메뉴 건너뛰기




Volumn 1, Issue , 2013, Pages 167-200

Information forensics: An overview of the first decade

Author keywords

Anti forensics; Information forensics; Multimedia fingerprint; Tampering detection

Indexed keywords

INFORMATION TECHNOLOGY; PATTERN RECOGNITION;

EID: 84888386204     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2013.2260814     Document Type: Article
Times cited : (362)

References (179)
  • 2
    • 11844303521 scopus 로고    scopus 로고
    • Group-oriented-ngerprinting for multimedia forensics
    • Oct.
    • Z. Wang, M. Wu, W. Trappe, and K. J. R. Liu, "Group-oriented- ngerprinting for multimedia forensics," EURASIP J. Appl. Signal Process., vol. 2004, pp. 2153-2173, Oct. 2004.
    • (2004) EURASIP J. Appl. Signal Process. , vol.2004 , pp. 2153-2173
    • Wang, Z.1    Wu, M.2    Trappe, W.3    Liu, K.J.R.4
  • 4
    • 33847671791 scopus 로고    scopus 로고
    • Image manipulation detection
    • S. Bayram, I. Avcibas, B. Sankur, and N. Memon, "Image manipulation detection," J. Electron. Imag., vol. 15, no. 4, pp. 041102-1-041102-17, 2006.
    • (2006) J. Electron. Imag. , vol.15 , Issue.4 , pp. 0411021-04110217
    • Bayram, S.1    Avcibas, I.2    Sankur, B.3    Memon, N.4
  • 6
    • 4344600402 scopus 로고    scopus 로고
    • Blind detection of photomontage using higher order statistics
    • May
    • T.-T. Ng, S.-F. Chang, and Q. Sun, "Blind detection of photomontage using higher order statistics," in Proc. Int. Symp. Circuits Syst., vol. 5. May 2004, pp. V-688-V-691.
    • (2004) Proc. Int. Symp. Circuits Syst. , vol.5
    • Ng, T.-T.1    Chang, S.-F.2    Sun, Q.3
  • 7
    • 34250373244 scopus 로고    scopus 로고
    • Image splicing detection using 2-d phase congruency and statistical moments of characteristic function
    • W. Chen, Y. Q. Shi, and W. Su, "Image splicing detection using 2-D phase congruency and statistical moments of characteristic function," in Proc. SPIE Security, Steganogr. 9th Watermarking Multimedia Contents, vol. 6505, 2007, pp. 65050R-1-65050R-8.
    • (2007) Proc. SPIE Security, Steganogr. 9th Watermarking Multimedia Contents , vol.6505
    • Chen, W.1    Shi, Y.Q.2    Su, W.3
  • 9
    • 84954462362 scopus 로고    scopus 로고
    • Higher-order wavelet statistics and their application to digital forensics
    • Jun.
    • H. Farid and S. Lyu, "Higher-order wavelet statistics and their application to digital forensics," in Proc. Conf. Comput. Vis. Pattern Recognit. Workshop, vol. 8. Jun. 2003, p. 94.
    • (2003) Proc. Conf. Comput. Vis. Pattern Recognit. Workshop , vol.8 , pp. 94
    • Farid, H.1    Lyu, S.2
  • 10
    • 13244253845 scopus 로고    scopus 로고
    • How realistic is photorealistic
    • Feb.
    • S. Lyu and H. Farid, "How realistic is photorealistic," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 845-850, Feb. 2005.
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.2 , pp. 845-850
    • Lyu, S.1    Farid, H.2
  • 16
    • 34247636825 scopus 로고    scopus 로고
    • Detecting image splicing using geometry invariants and camera characteristics consistency
    • Jul.
    • Y.-F. Hsu and S.-F. Chang, "Detecting image splicing using geometry invariants and camera characteristics consistency," in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2006, pp. 549-552.
    • (2006) Proc. IEEE Int. Conf. Multimedia Expo , pp. 549-552
    • Hsu, Y.-F.1    Chang, S.-F.2
  • 17
    • 78649395962 scopus 로고    scopus 로고
    • Camera response functions for image forensics: An automatic algorithm for splicing detection
    • Dec.
    • Y.-F. Hsu and S.-F. Chang, "Camera response functions for image forensics: An automatic algorithm for splicing detection," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 816-825, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 816-825
    • Hsu, Y.-F.1    Chang, S.-F.2
  • 19
    • 67349211082 scopus 로고    scopus 로고
    • Using noise inconsistencies for blind image forensics
    • B. Mahdian and S. Saic, "Using noise inconsistencies for blind image forensics," Image Vis. Comput., vol. 27, no. 10, pp. 1497-1503, 2009.
    • (2009) Image Vis. Comput. , vol.27 , Issue.10 , pp. 1497-1503
    • Mahdian, B.1    Saic, S.2
  • 21
    • 84863669377 scopus 로고    scopus 로고
