-
1
-
-
34547529764
-
A novel method for detecting cropped and recompressed image block
-
Apr
-
W. Luo, Z. Qu, J. Huang, and G. Qiu, "A novel method for detecting cropped and recompressed image block," in Proc. of ICASSP 2007, vol. 2, Apr 2007, pp. II-217 -II-220.
-
(2007)
Proc. of ICASSP 2007
, vol.2
-
-
Luo, W.1
Qu, Z.2
Huang, J.3
Qiu, G.4
-
2
-
-
67649410199
-
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
-
Nov.
-
Z. C. Lin, J. F. He, X. Tang, and C. K. Tang, "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognition, vol. 42, no. 11, pp. 2492-2501, Nov. 2009.
-
(2009)
Pattern Recognition
, vol.42
, Issue.11
, pp. 2492-2501
-
-
Lin, Z.C.1
He, J.F.2
Tang, X.3
Tang, C.K.4
-
3
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE T. on Information Forensics and Security, vol. 4, no. 1, pp. 154-160, 2009.
-
(2009)
IEEE T. on Information Forensics and Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
4
-
-
38549095977
-
Improving steganalysis by fusion techniques: A case study with image steganography
-
Transactions on Data Hiding and Multimedia Security I
-
M. Kharrazi, H. T. Sencar, and N. D. Memon, "Improving steganalysis by fusion techniques: A case study with image steganography," T. Data Hiding and Multimedia Security, vol. 4300, pp. 123-137, 2006. (Pubitemid 351150618)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4300 LNCS
, pp. 123-137
-
-
Kharrazi, M.1
Senear, H.T.2
Memon, N.3
-
5
-
-
70349678692
-
Statistical Fusion of Multiple Cues for Image Tampering Detection
-
Y-F. Hsu and S.-F. Chang, "Statistical Fusion of Multiple Cues for Image Tampering Detection," in Asilomar Conference on Signals, Systems, and Computers, 2008.
-
Asilomar Conference on Signals, Systems, and Computers, 2008
-
-
Hsu, Y.-F.1
Chang, S.-F.2
-
6
-
-
84856497177
-
Nonintrusive image tamper detection based on fuzzy fusion
-
Sep
-
G. Chetty and M. Singh, "Nonintrusive image tamper detection based on fuzzy fusion," IJCSNS, vol. 10, no. 9, pp. 86-90, Sep 2010.
-
(2010)
IJCSNS
, vol.10
, Issue.9
, pp. 86-90
-
-
Chetty, G.1
Singh, M.2
-
7
-
-
77749248951
-
D-S Evidence Theory based digital image trustworthiness evaluation model
-
ser. MINES '09
-
D. Hu, L. Wang, Y. Zhou, Y. Zhou, X. Jiang, and L. Ma, "D-S Evidence Theory based digital image trustworthiness evaluation model," in Proc. of MINES 2009, ser. MINES '09, vol. 1, 2009, pp. 85-89.
-
(2009)
Proc. of MINES 2009
, vol.1
, pp. 85-89
-
-
Hu, D.1
Wang, L.2
Zhou, Y.3
Zhou, Y.4
Jiang, X.5
Ma, L.6
-
8
-
-
33847671791
-
Image manipulation detection
-
S. Bayram, I. Avcibas, B. Sankur, and N. Memon, "Image manipulation detection," J. Electronic Imaging, vol. 15, no. 4, 2006.
-
(2006)
J. Electronic Imaging
, vol.15
, Issue.4
-
-
Bayram, S.1
Avcibas, I.2
Sankur, B.3
Memon, N.4
-
10
-
-
70349662483
-
Detecting image tampering using feature fusion
-
0
-
P. Zhang and X. Kong, "Detecting image tampering using feature fusion," Proc. of ARES 2009, vol. 0, pp. 335-340, 2009.
-
(2009)
Proc. of ARES 2009
, pp. 335-340
-
-
Zhang, P.1
Kong, X.2
-
11
-
-
84856426316
-
-
ISBN: 978-8886658430
-
A. Benavoli, L. Chisci, B. Ristic, A. Farina, and A. Graziano, Reasoning under uncertainty: from Bayesian to Valuation Based Systems. ISBN: 978-8886658430, 2007.
-
(2007)
Reasoning under Uncertainty: From Bayesian to Valuation Based Systems
-
-
Benavoli, A.1
Chisci, L.2
Ristic, B.3
Farina, A.4
Graziano, A.5
-
12
-
-
0003243224
-
Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods
-
MIT Press
-
J. C. Platt, "Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods," in Advances in large margin classifiers. MIT Press, 1999, pp. 61-74.
-
(1999)
Advances in Large Margin Classifiers
, pp. 61-74
-
-
Platt, J.C.1
|