-
1
-
-
85032751542
-
Special issue on digital forensics
-
E. Delp, N. Memon, and M. Wu, "Special issue on digital forensics," IEEE Signal Process. Mag., vol. 26, no. 2, p., Mar. 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.2
-
-
Delp, E.1
Memon, N.2
Wu, M.3
-
2
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
DOI 10.1109/TIFS.2007.916285
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukas, "Determining image origin and integrity using sensor noise," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74-90, Mar. 2008. (Pubitemid 351270074)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
3
-
-
13244253845
-
How realistic is photorealistic?
-
DOI 10.1109/TSP.2004.839896
-
S. Lyu and H. Farid, "How realistic is photorealistic?," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 845-850, Feb. 2005. (Pubitemid 40181778)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 845-850
-
-
Lyu, S.1
Farid, H.2
-
4
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
DOI 10.1109/TSP.2004.839932
-
A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005. (Pubitemid 40181769)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
5
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
Mar
-
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
6
-
-
78649395962
-
Camera response functions for image forensics: An automatic algorithm for splicing detection
-
Dec
-
Y.-F. Hsu and S.-F. Chang, "Camera response functions for image forensics: An automatic algorithm for splicing detection," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 816-825, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 816-825
-
-
Hsu, Y.-F.1
Chang, S.-F.2
-
7
-
-
70349199203
-
An efficient and robust method for detecting copy-move forgery
-
Apr.
-
S. Bayram, H. T. Sencar, and N. Memon, "An efficient and robust method for detecting copy-move forgery," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP 2009), Apr. 2009, pp. 1053-1056.
-
(2009)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP 2009)
, pp. 1053-1056
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
8
-
-
37849032097
-
Can we trust digital image forensics?
-
Augsburg, Germany, Sep.
-
T. Gloe,M. Kirchner, A.Winkler, and R. Böhme, "Can we trust digital image forensics?," in Proc. ACM Multimedia 2007, Augsburg, Germany, Sep. 2007, pp. 78-86.
-
(2007)
Proc. ACM Multimedia 2007
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Böhme, R.4
-
9
-
-
56749180518
-
Hiding traces of resampling in digital images
-
Dec
-
M. Kirchner and R. Böhme, "Hiding traces of resampling in digital images," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 582-292, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 582-292
-
-
Kirchner, M.1
Böhme, R.2
-
10
-
-
78149263012
-
Anti-forensics of contrast enhancement in digital images
-
Sep.
-
G. Cao, Y. Zhao, R. Ni, and H. Tian, "Anti-forensics of contrast enhancement in digital images," in Proc. 12th ACM Multimedia and Security Workshop 2010, Sep. 2010, pp. 24-34.
-
(2010)
Proc. 12th ACM Multimedia and Security Workshop 2010
, pp. 24-34
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Tian, H.4
-
11
-
-
80051605162
-
Anti-forensics of digital image compression
-
Sep
-
M. C. Stamm and K. J. R. Liu, "Anti-forensics of digital image compression," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 50-65, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 50-65
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
12
-
-
84873623957
-
Counter-forensics: Attacking image forensics
-
Berlin/Heidelberg, Germany: Springer
-
R. Böhme and M. Kirchner, H. T. Sencar and N. Memon, Eds., "Counter-forensics: Attacking image forensics," in Digital Image Forensics. Berlin/Heidelberg, Germany: Springer, 2012.
-
(2012)
Digital Image Forensics
-
-
Böhme, R.1
Kirchner, M.2
Sencar, H.T.3
Memon, N.4
-
13
-
-
77951842370
-
Sensor noise camera identification: Countering counter forensics
-
San Jose, CA, USA
-
M. Goljan, J. Fridrich, and M. Chen, "Sensor noise camera identification: Countering counter forensics," in Proc. SPIE Conf. Media Forensics and Security, San Jose, CA, USA, 2010.
-
(2010)
Proc. SPIE Conf. Media Forensics and Security
-
-
Goljan, M.1
Fridrich, J.2
Chen, M.3
-
14
-
-
80053033238
-
Countering counter-forensics: The case of JPEG compression
-
Berlin/Heidelberg, Germany: Springer
-
S. Lai and R. Böhme, "Countering counter-forensics: The case of JPEG compression," in Information Hiding, ser. Lecture Notes in Computer Science. Berlin/Heidelberg, Germany: Springer, 2011, vol. 6958, pp. 285-298.
-
(2011)
Information Hiding, Ser. Lecture Notes in Computer Science
, vol.6958
, pp. 285-298
-
-
Lai, S.1
Böhme, R.2
-
15
-
-
84856278454
-
Countering JPEG anti-forensics
-
Brussels, Belgium, Sep.
-
G. Valenzise, V. Nobile, M. Tagliasacchi, and S. Tubaro, "Countering JPEG anti-forensics," in IEEE Int. Conf. Image Processing (ICIP'11), Brussels, Belgium, Sep. 2011, pp. 1949-1952.
-
(2011)
IEEE Int. Conf. Image Processing (ICIP'11)
, pp. 1949-1952
-
-
Valenzise, G.1
Nobile, V.2
Tagliasacchi, M.3
Tubaro, S.4
-
16
-
-
84957868624
-
An information-theoretic model for steganography
-
Berlin/Heidelberg, Germany: Springer
-
C. Cachin, "An information-theoretic model for steganography," in IH98, Second International Workshop on Information Hiding, ser. ser. Lecture Notes in Computer Science. Berlin/Heidelberg, Germany: Springer, 1998, vol. 6958, pp. 306-318.
