-
2
-
-
33645696636
-
Image steganalysis with binary similarity measures
-
DOI 10.1155/ASP.2005.2749, PII S1110865705505110
-
AVCIBAS, I., KHARRAZI, M., MEMON, N., AND SANKUR, B. 2005. Image steganalysis with binary similarity measures. J. Appl. Sig. Proc. 2749-2757. (Pubitemid 44178258)
-
(2005)
Eurasip Journal on Applied Signal Processing
, vol.2005
, Issue.17
, pp. 2749-2757
-
-
Avcibas, I.1
Kharrazi, M.2
Memon, N.3
Sankur, B.4
-
3
-
-
0038343416
-
Steganalysis using image quality metrics
-
AVCIBAS, I., MEMON, N., AND SANKUR, B. 2003. Steganalysis using image quality metrics. IEEE Trans. Image Proc. 12, 221-229.
-
(2003)
IEEE Trans. Image Proc.
, vol.12
, pp. 221-229
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
4
-
-
33847671791
-
Image manipulation detection
-
BAYRAM, S., AVCIBAS, I., SANKUR, B., AND MEMON, N. 2006a. Image manipulation detection. J. Elect. Imag. 15, 4, 1-17.
-
(2006)
J. Elect. Imag.
, vol.15
, Issue.4
, pp. 1-17
-
-
Bayram, S.1
Avcibas, I.2
Sankur, B.3
Memon, N.4
-
9
-
-
0037900670
-
Listening in
-
CASS, S. 2003. Listening in. IEEE Spectrum 40, 4, 32-37.
-
(2003)
IEEE Spectrum
, vol.40
, Issue.4
, pp. 32-37
-
-
Cass, S.1
-
10
-
-
84925245477
-
Registration of translated and rotated images using finite fourier transforms
-
CASTRO, E. D. AND MORANDI, C. 1987. Registration of translated and rotated images using finite fourier transforms. IEEE Trans. Patt. Anal. Mach. Intell. 9, 700-703.
-
(1987)
IEEE Trans. Patt. Anal. Mach. Intell.
, vol.9
, pp. 700-703
-
-
Castro, E.D.1
Morandi, C.2
-
11
-
-
80155170489
-
Source cell-phone identification
-
Computer Society of India, Tamil Nadu, India
-
CELIKTUTAN, O., AVCIBAS, I., SANKUR, B., AND MEMON, N. 2005. Source cell-phone identification. In Proceedings of the International Conference on Advanced Computing and Communication. Computer Society of India, Tamil Nadu, India.
-
(2005)
Proceedings of the International Conference on Advanced Computing and Communication
-
-
Celiktutan, O.1
Avcibas, I.2
Sankur, B.3
Memon, N.4
-
12
-
-
21244443111
-
Current trends in steganalysis: A critical survey
-
TuA4.02 - P1858, 2004 8th International Conference on Control, Automation, Robotics and Vision (ICARCV)
-
CHANDRAMOULI, R. AND SUBBALAKSHMI, K. P. 2004. Current trends in steganalysis: A critical survey. In Proceedings of the International Conference on Control, Automation, Robotics and Vision. IEEE. 964-967. (Pubitemid 40893686)
-
(2004)
2004 8th International Conference on Control, Automation, Robotics and Vision (ICARCV)
, vol.2
, pp. 964-967
-
-
Chandramouli, R.1
Subbalakshmi, K.P.2
-
13
-
-
34548294226
-
Source digital camcorder identification using sensor photo-response non-uniformity
-
CHEN, M., FRIDRICH, J., GOLJAN, M., AND LUKAS, J. 2007a. Source digital camcorder identification using sensor photo-response non-uniformity. In Proceedings of the SPIE Photonics West. SPIE, 1G-1H.
-
(2007)
Proceedings of the SPIE Photonics West. SPIE
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
14
-
-
65349182220
-
Imaging sensor noise as digital x-ray for revealing forgeries
-
Springer
-
CHEN, M., FRIDRICH, J., LUKAS, J., AND GOLJAN, M. 2007b. Imaging sensor noise as digital x-ray for revealing forgeries. In Proceedings of the International Workshop in Information Hiding. Springer.
