-
4
-
-
85032768213
-
Image forgery detection - A survey
-
March
-
H. Farid, "Image forgery detection - A survey," IEEE Signal Processing Magazine 26, pp. 16-25, March 2009.
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, pp. 16-25
-
-
Farid, H.1
-
5
-
-
84937814312
-
High capacity despite better steganalysis (F5 a steganographic algorithm)
-
Proceedings of the 4th Information Hiding Workshop, I. S. Moskowitz, ed., April
-
A. Westfeld, "High capacity despite better steganalysis (F5 a steganographic algorithm)," in Proceedings of the 4th Information Hiding Workshop, I. S. Moskowitz, ed., Lecture Notes in Computer Science 2137, pp. 289-302, April 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
7
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Proceedings of the 5th Information Hiding Workshop, F. A. P. Petitcolas, ed., October
-
J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of JPEG images: Breaking the F5 algorithm," in Proceedings of the 5th Information Hiding Workshop, F. A. P. Petitcolas, ed., Lecture Notes in Computer Science 3200, pp. 310-323, October 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.3200
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
8
-
-
33745830178
-
Detecting doctored JPEG images via DCT coefficient analysis
-
Proceedings of the 9th European Conference on Computer Vision, Part III, A. Leonardis, H. Bischof, and A. Pinz, eds., May
-
J. He, Z. Lin, L. Wang, and X. Tang, "Detecting doctored JPEG images via DCT coefficient analysis," in Proceedings of the 9th European Conference on Computer Vision, Part III, A. Leonardis, H. Bischof, and A. Pinz, eds., Lecture Notes in Computer Science 3953, pp. 423-435, May 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3953
, pp. 423-435
-
-
He, J.1
Lin, Z.2
Wang, L.3
Tang, X.4
-
9
-
-
35048816032
-
Statistical tools for digital forensics
-
Proceedings of the 6th Information Hiding Workshop, J. Fridrich, ed., May
-
A. C. Popescu and H. Farid, "Statistical tools for digital forensics," in Proceedings of the 6th Information Hiding Workshop, J. Fridrich, ed., Lecture Notes in Computer Science 3200, pp. 128-147, May 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3200
, pp. 128-147
-
-
Popescu, A.C.1
Farid, H.2
-
13
-
-
34250355507
-
A generalized Benford's law for JPEG coefficients and its applications in image forensics
-
Security and Watermarking of Multimedia Contents IX, January
-
D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Security and Watermarking of Multimedia Contents IX, Proceedings of SPIE 6505, pp. 1L1-1L11, January 2007.
-
(2007)
Proceedings of SPIE
, vol.6505
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
15
-
-
0026818192
-
The JPEG still picture compression standard
-
February
-
G. K. Wallace, "The JPEG still picture compression standard," IEEE Transactions on Consumer Electronics 38, pp. 18-34, February 1992.
-
(1992)
IEEE Transactions on Consumer Electronics
, vol.38
, pp. 18-34
-
-
Wallace, G.K.1
-
16
-
-
0003922190
-
-
Wiley-Interscience, 2nd ed.
-
R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification, Wiley-Interscience, 2nd ed., 2001.
-
(2001)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
|