-
1
-
-
57849140821
-
Digital image forensics using statistical features and neural network classifier
-
July 2008
-
Lu, W., et al. 2008. Digital image forensics using statistical features and neural network classifier, Proc. The 7th International Conference on Machine Learning and Cybernetics, pp. 2831-2834, July 2008.
-
(2008)
Proc. The 7th International Conference on Machine Learning and Cybernetics
, pp. 2831-2834
-
-
Lu, W.1
-
2
-
-
80755129784
-
Alterations of photos raise host of legal, ethical issues
-
Jan 1989
-
Amsberry C. 1989. Alterations of photos raise host of legal, ethical issues, The Wall Street Journal, Jan 1989.
-
(1989)
The Wall Street Journal
-
-
Amsberry, C.1
-
3
-
-
0043201448
-
Digital watermarking
-
Yeung, M. M. 1998. Digital watermarking, Communication ACM, vol. 41, no. 7, pp. 30-33.
-
(1998)
Communication ACM
, vol.41
, Issue.7
, pp. 30-33
-
-
Yeung, M.M.1
-
5
-
-
0036627368
-
A survey of watermarking algorithms for image authentication
-
Rey, C. and Dugelay, J. L. 2002. A survey of watermarking algorithms for image authentication, EURASIP Journal on applied Signal Processing. Vol. 2002 N6, pp. 613-621.
-
(2002)
EURASIP Journal on Applied Signal Processing
, vol.2002
, Issue.6
, pp. 613-621
-
-
Rey, C.1
Dugelay, J.L.2
-
6
-
-
56749161438
-
Multipurpose Watermarking Based on Multiscale Curvelet Transform
-
December 2008
-
Zhang, C., Cheng, L. L., Qiu, Z. and Cheng, L. M. 2008. Multipurpose Watermarking Based on Multiscale Curvelet Transform, IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 611-619,(December 2008).
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 611-619
-
-
Zhang, C.1
Cheng, L.L.2
Qiu, Z.3
Cheng, L.M.4
-
7
-
-
13244251141
-
Exposing Digital Forgeries by Detecting Traces of Re-sampling
-
Feb. 2005
-
Popescu, A. C. and Farid, H. 2005. Exposing Digital Forgeries by Detecting Traces of Re-sampling, IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 758-767, (Feb. 2005).
-
(2005)
IEEE Trans. Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
8
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
DOI 10.1109/TIFS.2007.916285
-
Chen, M., Fridrich, J., Goljan, M. and Lukáš, J. 2008. Determining Image Origin and Integrity Using Sensor Noise, IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74-90. (Pubitemid 351270074)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
9
-
-
49549116860
-
Blind Authentication Using Periodic Properties of Interpolation
-
September 2008
-
Mahdian, B. and Saic, S. 2008. Blind Authentication Using Periodic Properties of Interpolation, IEEE Trans. on Inf. Forensics Security, vol. 3, no. 3, pp. 529-538, (September 2008).
-
(2008)
IEEE Trans. on Inf. Forensics Security
, vol.3
, Issue.3
, pp. 529-538
-
-
Mahdian, B.1
Saic, S.2
-
10
-
-
60449117421
-
Exposing Digital Forgeries from JPEG Ghosts
-
March 2009
-
Farid, H. 2009. Exposing Digital Forgeries From JPEG Ghosts, IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, (March 2009).
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
11
-
-
67349211082
-
Using Noise Inconsistencies for Blind Image Forensics
-
doi: 10.1016/j.imavis.2009.02.001
-
Mahdian, B. and Saic, S. 2009. Using Noise Inconsistencies for Blind Image Forensics, Image and Vision Computing, doi: 10.1016/j.imavis.2009.02.001.
-
(2009)
Image and Vision Computing
-
-
Mahdian, B.1
Saic, S.2
-
12
-
-
39449103666
-
Digital Image Forensics via Intrinsic Fingerprints
-
March 2008
-
Swaminathan, A., Wu, M., Liu, K. J. R. 2008. Digital Image Forensics via Intrinsic Fingerprints, IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, 101-117, (March 2008).