-
(2007)
Proceedings of the International Workshop in Information Hiding
-
-
Chen, M.1
Fridrich, J.2
Lukas, J.3
Goljan, M.4
-
15
-
-
34147139894
-
Blind image steganalysis based on statistical analysis of empirical matrix
-
DOI 10.1109/ICPR.2006.332, 1699719, Proceedings - 18th International Conference on Pattern Recognition, ICPR 2006
-
CHEN, X., WANG, Y., TAN, T., AND GUO, L. 2006. Blind image steganalysis based on statistical analysis of empirical matrix. In Proceedings of the International Conference on Pattern Recognition. IAPR, 1107-1110. (Pubitemid 46553314)
-
(2006)
Proceedings - International Conference on Pattern Recognition
, vol.3
, pp. 1107-1110
-
-
Chen, X.1
Wang, Y.2
Tan, T.3
Guo, L.4
-
16
-
-
37849029111
-
Automatic source camera identification using the intrinsic lens radial distortion
-
DOI 10.1364/OE.14.011551
-
CHOI, K. S., LAM, E., AND WONG, K. 2006. Automatic source camera identification using the intrinsic lens radial distortion. Optics Express 14, 24, 11551-11565. (Pubitemid 44826839)
-
(2006)
Optics Express
, vol.14
, Issue.24
, pp. 11551-11565
-
-
Choi, K.S.1
Lam, E.Y.2
Wong, K.K.Y.3
-
19
-
-
85013855044
-
-
2nd Ed. Morgan-Kauffman
-
COX, I. J., MILLER, M. L., BLOOM, J. A., FRIDRICH, J., AND KALKER, T. 2008. Digital Watermarking and Steganography 2nd Ed. Morgan-Kauffman.
-
(2008)
Digital Watermarking and Steganography
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
Fridrich, J.4
Kalker, T.5
-
20
-
-
0031634414
-
Rendering synthetic objects into real scenes: Bridging traditional and imge-based graphics with global illumination and high dynamic range photograph
-
DEBEVEC, P. 1998. Rendering synthetic objects into real scenes: Bridging traditional and imge-based graphics with global illumination and high dynamic range photograph. In Proceedings of ACM SIGGRAPH. ACM, 189-198.
-
(1998)
Proceedings of ACM SIGGRAPH. ACM
, pp. 189-198
-
-
Debevec, P.1
-
22
-
-
49549122403
-
Digital single lens reflex camera identification from traces of sensor dust
-
DIRIK, A., SENCAR, H., AND MEMON, N. 2008. Digital single lens reflex camera identification from traces of sensor dust. IEEE Trans. Inf. Foren. and Security 3, 3, 539-552.
-
(2008)
IEEE Trans. Inf. Foren. and Security
, vol.3
, Issue.3
, pp. 539-552
-
-
Dirik, A.1
Sencar, H.2
Memon, N.3
-
23
-
-
48149097069
-
New features to identify computer generated images
-
DIRIK, E., BAYRAM, S., SENCAR, T., AND MEMON, N. 2007. New features to identify computer generated images. In Proceedings of the International Conference on Image Processing. IEEE.
-
(2007)
Proceedings of the International Conference on Image Processing. IEEE
-
-
Dirik, E.1
Bayram, S.2
Sencar, T.3
Memon, N.4
-
24
-
-
0036450555
-
On steganalysis of random LSB embedding in continuoustone images
-
IEEE
-
DUMITRESCU, S., WU, X., AND MEMON, N. 2002. On steganalysis of random LSB embedding in continuoustone images. In Proceedings of the International Conference on Image Processing. Vol. 3. IEEE, 641-644.
