-
1
-
-
85032768213
-
Image forgery detection
-
H. Farid, "Image forgery detection," IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16-26, 2009.
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, Issue.2
, pp. 16-26
-
-
Farid, H.1
-
2
-
-
85013855044
-
-
2nd ed. Morgan Kaufmann
-
I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd ed. Morgan Kaufmann, 2008.
-
(2008)
Digital Watermarking and Steganography
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
Fridrich, J.4
Kalker, T.5
-
3
-
-
35048816032
-
Statistical tools for digital foren-sics
-
A. C. Popescu and H. Farid, "Statistical tools for digital foren-sics," in Proceedings of the 6th Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, pp. 128-147, 2004.
-
(2004)
Proceedings of the 6th Information Hiding Workshop, Lecture Notes in Computer Science
, vol.3200
, pp. 128-147
-
-
Popescu, A.C.1
Farid, H.2
-
7
-
-
13244251141
-
Exposing digital forgeries by detecting traces of re-sampling
-
A. C. Popescu and Hany Farid, "Exposing digital forgeries by detecting traces of re-sampling," IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758-767, 2005.
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
9
-
-
49549116860
-
Blind authentication using periodic properties of interpolation
-
B. Mahdian and S. Saic, "Blind authentication using periodic properties of interpolation," IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 529-538, 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 529-538
-
-
Mahdian, B.1
Saic, S.2
-
10
-
-
56749171108
-
Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue
-
M. Kirchner, "Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue," in Proceedings of the 10th ACM Workshop on Multimedia and Security, pp. 11-20, 2008.
-
(2008)
Proceedings of the 10th ACM Workshop on Multimedia and Security
, pp. 11-20
-
-
Kirchner, M.1
-
13
-
-
84946213795
-
Automatic detection of signs with affine transformation
-
X. Chen, J. Yang, J. Zhang, and A. Waibel, "Automatic detection of signs with affine transformation," in Proceedings of the Sixth IEEE Workshop on Applications of Computer Vision, pp. 32-36, 2002.
-
(2002)
Proceedings of the Sixth IEEE Workshop on Applications of Computer Vision
, pp. 32-36
-
-
Chen, X.1
Yang, J.2
Zhang, J.3
Waibel, A.4
-
14
-
-
33244468369
-
A comparison of affine region detectors
-
K. Mikolajczyk, T. Tuytelaars, C. Schmid, A. Zisserman, J. Matas, F. Schaffalitzky, T. Kadir, and L. Van Gool, "A comparison of affine region detectors," International Journal of Computer Vision, vol. 65, 2005.
-
(2005)
International Journal of Computer Vision
, vol.65
-
-
Mikolajczyk, K.1
Tuytelaars, T.2
Schmid, C.3
Zisserman, A.4
Matas, J.5
Schaffalitzky, F.6
Kadir, T.7
Van Gool, L.8
-
17
-
-
26944454497
-
ROC graphs: Notes and practical considerations for researchers
-
T. Fawcett, "ROC graphs: Notes and practical considerations for researchers," HP Laboratories, 2003.
-
(2003)
HP Laboratories
-
-
Fawcett, T.1
-
18
-
-
84863803022
-
Detection of resampled images: Performance analysis and practical challenges
-
F. Uccheddu, A. De Rosa, A. Piva, and M. Barni, "Detection of resampled images: performance analysis and practical challenges," in Proceedings of the 18th European Signal Processing Conference, pp. 24-27, 2010.
-
(2010)
Proceedings of the 18th European Signal Processing Conference
, pp. 24-27
-
-
Uccheddu, F.1
De Rosa, A.2
Piva, A.3
Barni, M.4
|