-
1
-
-
85032752228
-
When seeing isn't believing [multimedia authentication technologies]
-
Mar.
-
B. Zhu, M. D. Swanson, and A. H. Tewfik, "When seeing isn't believing [multimedia authentication technologies]," IEEE Signal Process. Mag., vol.21, no.2, pp. 40-49, Mar. 2004.
-
(2004)
IEEE Signal Process. Mag.
, vol.21
, Issue.2
, pp. 40-49
-
-
Zhu, B.1
Swanson, M.D.2
Tewfik, A.H.3
-
2
-
-
0032634857
-
Multimedia watermarking techniques
-
Jul.
-
F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol.87, no.7, pp. 1079-1107, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
3
-
-
33744764278
-
Robust and secure image hashing
-
Jun.
-
A. Swaminathan, Y. Mao, and M. Wu, "Robust and secure image hashing," IEEE Trans. Inf. Forensics Security, vol.1, no.2, pp. 215-230, Jun. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
4
-
-
85032768213
-
A survey of image forgery detection
-
Mar.
-
H. Farid, "A survey of image forgery detection," IEEE Signal Process. Mag., vol.2, no.26, pp. 16-25, Mar. 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.2
, Issue.26
, pp. 16-25
-
-
Farid, H.1
-
5
-
-
34250330047
-
A survey of passive technology for digital image forensics
-
May
-
W. Luo, Z. Qu, F. Pan, and J. Huang, "A survey of passive technology for digital image forensics," Frontiers Comput. Sci. China, vol.1, no.2, pp. 1673-7350, May 2007.
-
(2007)
Frontiers Comput. Sci. China
, vol.1
, Issue.2
, pp. 1673-7350
-
-
Luo, W.1
Qu, Z.2
Pan, F.3
Huang, J.4
-
6
-
-
33847714243
-
Estimation of primary quantization matrix in double compressed JPEG images
-
Cleveland, OH, Aug. 5- 8
-
J. Luká J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," in Proc. Digital Forensic Research Workshop, Cleveland, OH, Aug. 5-8, 2003.
-
(2003)
Proc. Digital Forensic Research Workshop
-
-
Luká, J.1
Fridrich, J.2
-
7
-
-
27844572456
-
-
Ph.D. thesis, Department of Computer Science, Dartmouth College, Hanover, NH
-
A. C. Popescu, "Statistical Tools for Digital Image Forensics," Ph.D. thesis, Department of Computer Science, Dartmouth College, Hanover, NH, 2005.
-
(2005)
Statistical Tools for Digital Image Forensics
-
-
Popescu, A.C.1
-
8
-
-
34547529764
-
A novel method for detecting cropped and recompressed image block
-
Honolulu, Hawaii Apr.
-
W. Luo, Z. Qu, J. Huang, and G. Qiu, "A novel method for detecting cropped and recompressed image block," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Honolulu, Hawaii, Apr. 2007, vol.2, pp. 217-220.
-
(2007)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing
, vol.2
, pp. 217-220
-
-
Luo, W.1
Qu, Z.2
Huang, J.3
Qiu, G.4
-
9
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
Mar.
-
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol.4, no.1, pp. 154-160, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
10
-
-
46449089083
-
Detecting digital image forgeries by measuring inconsistencies of blocking artifact
-
Jul.
-
S.Ye,Q. Sun, and E. Chang, "Detecting digital image forgeries by measuring inconsistencies of blocking artifact," in Proc. IEEE Int. Conf. Multimedia and Expo, Jul. 2007, pp. 12-15.
-
(2007)
Proc. IEEE Int. Conf. Multimedia and Expo
, pp. 12-15
-
-
Sun, S.YeQ.1
Chang, E.2
-
11
-
-
49949091527
-
YASS: Yet another steganographic scheme that resists blind steganalysis
-
Saint Malo, France
-
K. Solanki, A. Sarkar, and B. S. Manjunath, "YASS: Yet another steganographic scheme that resists blind steganalysis," in Proc. 9th Int. Workshop on Information Hiding, Saint Malo, France, 2007, vol.4567, pp. 16-31.
-
(2007)
Proc. 9th Int. Workshop on Information Hiding
, vol.4567
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
12
-
-
56749160543
-
Steganalysis of YASS
-
Oxford, U.K. Sep.
-
B. Li, Y. Q. Shi, and J. Huang, "Steganalysis of YASS," in Proc. 10th ACM Workshop on Multimedia and Security, Oxford, U.K., Sep. 2008, pp. 139-148.
