메뉴 건너뛰기




Volumn 6, Issue 4, 2011, Pages 1335-1345

Blind forensics of median filtering in digital images

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL IMAGE; FORENSIC ANALYZERS; IMAGE DATABASE; JPEG COMPRESSED IMAGES; MEDIAN FILTER; MEDIAN FILTERING; NONLINEAR DENOISING;

EID: 82055176931     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2161761     Document Type: Article
Times cited : (176)

References (26)
  • 3
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression for applications in steganography
    • Jun
    • T. Pevý and J. Fridrich, "Detection of double-compression for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.2 , pp. 247-258
    • Pevý, T.1    Fridrich, J.2
  • 4
    • 77955707653 scopus 로고    scopus 로고
    • Forensic detection of image manipulation using statistical intrinsic fingerprints
    • Sep
    • M. C. Stamm and K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492-506, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 492-506
    • Stamm, M.C.1    Liu, K.J.R.2
  • 6
    • 56749180518 scopus 로고    scopus 로고
    • Hiding traces of resampling in digital images
    • Dec
    • M. Kirchner and R. Böhme, "Hiding traces of resampling in digital images," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 582-592, Dec. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.4 , pp. 582-592
    • Kirchner, M.1    Böhme, R.2
  • 9
    • 0023330781 scopus 로고
    • Streaking in median filtered images
    • Apr
    • A. C. Bovik, "Streaking in median filtered images," IEEE Trans. Acoust., Speech, Signal Process., vol. 35, no. 4, pp. 493-503, Apr. 1987.
    • (1987) IEEE Trans. Acoust., Speech, Signal Process , vol.35 , Issue.4 , pp. 493-503
    • Bovik, A.C.1
  • 12
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Jun
    • T. Pevý, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevý, T.1    Bas, P.2    Fridrich, J.3
  • 16
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • Jun. 28-30, Lecture Notes in Computer Science
    • T. Pevý, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. 12th Information Hiding, Jun. 28-30, 2010, vol. 6387, Lecture Notes in Computer Science, pp. 161-177.
    • (2010) Proc. 12th Information Hiding , vol.6387 , pp. 161-177
    • Pevý, T.1    Filler, T.2    Bas, P.3
  • 17
    • 82055174860 scopus 로고    scopus 로고
    • [Online]. Available
    • [Online]. Available: http://boss.gipsa-lab.grenoble-inp.fr/BOSSRank/ index.php?mode=VIEW&tmpl=materials
  • 18
    • 58049106246 scopus 로고    scopus 로고
    • United States Department of Agriculture [Online]. Available
    • United States Department of Agriculture, Natural Resources Conservation Service Photo Gallery 2002 [Online]. Available: http://photogallery.nrcs.usda. gov
    • (2002) Natural Resources Conservation Service Photo Gallery
  • 19
    • 77955676537 scopus 로고    scopus 로고
    • JPEG error analysis and its applications to digital image forensics
    • Sep
    • W. Q. Luo, J. W. Huang, and G. P. Qiu, "JPEG error analysis and its applications to digital image forensics," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 480-491, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 480-491
    • Luo, W.Q.1    Huang, J.W.2    Qiu, G.P.3
  • 20
    • 78649402180 scopus 로고    scopus 로고
    • Detection of quantization artifacts and its applications to transform encoder identification
    • Dec
    • W. Q. Luo, Y. G. Wang, and J. W. Huang, "Detection of quantization artifacts and its applications to transform encoder identification," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 810-815, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 810-815
    • Luo, W.Q.1    Wang, Y.G.2    Huang, J.W.3
  • 21
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • DOI 10.1109/LSP.2005.847889
    • A. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441-444, Jun. 2005. (Pubitemid 40794877)
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.D.1
  • 23
    • 60449117421 scopus 로고    scopus 로고
    • Exposing digital forgeries from JPEG ghosts
    • Mar
    • H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 154-160
    • Farid, H.1
  • 24
    • 59149105989 scopus 로고    scopus 로고
    • Steganalysis of reversible contrast mapping watermarking
    • Feb
    • Y. S. Chen and R. Z. Wang, "Steganalysis of reversible contrast mapping watermarking," IEEE Signal Process. Lett., vol. 16, no. 2, pp. 125-128, Feb. 2009.
    • (2009) IEEE Signal Process. Lett. , vol.16 , Issue.2 , pp. 125-128
    • Chen, Y.S.1    Wang, R.Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.