-
1
-
-
35048816032
-
Statistical tools for digital forensics
-
A. C. Popescu and H. Farid, "Statistical tools for digital forensics," in Proc. 6th Int. Workshop Information Hiding, Toronto, Canada, 2004, pp. 128-147. (Pubitemid 39745172)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3200
, pp. 128-147
-
-
Popescu, A.C.1
Farid, H.2
-
2
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
DOI 10.1109/TIFS.2007.916285
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukáŝ, "Determining image origin and integrity using sensor noise," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74-90, Mar. 2008. (Pubitemid 351270074)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
3
-
-
39449103666
-
Digital image forensics via intrinsic fingerprints
-
DOI 10.1109/TIFS.2007.916010
-
A. Swaminathan, M. Wu, and K. J. R. Liu, "Digital image forensics via intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101-117, Mar. 2008. (Pubitemid 351270076)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 101-117
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
4
-
-
20444444311
-
A classifier design for detecting image manipulations
-
2004 International Conference on Image Processing, ICIP 2004
-
I. Avcibas, S. Bayram, N. Memon, M. Ramkumar, and B. Sankur, "A classifier design for detecting image manipulations," in Proc. IEEE Int. Conf. Image Processing, Oct. 2004, vol. 4, pp. 2645-2648. (Pubitemid 40820438)
-
(2004)
Proceedings - International Conference on Image Processing, ICIP
, vol.4
, pp. 2645-2648
-
-
Avcibas, I.1
Bayram, S.2
Memon, N.3
Ramkumar, M.4
Sankur, B.5
-
5
-
-
77955707653
-
Forensic detection of image manipulation using statistical intrinsic fingerprints
-
Sep
-
M. C. Stammand K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492-506, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 492-506
-
-
Stammand, M.C.1
Liu K, J.R.2
-
6
-
-
33750927408
-
Exposing digital forgeries in video by detecting double MPEG compression
-
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
-
W. Wang and H. Farid, "Exposing digital forgeries in video by detecting double MPEG compression," in Proc. ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006, pp. 37-47. (Pubitemid 44729574)
-
(2006)
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
, vol.2006
, pp. 37-47
-
-
Wang, W.1
Farid, H.2
-
7
-
-
34548070244
-
Exposing digital forgeries in interlaced and deinterlaced video
-
DOI 10.1109/TIFS.2007.902661
-
W. Wang and H. Farid, "Exposing digital forgeries in interlaced and de-interlaced video," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 438-449, Jun. 2007. (Pubitemid 47290578)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 438-449
-
-
Wang, W.1
Farid, H.2
-
8
-
-
34548294226
-
Source digital camcorder identification using sensor photo response non-uniformity
-
Feb
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukáŝ, "Source digital camcorder identification using sensor photo response non-uniformity," in Proc. SPIE Electronic Imaging, Photonics West, Feb. 2007, vol. 6505.
-
(2007)
Proc. SPIE Electronic Imaging, Photonics West
, vol.6505
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukáŝ, J.4
-
9
-
-
38849151499
-
Digital audio forensics: A first practical evaluation on microphone and environment classification
-
DOI 10.1145/1288869.1288879, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
C. Kraetzer, A. Oermann, J. Dittmann, and A. Lang, "Digital audio forensics: A first practical evaluation on microphone and environment classification," in Proc. 9th Workshop on Multimedia and Security, New York, 2007, pp. 63-74, ACM. (Pubitemid 351203805)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 63-74
-
-
Kraetzer, C.1
Oermann, A.2
Dittmann, J.3
Lang, A.4
-
10
-
-
78049411993
-
Automatic acquisition device identification from speech recordings
-
Mar
-
D. Garcia-Romero and C. Y. Espy-Wilson, "Automatic acquisition device identification from speech recordings," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Mar. 2010, pp. 1806-1809.
-
(2010)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, pp. 1806-1809
-
-
Garcia-Romero, D.1
Espy-Wilson, C.Y.2
-
11
-
-
21644454463
-
Digital audio recording analysis: The Electric Network Frequency (ENF) Criterion
-
C. Grigoras, "Digital audio recording analysis: The electric network frequency (ENF) criterion," Int. J. Speech Language and the Law, vol. 12, no. 1, pp. 63-76, Mar. 2005. (Pubitemid 40937849)
-
(2005)
International Journal of Speech, Language and the Law
, vol.12
, Issue.1
, pp. 63-76
-
-
Grigoras, C.1
-
12
-
-
56749180518
-
Hiding traces of resampling in digital images
-
Dec
-
M. Kirchner and R. Böhme, "Hiding traces of resampling in digital images," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 582-592, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 582-592
-
-
Kirchner, M.1
Böhme, R.2
-
13
-
-
37849032097
-
Can we trust digital image forensics?
