메뉴 건너뛰기




Volumn 53, Issue 2 II, 2005, Pages 758-767

Exposing digital forgeries by detecting traces of resampling

Author keywords

Digital forensics; Digital tampering

Indexed keywords

DIGITAL WATERMARKING; FOURIER TRANSFORMS; IMAGE COMPRESSION; INTERPOLATION; ITERATIVE METHODS; MATHEMATICAL MODELS; MATRIX ALGEBRA; PROBABILITY; STATISTICAL METHODS; VECTORS;

EID: 13244251141     PISSN: 1053587X     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSP.2004.839932     Document Type: Article
Times cited : (882)

References (22)
  • 3
    • 0027697301 scopus 로고
    • "The trustworthy camera: Restoring credibility to the photographic image"
    • Jun
    • G. Friedman, "The trustworthy camera: Restoring credibility to the photographic image," IEEE Trans. Consumer Electron., vol. 39, no. 3, pp. 905-910, Jun. 1993.
    • (1993) IEEE Trans. Consumer Electron. , vol.39 , Issue.3 , pp. 905-910
    • Friedman, G.1
  • 4
    • 0030409375 scopus 로고    scopus 로고
    • "A robust content-based digital signature for image authentication"
    • M. Schneider and S.-F. Chang, "A robust content-based digital signature for image authentication," in Proc. IEEE Int. Conf. Image Processing vol. 2, 1996, pp. 227-230.
    • (1996) Proc. IEEE Int. Conf. Image Processing , vol.2 , pp. 227-230
    • Schneider, M.1    Chang, S.-F.2
  • 5
    • 33750096298 scopus 로고    scopus 로고
    • "A new approach to integrity of digital images"
    • D. Storck, "A new approach to integrity of digital images," in Proc. IFIP Conf. Mobile Communication, 1996, pp. 309-316.
    • (1996) Proc. IFIP Conf. Mobile Communication , pp. 309-316
    • Storck, D.1
  • 6
    • 84936892450 scopus 로고
    • "Cryptology for digital tv broadcasting"
    • Jun
    • B. Macq and J.-J. Quisquater, "Cryptology for digital tv broadcasting," Proc. IEEE, vol. 83, no. 6, pp. 944-957, Jun. 1995.
    • (1995) Proc. IEEE , vol.83 , Issue.6 , pp. 944-957
    • Macq, B.1    Quisquater, J.-J.2
  • 8
    • 0003966349 scopus 로고    scopus 로고
    • "Lossless Recovery of an Original Image Containing Embedded Data"
    • U.S. patent Application, Docket/E-D
    • C. Honsinger, P. Jones, M. Rabbani, and J. Stoffel, "Lossless Recovery of an Original Image Containing Embedded Data," U.S. patent Application, Docket/E-D, 1999.
    • (1999)
    • Honsinger, C.1    Jones, P.2    Rabbani, M.3    Stoffel, J.4
  • 9
    • 0034765589 scopus 로고    scopus 로고
    • "Invertible authentication"
    • Security and Watermarking of Multimedia Contents
    • J. Fridrich, M. Goljan, and M. Du, "Invertible authentication," in Proc. SPIE, Security and Watermarking of Multimedia Contents, 2001.
    • (2001) Proc. SPIE
    • Fridrich, J.1    Goljan, M.2    Du, M.3
  • 10
    • 0033717154 scopus 로고    scopus 로고
    • "Detection of image alterations using semi-fragile watermarks"
    • Security and Watermarking of Multimedia Contents II
    • E. Lin, C. Podilchuk, and E. Delp, "Detection of image alterations using semi-fragile watermarks," in Proc. SPIE, vol. 3971, Security and Watermarking of Multimedia Contents II, 2000, pp. 52-163.
    • (2000) Proc. SPIE , vol.3971 , pp. 52-163
    • Lin, E.1    Podilchuk, C.2    Delp, E.3
  • 13
    • 0032223822 scopus 로고    scopus 로고
    • "A robust image authentication algorithm surviving jpeg lossy compression"
    • Storage and Retrieval of Image/Video Databases
    • C.-Y. Lin and S.-F. Chang, "A robust image authentication algorithm surviving jpeg lossy compression," in Proc. SPIE, vol. 3312, Storage and Retrieval of Image/Video Databases, 1998, pp. 296-307.
    • (1998) Proc. SPIE , vol.3312 , pp. 296-307
    • Lin, C.-Y.1    Chang, S.-F.2
  • 14
    • 0031378592 scopus 로고    scopus 로고
    • "An invisible watermarking technique for image verification"
    • M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proc. Int. Conf. Image Processing, vol. 1, 1997, pp. 680-683.
    • (1997) Proc. Int. Conf. Image Processing , vol.1 , pp. 680-683
    • Yeung, M.1    Mintzer, F.2
  • 15
    • 0032648596 scopus 로고    scopus 로고
    • "Digital watermarking for tell-tale tamper proofing and authentication"
    • Jul
    • D. Kundur and D. Hatzinakos, "Digital watermarking for tell-tale tamper proofing and authentication," Proc. IEEE, vol. 87, no. 7, pp. 1167-1180, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 16
    • 0036611838 scopus 로고    scopus 로고
    • "Hierarchical watermarking for secure image authentication with localization"
    • Apr
    • M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Trans. Image Processing, vol. 11, no. 4, pp. 585-595, Apr. 2002.
    • (2002) IEEE Trans. Image Processing , vol.11 , Issue.4 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 17
    • 0036030626 scopus 로고    scopus 로고
    • "Security of fragile authentication watermarks with localization"
    • Electronic Imaging
    • J. Fridrich, "Security of fragile authentication watermarks with localization," in Proc. SPIE, vol. 4675, Electronic Imaging, 2002, pp. 691-700.
    • (2002) Proc. SPIE , vol.4675 , pp. 691-700
    • Fridrich, J.1
  • 21
    • 0002629270 scopus 로고
    • "Maximum lilelihood from incomplete data via the EM algorithm"
    • A. Dempster, N. Laird, and D. Rubin, "Maximum lilelihood from incomplete data via the EM algorithm," J. Roy. Statist. Soc., vol. 99, no. 1, pp. 1-38, 1977.
    • (1977) J. Roy. Statist. Soc. , vol.99 , Issue.1 , pp. 1-38
    • Dempster, A.1    Laird, N.2    Rubin, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.