-
1
-
-
33847714243
-
Estimation of primary quantization matrix in double compressed JPEG images
-
Cleveland, OH, Aug
-
J. Lukáš and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images", in Proc. Digital Forensic Research Workshop, Cleveland, OH, Aug. 2003.
-
(2003)
Proc. Digital Forensic Research Workshop
-
-
Lukáš, J.1
Fridrich, J.2
-
2
-
-
44049087452
-
Detection of double-compression in JPEG images for applications in steganography
-
Jun
-
T. Pevný and J. Fridrich, "Detection of double-compression in JPEG images for applications in steganography", IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevný, T.1
Fridrich, J.2
-
3
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
Mar
-
H. Farid, "Exposing digital forgeries from JPEG ghosts", IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
4
-
-
67649410199
-
Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis
-
Z. Lin, J. He, X. Tang, and C.-K. Tang, "Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis", Pattern Recognit., vol. 42, pp. 2492-2501, 2009.
-
(2009)
Pattern Recognit.
, vol.42
, pp. 2492-2501
-
-
Lin, Z.1
He, J.2
Tang, X.3
Tang, C.-K.4
-
5
-
-
84937814312
-
High capacity despite better steganalysis (F5-A steganographic algorithm)
-
Lecture Notes in Computer Science
-
A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm)", in Proc. 4th Int. Workshop Information Hiding, 2001, vol. 2137, pp. 289-302, Lecture Notes in Computer Science.
-
(2001)
Proc. 4th Int. Workshop Information Hiding
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
6
-
-
85084160704
-
Defending against statistical steganalysis
-
Washington, DC
-
N. Provos, "Defending against statistical steganalysis", in Proc. 10th USENIX Security Symp., Washington, DC, 2001.
-
(2001)
Proc. 10th USENIX Security Symp.
-
-
Provos, N.1
-
7
-
-
70449650363
-
Defeating fake-quality MP3
-
Princeton, NJ, Sep. 7-8
-
R. Yang, Y. Q. Shi, and J. Huang, "Defeating fake-quality MP3", in Porc. ACM Multimedia and Security'09, Princeton, NJ, Sep. 7-8, 2009.
-
(2009)
Porc. ACM Multimedia and Security'09
-
-
Yang, R.1
Shi, Y.Q.2
Huang, J.3
-
8
-
-
33750927408
-
Exposing digital forgeris in video by detecting double MPEG compression
-
Geneva, Switzerland, Sep. 26-27
-
W. Wang and H. Farid, "Exposing digital forgeris in video by detecting double MPEG compression", in Porc. ACM Multimedia and Security'06, Geneva, Switzerland, Sep. 26-27, 2006.
-
(2006)
Porc. ACM Multimedia and Security'06
-
-
Wang, W.1
Farid, H.2
-
9
-
-
70449629685
-
Exposing digital forensics in video by detecting double quantization
-
Princeton, NJ, Sep. 7-8
-
W. Wang and H. Farid, "Exposing digital forensics in video by detecting double quantization", in Proc. ACM Multimedia and Security'09, Princeton, NJ, Sep. 7-8, 2009.
-
(2009)
Proc. ACM Multimedia and Security'09
-
-
Wang, W.1
Farid, H.2
-
10
-
-
27844572456
-
-
Ph. D., Department of Computer Science, Dartmouth College, Hanover, NH
-
A. C. Popescu, "Statistical Tools for Digital Image Forensics", Ph. D., Department of Computer Science, Dartmouth College, Hanover, NH, 2004.
-
(2004)
Statistical Tools for Digital Image Forensics
-
-
Popescu, A.C.1
-
11
-
-
35048816032
-
Statistical tools for digital forensics
-
Lecture Notes in Computer Science
-
A. C. Popescu and H. Farid, "Statistical tools for digital forensics", in Proc. 6th Int. Workshop on Information Hiding, 2004, vol. 3200, pp. 128-147, Lecture Notes in Computer Science.
-
(2004)
Proc. 6th Int. Workshop on Information Hiding
, vol.3200
, pp. 128-147
-
-
Popescu, A.C.1
Farid, H.2
-
12
-
-
34250355507
-
A generalized Benford's law for JPEG coefficients and its applications in image forensics
-
San Jose, CA, Jan
-
D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics", in Proc. SPIE, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, CA, Jan. 2007.
-
(2007)
Proc. SPIE, Security, Steganography and Watermarking of Multimedia Contents IX
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
13
-
-
58049107658
-
Detecting double compressed JPEG images by using mode based first digit features
-
Cairns, Queensland, Australia, Oct. 8-10
-
B. Li, Y. Q. Shi, and J. Huang, "Detecting double compressed JPEG images by using mode based first digit features", in Proc. IEEE Int. Workshop on Multimedia Signal Processing (MMSP 2008), Cairns, Queensland, Australia, Oct. 8-10, 2008.
-
(2008)
Proc. IEEE Int. Workshop on Multimedia Signal Processing (MMSP 2008)
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
14
-
-
77955699524
-
A marching learning based scheme for double JPEG compression detection
-
Tampa, FL, Dec. 8-11
-
C. Chen, Y. Q. Shi, and W. Su, "A marching learning based scheme for double JPEG compression detection", in Proc. IEEE Int. Conf. Pattern Recognition, Tampa, FL, Dec. 8-11, 2008.
-
(2008)
Proc. IEEE Int. Conf. Pattern Recognition
-
-
Chen, C.1
Shi, Y.Q.2
Su, W.3
-
15
-
-
0026818192
-
The JPEG still picture compression standard
-
Feb
-
G. K. Wallace, "The JPEG still picture compression standard", IEEE Trans. Consumer Electron., vol. 38, no. 1, pp. XVIII-XXXIV, Feb. 1992.
-
(1992)
IEEE Trans. Consumer Electron.
, vol.38
, Issue.1
-
-
Wallace, G.K.1
-
17
-
-
72849107000
-
-
Online. Available
-
NRCS Photo Gallery [Online]. Available: http://photogallery.nrcs. usda.gov
-
NRCS Photo Gallery
-
-
-
18
-
-
78649436783
-
-
Online. Available
-
JPEG Tool Box [Online]. Available: http://www.philsallee.com/jpegtbx/ index.html
-
JPEG Tool Box
-
-
|