-
1
-
-
80051643956
-
The cost of JPEG compression anti-forensics
-
Speech, and Signal Processing, Prague, Czech Republic, May 2011
-
G. Valenzise, M. Tagliasacchi, and S. Tubaro, "The cost of JPEG compression anti-forensics," in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Prague, Czech Republic, May 2011.
-
Proc. Int. Conf. Acoustics
-
-
Valenzise, G.1
Tagliasacchi, M.2
Tubaro, S.3
-
2
-
-
84856278454
-
Countering JPEG anti-forensics
-
Bruxelles, Belgium, Sep
-
G. Valenzise, V. Nobile, M. Tagliasacchi, and S. Tubaro, "Countering JPEG anti-forensics," in Proc. Int. Conf. on Image Process., Bruxelles, Belgium, Sep. 2011.
-
(2011)
Proc. Int. Conf. on Image Process.
-
-
Valenzise, G.1
Nobile, V.2
Tagliasacchi, M.3
Tubaro, S.4
-
3
-
-
85032768213
-
Image forgery detection
-
Mar
-
H. Farid, "Image forgery detection," IEEE Signal Process. Mag., vol. 26, no. 2, pp. 16-25, Mar. 2009.
-
(2009)
IEEE Signal Process. Mag
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
4
-
-
84872323594
-
An overview on video forensics
-
S.Milani,M. Fontani, P. Bestagini, M. Barni, A. Piva,M. Tagliasacchi, and S. Tubaro, "An overview on video forensics," APSIPA Trans. Signal Inf. Process., vol. 1, pp. 1-18, 2012.
-
(2012)
APSIPA Trans. Signal Inf. Process
, vol.1
, pp. 1-18
-
-
Milani, S.1
Fontani, M.2
Bestagini, P.3
Barni, M.4
Piva, A.5
Tagliasacchi, M.6
Tubaro, S.7
-
5
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
DOI 10.1109/TIFS.2007.916285
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukas, "Determining image origin and integrity using sensor noise," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74-90, Mar. 2008. (Pubitemid 351270074)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
6
-
-
0038005383
-
Identification of bitmap compression history: JPEG detection and quantizer estimation
-
Feb
-
Z. Fan and R. L. de Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Trans. Image Process., vol. 12, no. 2, pp. 230-235, Feb. 2003.
-
(2003)
IEEE Trans. Image Process
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
De Queiroz, R.L.2
-
7
-
-
69749097361
-
Digital image source coder forensics via intrinsic fingerprints
-
Sep
-
W. S. Lin, S. K. Tjoa, H. V. Zhao, and K. J. Liu, "Digital image source coder forensics via intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 460-475, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.3
, pp. 460-475
-
-
Lin, W.S.1
Tjoa, S.K.2
Zhao, H.V.3
Liu, K.J.4
-
8
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
DOI 10.1109/TSP.2004.839932
-
A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005. (Pubitemid 40181769)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
9
-
-
34547529764
-
A novel method for detecting cropped and recompressed image block
-
Apr
-
W. Luo, Z. Qu, J. Huang, and G. Qiu, "A novel method for detecting cropped and recompressed image block," in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Apr. 2007, vol. 2, pp. 217-220.
-
(2007)
Proc. Int. Conf. Acoustics, Speech, and Signal Processing
, vol.2
, pp. 217-220
-
-
Luo, W.1
Qu, Z.2
Huang, J.3
Qiu, G.4
-
10
-
-
77955707653
-
Forensic detection of image manipulation using statistical intrinsic fingerprints
-
Sep.
-
M. C. Stamm and K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492-506, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 492-506
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
12
-
-
77955699524
-
A machine learning based scheme for double JPEG compression detection
-
C. Chen, Y. Q. Shi, and W. Su, "A machine learning based scheme for double JPEG compression detection," in Proc. Int. Conf. Pattern Recognition, 2008, pp. 1-4.