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 101-117
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
13
-
-
77953650817
-
A bibliography on blind methods for identifying image forgery
-
Mahdian, B. and Saic, S. 2010. A bibliography on blind methods for identifying image forgery. Signal Processing: Image Communication, vol. 25, pp. 389-399.
-
(2010)
Signal Processing: Image Communication
, vol.25
, pp. 389-399
-
-
Mahdian, B.1
Saic, S.2
-
14
-
-
33645671569
-
Detecting digital image forgeries using sensor pattern noise
-
Jan. 2006
-
Lukas, J., Fridrich, J. and Goljan, M. 2006. Detecting digital image forgeries using sensor pattern noise, Proc. SPIE Conf. Security, Steganography, Watermarking of Multimedia Contents, vol. 6072, pp. 362-372, (Jan. 2006).
-
(2006)
Proc. SPIE Conf. Security, Steganography, Watermarking of Multimedia Contents
, vol.6072
, pp. 362-372
-
-
Lukas, J.1
Fridrich, J.2
Goljan, M.3
-
15
-
-
70349199203
-
An efficient and robust method for detecting copy-move forgery
-
Bayram, S. et al. 2009. An efficient and robust method for detecting copy-move forgery. Proc. ICASSP09, pp. 1053-1056.
-
(2009)
Proc. ICASSP09
, pp. 1053-1056
-
-
Bayram, S.1
-
16
-
-
34547689478
-
Detection of copy-move forgery using a method based on blur moment invariants
-
DOI 10.1016/j.forsciint.2006.11.002, PII S0379073806006748
-
Mahdian, B. and Saic, S. 2007. Detection of copy-move forgery using a method based on blur moment invariants. Forens. Sci. Int., vol. 171, no. 2-3, pp. 180-189. (Pubitemid 47211748)
-
(2007)
Forensic Science International
, vol.171
, Issue.2-3
, pp. 180-189
-
-
Mahdian, B.1
Saic, S.2
-
17
-
-
58149235809
-
A sorted neighborhood approach detecting duplicated forgeries based on DWT and SVD
-
Li, G. et al. 2007. A sorted neighborhood approach detecting duplicated forgeries based on DWT and SVD. Proc. ICME2007, pp. 1750-1753.
-
(2007)
Proc. ICME2007
, pp. 1750-1753
-
-
Li, G.1
-
18
-
-
13444308154
-
Detection of copy-move forgery in digital images
-
Fridrich, J. et al. 2003. Detection of copy-move forgery in digital images. Digital Forensic Research Works, pp. 55-61.
-
(2003)
Digital Forensic Research Works
, pp. 55-61
-
-
Fridrich, J.1
-
19
-
-
58149213083
-
Tamper Detection Based on Regularity of Wavelet Transform Coefficients
-
Sutcu, Y. et al. 2007. Tamper Detection Based on Regularity of Wavelet Transform Coefficients. Proc. IEEE ICIP 2007.
-
(2007)
Proc. IEEE ICIP 2007
-
-
Sutcu, Y.1
-
20
-
-
84898785264
-
Characterization of signals from multiscale edges
-
July 1992
-
Mallat, S. G. and Zhong, S. 1992. Characterization of signals from multiscale edges. IEEE Trans. Pattern Anal. Machine Intell., vol. 14, pp. 710-732, (July 1992).
-
(1992)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.14
, pp. 710-732
-
-
Mallat, S.G.1
Zhong, S.2
-
22
-
-
84937655864
-
Visual Pattern Recognition by Moment Invariants
-
Hu M. K. 1962. Visual Pattern Recognition by Moment Invariants. IRE Transaction Information Theory, Vol. 2, pp 179-187.
-
(1962)
IRE Transaction Information Theory
, vol.2
, pp. 179-187
-
-
Hu, M.K.1
|