-
(2002)
Proceedings of the International Conference on Image Processing
, vol.3
, pp. 641-644
-
-
Dumitrescu, S.1
Wu, X.2
Memon, N.3
-
25
-
-
34250309547
-
Digital doctoring: How to tell the real from the fake
-
DOI 10.1111/j.1740-9713.2006.00197.x
-
FARID, H. 2006a. Digital doctoring: How to tell the real from the fake. Significance 3, 4, 162-166. (Pubitemid 44826145)
-
(2006)
Significance
, vol.3
, Issue.4
, pp. 162-166
-
-
Farid, H.1
-
27
-
-
85032768213
-
Image forgery detection
-
FARID, H. 2009. Image forgery detection. IEEE Signal Process. Mag. 26, 2, 16-25.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
28
-
-
84880779239
-
-
April 5th, In Portuguese
-
Folha de São Paulo. April 5th, 2009. http://www1.folha.uol.com.br/ fsp/brasil/fc0504200906.htm (In Portuguese).
-
(2009)
Folha de São Paulo.
-
-
-
29
-
-
80155162083
-
-
March 10th, In Portuguese, FOLHA DE SÃO PAULO
-
FOLHA DE SÃO PAULO. March 10th, 2008. Para agência dos EUA, Abadía traficou no Brasil. http://www1. folha.uol.com.br/fsp/cotidian/ ff1003200801.htm (In Portuguese).
-
(2008)
Para Agência dos EUA, Abadía Traficou no Brasil
-
-
-
31
-
-
0035472155
-
Detecting LSB steganography in color and gray-scale images
-
DOI 10.1109/93.959097
-
FRIDRICH, J., GOLJAN, M., AND DU, R. 2001. Detecting LSB steganography in color and grayscale images. IEEE Multimed. 8, 22-28. (Pubitemid 33018249)
-
(2001)
IEEE Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
32
-
-
35248884299
-
Steganalysis of jpeg images: Breaking the f5 algorithm
-
Springer
-
FRIDRICH, J., HOGEA, D., AND GOLJAN, M. 2002. Steganalysis of jpeg images: Breaking the f5 algorithm. In Proceedings of the International Workshop in Information Hiding. Springer, 310-323.
-
(2002)
Proceedings of the International Workshop in Information Hiding
, pp. 310-323
-
-
Fridrich, J.1
Hogea, D.2
Goljan, M.3
-
34
-
-
34250775433
-
JPEG steganalysis using empirical transition matrix in block DCT domain
-
FU, D., SHI, Y., ZOU, D., AND XUAN, G. 2006. JPEG steganalysis using empirical transition matrix in block DCT domain. In Proceedings of the International Workshop on Multimedia and Signal Processing. IEEE, 310-313.
-
(2006)
Proceedings of the International Workshop on Multimedia and Signal Processing. IEEE
, pp. 310-313
-
-
Fu, D.1
Shi, Y.2
Zou, D.3
Xuan, G.4
-
36
-
-
0034938147
-
Methods for identification of images acquired with digital cameras
-
SPIE
-
GERADTS, Z., BIJHOLD, J., KIEFT, M., KURUSAWA, K., KUROKI, K., AND SAITOH, N. 2001. Methods for identification of images acquired with digital cameras. In Enabling Technologies for Law Enforcement and Security. Vol. 4232. SPIE.
-
(2001)
Enabling Technologies for Law Enforcement and Security
, vol.4232
-
-
Geradts, Z.1
Bijhold, J.2
Kieft, M.3
Kurusawa, K.4
Kuroki, K.5
Saitoh, N.6
-
37
-
-
37849032097
-
Can we trust digital image forensics?
-
GLOE, T., KIRCHNER, M., WINKLER, A., AND BOHME, R. 2007. Can we trust digital image forensics? In Proceedings of the ACM Conference on Multimedia. ACM, 78-86.
-
(2007)
Proceedings of the ACM Conference on Multimedia. ACM
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Bohme, R.4
-
39
-
-
42949094707
-
Camera identification from scaled and cropped images
-
Forensics, Security, Steganography, and Watermarking of Multimedia Contents. SPIE, OE-1-OE-13
-
GOLJAN, M. AND FRIDRICH, J. 2008. Camera identification from scaled and cropped images. In Proceedings of the SPIE Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents. SPIE, OE-1-OE-13.