-
(2008)
Proc. Int. Conf. Pattern Recognition
, pp. 1-4
-
-
Chen, C.1
Shi, Y.Q.2
Su, W.3
-
14
-
-
78649396720
-
Detecting double JPEG compression with the same quantization matrix
-
Dec.
-
F. Huang, J. Huang, and Y. Q. Shi, "Detecting double JPEG compression with the same quantization matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 848-856, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 848-856
-
-
Huang, F.1
Huang, J.2
Shi, Y.Q.3
-
15
-
-
27844554394
-
Detection of copy-move forgery in digital images
-
Cleveland, OH Aug
-
J. Fridrich, D. Soukal, and J. Lukás, "Detection of copy-move forgery in digital images," in Proc. Digital Forensic Research Workshop, Cleveland, OH, Aug. 2003.
-
(2003)
Proc. Digital Forensic Research Workshop
-
-
Fridrich, J.1
Soukal, D.2
Lukás, J.3
-
16
-
-
78650878210
-
A survey of copy-move forgery detection techniques
-
Rochester, NY, Oct
-
S. Bayram, H. T. Sencar, and N. Memon, "A survey of copy-move forgery detection techniques," in Proc. IEEE Western New York Image Processing Workshop, Rochester, NY, Oct. 2008.
-
(2008)
Proc. IEEE Western New York Image Processing Workshop
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
17
-
-
80051606276
-
Improved DCT coefficient analysis for forgery localization in JPEG images
-
Czech Republic, May
-
A. Bianchi, T. De Rosa, and A. Piva, "Improved DCT coefficient analysis for forgery localization in JPEG images," in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Prague, Czech Republic, May 2011.
-
(2011)
Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Prague
-
-
Bianchi, A.1
De Rosa, T.2
Piva, A.3
-
18
-
-
78049404806
-
Anti-forensics of JPEG compression
-
Apr
-
M. C. Stamm, S.K. Tjoa,W. S. Lin, and K. J. R. Liu, "Anti-forensics of JPEG compression," in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Dallas, TX, Apr. 2010.
-
(2010)
Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Dallas, TX
-
-
Stamm, M.C.1
Tjoaw. S Lin, S.K.2
Liu, K.J.R.3
-
19
-
-
78651088596
-
Undetectable image tampering through JPEG compression anti-forensics
-
Hong Kong, Sep
-
M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, "Undetectable image tampering through JPEG compression anti-forensics," in Proc. Int. Conf. Image Process., Hong Kong, Sep. 2010, pp. 2109-2112.
-
(2010)
Proc. Int. Conf. Image Process
, pp. 2109-2112
-
-
Stamm, M.C.1
Tjoa, S.K.2
Lin, W.S.3
Liu, K.J.R.4
-
20
-
-
78650003881
-
Security analysis on spatial 1 steganography for JPEG decompressed images
-
Jan.
-
W. Luo, Y. Wang, and J. Huang, "Security analysis on spatial 1 steganography for JPEG decompressed images," IEEE Signal Process. Lett., vol. 18, no. 1, pp. 39-42, Jan. 2011.
-
(2011)
IEEE Signal Process. Lett
, vol.18
, Issue.1
, pp. 39-42
-
-
Luo, W.1
Wang, Y.2
Huang, J.3
-
21
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
Mar
-
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
22
-
-
84867605301
-
Video codec identification
-
Mar 25-30
-
P. Bestagini, A. Allam, S. Milani, M. Tagliasacchi, and S. Tubaro, "Video codec identification," in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Mar. 25-30, 2012, pp. 2257-2260.
-
(2012)
Proc. Int. Conf. Acoustics, Speech, and Signal Processing
, pp. 2257-2260
-
-
Bestagini, P.1
Allam, A.2
Milani, S.3
Tagliasacchi, M.4
Tubaro, S.5
-
23
-
-
80053033238
-
Countering counter-forensics: The case of JPEG compression
-
New York: Springer
-
S. Y. Lai and R. Böhme, "Countering counter-forensics: The case of JPEG compression," in Information Hiding. New York: Springer, 2011, pp. 285-298.
