메뉴 건너뛰기




Volumn 14, Issue 3 PART1, 2012, Pages 536-545

Normalized energy density-based forensic detection of resampled images

Author keywords

Image forensics; normalized energy density; resampling detection

Indexed keywords

BICUBIC INTERPOLATION; DENSITY-BASED; ENERGY DENSITY; FEATURE VECTORS; FORENSIC DETECTION; FREQUENCY DOMAINS; IMAGE FORENSICS; JPEG COMPRESSION; NOISE CORRUPTION; QUALITY FACTORS; RAW IMAGES; RESAMPLING; RESAMPLING DETECTION; SECOND DERIVATIVES; SVM CLASSIFIERS;

EID: 84861167540     PISSN: 15209210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMM.2012.2191946     Document Type: Article
Times cited : (133)

References (23)
  • 1
    • 85032768213 scopus 로고    scopus 로고
    • Image forgery detection
    • Mar.
    • H. Farid, "Image forgery detection," IEEE Signal Process. Mag., vol. 26, no. 2, pp. 16-26, Mar. 2009.
    • (2009) IEEE Signal Process. Mag. , vol.26 , Issue.2 , pp. 16-26
    • Farid, H.1
  • 4
    • 33750927408 scopus 로고    scopus 로고
    • Exposing digital forgeries in video by detecting double MPEG compression
    • Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
    • W. Wang and H. Farid, "Exposing digital forgeries in video by detecting doubleMPEG compression," in Proc. 8th ACM Workshop Multimedia Security, 2006, pp. 37-47. (Pubitemid 44729574)
    • (2006) Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06 , vol.2006 , pp. 37-47
    • Wang, W.1    Farid, H.2
  • 5
    • 33847714243 scopus 로고    scopus 로고
    • Estimation of primary quantization matrix in double compressed JPEG images
    • J. Lukáš and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," in Proc. Digital Forensic Res. Workshop, 2003.
    • (2003) Proc. Digital Forensic Res. Workshop
    • Lukáš, J.1    Fridrich, J.2
  • 6
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression for applications in steganography
    • Jun.
    • T. Pevný and J. Fridrich, "Detection of double-compression for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.2 , pp. 247-258
    • Pevný, T.1    Fridrich, J.2
  • 7
    • 77951838183 scopus 로고    scopus 로고
    • JPEG recompression detection
    • X. Feng and G. Doërr, "JPEG recompression detection," in Proc. SPIE, 2010, vol. 7541, no. 20, pp. 1-12.
    • (2010) Proc. SPIE , vol.7541 , Issue.20 , pp. 1-12
    • Feng, X.1    Doërr, G.2
  • 8
    • 13244251141 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting traces of resampling
    • DOI 10.1109/TSP.2004.839932
    • A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005. (Pubitemid 40181769)
    • (2005) IEEE Transactions on Signal Processing , vol.53 , Issue.2 , pp. 758-767
    • Popescu, A.C.1    Farid, H.2
  • 9
    • 49549116860 scopus 로고    scopus 로고
    • Blind authentication using periodic properties of interpolation
    • Sep.
    • B.Mahdian and S. Saic, "Blind authentication using periodic properties of interpolation," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 529-538, Sep. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.3 , pp. 529-538
    • Mahdian, B.1    Saic, S.2
  • 10
    • 56749171108 scopus 로고    scopus 로고
    • Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue
    • M. Kirchner, "Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue," in Proc. 10th ACM Workshop Multimedia Security, 2008, pp. 11-20.
    • (2008) Proc. 10th ACM Workshop Multimedia Security , pp. 11-20
    • Kirchner, M.1
  • 11
    • 78149274271 scopus 로고    scopus 로고
    • Linear row and column predictors for the analysis of resized images
    • M. Kirchner, "Linear row and column predictors for the analysis of resized images," in Proc. 12th ACM Workshop Multimedia Security, 2010, pp. 13-18.
    • (2010) Proc. 12th ACM Workshop Multimedia Security , pp. 13-18
    • Kirchner, M.1
  • 14
    • 80155179780 scopus 로고    scopus 로고
    • An energy-based method for the forensic detection of resampled images
    • X. Feng, I. J. Cox, and G. Doërr, "An energy-based method for the forensic detection of resampled images," in Proc. IEEE Int. Conf.Multimedia Expo, 2011, pp. 1-6.
    • (2011) Proc. IEEE Int. Conf.Multimedia Expo , pp. 1-6
    • Feng, X.1    Cox, I.J.2    Doërr, G.3
  • 17
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system: The ins and outs of organizing BOSS
    • fr/, :Lecture notes in computer science
    • P. Bas, T. Filler, and T. Pevn, "Break our steganographic system: The ins and outs of organizing BOSS," in Proc. 13th Int. Workshop Inf. Hiding, pp. 59-70 [Online]. Available: http://boss.gipsa-lab.grenobleinp. fr/, :Lecture notes in computer science
    • Proc. 13th Int. Workshop Inf. Hiding , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevn, T.3
  • 21
    • 84938576712 scopus 로고    scopus 로고
    • Detection of linear and cubic interpolation in JPEG compressed images
    • A. Gallagher, "Detection of linear and cubic interpolation in JPEG compressed images," in Proc. 2nd Canadian Conf. Comput. Robot Vis. ion, 2005, pp. 65-72.
    • (2005) Proc. 2nd Canadian Conf. Comput. Robot Vis. Ion , pp. 65-72
    • Gallagher, A.1
  • 23


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.