-
1
-
-
84857491934
-
-
[Online] Metadata Working Group, [Online]. Available
-
Guidelines for handling image metadata v2.0 Nov. 2010 [Online]. Available: http://www.metadataworkinggroup.org/specs/, Metadata Working Group, [Online]. Available
-
(2010)
Guidelines for Handling Image Metadata v2.0 Nov
-
-
-
3
-
-
27844554394
-
Detection of copy-move forgery in digital images
-
J. Fridrich, D. Soukal, and J. Lukáš, "Detection of copy-move forgery in digital images," in Proc. Digital Forensic Res. Workshop, 2003, pp. 90-105.
-
(2003)
Proc. Digital Forensic Res. Workshop
, pp. 90-105
-
-
Fridrich, J.1
Soukal, D.2
Lukáš, J.3
-
4
-
-
33750929814
-
Exposing digital forgeries through chromatic aberration
-
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
-
M. Johnson and H. Farid, "Exposing digital forgeries through chromatic aberration," in Proc. ACM Workshop Multimedia Security, 2006, pp. 48-55. (Pubitemid 44729575)
-
(2006)
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
, vol.2006
, pp. 48-55
-
-
Johnson, M.K.1
Farid, H.2
-
5
-
-
77951863205
-
On detection of median filtering in digital images
-
New York: SPIE
-
M. Kirchner and J. Fridrich, "On detection of median filtering in digital images," in Media Forensics and Security II. New York: SPIE, 2010, vol. 7541, pp. 754 110-1-754 110-12.
-
(2010)
Media Forensics and Security II
, vol.7541
, pp. 75411001-75411012
-
-
Kirchner, M.1
Fridrich, J.2
-
6
-
-
84882472841
-
Passive-blind image forensics
-
New York: Elsevier
-
T.-T. Ng, S.-F. Chang, C.-Y. Lin, and Q. Sun, "Passive-blind image forensics," in Multimedia Security Technologies for Digital Rights. New York: Elsevier, 2006, pp. 383-412.
-
(2006)
Multimedia Security Technologies for Digital Rights
, pp. 383-412
-
-
Ng, T.-T.1
Chang, S.-F.2
Lin, C.-Y.3
Sun, Q.4
-
8
-
-
33744736314
-
Digital camera identification from sensor pattern noise
-
DOI 10.1109/TIFS.2006.873602
-
J. Lukas, J. Fridrich, andM.Goljan, "Digital camera identification from sensor noise," IEEE Trans. Inform. Forensics Security, vol. 1, no. 2, pp. 205-214, Feb. 2006. (Pubitemid 43824631)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 205-214
-
-
Lukas, J.1
Fridrich, J.2
Goljan, M.3
-
9
-
-
49549122403
-
Digital single lens reflex camera identification from traces of sensor dust
-
Mar.
-
A. E. Dirik, H. T. Sencar, and N. Memon, "Digital single lens reflex camera identification from traces of sensor dust," IEEE Trans. Inform. Forensics Security, vol. 3, no. 3, pp. 539-552, Mar. 2008.
-
(2008)
IEEE Trans. Inform. Forensics Security
, vol.3
, Issue.3
, pp. 539-552
-
-
Dirik, A.E.1
Sencar, H.T.2
Memon, N.3
-
10
-
-
44149126850
-
Using extended file information (EXIF) file headers in digital evidence analysis
-
P. Alvarez, "Using extended file information (EXIF) file headers in digital evidence analysis," Int. J. Digital Evidence, vol. 2, no. 3, pp. 1-5, 2004.
-
(2004)
Int. J. Digital Evidence
, vol.2
, Issue.3
, pp. 1-5
-
-
Alvarez, P.1
-
11
-
-
80051771082
-
Digital image authentication from JPEG headers
-
Jun.
-
E. Kee, M. K. Johnson, and H. Farid, "Digital image authentication from JPEG headers," IEEE Trans. Inform. Forensics Security, vol. 6, no. 3, pp. 1066-1075, Jun. 2011.
