-
1
-
-
0032648596
-
Digital watermarking for telltale tamper proofing andauthentication
-
Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing andauthentication. Proceedings of the IEEE 87(7), 1167-1180 (1999)
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
4
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 3(1), 74-90 (2008)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
5
-
-
33745117985
-
Detecting doctored images using camera response normality and consistency
-
Lin, Z., Wang, R., Tang, X., Shum, H.Y.: Detecting doctored images using camera response normality and consistency. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 1087-1092 (2005)
-
(2005)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition
, vol.1
, pp. 1087-1092
-
-
Lin, Z.1
Wang, R.2
Tang, X.3
Shum, H.Y.4
-
6
-
-
34248143596
-
Creating and detecting doctored and virtual images: Implications to the child pornography prevention act
-
Technical Report TR2004-518, Department of Computer Science, Dartmouth College
-
Farid, H.: Creating and detecting doctored and virtual images: Implications to the child pornography prevention act. Technical Report TR2004-518, Department of Computer Science, Dartmouth College (2004)
-
(2004)
-
-
Farid, H.1
-
7
-
-
12844275859
-
Lazy snapping
-
ACM, New York
-
Li, Y., Sun, J., Tang, C., Shum, H.: Lazy snapping. In: International Conference on Computer Graphics and Interactive Techniques, pp. 303-308. ACM, New York (2004)
-
(2004)
International Conference on Computer Graphics and Interactive Techniques
, pp. 303-308
-
-
Li, Y.1
Sun, J.2
Tang, C.3
Shum, H.4
-
8
-
-
84882472841
-
Passive-blind image forensics
-
Elsevier, Amsterdam
-
Ng, T.T., Chang, S.F., Lin, C.Y., Sun, Q.: Passive-blind image forensics. In: Multimedia Security Technologies for Digital Rights Management. Elsevier, Amsterdam (2006)
-
(2006)
Multimedia Security Technologies for Digital Rights Management
-
-
Ng, T.T.1
Chang, S.F.2
Lin, C.Y.3
Sun, Q.4
-
9
-
-
33745830178
-
-
He, J., Lin, Z., Wang, L., Tang, X.: Detecting doctored JPEG images via DCT coefficient analysis. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, 3953, pp. 423-435. Springer, Heidelberg (2006)
-
He, J., Lin, Z., Wang, L., Tang, X.: Detecting doctored JPEG images via DCT coefficient analysis. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, vol. 3953, pp. 423-435. Springer, Heidelberg (2006)
-
-
-
-
10
-
-
39449103666
-
Digital image forensics via intrinsic fingerprints
-
Swaminathan, A.,Wu, M., Liu, K.: Digital image forensics via intrinsic fingerprints. IEEE Trans. Info. Forensics and Security 3(1), 101-117 (2008)
-
(2008)
IEEE Trans. Info. Forensics and Security
, vol.3
, Issue.1
, pp. 101-117
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.3
-
11
-
-
27844493797
-
Exposing digital forgeries in color filter array interpolated images
-
Popescu, A., Farid, H.: Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing 53(10), 3948-3959 (2005)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 3948-3959
-
-
Popescu, A.1
Farid, H.2
-
12
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
Popescu, A., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53(2), 758-767 (2005)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.1
Farid, H.2
-
15
-
-
70350531478
-
Detection and description of geometrically transformed digital images
-
Media Forensics and Security
-
Mahdian, B., Saic, S.: Detection and description of geometrically transformed digital images. In: Proc. SPIE, Media Forensics and Security, vol. 7254, pp. 72540J-72548J (2009)
-
(2009)
Proc. SPIE
, vol.7254
-
-
Mahdian, B.1
Saic, S.2
-
17
-
-
33645671569
-
Detecting digital image forgeries using sensor pattern noise
-
Society of Photo-Optical Instrumentation Engineers SPIE
-
Lukáš, J., Fridrich, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. In: Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol. 6072, pp. 362-372 (2006)
-
(2006)
Conference Series
, vol.6072
, pp. 362-372
-
-
Lukáš, J.1
Fridrich, J.2
Goljan, M.3
-
18
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 3(1), 74-90 (2008)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
19
-
-
33847748167
-
Non-intrusive component forensics of visual sensors using output images
-
Swaminathan, A., Wu, M., Liu, K.: Non-intrusive component forensics of visual sensors using output images. IEEE Transactions on Information Forensics and Security 2(1), 91-106 (2007)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.1
, pp. 91-106
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.3
-
20
-
-
44049088600
-
Component forensics of digital cameras: A non-intrusive approach
-
Swaminathan, A., Wu, M., Liu, K.: Component forensics of digital cameras: A non-intrusive approach. In: Annual Conference on Information Sciences and Systems, pp. 1194-1199 (2006)
-
(2006)
Annual Conference on Information Sciences and Systems
, pp. 1194-1199
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.3
-
21
-
-
34250355507
-
A generalized Benford's law for JPEG coefficients and its applications in image forensics
-
Fu, D., Shi, Y., Su, W., et al.: A generalized Benford's law for JPEG coefficients and its applications in image forensics. In: Proc. of SPIE Security, Steganography, and Watermarking of Multimedia Contents., vol. 6505, pp. 47-58 (2007)
