workshop on Information Hiding and Multimedia Security
Autorzy:
Etienne Levecque, Jan Butora, John Klein, and Patrick Bas
Opublikowane w:
Groupe de Recherche et d'Etudes de Traitement du Signal et des Images (GRETSI), 2022
Wydawca:
GRETSI
Autorzy:
Etienne Levecque, John Klein, Patrick Bas, Jan Butora
Opublikowane w:
IEEE International Workshop on Information Forensics and Security, 2022
Wydawca:
IEEE International Workshop on Information Forensics and Security
Autorzy:
Martin Beneš, Nora Hofer, Rainer Böhme
Opublikowane w:
Proceedings of the 10th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC), 2022
Wydawca:
Proceedings of the 10th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC)
Autorzy:
Domin Sepak, Lukas Adam, Tomas Pevny
Opublikowane w:
European Signal Processing Conference (EUSIPCO 2022), 2022
Wydawca:
EUSIPCO 2022
Autorzy:
Vaila Leask; Rémi Cogranne; Dirk Borghys; Helena Bruyninckx
Opublikowane w:
17th International Conference on Availability, Reliability and Security (ARES 2022), Aug 2022, Vienna, Austria, Numer 1, 2022
Wydawca:
ARES 2022
DOI:
10.1145/3538969.3544468
Autorzy:
Jan Butora
Opublikowane w:
32nd European Signal Processing Conference (EUPSICO 2024), 2024
Wydawca:
European Signal Processing Conference
Autorzy:
Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas
Opublikowane w:
Proceeding of the Colloque Francophone de Traitement du Signal et des Images - GRETSI'23, 2023
Wydawca:
Grenoble, France
Autorzy:
Levecque, Etienne; Bas, Patrick; Butora, Jan
Opublikowane w:
Proceedings of the Colloque Francophone de Traitement du Signal et des Images - GRETSI'23, Numer 5, 2023
Wydawca:
GRETSI
Autorzy:
Jan Butora; Patrick Bas.
Opublikowane w:
Groupe de Recherche et d'Etudes de Traitement du Signal et des Images (GRETSI), 2022
Wydawca:
GRETSI
Autorzy:
Martin Beneš, Nora Hofer and Rainer Böhme
Opublikowane w:
European Signal Processing Conference (EUSIPCO 2022), 2022
Wydawca:
EUSIPCO 2022
Autorzy:
Jan Butora, Patrick Bas
Opublikowane w:
Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security, 2024, Strona(/y) 143-148
Wydawca:
ACM
DOI:
10.1145/3658664.3659650
Autorzy:
Nora Hofer, Rainer Boehme
Opublikowane w:
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2024, Strona(/y) 47-58
Wydawca:
ACM
DOI:
10.1145/3577163.3595097
Autorzy:
A. Méreur, A. Mallet and R. Cogranne
Opublikowane w:
International Conference on Availability, Reliability and Security: ARES, 2023
Wydawca:
ARES
Autorzy:
Benedikt Lorch, Rainer Böhme
Opublikowane w:
33th USENIX Security Symposium, 2024
Wydawca:
USENIX
Autorzy:
Martin Beneš, Rainer Böhme
Opublikowane w:
WIFS 2024 - 2024 IEEE International Workshop on Information Forensics and Security, 2024
Wydawca:
IEEE
Autorzy:
Rony Abecidan, Vincent Itier, Jeremie Boulanger, Patrick Bas, Tomas Pevny
Opublikowane w:
IEEE International workshop on Informations Forensic and Security, 2022
Wydawca:
WIFS 2022 - 14th IEEE International workshop on Informations Forensic and Security
Autorzy:
Nora Hofer
Opublikowane w:
2024 IEEE International Conference on Image Processing (ICIP), 2024
Wydawca:
IEEE
Autorzy:
Antoine Mallet, Patrick Bas, Rémi Cogranne
Opublikowane w:
Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security, 2024, Strona(/y) 87-94
Wydawca:
ACM
DOI:
10.1145/3658664.3659638
Autorzy:
Martin Beneš, Rainer Böhme
Opublikowane w:
Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security, 2024, Strona(/y) 75-86
Wydawca:
ACM
DOI:
10.1145/3658664.3659645
Autorzy:
Zeno Geradts, Meike Kombrink
Opublikowane w:
NL Times, 2022
Wydawca:
NL times
Autorzy:
Alejandro Nicolás-Sánchez, Francisco J. Castro-Toledo
Opublikowane w:
CrimRxiv, 2024
Wydawca:
Springer BMC - Crime Science Journal
DOI:
10.21428/cb6ab371.861e761b
Autorzy:
Jan Butora, Patrick Bas
Opublikowane w:
IEEE Transactions on Information Forensics and Security, Numer 18, 2023, Strona(/y) 2683-2695, ISSN 1556-6013
Wydawca:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tifs.2023.3268884
Autorzy:
Jan Butora, Pauline Puteaux, Patrick Bas
Opublikowane w:
IEEE Transactions on Dependable and Secure Computing, Numer 21, 2024, Strona(/y) 2394-2406, ISSN 1545-5971
Wydawca:
IEEE Computer Society
DOI:
10.1109/tdsc.2023.3306379
Autorzy:
Jan Butora and Patrick Bas
Opublikowane w:
IEEE Transactions on Information Forensics and Security, 2023, ISSN 1556-6013
Wydawca:
Institute of Electrical and Electronics Engineers
Autorzy:
Eva Giboulot, Tomáš Pevný, Andrew D. Ker
Opublikowane w:
IEEE Transactions on Information Forensics and Security, Numer 18, 2024, Strona(/y) 4436-4448, ISSN 1556-6013
Wydawca:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tifs.2023.3295945
Autorzy:
Etienne Levecque
Opublikowane w:
IEEE Transactions on Information Forensics and Security, 2024, ISSN 1556-6013
Wydawca:
Institute of Electrical and Electronics Engineers
Autorzy:
Meike Helena Kombrink, Zeno Jean Marius Hubert Geradts, Marcel Worring
Opublikowane w:
ACM Computing Surveys, 2024, ISSN 0360-0300
Wydawca:
Association for Computing Machinary, Inc.
DOI:
10.1145/3694965
Autorzy:
Antoine Mallet, Martin Benes, Rémi Cogranne
Opublikowane w:
Journal of Information Security, 2024, ISSN 2193-1801
Wydawca:
Springer Science and Business Media Deutschland GmbH
DOI:
10.21203/rs.3.rs-3812991/v1
Autorzy:
Quentin Giboulot, Patrick Bas, and Rémi Cogranne
Opublikowane w:
IEEE Transactions on Information Forensics and Security, 2022, Strona(/y) Vol.17, pp.1841 - 1854, ISSN 1556-6013
Wydawca:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tifs.2022.3173184
Wyszukiwanie danych OpenAIRE...
Podczas wyszukiwania danych OpenAIRE wystąpił błąd
Brak wyników