-
(2008)
Proceedings of the SPIE Electronic Imaging
-
-
Goljan, M.1
Fridrich, J.2
-
40
-
-
42949133856
-
Camera identification from printed images
-
Forensics, Security, Steganography, and Watermarking of Multimedia Contents. SPIE, OI-1-OI-12
-
GOLJAN, M., FRIDRICH, J., AND LUKAS, J. 2008. Camera identification from printed images. In Proceedings of the SPIE Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents. SPIE, OI-1-OI-12.
-
(2008)
Proceedings of the SPIE Electronic Imaging
-
-
Goljan, M.1
Fridrich, J.2
Lukas, J.3
-
43
-
-
33745830178
-
Detecting doctored JPEG images Via DCT coefficient analysis
-
Computer Vision - ECCV 2006, 9th European Conference on Computer Vision, Proceedings
-
HE, J., LIN, Z., WANG, L., AND TANG, X. 2006. Detecting doctored JPEG images via DCT coefficient analysis. In Proceedings of the European Conference on Computer Vision. Springer, 423-435. (Pubitemid 44029695)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3953
, pp. 423-435
-
-
He, J.1
Lin, Z.2
Wang, L.3
Tang, X.4
-
44
-
-
80155190694
-
-
March 11th
-
HERALD SUN. March 11th, 2008. Hello Kitty was drug lord's messenger. http://www.news.com.au/heraldsun/story/0, 21985, 23354813-5005961, 00.html.
-
(2008)
Hello Kitty was Drug Lord's Messenger
-
-
-
45
-
-
20544451854
-
Patient-specific embryonic stem cells derived from human SCNT blastocysts
-
HWANG, W.-S. ET AL. 2005. Patient-specific embryonic stem cells derived from human SCNT blastocysts. Science 308, 1777-1783.
-
(2005)
Science
, vol.308
, pp. 1777-1783
-
-
Hwang, W.-S.1
-
50
-
-
30344488748
-
Editorial expression of concern
-
KAVANGH, E. 2006. Editorial expression of concern. Science 311, 36-37.
-
(2006)
Science
, vol.311
, pp. 36-37
-
-
Kavangh, E.1
-
54
-
-
0038576933
-
Mission impossible?
-
KUMAGAI, J. 2003. Mission impossible? IEEE Spectrum 40, 4, 26-31.
-
(2003)
IEEE Spectrum
, vol.40
, Issue.4
, pp. 26-31
-
-
Kumagai, J.1
-
56
-
-
5044229427
-
Radimetric calibration from a single image
-
LIN, S., GU, J., YAMAZAKI, S., AND SHUM, H.-Y. 2004. Radimetric calibration from a single image. In Proceedings of the International Conference on Computer Vision and Pattern Recognition. IEEE, 938-945.
-
(2004)
Proceedings of the International Conference on Computer Vision and Pattern Recognition. IEEE
, pp. 938-945
-
-
Lin, S.1
Gu, J.2
Yamazaki, S.3
Shum, H.-Y.4
-
57
-
-
33745117985
-
Detecting doctored images using camera response normality and consistency
-
LIN, Z., WANG, R., TANG, X., AND SHUM, H.-Y. 2005. Detecting doctored images using camera response normality and consistency. Proceedings of the International Conference on Computer Vision and Pattern Recognition. IEEE.
-
(2005)
Proceedings of the International Conference on Computer Vision and Pattern Recognition. IEEE
-
-
Lin, Z.1
Wang, R.2
Tang, X.3
Shum, H.-Y.4
-
59
-
-
33744736314
-
Digital camera identification from sensor pattern noise
-
DOI 10.1109/TIFS.2006.873602
-
LUKAS, J., FRIDRICH, J., AND GOLJAN, M. 2006. Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Foren. Sec. 1, 2, 205-214. (Pubitemid 43824631)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 205-214
-
-
Lukas, J.1
Fridrich, J.2
Goljan, M.3
-
61
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Springer
-
LYU, S. AND FARID, H. 2002b. Detecting hidden messages using higher-order statistics and support vector machines. In Proceedings of the International Workshop in Information Hiding. Springer, 340-354.