-
T. Gloe, M. Kirchner, A. Winkler, and R. Böhme, "Can we trust digital image forensics?," in Proc. 15th Int. Conf. Multimedia, 2007, pp. 78-86.
-
(2007)
Proc. 15th Int. Conf. Multimedia
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Böhme, R.4
-
14
-
-
78049404806
-
Anti-forensics of JPEG compression
-
Mar
-
M. C. Stamm, S. K. Tjoa,W. S. Lin, and K. J. R. Liu, "Anti-forensics of JPEG compression," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Mar. 2010, pp. 1694-1697.
-
(2010)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, pp. 1694-1697
-
-
Stamm, M.C.1
Tjoa, S.K.2
Lin, W.S.3
Liu, K.J.R.4
-
16
-
-
80051605162
-
Anti-forensics of digital image compression
-
Sep
-
M. C. Stamm and K. J. R. Liu, "Anti-forensics of digital image compression," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 1050-1065, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
17
-
-
78651088596
-
Undetectable image tampering through JPEG compression anti-forensics
-
Sep
-
M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, "Undetectable image tampering through JPEG compression anti-forensics," in Proc. IEEE Int. Conf. Image Processing, Sep. 2010, pp. 2109-2112.
-
(2010)
Proc. IEEE Int. Conf. Image Processing
, pp. 2109-2112
-
-
Stamm, M.C.1
Tjoa, S.K.2
Lin, W.S.3
Liu, K.J.R.4
-
18
-
-
78149263012
-
Anti-forensics of contrast enhancement in digital images
-
ACM
-
G. Cao, Y. Zhao, R. Ni, and H. Tian, "Anti-forensics of contrast enhancement in digital images," in Proc. 12th ACM Workshop on Multimedia and Security, 2010, pp. 25-34, ACM.
-
(2010)
Proc. 12th ACM Workshop on Multimedia and Security
, pp. 25-34
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Tian, H.4
-
20
-
-
79951834941
-
Defending against fingerprintcopy attack in sensor-based camera identification
-
Mar
-
M. Goljan, J. Fridrich, and M. Chen, "Defending against fingerprintcopy attack in sensor-based camera identification," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 227-236, Mar. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.1
, pp. 227-236
-
-
Goljan, M.1
Fridrich, J.2
Chen, M.3
-
21
-
-
84856278454
-
Countering JPEG anti-forensics
-
Brussels, Belgium, Sep
-
G. Valenzise, V. Nobile, M. Taglisacchi, and S. Tubaro, "Countering JPEG anti-forensics," in Proc. IEEE Int. Conf. Image Processing, Brussels, Belgium, Sep. 2011.
-
(2011)
Proc. IEEE Int. Conf. Image Processing
-
-
Valenzise, G.1
Nobile, V.2
Taglisacchi, M.3
Tubaro, S.4
-
22
-
-
44049087452
-
Detection of double-compression in JPEG images for applications in steganography
-
DOI 10.1109/TIFS.2008.922456, 4512175
-
T. Pevny and J. Fridrich, "Detection of double-compression in JPEG images for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008. (Pubitemid 351709458)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevny, T.1
Fridrich, J.2
-
23
-
-
80051649252
-
Anti-forensics for frame deletion/addition in MPEG video
-
Prague, Czech Republic,May
-
M. C. Stamm and K. J. R. Liu, "Anti-forensics for frame deletion/addition in MPEG video," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Prague, Czech Republic,May 2011, pp. 1876-1879.
-
(2011)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, pp. 1876-1879
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
24
-
-
84864034865
-
Forensics vs. anti-forensics: A decision and game theoretic framework
-
Kyoto, Japan, Mar
-
M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Forensics vs. anti-forensics: A decision and game theoretic framework," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Kyoto, Japan, Mar. 2012, pp. 1749-1752.
-
(2012)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, pp. 1749-1752
-
-
Stamm, M.C.1
Lin, W.S.2
Liu, K.J.R.3
-
25
-
-
0033875356
-
New diamond search algorithm for fast block-matching motion estimation
-
DOI 10.1109/83.821744
-
S. Zhu and K.-K.Ma, "A new diamond search algorithm for fast blockmatching motion estimation," IEEE Trans. Image Process., vol. 9, no. 2, pp. 287-290, Feb. 2000. (Pubitemid 30557223)
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.2
, pp. 287-290
-
-
Zhu, S.1
Ma, K.-K.2
|