-
(2011)
IEEE Trans. Inform. Forensics Security
, vol.6
, Issue.3
, pp. 1066-1075
-
-
Kee, E.1
Johnson, M.K.2
Farid, H.3
-
12
-
-
79952275206
-
JPEG quantization tables forensics: A statistical approach
-
B. Mahdian, S. Saic, and R. Nedbal, "JPEG quantization tables forensics: A statistical approach," in Proc. Int. Workshop Computational Forensics, 2010, pp. 150-159.
-
(2010)
Proc. Int. Workshop Computational Forensics
, pp. 150-159
-
-
Mahdian, B.1
Saic, S.2
Nedbal, R.3
-
13
-
-
33947379497
-
Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis
-
DOI 10.1016/j.forsciint.2006.06.033, PII S0379073806004312, Selected Articles of the 4th European Academy of Forensic Science Conference (EAFS2006) June 13-16, 2006 Helsinki, Finland
-
C. Grigoras, "Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis," Forensic Sci. Int., vol. 167, no. 2-3, pp. 136-145, 2007. (Pubitemid 46453424)
-
(2007)
Forensic Science International
, vol.167
, Issue.2-3
, pp. 136-145
-
-
Grigoras, C.1
-
14
-
-
51949108663
-
What do color changes reveal about an outdoor scene?
-
K. Sunkavalli, F. Romeiro, W. Matusik, T. Zickler, and H. Pfister, "What do color changes reveal about an outdoor scene?," in Proc. IEEE Conf. Computer Vision Pattern Recognition, 2008, pp. 1-8.
-
(2008)
Proc. IEEE Conf. Computer Vision Pattern Recognition
, pp. 1-8
-
-
Sunkavalli, K.1
Romeiro, F.2
Matusik, W.3
Zickler, T.4
Pfister, H.5
-
16
-
-
34548056428
-
Exposing digital forgeries in complex lighting environments
-
DOI 10.1109/TIFS.2007.903848
-
M. K. Johnson and H. Farid, "Exposing digital forgeries in complex lighting environments," IEEE Trans. Inform. Forensics Security, vol. 3, no. 2, pp. 450-461, Apr. 2007. (Pubitemid 47290579)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 450-461
-
-
Johnson, M.K.1
Farid, H.2
-
18
-
-
84861149721
-
Photographs prove Peary was close to the pole
-
T. D. Davies, "Photographs prove Peary was close to the pole," Nat. Geographic Mag., vol. 1, pp. 52-53, 1990.
-
(1990)
Nat. Geographic Mag.
, vol.1
, pp. 52-53
-
-
Davies, T.D.1
-
19
-
-
84861112987
-
-
Ph.D. dissertation CarnegieMellon Univ., Pittsburgh, PA, Jan.
-
J.-F. Lalonde, "Understanding and recreating visual appearance under natural illumination," Ph.D. dissertation, CarnegieMellon Univ., Pittsburgh, PA, Jan. 2011.
-
(2011)
Understanding and Recreating Visual Appearance under Natural Illumination
-
-
Lalonde, J.-F.1
-
20
-
-
0032689678
-
Illumination distribution from shadows
-
I. Sato, Y. Sato, and K. Ikeuchi, "Illumination distribution from shadows," in Proc. IEEE Conf. Computer Vision Pattern Recognition, 1999, pp. 306-312.
-
(1999)
Proc.IEEE Conf. Computer Vision Pattern Recognition
, pp. 306-312
-
-
Sato, I.1
Sato, Y.2
Ikeuchi, K.3
-
21
-
-
56749154287
-
Estimating geo-temporal location of stationary cameras using shadow trajectories
-
I. Junejo and H. Foroosh, "Estimating geo-temporal location of stationary cameras using shadow trajectories," in Proc Eur. Conf. Computer Vision, 2008, pp. 318-331.
-
(2008)
Proc Eur. Conf. Computer Vision
, pp. 318-331
-
-
Junejo, I.1
Foroosh, H.2
-
22
-
-
77953961747
-
Camera calibration and geo-location estimation from two shadow trajectories
-
L. Wu, X. Cao, and H. Foroosh, "Camera calibration and geo-location estimation from two shadow trajectories," Computer Vision Image Understanding, vol. 114, no. 8, pp. 915-927, 2010.