-
(2002)
Proceedings of the International Workshop in Information Hiding
, pp. 340-354
-
-
Lyu, S.1
Farid, H.2
-
63
-
-
13244253845
-
How realistic is photorealistic?
-
DOI 10.1109/TSP.2004.839896
-
LYU, S. AND FARID, H. 2005. How realistic is photorealistic? IEEE Trans. Sig. Proc. 53, 2, 845-850. (Pubitemid 40181778)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 845-850
-
-
Lyu, S.1
Farid, H.2
-
64
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
LYU, S. AND FARID, H. 2006. Steganalysis using higher-order image statistics. IEEE Trans. Inf. Foren. Sec. 1, 111-119.
-
(2006)
IEEE Trans. Inf. Foren. Sec.
, vol.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
66
-
-
80155170479
-
-
July 11th
-
MORRIS, E. The New York Times, July 11th, 2008. Photography as a weapon. http://morris.blogs.nytimes.com/2008/08/11/photography-as-a-weapon/index.html.
-
(2008)
Photography as a Weapon
-
-
Morris, E.1
-
68
-
-
0035274536
-
Robust voice activity detection using higher-order statistics in the LPC residual domain
-
DOI 10.1109/89.905996, PII S1063667601013244
-
NEMER, E., GOUBRAN, R., AND MAHMOUD, S. 2001. Robust voice activity detection using higher-order statistics in the LPC residual domain. IEEE Trans. Speech Audio Process. 9, 3, 217-231. (Pubitemid 32300847)
-
(2001)
IEEE Transactions on Speech and Audio Processing
, vol.9
, Issue.3
, pp. 217-231
-
-
Nemer, E.1
Goubran, R.2
Mahmoud, S.3
-
70
-
-
85032752129
-
Identifying and prefiltering images
-
NG, T.-T. AND CHANG, S.-F. 2009. Identifying and prefiltering images. IEEE Signal Process. Mag. 26, 2, 49-58.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.2
, pp. 49-58
-
-
Ng, T.-T.1
Chang, S.-F.2
-
71
-
-
85013717190
-
-
Academic Press
-
NG, T.-T., CHANG, S.-F., LIN, C.-Y., AND SUN, Q. 2006. Multimedia Security Technologies for Digital Rights Management. Academic Press, 1-30.
-
(2006)
Multimedia Security Technologies for Digital Rights Management
, pp. 1-30
-
-
Ng, T.-T.1
Chang, S.-F.2
Lin, C.-Y.3
Sun, Q.4
-
72
-
-
84883130375
-
Physics-motivated features for distinguishing photographic images and computer graphics
-
NG, T.-T., CHANG, S.-F., AND TSUI, M.-P. 2005. Physics-motivated features for distinguishing photographic images and computer graphics. In Proceedings of ACM Multimedia Conference. ACM, 239-248.
-
(2005)
Proceedings of ACM Multimedia Conference. ACM
, pp. 239-248
-
-
Ng, T.-T.1
Chang, S.-F.2
Tsui, M.-P.3
-
75
-
-
80155190686
-
-
New York Times, July 10th
-
NIZZA, M. AND WITTY, P. The New York Times, July 10th, 2008. In an Iranian image, a missile too many. http://thelede.blogs.nytimes.com/2008/07/10/ in-an-iranian-image-a-missile-too-many.
-
(2008)
An Iranian Image, a Missile Too Many
-
-
Nizza, M.1
Witty, P.2
-
76
-
-
17844387333
-
Image manipulation: CSI: Cell biology
-
PEARSON, H. 2005. Image manipulation: CSI: Cell biology. Nature 434, 952-953.