    • Exposing image splicing with inconsistent local noise variances
    • Apr.
    • X. Pan, X. Zhang, and S. Lyu, "Exposing image splicing with inconsistent local noise variances," in Proc. IEEE Int. Conf. Comput. Photogr., Apr. 2012, pp. 1-10.
    • (2012) Proc. IEEE Int. Conf. Comput. Photogr. , pp. 1-10
    • Pan, X.1    Zhang, X.2    Lyu, S.3
  • 22
    • 77955707653 scopus 로고    scopus 로고
    • Forensic detection of image manipulation using statistical intrinsic-ngerprints
    • Sep.
    • M. C. Stamm and K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic-ngerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492-506, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 492-506
    • Stamm, M.C.1    Liu, K.J.R.2
  • 24
    • 58149235809 scopus 로고    scopus 로고
    • A sorted neighborhood approach for detecting duplicated regions in image forgeries based on dwt and svd
    • Jul.
    • G. Li, Q. Wu, D. Tu, and S. Sun, "A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD," in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2007, pp. 1750-1753.
    • (2007) Proc. IEEE Int. Conf. Multimedia Expo , pp. 1750-1753
    • Li, G.1    Wu, Q.2    Tu, D.3    Sun, S.4
  • 25
    • 27844542239 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting duplicated image regions
    • Dartmouth College Private Ivy League Res. Univ., Dartmouth, NH, USA, Tech. Rep. TR2004-515
    • A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Dept. Comput. Sci., Dartmouth College Private Ivy League Res. Univ., Dartmouth, NH, USA, Tech. Rep. TR2004-515, 2004.
    • (2004) Dept. Comput. Sci.
    • Popescu, A.C.1    Farid, H.2
  • 26
    • 34147142845 scopus 로고    scopus 로고
    • Robust detection of region-duplication forgery in digital image
    • Aug.
    • W. Luo, J. Huang, and G. Qiu, "Robust detection of region-duplication forgery in digital image," in Proc. Int. Conf. Pattern Recognit., vol. 4. Aug. 2006, pp. 746-749.
    • (2006) Proc. Int. Conf. Pattern Recognit. , vol.4 , pp. 746-749
    • Luo, W.1    Huang, J.2    Qiu, G.3
  • 28
    • 34547689478 scopus 로고    scopus 로고
    • Detection of copy move forgery using a method based on blur moment invariants
    • B. Mahdian and S. Saic, "Detection of copy.move forgery using a method based on blur moment invariants," Forensic Sci. Int., vol. 171, nos. 2-3, pp. 180-189, 2007.
    • (2007) Forensic Sci. Int. , vol.171 , Issue.2-3 , pp. 180-189
    • Mahdian, B.1    Saic, S.2
  • 30
    • 3042535216 scopus 로고    scopus 로고
    • Distinctive image features from scale-invariant keypoints
    • Nov.
    • D. G. Lowe, "Distinctive image features from scale-invariant keypoints," Int. J. Comput. Vis., vol. 60, no. 2, pp. 91-110, Nov. 2004.
    • (2004) Int. J. Comput. Vis. , vol.60 , Issue.2 , pp. 91-110
    • Lowe, D.G.1
  • 31
    • 78649426066 scopus 로고    scopus 로고
    • Region duplication detection using image feature matching
    • Dec.
    • X. Pan and S. Lyu, "Region duplication detection using image feature matching," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 857-867, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 857-867
    • Pan, X.1    Lyu, S.2
  • 32
  • 33
    • 13244251141 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting traces of resampling
    • Feb.
    • A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005.
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.2 , pp. 758-767
    • Popescu, A.C.1    Farid, H.2
  • 34
    • 56749171108 scopus 로고    scopus 로고
    • Fast and reliable resampling detection by spectral analysis of-xed linear predictor residue
    • M. Kirchner, "Fast and reliable resampling detection by spectral analysis of-xed linear predictor residue," in Proc. 10th ACMWorkshop Multimedia Security, 2008, pp. 11-20.
    • (2008) Proc. 10th ACMWorkshop Multimedia Security , pp. 11-20
    • Kirchner, M.1
  • 36
    • 84938576712 scopus 로고    scopus 로고
    • Detection of linear and cubic interpolation in jpeg compressed images
    • May
    • A. C. Gallagher, "Detection of linear and cubic interpolation in JPEG compressed images," in Proc. Can. Conf. Comput. Robot Vis., May 2005, pp. 65-72.
    • (2005) Proc. Can. Conf. Comput. Robot Vis. , pp. 65-72
    • Gallagher, A.C.1
  • 37
