메뉴 건너뛰기




Volumn 7, Issue 2, 2012, Pages 842-848

Detection of nonaligned double JPEG compression based on integer periodicity maps

Author keywords

Image forensics; JPEG artifacts; nonaligned double JPEG compression; threshold detector

Indexed keywords

DISCRETE COSINE TRANSFORMS;

EID: 84858394859     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2170836     Document Type: Article
Times cited : (188)

References (14)
  • 1
    • 85032768213 scopus 로고    scopus 로고
    • A survey of image forgery detection
    • H. Farid, "A survey of image forgery detection," IEEE Signal Process. Mag., vol. 2, no. 26, pp. 16-25, 2009.
    • (2009) IEEE Signal Process. Mag. , vol.2 , Issue.26 , pp. 16-25
    • Farid, H.1
  • 2
    • 60449117421 scopus 로고    scopus 로고
    • Exposing digital forgeries from JPEG ghosts
    • Mar.
    • H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
    • (2009) IEEE Trans. Inform. Forensics Security , vol.4 , Issue.1 , pp. 154-160
    • Farid, H.1
  • 3
    • 67649410199 scopus 로고    scopus 로고
    • Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis
    • Nov.
    • Z. Lin, J. He, X. Tang, and C.-K. Tang, "Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognition, vol. 42, no. 11, pp. 2492-2501, Nov. 2009.
    • (2009) Pattern Recognition , vol.42 , Issue.11 , pp. 2492-2501
    • Lin, Z.1    He, J.2    Tang, X.3    Tang, C.-K.4
  • 4
    • 34250355507 scopus 로고    scopus 로고
    • A generalized Benford's law for JPEG coefficients and its applications in image forensics
    • P. W. Wong and E. J. Delp, Eds., San Jose, CA, Jan.
    • D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, P. W. Wong and E. J. Delp, Eds., San Jose, CA, Jan. 2007, vol. 6505, pp. 1L1-1L11.
    • (2007) Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX , vol.6505
    • Fu, D.1    Shi, Y.Q.2    Su, W.3
  • 5
    • 58049107658 scopus 로고    scopus 로고
    • Detecting doubly compressed JPEG images by using mode based first digit features
    • Oct.
    • B. Li, Y. Shi, and J. Huang, "Detecting doubly compressed JPEG images by using mode based first digit features," in Proc. IEEE 10thWorkshop Multimedia Signal Processing, Oct. 2008, pp. 730-735.
    • (2008) Proc. IEEE 10thWorkshop Multimedia Signal Processing , pp. 730-735
    • Li, B.1    Shi, Y.2    Huang, J.3
  • 6
    • 34547529764 scopus 로고    scopus 로고
    • A novel method for detecting cropped and recompressed image block
    • W. Luo, Z. Qu, J. Huang, and G. Qui, "A novel method for detecting cropped and recompressed image block," in Proc. ICASSP 2007, 2007, vol. 2, pp. II-217-II-220.
    • (2007) Proc. ICASSP 2007 , vol.2
    • Luo, W.1    Qu, Z.2    Huang, J.3    Qui, G.4
  • 7
    • 58049103482 scopus 로고    scopus 로고
    • Image tampering detection by blocking periodicity analysis in JPEG compressed images
    • Oct.
    • Y.-L. Chen and C.-T. Hsu, "Image tampering detection by blocking periodicity analysis in JPEG compressed images," in Proc. IEEE 10th Workshop Multimedia Signal Processing, Oct. 2008, pp. 803-808.
    • (2008) Proc. IEEE 10th Workshop Multimedia Signal Processing , pp. 803-808
    • Chen, Y.-L.1    Hsu, C.-T.2
  • 8
    • 51449116747 scopus 로고    scopus 로고
    • A convolutive mixing model for shifted double JPEG compression with application to passive image authentication
    • Z. Qu, W. Luo, and J. Huang, "A convolutive mixing model for shifted double JPEG compression with application to passive image authentication," in Proc. ICASSP, 2008, pp. 1661-1664.
    • (2008) Proc. ICASSP , pp. 1661-1664
    • Qu, Z.1    Luo, W.2    Huang, J.3
  • 9
    • 79957470147 scopus 로고    scopus 로고
    • Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
    • Jun.
    • Y.-L. Chen and C.-T. Hsu, "Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection," IEEE Trans. Inform. Forensics Security, vol. 6, no. 2, pp. 396-406, Jun. 2011.
    • (2011) IEEE Trans. Inform. Forensics Security , vol.6 , Issue.2 , pp. 396-406
    • Chen, Y.-L.1    Hsu, C.-T.2
  • 10
    • 77956003150 scopus 로고    scopus 로고
    • Identification of cut & paste tampering by means of double-JPEG detection and image segmentation
    • M. Barni, A. Costanzo, and L. Sabatini, "Identification of cut & paste tampering by means of double-JPEG detection and image segmentation," in Proc. ISCAS, 2010, pp. 1687-1690.
    • (2010) Proc. ISCAS , pp. 1687-1690
    • Barni, M.1    Costanzo, A.2    Sabatini, L.3
  • 11
    • 33847714243 scopus 로고    scopus 로고
    • Estimation of primary quantization matrix in double compressed JPEG images
    • J. Lukáš and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," in Digital Forensic Res. Workshop, 2003.
    • (2003) Digital Forensic Res. Workshop
    • Lukáš, J.1    Fridrich, J.2
  • 12
    • 34249753618 scopus 로고
    • Support-vector networks
    • C. Cortes and V. Vapnik, "Support-vector networks," Machine Learning, vol. 20, pp. 273-297, 1995.
    • (1995) Machine Learning , vol.20 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 13
    • 68549133155 scopus 로고    scopus 로고
    • Learning from imbalanced data
    • Sep.
    • H. He and E. A. Garcia, "Learning from imbalanced data," IEEE Trans. Knowledge Data Eng., vol. 21, no. 9, pp. 1263-1284, Sep. 2009.
    • (2009) IEEE Trans. Knowledge Data Eng. , vol.21 , Issue.9 , pp. 1263-1284
    • He, H.1    Garcia, E.A.2
  • 14
    • 33750593995 scopus 로고    scopus 로고
    • EUS SVMs: Ensemble of under-sampled SVMs for data imbalance problems
    • ser. Lecture Notes in Computer Science, I. King, J. Wang, L. Chan, and D. Wang, Eds. Berlin, Germany: Springer
    • P. Kang and S. Cho, "EUS SVMs: Ensemble of under-sampled SVMs for data imbalance problems," in Neural Information Processing, ser. Lecture Notes in Computer Science, I. King, J. Wang, L. Chan, and D. Wang, Eds. Berlin, Germany: Springer, 2006, vol. 4232, pp. 837-846.
    • (2006) Neural Information Processing , vol.4232 , pp. 837-846
    • Kang, P.1    Cho, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.