-
(2005)
Nature
, vol.434
, pp. 952-953
-
-
Pearson, H.1
-
77
-
-
0000230675
-
Attacks on copyright marking systems
-
Springer
-
PETITCOLAS, F. A. P., ANDERSON, R. J., AND KUHN, M. G. 1998. Attacks on copyright marking systems. In Proceedings of the International Workshop in Information Hiding. Springer, 219-239.
-
(1998)
Proceedings of the International Workshop in Information Hiding
, pp. 219-239
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
79
-
-
27844572456
-
-
Ph. D. dissertation, Department of Computer Science - Dartmouth College. Hanover, NH
-
POPESCU, A. C. 2004. Statistical tools for digital image forensics. Ph. D. dissertation, Department of Computer Science - Dartmouth College. Hanover, NH.
-
(2004)
Statistical Tools for Digital Image Forensics
-
-
Popescu, A.C.1
-
82
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
DOI 10.1109/TSP.2004.839932
-
POPESCU, A. C. AND FARID, H. 2005a. Exposing digital forgeries by detecting traces of re-sampling. IEEE Trans. Sig. Process. 53, 2, 758-767. (Pubitemid 40181769)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
83
-
-
27844493797
-
Exposing digital forgeries in color filter array interpolated images
-
DOI 10.1109/TSP.2005.855406
-
POPESCU, A. C. AND FARID, H. 2005b. Exposing digital forgeries in color filter array interpolated images. IEEE Trans. Sig. Process. 53, 10, 3948-3959. (Pubitemid 41638246)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 3948-3959
-
-
Popescu, A.C.1
Farid, H.2
-
84
-
-
85084160704
-
Defending against statistical steganalysis
-
USENIX
-
PROVOS, N. 2001. Defending against statistical steganalysis. In Proceedings of the USENIX Security Symposium. Vol. 10. USENIX, 24-36.
-
(2001)
Proceedings of the USENIX Security Symposium
, vol.10
, pp. 24-36
-
-
Provos, N.1
-
86
-
-
34250776454
-
Progressive randomization for steganalysis
-
DOI 10.1109/MMSP.2006.285321, 4064571, 2006 IEEE 8th Workshop on Multimedia Signal Processing, MMSP 2006
-
ROCHA, A. AND GOLDENSTEIN, S. 2006. Progressive randomization for steganalysis. In Proceedings of the International Workshop on Multimedia and Signal Processing. IEEE, 314-319. (Pubitemid 46948560)
-
(2007)
2006 IEEE 8th Workshop on Multimedia Signal Processing, MMSP 2006
, pp. 314-319
-
-
Rocha, A.1
Goldenstein, S.2
-
88
-
-
75749083087
-
Steganography and steganalysis in digital multimedia: Hype or hallelujah?
-
ROCHA, A. AND GOLDENSTEIN, S. 2008. Steganography and steganalysis in digital multimedia: Hype or hallelujah? J. Theoret. Appl. Comput. 15, 1, 83-110.
-
(2008)
J. Theoret. Appl. Comput.
, vol.15
, Issue.1
, pp. 83-110
-
-
Rocha, A.1
Goldenstein, S.2
-
89
-
-
75749116744
-
Progressive randomization: Seeing the unseen
-
ROCHA, A. AND GOLDENSTEIN, S. 2010. Progressive randomization: seeing the unseen. Comput. Vis. Image Understand. 114, 3, 349-362.
-
(2010)
Comput. Vis. Image Understand.
, vol.114
, Issue.3
, pp. 349-362
-
-
Rocha, A.1
Goldenstein, S.2
-
90
-
-
51849099846
-
The unseen challenge data sets
-
ROCHA, A., SCHEIRER, W., GOLDENSTEIN, S., AND BOULT, T. E. 2008. The unseen challenge data sets. In Proceedings of the International CVPR Workshop on Vision of the Unseen. IEEE, 1-8.