-
(1998)
IH98, Second International Workshop on Information Hiding, Ser. Ser. Lecture Notes in Computer Science
, vol.6958
, pp. 306-318
-
-
Cachin, C.1
-
18
-
-
84864034865
-
Forensics vs anti-forensics: A decision and game theoretic framework
-
Kyoto, Japan, Mar. 25-30
-
M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Forensics vs anti-forensics: A decision and game theoretic framework," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP 2012), Kyoto, Japan, Mar. 25-30, 2012.
-
(2012)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP 2012)
-
-
Stamm, M.C.1
Lin, W.S.2
Liu, K.J.R.3
-
19
-
-
84867619278
-
A game theoretic approach to source identification with known statistics
-
Kyoto, Japan, Mar. 25-30
-
M. Barni, "A game theoretic approach to source identification with known statistics," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP 2012), Kyoto, Japan, Mar. 25-30, 2012.
-
(2012)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP 2012)
-
-
Barni, M.1
-
21
-
-
0032183789
-
The method of types
-
PII S0018944898052857
-
I. Csiszar, "The method of types," IEEE Trans. Inf. Theory, vol. 44, no. 6, pp. 2505-2523, Oct. 1998. (Pubitemid 128741898)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.6
, pp. 2505-2523
-
-
Csiszar, I.1
-
22
-
-
38349193395
-
Optimal watermark embedding and detection strategies under limited detection resources
-
Jan
-
N. Merhav and E. Sabbag, "Optimal watermark embedding and detection strategies under limited detection resources," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 255-274, Jan. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.1
, pp. 255-274
-
-
Merhav, N.1
Sabbag, E.2
-
23
-
-
0001613029
-
Asymptotically optimal tests for multinomial distributions
-
Apr
-
W. Hoeffding, "Asymptotically optimal tests for multinomial distributions," Annals Math. Statist., vol. 36, no. 2, pp. 369-401, Apr. 1965.
-
(1965)
Annals Math. Statist.
, vol.36
, Issue.2
, pp. 369-401
-
-
Hoeffding, W.1
-
24
-
-
0002021736
-
Equilibrium points in n-person games
-
J. Nash, "Equilibrium points in n-person games," Proc. Nat. Acad. Sci., vol. 36, no. 1, pp. 48-49, 1950.
-
(1950)
Proc. Nat. Acad. Sci.
, vol.36
, Issue.1
, pp. 48-49
-
-
Nash, J.1
-
26
-
-
0000239750
-
Redundancy rates for renewal and other processes
-
PII S0018944896063717
-
I. Csiszar and P. C. Shields, "Redundancy rates for renewal and other processes," IEEE Trans. Inf. Theory, vol. 42, no. 6, pp. 2065-2072, Nov. 1996. (Pubitemid 126771535)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.6 PART 2
, pp. 2065-2072
-
-
Csiszar, I.1
Shields, P.C.2
-
28
-
-
84873689187
-
Algorithms and software for convex mixed integer nonlinear programs
-
NewYork,NY, USA: Springer
-
P. Bonami, M. Kilinc, and J. Linderoth, J. Lee and S. Leyffer, Eds., "Algorithms and software for convex mixed integer nonlinear programs," in Mixed Integer Nonlinear Programming. NewYork,NY, USA: Springer, 2012, pp. 1-39.
-
(2012)
Mixed Integer Nonlinear Programming
, pp. 1-39
-
-
Bonami, P.1
Kilinc, M.2
Linderoth, J.3
Lee, J.4
Leyffer, S.5
-
29
-
-
67349211082
-
Using noise inconsistencies for blind image forensics
-
B. Mahdian and S. Saic, "Using noise inconsistencies for blind image forensics," Image Vis. Comput., vol. 27, pp. 1497-1503, 2009.
-
(2009)
Image Vis. Comput.
, vol.27
, pp. 1497-1503
-
-
Mahdian, B.1
Saic, S.2
-
30
-
-
80054782322
-
Exposing image forgery with blind noise estimation
-
Buffalo, NY, USA, Sep.
-
X. Pan, X. Zhang, and S. Lyu, "Exposing image forgery with blind noise estimation," in Proc. ACM Multimedia and Security Workshop 2011, Buffalo, NY, USA, Sep. 2011, pp. 15-20.
-
(2011)
Proc. ACM Multimedia and Security Workshop 2011
, pp. 15-20
-
-
Pan, X.1
Zhang, X.2
Lyu, S.3
-
31
-
-
84867466942
-
A universal technique to hide traces of histogram-based image manipulations
-
Coventry, U.K., Sep. 6-7
-
M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations," in Proc. ACM Multimedia and Security Workshop, Coventry, U.K., Sep. 6-7, 2012, pp. 97-104.
-
(2012)
Proc. ACM Multimedia and Security Workshop
, pp. 97-104
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
32
-
-
0024627211
-
Asymptotically optimal classification for multiple tests with empirically observed statistics
-
Mar
-
M. Gutman, "Asymptotically optimal classification for multiple tests with empirically observed statistics," IEEE Trans. Inf. Theory, vol. 35, no. 2, pp. 401-408, Mar. 1989.
-
(1989)
IEEE Trans. Inf. Theory
, vol.35
, Issue.2
, pp. 401-408
-
-
Gutman, M.1
|