-
1
-
-
80051605162
-
Anti-forensics of digital image compression
-
Sept.
-
M.C. Stamm and K.J.R. Liu, "Anti-forensics of digital image compression," IEEE Transactions on Information Forensics Security, vol. 6, no. 3, pp. 1050 -1065, Sept. 2011.
-
(2011)
IEEE Transactions on Information Forensics Security
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
3
-
-
0038005383
-
Identification of bitmap compression history: JPEG detection and quantizer estimation
-
Feb.
-
Z. Fan and R.L. de Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 230-235, Feb. 2003.
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
De Queiroz, R.L.2
-
4
-
-
34547529764
-
A novel method for detecting cropped and recompressed image block
-
april
-
W. Luo, Z. Qu, J. Huang, and G. Qiu, "A novel method for detecting cropped and recompressed image block," in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, april 2007, vol. 2, pp. 217-220.
-
(2007)
Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing
, vol.2
, pp. 217-220
-
-
Luo, W.1
Qu, Z.2
Huang, J.3
Qiu, G.4
-
5
-
-
34250355507
-
A generalized benford's law for JPEG coefficients and its applications in image forensics
-
SPIE
-
D. Fu, Y. Q. Shi, and W. Su, "A generalized benford's law for JPEG coefficients and its applications in image forensics," in Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia. 2007, vol. 6505, p. 65051L, SPIE.
-
(2007)
Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia.
, vol.6505
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
6
-
-
77955676537
-
JPEG error analysis and its applications to digital image forensics
-
Sept.
-
W. Luo, J. Huang, and G. Qiu, "JPEG error analysis and its applications to digital image forensics," IEEE Transactions on Information Forensics Security, vol. 5, no. 3, pp. 480-491, Sept. 2010.
-
(2010)
IEEE Transactions on Information Forensics Security
, vol.5
, Issue.3
, pp. 480-491
-
-
Luo, W.1
Huang, J.2
Qiu, G.3
-
7
-
-
42949152350
-
Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images
-
SPIE
-
T. Pevny and J. Fridrich, "Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images," in Proceedings of SPIE: Security, Forensics, Steganography, and Watermarking of Multimedia. 2008, vol. 6819, p. 681911, SPIE.
-
(2008)
Proceedings of SPIE: Security, Forensics, Steganography, and Watermarking of Multimedia.
, vol.6819
, pp. 681911
-
-
Pevny, T.1
Fridrich, J.2
-
8
-
-
33745830178
-
Detecting doctored JPEG images via dct coefficient analysis
-
J. He, Z. Lin, L. Wang, and X. Tang, "Detecting doctored JPEG images via dct coefficient analysis," in Proceedings of European Conference on Computer Vision (ECCV), 2006, vol. 3953, pp. 423-435.
-
(2006)
Proceedings of European Conference on Computer Vision (ECCV)
, vol.3953
, pp. 423-435
-
-
He, J.1
Lin, Z.2
Wang, L.3
Tang, X.4
-
9
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
Mar.
-
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Transactions on Information Forensics Security, vol. 4, no. 1, pp. 154 -160, Mar. 2009.
-
(2009)
IEEE Transactions on Information Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
10
-
-
78049404806
-
Antiforensics of JPEG compression
-
Mar.
-
M.C. Stamm, S.K. Tjoa, W.S. Lin, and K.J.R. Liu, "Antiforensics of JPEG compression," in Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing, Mar. 2010, pp. 1694-1697.
-
(2010)
Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing
, pp. 1694-1697
-
-
Stamm, M.C.1
Tjoa, S.K.2
Lin, W.S.3
Liu, K.J.R.4
-
11
-
-
78651088596
-
Undetectable image tampering through JPEG compression antiforensics
-
Sept.
-
M.C. Stamm, S.K. Tjoa, W.S. Lin, and K.J.R. Liu, "Undetectable image tampering through JPEG compression antiforensics," in Proceedings of IEEE International Conference on Image Processing, Sept. 2010, pp. 2109-2112.
-
(2010)
Proceedings of IEEE International Conference on Image Processing
, pp. 2109-2112
-
-
Stamm, M.C.1
Tjoa, S.K.2
Lin, W.S.3
Liu, K.J.R.4
-
12
-
-
84856278454
-
Countering JPEG anti-forensics
-
Sept.
-
G. Valenzise, V. Nobile, M. Tagliasacchi, and S. Tubaro, "Countering JPEG anti-forensics," in Proceedings of IEEE International Conference on Image Processing, Sept. 2011, pp. 1949 -1952.
-
(2011)
Proceedings of IEEE International Conference on Image Processing
, pp. 1949-1952
-
-
Valenzise, G.1
Nobile, V.2
Tagliasacchi, M.3
Tubaro, S.4
-
14
-
-
79955702502
-
Libsvm: A library for support vector machines
-
Software
-
C. Chang and C. Lin, "Libsvm: A library for support vector machines," ACM Transactions on Intelligent Systems and Technology, vol. 2, pp. 27:1-27:27, 2011, Software available at http://www.csie.ntu.edu.tw/~cjlin/ libsvm.
-
(2011)
ACM Transactions on Intelligent Systems and Technology
, vol.2
, pp. 271-2727
-
-
Chang, C.1
Lin, C.2
|