-
(2008)
Proceedings of the International CVPR Workshop on Vision of the Unseen. IEEE
, pp. 1-8
-
-
Rocha, A.1
Scheirer, W.2
Goldenstein, S.3
Boult, T.E.4
-
92
-
-
37349090743
-
Changing history: Doctored photographs affect memory for past public events
-
SACCHI, D. L. M., AGNOLI, F., AND LOFTUS, E. F. 2007. Changing history: Doctored photographs affect memory for past public events. Appl. Cogn. Psych. 21, 8, 249-273.
-
(2007)
Appl. Cogn. Psych.
, vol.21
, Issue.8
, pp. 249-273
-
-
Sacchi, D.L.M.1
Agnoli, F.2
Loftus, E.F.3
-
93
-
-
49549103391
-
-
World Scientific Press, Mountain View, CA, Chapter Overview of State-of-the-art in Digital Image Forensics
-
SENCAR, T. AND MEMON, N. 2008. Statistical Science and Interdisciplinary Research. World Scientific Press, Mountain View, CA, (Chapter Overview of State-of-the-art in Digital Image Forensics).
-
(2008)
Statistical Science and Interdisciplinary Research
-
-
Sencar, T.1
Memon, N.2
-
94
-
-
0034244751
-
Normalized cuts and image segmentation
-
Aug.
-
SHI, J. AND MALIK, J. 2000. Normalized cuts and image segmentation. IEEE Trans. Patt. Anal. Mach. Intell. 22, 8(Aug.), 888-905.
-
(2000)
IEEE Trans. Patt. Anal. Mach. Intell.
, vol.22
, Issue.8
, pp. 888-905
-
-
Shi, J.1
Malik, J.2
-
95
-
-
79955595823
-
A LSB steganography detection algorithm
-
IEEE
-
SHI, L., FEN, S. A., AND XIAN, Y. Y. 2003. A LSB steganography detection algorithm. In Personal, Indoor and Mobile Radio Communications. Vol. 3. IEEE, 2780-2783.
-
(2003)
Personal, Indoor and Mobile Radio Communications
, vol.3
, pp. 2780-2783
-
-
Shi, L.1
Fen, S.A.2
Xian, Y.Y.3
-
96
-
-
38849209052
-
A natural image model approach to splicing detection
-
DOI 10.1145/1288869.1288878, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
SHI, Y. Q., CHEN, C., AND CHEN, W. 2007. A natural image model approach to splicing detection. In Proceedings of the ACM Multimedia and Security Workshop. ACM, 51-62. (Pubitemid 351203804)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 51-62
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
97
-
-
33750555925
-
Image steganalysis based on moments of characteristic functions and wavelet decomposition, prediction, errorimage, and neural network
-
SHI, Y. Q., XUAN, G., ZOU, D., GAO, J., YANG, C., ZHANG, Z., CHAI, P., CHEN, W., AND CHEN, C. 2005. Image steganalysis based on moments of characteristic functions and wavelet decomposition, prediction, errorimage, and neural network. In Proceedings of the International Conference on Multimedia and Expo. IEEE, 268-272.
-
(2005)
Proceedings of the International Conference on Multimedia and Expo. IEEE
, pp. 268-272
-
-
Shi, Y.Q.1
Xuan, G.2
Zou, D.3
Gao, J.4
Yang, C.5
Zhang, Z.6
Chai, P.7
Chen, W.8
Chen, C.9
-
98
-
-
33646021969
-
Image completion with structure propagation
-
SUN, J., YUAN, L., JIA, J., AND SHUM, H.-Y. 2005. Image completion with structure propagation. ACM Trans. Graph. 24, 3, 861-868.
-
(2005)
ACM Trans. Graph.
, vol.24
, Issue.3
, pp. 861-868
-
-
Sun, J.1
Yuan, L.2
Jia, J.3
Shum, H.-Y.4
-
99
-
-
46449127762
-
Improvements on sensor noise based source camera identification
-
SUTCU, Y., BAYARAM, S., SENCAR, H., AND MEMON, N. 2007. Improvements on sensor noise based source camera identification. In Proceedings of the International Conference on Multimedia and Expo. IEEE.