-
(2008)
Proc. 10th ACM Workshop on Multimedia and Security
, pp. 139-148
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
14
-
-
0038005383
-
Identification of bitmap compression history: JPEG detection and quantizer estimation
-
Feb.
-
Z. Fan and R. de Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Trans. Image Process., vol.12, no.2, pp. 230-235, Feb. 2003.
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
De Queiroz, R.2
-
15
-
-
0035766166
-
Steganalysis based on JPEG compatibility
-
Denver, Co Aug.
-
J. Fridrich, M. Goljan, and R. Du, "Steganalysis based on JPEG compatibility," in Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, Multimedia Systems and Applications IV, Denver, Co, Aug. 2001, pp. 275-280.
-
(2001)
Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, Multimedia Systems and Applications IV
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
16
-
-
34250355507
-
A generalized benford's law for JPEG coefficients and its applications in image forensics
-
Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA
-
D. Fu, Y. Q. Shi, and W. Su, "A generalized benford's law for JPEG coefficients and its applications in image forensics," in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, 2007, vol.6505, p. 65051L.
-
(2007)
Proc. SPIE Electronic Imaging
, vol.6505
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
17
-
-
0036817603
-
Blocking artifact detection and reduction in compressed data
-
Oct.
-
G. A. Triantafyllidis, D. Tzovaras, and M. G. Strintzis, "Blocking artifact detection and reduction in compressed data," IEEE Trans. Circuits Syst. Video Technol., vol.12, no.10, pp. 877-890, Oct. 2002.
-
(2002)
IEEE Trans. Circuits Syst. Video Technol.
, vol.12
, Issue.10
, pp. 877-890
-
-
Triantafyllidis, G.A.1
Tzovaras, D.2
Strintzis, M.G.3
-
18
-
-
18844478544
-
No-reference perceptual quality assessment of JPEG compressed images
-
Z. Wang, H. R. Sheikh, and A. C. Bovik, "No-reference perceptual quality assessment of JPEG compressed images," in Proc. Int. Conf. Image Processing, 2002, vol.1, pp. 477-480.
-
(2002)
Proc. Int. Conf. Image Processing
, vol.1
, pp. 477-480
-
-
Wang, Z.1
Sheikh, H.R.2
Bovik, A.C.3
-
19
-
-
0034442697
-
Blind measurement of blocking artifacts in images
-
Z.Wang, A. C. Bovik, and B. L. Evan, "Blind measurement of blocking artifacts in images," in Proc. Int. Conf. Image Processing, 2000, vol.3, pp. 981-984.
-
(2000)
Proc. Int. Conf. Image Processing
, vol.3
, pp. 981-984
-
-
Wang, Z.1
Bovik, A.C.2
Evan, B.L.3
-
20
-
-
0036989710
-
Efficient DCT-domain blind measurement and reduction of blocking artifacts
-
Dec.
-
S. Liu and A. C. Bovik, "Efficient DCT-domain blind measurement and reduction of blocking artifacts," IEEE Trans. Circuits Syst. Video Technol., vol.12, no.12, pp. 1139-1149, Dec. 2002.
-
(2002)
IEEE Trans. Circuits Syst. Video Technol.
, vol.12
, Issue.12
, pp. 1139-1149
-
-
Liu, S.1
Bovik, A.C.2
-
21
-
-
0029291442
-
An optimization approach for removing blocking effects in transform coding
-
Apr.
-
S. Minami and A. Zakhor, "An optimization approach for removing blocking effects in transform coding," IEEE Trans. Circuits Syst. Video Technol., vol.5, no.2, pp. 74-82, Apr. 1995.
-
(1995)
IEEE Trans. Circuits Syst. Video Technol.
, vol.5
, Issue.2
, pp. 74-82
-
-
Minami, S.1
Zakhor, A.2
-
22
-
-
0032633949
-
Derivation of prediction equations for blocking effect reduction
-
Apr.
-
G. Lakhani and N. Zhong, "Derivation of prediction equations for blocking effect reduction," IEEE Trans. Circuits Syst. Video Technol., vol.9, no.3, pp. 415-418, Apr. 1999.
-
(1999)
IEEE Trans. Circuits Syst. Video Technol.
, vol.9
, Issue.3
, pp. 415-418
-
-
Lakhani, G.1
Zhong, N.2
-
23
-
-
0026838050
-
Iterative procedures for reduction of blocking effects in transform image coding
-
Mar.