-
(2010)
Computer Vision Image Understanding
, vol.114
, Issue.8
, pp. 915-927
-
-
Wu, L.1
Cao, X.2
Foroosh, H.3
-
23
-
-
33745966675
-
A Bayesian approach for shadow extraction from a single image
-
DOI 10.1109/ICCV.2005.4, 1541293, Proceedings - 10th IEEE International Conference on Computer Vision, ICCV 2005
-
T.Wu and C. Tang, "A Bayesian approach for shadow extraction from a single image," in Proc. IEEE Int. Conf. Computer Vision, 2005, pp. 480-487. (Pubitemid 44054995)
-
(2005)
Proceedings of the IEEE International Conference on Computer Vision
, vol.1
, pp. 480-487
-
-
Wu, T.-P.1
Tang, C.-K.2
-
24
-
-
33745944022
-
A practical single image based approach for estimating illumination distribution from shadows
-
DOI 10.1109/ICCV.2005.15, 1541266, Proceedings - 10th IEEE International Conference on Computer Vision, ICCV 2005
-
T. Kim and K. Hong, "A practical single image based approach for estimating illumination distribution from shadows," in Proc. IEEE Int. Conf. Computer Vision, 2005, pp. 266-271. (Pubitemid 44054968)
-
(2005)
Proceedings of the IEEE International Conference on Computer Vision
, vol.1
, pp. 266-271
-
-
Kim, T.1
Hong, K.-S.2
-
25
-
-
84860390370
-
Non-lambertian corrected albedo and vegetation index for estimating land evapotranspiration in a heterogeneous semi-arid landscape
-
I. Mariotto and V. Gutschick, "Non-lambertian corrected albedo and vegetation index for estimating land evapotranspiration in a heterogeneous semi-arid landscape," Remote Sensing, vol. 2, no. 4, pp. 926-938, 2010.
-
(2010)
Remote Sensing
, vol.2
, Issue.4
, pp. 926-938
-
-
Mariotto, I.1
Gutschick, V.2
-
27
-
-
34547216923
-
Recovering surface layout from an image
-
DOI 10.1007/s11263-006-0031-y
-
D. Hoiem, A. Efros, and M. Hebert, "Recovering surface layout from an image," Int. J. Computer Vision, vol. 75, no. 1, pp. 151-172, 2007. (Pubitemid 47120250)
-
(2007)
International Journal of Computer Vision
, vol.75
, Issue.1
, pp. 151-172
-
-
Hoiem, D.1
Efros, A.A.2
Hebert, M.3
-
29
-
-
0032646404
-
Creating architectural models from images
-
D. Liebowitz, A. Criminisi, and A. Zisserman, "Creating architectural models from images," Computer Graphics Forum, vol. 18, no. 3, pp. 39-50, 1999.
-
(1999)
Computer Graphics Forum
, vol.18
, Issue.3
, pp. 39-50
-
-
Liebowitz, D.1
Criminisi, A.2
Zisserman, A.3
-
30
-
-
0018306059
-
Threshold selection method from gray-level histograms
-
N. Otsu, "A threshold selection method from gray-level histograms," IEEE Trans. Syst., Man, Cybern., vol. 9, no. 1, pp. 62-66, Jan. 1979. (Pubitemid 9413341)
-
(1979)
IEEE Trans Syst Man Cybern
, vol.SMC-9
, Issue.1
, pp. 62-66
-
-
Otsu Nobuyuki1
-
31
-
-
0022808786
-
A computational approach to edge detection
-
Jun.
-
J. Canny, "A computational approach to edge detection," IEEE Trans. Pattern Anal. Machine Intell., vol. 16, no. 6, pp. 679-698, Jun. 1986.
-
(1986)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.16
, Issue.6
, pp. 679-698
-
-
Canny, J.1
-
33
-
-
0027568526
-
All-weather model for sky luminance distribution-preliminary configuration and validation
-
R. Perez, R. Seals, and J. Michalsky, "All-weather model for sky luminance distribution-preliminary configuration and validation," Solar Energy, vol. 50, no. 3, pp. 235-245, 1993.
-
(1993)
Solar Energy
, vol.50
, Issue.3
, pp. 235-245
-
-
Perez, R.1
Seals, R.2
Michalsky, J.3
|