-
1
-
-
78651398372
-
Digital image forensics: A booklet for beginners
-
Jan
-
J. A. Redi, W. Taktak, and J.-L. Dugelay, "Digital image forensics: A booklet for beginners," Multimedia Tools Appl. vol. 51, pp. 133-162, Jan. 2011 [Online]. Available: http://dx.doi.org/10.1007/s11042-010- 0620-1
-
(2011)
Multimedia Tools Appl
, vol.51
, pp. 133-162
-
-
Redi, J.A.1
Taktak, W.2
Dugelay, J.-L.3
-
2
-
-
84856481580
-
A Dempster-Shafer framework for decision fusion in image forensics
-
Dec. 29
-
M. Fontani, T. Bianchi, A. De Rosa, A. Piva, and M. Barni, "A Dempster-Shafer framework for decision fusion in image forensics," in Proc. 2011 IEEE Int. Workshop on Information Forensics and Security (WIFS), Dec. 29, 2011, pp. 1-6.
-
(2011)
Proc 2011 IEEE Int. Workshop on Information Forensics and Security (WIFS)
, pp. 1-6
-
-
Fontani, M.1
Bianchi, T.2
De Rosa, A.3
Piva, A.4
Barni, M.5
-
3
-
-
80051606276
-
Improved DCT coefficient analysis for forgery localization in JPEG images
-
T. Bianchi,A. De Rosa, and A. Piva, "Improved DCT coefficient analysis for forgery localization in JPEG images," in Proc. IEEE ICASSP, 2011, pp. 2444-2447.
-
(2011)
Proc IEEE ICASSP
, pp. 2444-2447
-
-
Bianchi, T.1
De Rosa, A.2
Piva, A.3
-
4
-
-
84856314905
-
Detection of non-aligned double JPEG compression with estimation of primary compression parameters
-
Sep
-
T. Bianchi and A. Piva, "Detection of non-aligned double JPEG compression with estimation of primary compression parameters," in Proc. 2011 18th IEEE Int. Conf. Image Processing (ICIP), Sep. 2011, pp. 1929-1932.
-
(2011)
Proc. 2011 18th IEEE Int. Conf. Image Processing (ICIP)
, pp. 1929-1932
-
-
Bianchi, T.1
Piva, A.2
-
5
-
-
34547529764
-
A novel method for detecting cropped and recompressed image block
-
Apr
-
W. Luo, Z. Qu, J. Huang, and G. Qiu, "A novel method for detecting cropped and recompressed image block," in Proc. ICASSP 2007, Apr. 2007, vol. 2, pp. II-217-II-220.
-
(2007)
Proc. ICASSP 2007
, vol.2
, pp. 11-217
-
-
Luo, W.1
Qu, Z.2
Huang, J.3
Qiu, G.4
-
6
-
-
67649410199
-
Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis
-
Nov
-
Z. C. Lin, J. F. He, X. Tang, and C. K. Tang, "Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognit., vol. 42, no. 11, pp. 2492-2501, Nov. 2009.
-
(2009)
Pattern Recognit
, vol.42
, Issue.11
, pp. 2492-2501
-
-
Lin, Z.C.1
He, J.F.2
Tang, X.3
Tang, C.K.4
-
7
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
Mar
-
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
8
-
-
38549095977
-
Improving steganalysis by fusion techniques: A case study with image steganography
-
Transactions on Data Hiding and Multimedia Security I
-
M. Kharrazi, H. T. Sencar, and N. D. Memon, "Improving steganalysis by fusion techniques: A case study with image steganography," Trans. Data Hiding Multimedia Security, vol. 4300, pp. 123-137, 2006. (Pubitemid 351150618)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4300
, Issue.LNCS
, pp. 123-137
-
-
Kharrazi, M.1
Senear, H.T.2
Memon, N.3
-
9
-
-
70349678692
-
Statistical fusion of multiple cues for image tampering detection
-
Oct.
-
Y.-F. Hsu and S.-F. Chang, "Statistical fusion of multiple cues for image tampering detection," in Proc. 42nd Asilomar Conf. Signals, Systems and Computers, 2008, Oct. 2008, pp. 1386-1390.
