-
1
-
-
85032768213
-
A survey of image forgery detection
-
H. Farid, "A survey of image forgery detection," IEEE Signal Process. Mag., vol. 2, no. 26, pp. 16-25, 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.2
, Issue.26
, pp. 16-25
-
-
Farid, H.1
-
2
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
Mar.
-
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
-
(2009)
IEEE Trans. Inform. Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
3
-
-
67649410199
-
Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis
-
Nov.
-
Z. Lin, J. He, X. Tang, and C.-K. Tang, "Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognition, vol. 42, no. 11, pp. 2492-2501, Nov. 2009.
-
(2009)
Pattern Recognition
, vol.42
, Issue.11
, pp. 2492-2501
-
-
Lin, Z.1
He, J.2
Tang, X.3
Tang, C.-K.4
-
4
-
-
34250355507
-
A generalized Benford's law for JPEG coefficients and its applications in image forensics
-
P. W. Wong and E. J. Delp, Eds., San Jose, CA, Jan.
-
D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, P. W. Wong and E. J. Delp, Eds., San Jose, CA, Jan. 2007, vol. 6505, pp. 1L1-1L11.
-
(2007)
Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
5
-
-
58049107658
-
Detecting doubly compressed JPEG images by using mode based first digit features
-
Oct.
-
B. Li, Y. Shi, and J. Huang, "Detecting doubly compressed JPEG images by using mode based first digit features," in Proc. IEEE 10thWorkshop Multimedia Signal Processing, Oct. 2008, pp. 730-735.
-
(2008)
Proc. IEEE 10thWorkshop Multimedia Signal Processing
, pp. 730-735
-
-
Li, B.1
Shi, Y.2
Huang, J.3
-
6
-
-
34547529764
-
A novel method for detecting cropped and recompressed image block
-
W. Luo, Z. Qu, J. Huang, and G. Qui, "A novel method for detecting cropped and recompressed image block," in Proc. ICASSP 2007, 2007, vol. 2, pp. II-217-II-220.
-
(2007)
Proc. ICASSP 2007
, vol.2
-
-
Luo, W.1
Qu, Z.2
Huang, J.3
Qui, G.4
-
7
-
-
58049103482
-
Image tampering detection by blocking periodicity analysis in JPEG compressed images
-
Oct.
-
Y.-L. Chen and C.-T. Hsu, "Image tampering detection by blocking periodicity analysis in JPEG compressed images," in Proc. IEEE 10th Workshop Multimedia Signal Processing, Oct. 2008, pp. 803-808.
-
(2008)
Proc. IEEE 10th Workshop Multimedia Signal Processing
, pp. 803-808
-
-
Chen, Y.-L.1
Hsu, C.-T.2
-
8
-
-
51449116747
-
A convolutive mixing model for shifted double JPEG compression with application to passive image authentication
-
Z. Qu, W. Luo, and J. Huang, "A convolutive mixing model for shifted double JPEG compression with application to passive image authentication," in Proc. ICASSP, 2008, pp. 1661-1664.
-
(2008)
Proc. ICASSP
, pp. 1661-1664
-
-
Qu, Z.1
Luo, W.2
Huang, J.3
-
9
-
-
79957470147
-
Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
-
Jun.
-
Y.-L. Chen and C.-T. Hsu, "Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection," IEEE Trans. Inform. Forensics Security, vol. 6, no. 2, pp. 396-406, Jun. 2011.
-
(2011)
IEEE Trans. Inform. Forensics Security
, vol.6
, Issue.2
, pp. 396-406
-
-
Chen, Y.-L.1
Hsu, C.-T.2
-
10
-
-
77956003150
-
Identification of cut & paste tampering by means of double-JPEG detection and image segmentation
-
M. Barni, A. Costanzo, and L. Sabatini, "Identification of cut & paste tampering by means of double-JPEG detection and image segmentation," in Proc. ISCAS, 2010, pp. 1687-1690.
-
(2010)
Proc. ISCAS
, pp. 1687-1690
-
-
Barni, M.1
Costanzo, A.2
Sabatini, L.3
-
11
-
-
33847714243
-
Estimation of primary quantization matrix in double compressed JPEG images
-
J. Lukáš and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," in Digital Forensic Res. Workshop, 2003.
-
(2003)
Digital Forensic Res. Workshop
-
-
Lukáš, J.1
Fridrich, J.2
-
12
-
-
34249753618
-
Support-vector networks
-
C. Cortes and V. Vapnik, "Support-vector networks," Machine Learning, vol. 20, pp. 273-297, 1995.
-
(1995)
Machine Learning
, vol.20
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
13
-
-
68549133155
-
Learning from imbalanced data
-
Sep.
-
H. He and E. A. Garcia, "Learning from imbalanced data," IEEE Trans. Knowledge Data Eng., vol. 21, no. 9, pp. 1263-1284, Sep. 2009.
-
(2009)
IEEE Trans. Knowledge Data Eng.
, vol.21
, Issue.9
, pp. 1263-1284
-
-
He, H.1
Garcia, E.A.2
-
14
-
-
33750593995
-
EUS SVMs: Ensemble of under-sampled SVMs for data imbalance problems
-
ser. Lecture Notes in Computer Science, I. King, J. Wang, L. Chan, and D. Wang, Eds. Berlin, Germany: Springer
-
P. Kang and S. Cho, "EUS SVMs: Ensemble of under-sampled SVMs for data imbalance problems," in Neural Information Processing, ser. Lecture Notes in Computer Science, I. King, J. Wang, L. Chan, and D. Wang, Eds. Berlin, Germany: Springer, 2006, vol. 4232, pp. 837-846.
-
(2006)
Neural Information Processing
, vol.4232
, pp. 837-846
-
-
Kang, P.1
Cho, S.2
|