-
(2011)
Information Hiding
, pp. 285-298
-
-
Lai, S.Y.1
Böhme, R.2
-
25
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun.
-
T. Pevny, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
26
-
-
84861122288
-
Image forgery localization via block-grained analysis of JPEG artifacts
-
Jun.
-
T. Bianchi and A. Piva, "Image forgery localization via block-grained analysis of JPEG artifacts," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1003-1017, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 1003-1017
-
-
Bianchi, T.1
Piva, A.2
-
27
-
-
84867616246
-
Discriminating multiple jpeg compression using first digit features
-
Mar 25-30
-
S. Tubaro, S. Milani, and M. Tagliasacchi, "Discriminating multiple jpeg compression using first digit features," in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Mar. 25-30, 2012.
-
(2012)
Proc. Int. Conf. Acoustics, Speech, and Signal Processing
-
-
Tubaro, S.1
Milani, S.2
Tagliasacchi, M.3
-
28
-
-
84872317275
-
-
The Independent JPEG Group [Online] Available:
-
The Independent JPEG Group [Online]. Available: http://www.ijg.org/
-
-
-
-
29
-
-
84872329785
-
-
Recommendation T.81: Digital Compression and Coding of Continuous-Tone Still Images ISO/IEC 10918-1, ITU-T
-
Recommendation T.81: Digital Compression and Coding of Continuous-Tone Still Images, ISO/IEC 10918-1, ITU-T, 1991.
-
(1991)
-
-
-
30
-
-
0034298708
-
A mathematical analysis of the DCT coefficient distributions for images
-
Oct
-
E. Y. Lam and J. W. Goodman, "A mathematical analysis of the DCT coefficient distributions for images," IEEE Trans. Image Process., vol. 9, no. 10, pp. 1661-1666, Oct. 2000.
-
(2000)
IEEE Trans. Image Process
, vol.9
, Issue.10
, pp. 1661-1666
-
-
Lam, E.Y.1
Goodman, J.W.2
-
31
-
-
0033357462
-
Biased reconstruction for JPEG decoding
-
DOI 10.1109/97.803427
-
J. R. Price and M. Rabbani, "Biased reconstruction for JPEG decoding," IEEE Signal Process. Lett., vol. 6, no. 12, pp. 297-299, Dec. 1999. (Pubitemid 30519148)
-
(1999)
IEEE Signal Processing Letters
, vol.6
, Issue.12
, pp. 297-299
-
-
Price, J.R.1
Rabbani, M.2
-
33
-
-
44049111982
-
Nonlinear total variation based noise removal algorithms
-
L. I. Rudin, S. Osher, and E. Fatemi, "Nonlinear total variation based noise removal algorithms," Physica D: Nonlinear Phenomena, vol. 60, no. 1-4, pp. 259-268, 1992.
-
(1992)
Physica D: Nonlinear Phenomena
, vol.60
, Issue.1-4
, pp. 259-268
-
-
Rudin, L.I.1
Osher, S.2
Fatemi, E.3
-
34
-
-
25144471298
-
Score normalization in multimodal biometric systems
-
DOI 10.1016/j.patcog.2005.01.012, PII S0031320305000592
-
A. K. Jain, K. Nandakumar, and A. Ross, "Score normalization in multimodal biometric systems," Pattern Recognit., vol. 38, no. 12, pp. 2270-2285, 2005. (Pubitemid 41336698)
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2270-2285
-
-
Jain, A.1
Nandakumar, K.2
Ross, A.3
-
35
-
-
84872281737
-
-
NRCS Photo Gallery [Online] Available:
-
NRCS Photo Gallery [Online]. Available: http://photogallery.nrcs. usda.gov/
-
-
-
|