    • 49549116860 scopus 로고    scopus 로고
    • Blind authentication using periodic properties of interpolation
    • Sep.
    • B. Mahdian and S. Saic, "Blind authentication using periodic properties of interpolation," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 529-538, Sep. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.3 , pp. 529-538
    • Mahdian, B.1    Saic, S.2
  • 38
    • 69949189564 scopus 로고    scopus 로고
    • Blind forensics of contrast enhancement in digital images
    • Oct.
    • M. Stamm and K. J. R. Liu, "Blind forensics of contrast enhancement in digital images," in Proc. IEEE Int. Conf. Image Process., Oct. 2008, pp. 3112-3115.
    • (2008) Proc. IEEE Int. Conf. Image Process. , pp. 3112-3115
    • Stamm, M.1    Liu, K.J.R.2
  • 39
    • 78049407658 scopus 로고    scopus 로고
    • Forensic estimation and reconstruction of a contrast enhancement mapping
    • Mar.
    • M. C. Stamm and K. J. R. Liu, "Forensic estimation and reconstruction of a contrast enhancement mapping," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., Mar. 2010, pp. 1698-1701.
    • (2010) Proc. IEEE Int. Conf. Acoust. Speech Signal Process. , pp. 1698-1701
    • Stamm, M.C.1    Liu, K.J.R.2
  • 40
    • 0023330781 scopus 로고
    • Streaking in median-ltered images
    • Apr.
    • A. Bovik, "Streaking in median-ltered images," IEEE Trans. Acoust., Speech Signal Process., vol. 35, no. 4, pp. 493-503, Apr. 1987.
    • (1987) IEEE Trans. Acoust., Speech Signal Process. , vol.35 , Issue.4 , pp. 493-503
    • Bovik, A.1
  • 43
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Jun.
    • T. Pevny, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevny, T.1    Bas, P.2    Fridrich, J.3
  • 44
    • 82055176931 scopus 로고    scopus 로고
    • Blind forensics of median-ltering in digital images
    • Dec
    • H.-D. Yuan, "Blind forensics of median-ltering in digital images," IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1335-1345, Dec. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.4 , pp. 1335-1345
    • Yuan, H.-D.1
  • 46
    • 0038005383 scopus 로고    scopus 로고
    • Identification of bitmap compression history: Jpeg detection and quantizer estimation
    • Feb.
    • Z. Fan and R. De Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Trans. Image Process., vol. 12, no. 2, pp. 230-235, Feb. 2003.
    • (2003) IEEE Trans. Image Process. , vol.12 , Issue.2 , pp. 230-235
    • Fan, Z.1    De Queiroz, R.2
  • 47
    • 69749097361 scopus 로고    scopus 로고
    • Digital image source coder forensics via intrinsic-ngerprints
    • Sep.
    • W. S. Lin, S. K. Tjoa, H. V. Zhao, and K. J. Ray Liu, "Digital image source coder forensics via intrinsic-ngerprints," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 460-475, Sep. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.3 , pp. 460-475
    • Lin, W.S.1    Tjoa, S.K.2    Zhao, H.V.3    Ray Liu, K.J.4
  • 49
    • 48149105475 scopus 로고    scopus 로고
    • Transform coder classification for digital image forensics
    • Oct.
    • S. Tjoa, W. S. Lin, and K. J. R. Liu, "Transform coder classification for digital image forensics," in Proc. IEEE Int. Conf. Image Process., vol. 6. Oct. 2007, pp. 105-108.
    • (2007) Proc. IEEE Int. Conf. Image Process. , vol.6 , pp. 105-108
    • Tjoa, S.1    Lin, W.S.2    Liu, K.J.R.3
  • 50
    • 33847714243 scopus 로고    scopus 로고
    • Estimation of primary quantization matrix in double compressed jpeg images
    • Aug.
    • J. Luka and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," in Proc. Digital Forensic Res. Workshop, Aug. 2003, pp. 5-8.
    • (2003) Proc. Digital Forensic Res. Workshop , pp. 5-8
    • Luka, J.1    Fridrich, J.2
  • 52
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression in jpeg images for applications in steganography
    • Jun.
    • T. Pevny and J. Fridrich, "Detection of double-compression in JPEG images for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.2 , pp. 247-258
    • Pevny, T.1    Fridrich, J.2
  • 53
    • 78649396720 scopus 로고    scopus 로고
    • Detecting double jpeg compression with the same quantization matrix
    • Dec.
