메뉴 건너뛰기




Volumn 7, Issue 4, 2012, Pages 1315-1329

Temporal forensics and anti-forensics for motion compensated video

Author keywords

anti forensics; Digital forensics; frame deletion; game theory; video compression

Indexed keywords

ANTI-FORENSICS; DETECTION TECHNIQUE; DIGITAL FORENSIC; DIGITAL FORGERY; DIGITAL INFORMATION; DIGITAL MANIPULATION; DIGITAL VIDEOS; FRAME DELETION; GAME-THEORETIC; MOTION-COMPENSATED VIDEO; MULTIMEDIA CONTENTS; OPTIMAL ACTIONS; PROBABILITY OF FALSE ALARM; THEORETICAL MODELS; VIDEO FRAME;

EID: 84864056133     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2205568     Document Type: Article
Times cited : (193)

References (25)
  • 5
    • 77955707653 scopus 로고    scopus 로고
    • Forensic detection of image manipulation using statistical intrinsic fingerprints
    • Sep
    • M. C. Stammand K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492-506, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 492-506
    • Stammand, M.C.1    Liu K, J.R.2
  • 6
    • 33750927408 scopus 로고    scopus 로고
    • Exposing digital forgeries in video by detecting double MPEG compression
    • Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
    • W. Wang and H. Farid, "Exposing digital forgeries in video by detecting double MPEG compression," in Proc. ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006, pp. 37-47. (Pubitemid 44729574)
    • (2006) Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06 , vol.2006 , pp. 37-47
    • Wang, W.1    Farid, H.2
  • 7
    • 34548070244 scopus 로고    scopus 로고
    • Exposing digital forgeries in interlaced and deinterlaced video
    • DOI 10.1109/TIFS.2007.902661
    • W. Wang and H. Farid, "Exposing digital forgeries in interlaced and de-interlaced video," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 438-449, Jun. 2007. (Pubitemid 47290578)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 438-449
    • Wang, W.1    Farid, H.2
  • 9
    • 38849151499 scopus 로고    scopus 로고
    • Digital audio forensics: A first practical evaluation on microphone and environment classification
    • DOI 10.1145/1288869.1288879, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
    • C. Kraetzer, A. Oermann, J. Dittmann, and A. Lang, "Digital audio forensics: A first practical evaluation on microphone and environment classification," in Proc. 9th Workshop on Multimedia and Security, New York, 2007, pp. 63-74, ACM. (Pubitemid 351203805)
    • (2007) MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007 , pp. 63-74
    • Kraetzer, C.1    Oermann, A.2    Dittmann, J.3    Lang, A.4
  • 11
    • 21644454463 scopus 로고    scopus 로고
    • Digital audio recording analysis: The Electric Network Frequency (ENF) Criterion
    • C. Grigoras, "Digital audio recording analysis: The electric network frequency (ENF) criterion," Int. J. Speech Language and the Law, vol. 12, no. 1, pp. 63-76, Mar. 2005. (Pubitemid 40937849)
    • (2005) International Journal of Speech, Language and the Law , vol.12 , Issue.1 , pp. 63-76
    • Grigoras, C.1
  • 12
    • 56749180518 scopus 로고    scopus 로고
    • Hiding traces of resampling in digital images
    • Dec
    • M. Kirchner and R. Böhme, "Hiding traces of resampling in digital images," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 582-592, Dec. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.4 , pp. 582-592
    • Kirchner, M.1    Böhme, R.2
  • 16
    • 80051605162 scopus 로고    scopus 로고
    • Anti-forensics of digital image compression
    • Sep
    • M. C. Stamm and K. J. R. Liu, "Anti-forensics of digital image compression," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 1050-1065, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 1050-1065
    • Stamm, M.C.1    Liu, K.J.R.2
  • 20
    • 79951834941 scopus 로고    scopus 로고
    • Defending against fingerprintcopy attack in sensor-based camera identification
    • Mar
    • M. Goljan, J. Fridrich, and M. Chen, "Defending against fingerprintcopy attack in sensor-based camera identification," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 227-236, Mar. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.1 , pp. 227-236
    • Goljan, M.1    Fridrich, J.2    Chen, M.3
  • 22
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression in JPEG images for applications in steganography
    • DOI 10.1109/TIFS.2008.922456, 4512175
    • T. Pevny and J. Fridrich, "Detection of double-compression in JPEG images for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008. (Pubitemid 351709458)
    • (2008) IEEE Transactions on Information Forensics and Security , vol.3 , Issue.2 , pp. 247-258
    • Pevny, T.1    Fridrich, J.2
  • 25
    • 0033875356 scopus 로고    scopus 로고
    • New diamond search algorithm for fast block-matching motion estimation
    • DOI 10.1109/83.821744
    • S. Zhu and K.-K.Ma, "A new diamond search algorithm for fast blockmatching motion estimation," IEEE Trans. Image Process., vol. 9, no. 2, pp. 287-290, Feb. 2000. (Pubitemid 30557223)
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.2 , pp. 287-290
    • Zhu, S.1    Ma, K.-K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.