-
(2008)
Proc. 42nd Asilomar Conf. Signals, Systems and Computers 2008
, pp. 1386-1390
-
-
Hsu, Y.-F.1
Chang, S.-F.2
-
10
-
-
84856497177
-
Nonintrusive image tamper detection based on fuzzy fusion
-
Sep.
-
G. Chetty and M. Singh, "Nonintrusive image tamper detection based on fuzzy fusion," in Proc. IJCSNS, Sep. 2010, vol. 10, no. 9, pp. 86-90.
-
(2010)
Proc. IJCSNS
, vol.10
, Issue.9
, pp. 86-90
-
-
Chetty, G.1
Singh, M.2
-
11
-
-
77749248951
-
D-S Evidence Theory based digital image trustworthiness evaluationmodel
-
ser. MINES '09
-
D. Hu, L.Wang, Y. Zhou,Y. Zhou,X. Jiang, and L.Ma, "D-S Evidence Theory based digital image trustworthiness evaluationmodel," in Proc. MINES 2009, 2009, vol. 1, ser. MINES '09, pp. 85-89.
-
(2009)
Proc. MINES 2009
, vol.1
, pp. 85-89
-
-
Hu, D.1
Wang, L.2
Zhou, Y.3
Zhou, Y.4
Jiang, X.5
Ma, L.6
-
12
-
-
33847671791
-
Image manipulation detection
-
S. Bayram, I.Avcibas, B. Sankur, and N. Memon, "Image manipulation detection," J. Electron. Imag., vol. 15, no. 4, pp. 041102-041102-17, 2006.
-
(2006)
J. Electron. Imag
, vol.15
, Issue.4
, pp. 041102-041102
-
-
Bayram, S.1
Avcibas, I.2
Sankur, B.3
Memon, N.4
-
14
-
-
70349662483
-
Detecting image tampering using feature fusion
-
P. Zhang and X. Kong, "Detecting image tampering using feature fusion," in Proc. ARES 2009, 2009, pp. 335-340.
-
(2009)
Proc. ARES 2009
, pp. 335-340
-
-
Zhang, P.1
Kong, X.2
-
15
-
-
80052673400
-
Fusion image steganalysis based on Dempster-Shafer evidence theory
-
Z.-W. Sun, H. Li, and Z.-C. Ji, "Fusion image steganalysis based on Dempster-Shafer evidence theory," Control and Decision, vol. 26, no. 8, pp. 1192-1196, 2011.
-
(2011)
Control and Decision
, vol.26
, Issue.8
, pp. 1192-1196
-
-
Sun, Z.-W.1
Li, H.2
Ji, Z.-C.3
-
16
-
-
0000516376
-
Upper and lower probabilities induced by a multivalued mapping
-
A. P. Dempster, "Upper and lower probabilities induced by a multivalued mapping," Ann. Math. Statist., vol. 38, pp. 325-339, 1967.
-
(1967)
Ann. Math. Statist
, vol.38
, pp. 325-339
-
-
Dempster, A.P.1
-
17
-
-
84860216072
-
Aggregating non-independent Dempster-Shafer belief structures
-
R. Yager, "Aggregating non-independent Dempster-Shafer belief structures," in Proc. IPMU'08, 2008, pp. 289-297.
-
(2008)
Proc. IPMU'08
, pp. 289-297
-
-
Yager, R.1
-
18
-
-
84874901087
-
-
8886658430
-
A. Benavoli, L. Chisci, B. Ristic, A. Farina, and A. Graziano, Reasoning Under Uncertainty: From Bayesian to Valuation Based Systems. Firenze, Italy: Selex Sistemi Integrati, 2007, 978-8886658430.
-
(2007)
Reasoning under Uncertainty: From Bayesian to Valuation Based Systems. Firenze Italy: Selex Sistemi Integrati
, pp. 978
-
-
Benavoli, A.1
Chisci, L.2
Ristic, B.3
Farina, A.4
Graziano, A.5
-
19
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
C.-C. Chang and C.-J. Lin, "LIBSVM: A library for support vector machines," ACM Trans. Intelligent Syst. Technol. vol. 2, pp. 27:1-27:27, 2011 [Online]. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm
-
(2011)
ACM Trans. Intelligent Syst. Technol
, vol.2
, pp. 271-2727
-
-
Chang, C.-C.1
Lin, C.-J.2
|