-
1
-
-
77951863205
-
On detection of median filtering in digital images
-
M. Kirchner and J. Fridrich, "On detection of median filtering in digital images," in Proc. SPIE, Electronic Imaging, Media Forensics and Security II, 2010, vol. 7541, pp. 1-12.
-
(2010)
Proc. SPIE, Electronic Imaging, Media Forensics and Security II
, vol.7541
, pp. 1-12
-
-
Kirchner, M.1
Fridrich, J.2
-
2
-
-
78349262619
-
Forensic detection of median filtering in digital images
-
G. Cao, Y. Zhao, R.R. Ni, L. F.Yu, and H.W. Tian, "Forensic detection of median filtering in digital images," in Proc. 2010 IEEE Int. Conf. Multimedia and EXPO, 2010, pp. 89-94.
-
(2010)
Proc. 2010 IEEE Int. Conf. Multimedia and EXPO
, pp. 89-94
-
-
Cao, G.1
Zhao, Y.2
Ni, R.R.3
Yu, L.F.4
Tian, H.W.5
-
3
-
-
44049087452
-
Detection of double-compression for applications in steganography
-
Jun
-
T. Pevý and J. Fridrich, "Detection of double-compression for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevý, T.1
Fridrich, J.2
-
4
-
-
77955707653
-
Forensic detection of image manipulation using statistical intrinsic fingerprints
-
Sep
-
M. C. Stamm and K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492-506, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 492-506
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
5
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
A. Ker andR. Böhme, "Revisiting weighted stego-image steganalysis," in Proc. SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 2008, vol. 6819, pp. 501-517.
-
(2008)
Proc. SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 501-517
-
-
Ker, A.1
Böhme, R.2
-
6
-
-
56749180518
-
Hiding traces of resampling in digital images
-
Dec
-
M. Kirchner and R. Böhme, "Hiding traces of resampling in digital images," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 582-592, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 582-592
-
-
Kirchner, M.1
Böhme, R.2
-
8
-
-
0023310315
-
Effect of median filtering on edge estimation and detection
-
A. C. Bovik, T. Huang, and D. Munson, "The effect of median filtering on edge estimation and detection," IEEE Trans. Pattern Anal. Mach. Intell., vol. 9, no. 2, pp. 181-194, Mar. 1987. (Pubitemid 17565878)
-
(1987)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.PAMI-9
, Issue.2
, pp. 181-194
-
-
Bovik Alan Conrad1
Huang Thomas, S.2
Munson Jr. David, C.3
-
9
-
-
0023330781
-
Streaking in median filtered images
-
Apr
-
A. C. Bovik, "Streaking in median filtered images," IEEE Trans. Acoust., Speech, Signal Process., vol. 35, no. 4, pp. 493-503, Apr. 1987.
-
(1987)
IEEE Trans. Acoust., Speech, Signal Process
, vol.35
, Issue.4
, pp. 493-503
-
-
Bovik, A.C.1
-
10
-
-
39449103666
-
Digital image forensics via intrinsic fingerprints
-
DOI 10.1109/TIFS.2007.916010
-
A. Swaminathan, M. Wu, and K. J. Liu, "Digital image forensics via intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101-117, 2008. (Pubitemid 351270076)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 101-117
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
11
-
-
70349214858
-
Tampering identification using empirical frequency response
-
W. H. Chuang, A. Swaminathan, and M.Mu, "Tampering identification using empirical frequency response," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., 2009, pp. 1517-1520.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process
, pp. 1517-1520
-
-
Chuang, W.H.1
Swaminathan, A.2
Mu, M.3
-
12
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun
-
T. Pevý, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevý, T.1
Bas, P.2
Fridrich, J.3
-
13
-
-
58049131290
-
A comparative study of 1 steganalyzers
-
G. Cancelli, G. Doërr, M. Barni, and I. J. Cox, "A comparative study of 1 steganalyzers," in Proc. ACM Multimedia and Security Workshop 2008, 2008, pp. 791-796.
-
(2008)
Proc. ACM Multimedia and Security Workshop 2008
, pp. 791-796
-
-
Cancelli, G.1
Doërr, G.2
Barni, M.3
Cox, I.J.4
-
14
-
-
69949122982
-
Detection of 1 LSB steganography based on the amplitude of histogram local extrema
-
G. Cancelli, G. Doërr, I. J. Cox, and M. Barni, "Detection of 1 LSB steganography based on the amplitude of histogram local extrema," in Proc. 15th IEEE Int. Conf. Image Processing, 2008, pp. 1288-1291.
-
(2008)
Proc. 15th IEEE Int. Conf. Image Processing
, pp. 1288-1291
-
-
Cancelli, G.1
Doërr, G.2
Cox, I.J.3
Barni, M.4
-
16
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Jun. 28-30, Lecture Notes in Computer Science
-
T. Pevý, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. 12th Information Hiding, Jun. 28-30, 2010, vol. 6387, Lecture Notes in Computer Science, pp. 161-177.
-
(2010)
Proc. 12th Information Hiding
, vol.6387
, pp. 161-177
-
-
Pevý, T.1
Filler, T.2
Bas, P.3
-
17
-
-
82055174860
-
-
[Online]. Available
-
[Online]. Available: http://boss.gipsa-lab.grenoble-inp.fr/BOSSRank/ index.php?mode=VIEW&tmpl=materials
-
-
-
-
18
-
-
58049106246
-
-
United States Department of Agriculture [Online]. Available
-
United States Department of Agriculture, Natural Resources Conservation Service Photo Gallery 2002 [Online]. Available: http://photogallery.nrcs.usda. gov
-
(2002)
Natural Resources Conservation Service Photo Gallery
-
-
-
19
-
-
77955676537
-
JPEG error analysis and its applications to digital image forensics
-
Sep
-
W. Q. Luo, J. W. Huang, and G. P. Qiu, "JPEG error analysis and its applications to digital image forensics," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 480-491, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 480-491
-
-
Luo, W.Q.1
Huang, J.W.2
Qiu, G.P.3
-
20
-
-
78649402180
-
Detection of quantization artifacts and its applications to transform encoder identification
-
Dec
-
W. Q. Luo, Y. G. Wang, and J. W. Huang, "Detection of quantization artifacts and its applications to transform encoder identification," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 810-815, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 810-815
-
-
Luo, W.Q.1
Wang, Y.G.2
Huang, J.W.3
-
21
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
DOI 10.1109/LSP.2005.847889
-
A. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441-444, Jun. 2005. (Pubitemid 40794877)
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
22
-
-
8844280843
-
UCID-An uncompressed colour image database
-
[Online]. Available
-
G. Schaefer and M. Stich, "UCID-An uncompressed colour image database," in Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, 2004, pp. 472-480 [Online]. Available: http://vision.cs.aston. ac.uk/datasets/UCID/data/ucid.v2.tar.gz
-
Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, 2004
, pp. 472-480
-
-
Schaefer, G.1
Stich, M.2
-
23
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
Mar
-
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
24
-
-
59149105989
-
Steganalysis of reversible contrast mapping watermarking
-
Feb
-
Y. S. Chen and R. Z. Wang, "Steganalysis of reversible contrast mapping watermarking," IEEE Signal Process. Lett., vol. 16, no. 2, pp. 125-128, Feb. 2009.
-
(2009)
IEEE Signal Process. Lett.
, vol.16
, Issue.2
, pp. 125-128
-
-
Chen, Y.S.1
Wang, R.Z.2
|