-
A. Zakhor, "Iterative procedures for reduction of blocking effects in transform image coding," IEEE Trans. Circuits Syst. Video Technol., vol.2, no.1, pp. 91-95, Mar. 1992.
-
(1992)
IEEE Trans. Circuits Syst. Video Technol.
, vol.2
, Issue.1
, pp. 91-95
-
-
Zakhor, A.1
-
24
-
-
2042544770
-
Blocking artifacts suppression in block-coded images using overcomplete wavelet representation
-
Apr.
-
A. Liew and H. Yan, "Blocking artifacts suppression in block-coded images using overcomplete wavelet representation," IEEE Trans. Circuits Syst. Video Technol., vol.14, no.4, pp. 450-461, Apr. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.4
, pp. 450-461
-
-
Liew, A.1
Yan, H.2
-
25
-
-
0030241775
-
Artifact reduction in low bit rate DCT-based image compression
-
Sep.
-
J. Luo, C. Chen, K. J. Parker, and T. S. Huang, "Artifact reduction in low bit rate DCT-based image compression," IEEE Trans. Image Process., vol.5, no.9, pp. 1363-1368, Sep. 1996.
-
(1996)
IEEE Trans. Image Process.
, vol.5
, Issue.9
, pp. 1363-1368
-
-
Luo, J.1
Chen, C.2
Parker, K.J.3
Huang, T.S.4
-
26
-
-
58049107658
-
Detecting doubly compressed JPEG images by using mode based first digit features
-
Oct.
-
B. Li, Y. Q. Shi, and J. Huang, "Detecting doubly compressed JPEG images by using mode based first digit features," in Proc. IEEE Workshop on Multimedia Signal Processing, Oct. 2008, pp. 730-735.
-
(2008)
Proc. IEEE Workshop on Multimedia Signal Processing
, pp. 730-735
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
27
-
-
77955699524
-
A machine learning based scheme for double JPEG compression detection
-
Dec.
-
C. Chen, Y. Q. Shi, and W. Su, "A machine learning based scheme for double JPEG compression detection," in Proc. Int. Conf. Pattern Recognition, Dec. 2008, pp. 1-4.
-
(2008)
Proc. Int. Conf. Pattern Recognition
, pp. 1-4
-
-
Chen, C.1
Shi, Y.Q.2
Su, W.3
-
28
-
-
44049087452
-
Detection of double-compression in JPEG images for applications in steganography
-
Jun.
-
T. Pevny and J. Fridrich, "Detection of double-compression in JPEG images for applications in steganography," IEEE Trans. Inf. Forensics Security, vol.3, no.2, pp. 247-258, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevny, T.1
Fridrich, J.2
-
29
-
-
42949152350
-
Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images
-
SPIE
-
T. Pevny and J. Fridrich, "Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images," in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, 2008, vol.6819, p. 681911, SPIE.
-
(2008)
Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents
, vol.6819
, pp. 681911
-
-
Pevny, T.1
Fridrich, J.2
-
31
-
-
77955668580
-
-
[Online]. Available
-
NRCS Photo Gallery 2005 [Online]. Available: http://photogallery. nrcs.usda.gov/
-
(2005)
-
-
-
32
-
-
8844280843
-
UCID: An uncompressed color image database
-
San Jose, CA
-
G. Schaefer and M. Stich, "UCID: An uncompressed color image database," in Proc. SPIE Storage and Retrieval Methods and Applications for Multimedia, San Jose, CA, 2003, vol.5307, pp. 472-480.
-
(2003)
Proc. SPIE Storage and Retrieval Methods and Applications for Multimedia
, vol.5307
, pp. 472-480
-
-
Schaefer, G.1
Stich, M.2
-
33
-
-
77955702205
-
-
[Online]. Available
-
P. Sallee, Matlab JPEG Toolbox [Online]. Available: http://www. philsallee.com/jpegtbx/index.html
-
Matlab JPEG Toolbox
-
-
Sallee, P.1
-
34
-
-
0020766544
-
Distributions of the two-dimensionalDCT coefficients for images
-
Jun.
-
R. Reininger and J. Gibson, "Distributions of the two-dimensionalDCT coefficients for images," IEEE Trans. Commun., vol.31, no.6, pp. 835-839, Jun. 1983.
-
(1983)
IEEE Trans. Commun.
, vol.31
, Issue.6
, pp. 835-839
-
-
Reininger, R.1
Gibson, J.2
|