-
(2007)
Proceedings of the International Conference on Multimedia and Expo. IEEE
-
-
Sutcu, Y.1
Bayaram, S.2
Sencar, H.3
Memon, N.4
-
101
-
-
85032751005
-
Component forensics
-
SWAMINATHAN, A., WU, M., AND LIU, K. R. 2009. Component forensics. IEEE Sig. Process. Mag. 26, 2, 38-48.
-
(2009)
IEEE Sig. Process. Mag.
, vol.26
, Issue.2
, pp. 38-48
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.R.3
-
104
-
-
0023383122
-
Quadrature mirror filter banks, m-band extensions and perfect-reconstruction techniques
-
VAIDYANATHAN, P. P. 1987. Quadrature mirror filter banks, m-band extensions and perfect reconstruction techniques. IEEE Sig. Process. Mag. 4, 3, 4-20. (Pubitemid 17650867)
-
(1987)
IEEE ASSP magazine
, vol.4
, Issue.3
, pp. 4-20
-
-
Vaidyanathan, P.P.1
-
105
-
-
0038576916
-
Getting the message
-
WALLICH, P. 2003. Getting the message. IEEE Spectrum 40, 4, 38-40.
-
(2003)
IEEE Spectrum
, vol.40
, Issue.4
, pp. 38-40
-
-
Wallich, P.1
-
106
-
-
79960141184
-
-
Ph. D. dissertation. Department of Computer Science, Dartmouth College, Hanover, NH
-
WANG, W. 2009. Digital video forensics. Ph. D. dissertation. Department of Computer Science, Dartmouth College, Hanover, NH.
-
(2009)
Digital Video Forensics
-
-
Wang, W.1
-
107
-
-
34548070244
-
Exposing digital forgeries in interlaced and deinterlaced video
-
DOI 10.1109/TIFS.2007.902661
-
WANG, W. AND FARID, H. 2007a. Exposing digital forgeries in interlaced and deinterlaced video. IEEE Trans. Inf. Foren. Sec. 2, 438-449. (Pubitemid 47290578)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 438-449
-
-
Wang, W.1
Farid, H.2
-
109
-
-
33947705694
-
On discrimination between photorealistic and photographic images
-
Speech, and Signal Processing. IEEE
-
WANG, Y. AND MOULIN, P. 2006. On discrimination between photorealistic and photographic images. In Proceedings of the International Conference on Acoustics, Speech, and Signal Processing. IEEE.
-
(2006)
Proceedings of the International Conference on Acoustics
-
-
Wang, Y.1
Moulin, P.2
-
110
-
-
84937814312
-
F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis
-
Information Hiding
-
WESTFELD, A. 2001. F5-A steganographic algorithm high capacity despite better steganalysis. In Proceedings of the International Workshop in Information Hiding. Vol. 2137. Springer, 289-302. (Pubitemid 33367674)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 289-302
-
-
Westfeld, A.1
-
112
-
-
42749106257
-
Image steganalysis based on statistical moments of wavelet subband histograms in DFT domain
-
XUAN, G., GAO, J., SHI, Y., AND ZOU, D. 2005. Image steganalysis based on statistical moments of wavelet subband histograms in DFT domain. In Proceedings of the International Workshop on Multimedia Signal Processing. IEEE, 1-4.
-
(2005)
Proceedings of the International Workshop on Multimedia Signal Processing. IEEE
, pp. 1-4
-
-
Xuan, G.1
Gao, J.2
Shi, Y.3
Zou, D.4
-
113
-
-
33845426373
-
Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA)
-
Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings
-
XUAN, G., SHI, Y., HUANG, C., FU, D., ZHU, X., CHAI, P., AND GAO, J. 2006. Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA). In Proceedings of the International Workshop on Digital Watermarking. IEEE, 49-60. (Pubitemid 44891625)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4283
, pp. 49-60
-
-
Xuan, G.1
Shi, Y.Q.2
Huang, C.3
Fu, D.4
Zhu, X.5
Chai, P.6
Gao, J.7
|