-
(2007)
Proc. of SPIE Security, Steganography, and Watermarking of Multimedia Contents
, vol.6505
, pp. 47-58
-
-
Fu, D.1
Shi, Y.2
Su, W.3
-
22
-
-
34547529764
-
A novel method for detecting cropped and recompressed image block
-
ICASSP
-
Luo, W., Qu, Z., Huang, J., Qiu, G.: A novel method for detecting cropped and recompressed image block. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol. 2, pp. 217-220 (2007)
-
(2007)
IEEE International Conference on Acoustics, Speech and Signal Processing
, vol.2
, pp. 217-220
-
-
Luo, W.1
Qu, Z.2
Huang, J.3
Qiu, G.4
-
23
-
-
46449089083
-
Detecting digital image forgeries by measuring inconsistencies of blocking artifact
-
Ye, S., Sun, Q., Chang, E.: Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: IEEE International Conference on Multimedia and Expo, pp. 12-15 (2007)
-
(2007)
IEEE International Conference on Multimedia and Expo
, pp. 12-15
-
-
Ye, S.1
Sun, Q.2
Chang, E.3
-
26
-
-
33847671791
-
Image manipulation detection
-
Bayram, S., Avcibaş, İ., Sankur, B., Memon, N.: Image manipulation detection. Journal of Electronic Imaging 15(4), 1-17 (2006)
-
(2006)
Journal of Electronic Imaging
, vol.15
, Issue.4
, pp. 1-17
-
-
Bayram, S.1
Avcibaş, I.2
Sankur, B.3
Memon, N.4
-
27
-
-
0038343416
-
Steganalysis using image quality metrics
-
Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE transactions on Image Processing 12(2), 221-229 (2003)
-
(2003)
IEEE transactions on Image Processing
, vol.12
, Issue.2
, pp. 221-229
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
30
-
-
58349116041
-
-
Shi, Y.Q., Chen, C.-H., Xuan, G., Su, W.: Steganalysis versus splicing detection. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, 5041, pp. 158-172. Springer, Heidelberg (2008)
-
Shi, Y.Q., Chen, C.-H., Xuan, G., Su, W.: Steganalysis versus splicing detection. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol. 5041, pp. 158-172. Springer, Heidelberg (2008)
-
-
-
-
31
-
-
38849209052
-
A natural image model approach to splicing detection
-
ACM Press, New York
-
Shi, Y., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on Multimedia & security, pp. 51-62. ACM Press, New York (2007)
-
(2007)
Proceedings of the 9th workshop on Multimedia & security
, pp. 51-62
-
-
Shi, Y.1
Chen, C.2
Chen, W.3
-
32
-
-
4344685937
-
Detecting digital forgeries using bispectral analysis
-
Technical report, MIT AI Memo AIM-1657, MIT
-
Farid, H.: Detecting digital forgeries using bispectral analysis. Technical report, MIT AI Memo AIM-1657, MIT (1999)
-
(1999)
-
-
Farid, H.1
-
33
-
-
4344600402
-
Blind detection of photomontage using higher order statistics
-
Ng, T.T., Chang, S.F., Sun, Q.: Blind detection of photomontage using higher order statistics. In: IEEE International Symposium on Circuits and Systems, vol. 5, pp. 688-691 (2004)
-
(2004)
IEEE International Symposium on Circuits and Systems
, vol.5
, pp. 688-691
-
-
Ng, T.T.1
Chang, S.F.2
Sun, Q.3
-
36
-
-
70350561596
-
-
Popescu, A, Farid, H, Exposing digital forgeries by detecting duplicated image regions. Technical report, Department of Computer Science, Dartmouth College
-
Popescu, A., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technical report, Department of Computer Science, Dartmouth College
-
-
-
-
37
-
-
70349199203
-
An efficient and robust method for detecting copy-move forgery
-
Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech, and Signal Processing. (2009)
-
(2009)
IEEE International Conference on Acoustics, Speech, and Signal Processing
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
38
-
-
34250373244
-
Image splicing detection using 2-d phase congruency and statistical moments of characteristic function
-
San Jose, CA, USA
-
Chen, W., Shi, Y., Su, W.: Image splicing detection using 2-d phase congruency and statistical moments of characteristic function. In: Security, Steganography and Watermarking of Multimedia Contents IX, Proceeding. of SPIE, San Jose, CA, USA (2007)
-
(2007)
Security, Steganography and Watermarking of Multimedia Contents IX, Proceeding. of SPIE
-
-
Chen, W.1
Shi, Y.2
Su, W.3
-
43
-
-
37849032097
-
Can we trust digital image forensics?
-
ACM, New York
-
Gloe, T., Kirchner, M., Winkler, A., Böhme, R.: Can we trust digital image forensics? In: Proceedings of the 15th international conference on Multimedia, pp. 78-86. ACM, New York (2007)
-
(2007)
Proceedings of the 15th international conference on Multimedia
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Böhme, R.4
-
44
-
-
50049126671
-
-
Kirchner, M., Bohme, R.: Tamper hiding: Defeating image forensics. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, 4567, pp. 326-341. Springer, Heidelberg (2008)
-
Kirchner, M., Bohme, R.: Tamper hiding: Defeating image forensics. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 326-341. Springer, Heidelberg (2008)
-
-
-
-
45
-
-
70350538244
-
-
Ng, T., Chang, S., Sun, Q.: A data set of authentic and spliced image blocks. Technical report, DVMM, Columbia University (2004), http://www.ee. columbia. edu/ln/dvmm/downloads/AuthSplicedDataSet/photographers.htm
-
Ng, T., Chang, S., Sun, Q.: A data set of authentic and spliced image blocks. Technical report, DVMM, Columbia University (2004), http://www.ee. columbia. edu/ln/dvmm/downloads/AuthSplicedDataSet/photographers.htm
-
-
-
|