    • F. Huang, J. Huang, and Y. Q. Shi, "Detecting double JPEG compression with the same quantization matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 848-856, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 848-856
    • Huang, F.1    Huang, J.2    Shi, Y.Q.3
  • 55
    • 58049107658 scopus 로고    scopus 로고
    • Detecting doubly compressed jpeg images by using mode based-rst digit features
    • Oct.
    • B. Li, Y. Q. Shi, and J. Huang, "Detecting doubly compressed JPEG images by using mode based-rst digit features," in Proc. IEEE Workshop Multimedia Signal Process., Oct. 2008, pp. 730-735.
    • (2008) Proc. IEEE Workshop Multimedia Signal Process. , pp. 730-735
    • Li, B.1    Shi, Y.Q.2    Huang, J.3
  • 56
    • 33745830178 scopus 로고    scopus 로고
    • Detecting doctored jpeg images via dct coefficient analysis
    • Mar.
    • J. He, Z. Lin, L.Wang, and X. Tang, "Detecting doctored JPEG images via DCT coefficient analysis," in Proc. Comput. Vis..ECCV, vol. 3953. Mar. 2006, pp. 423-435.
    • (2006) Proc. Comput. Vis..ECCV , vol.3953 , pp. 423-435
    • He, J.1    Lin, Z.2    Wang, L.3    Tang, X.4
  • 57
    • 67649410199 scopus 로고    scopus 로고
    • Fast, automatic and-ne-grained tampered jpeg image detection via dct coefficient analysis
    • Z. Lin, J. He, X. Tang, and C.-K. Tang, "Fast, automatic and-ne-grained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognit., vol. 42, no. 11, pp. 2492-2501, 2009.
    • (2009) Pattern Recognit. , vol.42 , Issue.11 , pp. 2492-2501
    • Lin, Z.1    He, J.2    Tang, X.3    Tang, C.-K.4
  • 58
    • 79957470147 scopus 로고    scopus 로고
    • Detecting recompression of jpeg images via periodicity analysis of compression artifacts for tampering detection
    • Jun
    • Y.-L. Chen and C.-T. Hsu, "Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 396-406, Jun. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.2 , pp. 396-406
    • Chen, Y.-L.1    Hsu, C.-T.2
  • 59
    • 84858394859 scopus 로고    scopus 로고
    • Detection of nonaligned double jpeg compression based on integer periodicity maps
    • Apr
    • T. Bianchi and A. Piva, "Detection of nonaligned double JPEG compression based on integer periodicity maps," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 842-848, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 842-848
    • Bianchi, T.1    Piva, A.2
  • 60
    • 84861122288 scopus 로고    scopus 로고
    • Image forgery localization via block-grained analysis of jpeg artifacts
    • Jun
    • T. Bianchi and A. Piva, "Image forgery localization via block-grained analysis of JPEG artifacts," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1003-1017, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 1003-1017
    • Bianchi, T.1    Piva, A.2
  • 61
    • 60449117421 scopus 로고    scopus 로고
    • Exposing digital forgeries from jpeg ghosts
    • Mar.
    • H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 154-160
    • Farid, H.1
  • 62
    • 67349284349 scopus 로고    scopus 로고
    • Passive detection of doctored jpeg image via block artifact grid extraction
    • W. Li, Y. Yuan, and N. Yu, "Passive detection of doctored JPEG image via block artifact grid extraction," Signal Process., vol. 89, no. 9, pp. 1821-1829, 2009.
    • (2009) Signal Process. , vol.89 , Issue.9 , pp. 1821-1829
    • Li, W.1    Yuan, Y.2    Yu, N.3
  • 63
    • 46449089083 scopus 로고    scopus 로고
    • Detecting digital image forgeries by measuring inconsistencies of blocking artifact
    • Jul.
    • S. Ye, Q. Sun, and E.-C. Chang, "Detecting digital image forgeries by measuring inconsistencies of blocking artifact," in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2007, pp. 12-15.
    • (2007) Proc. IEEE Int. Conf. Multimedia Expo , pp. 12-15
    • Ye, S.1    Sun, Q.2    Chang, E.-C.3
  • 64
    • 77956003150 scopus 로고    scopus 로고
    • Identification of cut & paste tampering by means of double-jpeg detection and image segmentation
    • Jun.
    • M. Barni, A. Costanzo, and L. Sabatini, "Identification of cut & paste tampering by means of double-JPEG detection and image segmentation," in Proc. IEEE Int. Symp. Circuits Syst., Jun. 2010, pp. 1687-1690.
    • (2010) Proc. IEEE Int. Symp. Circuits Syst. , pp. 1687-1690
    • Barni, M.1    Costanzo, A.2    Sabatini, L.3
  • 66
    • 70449629685 scopus 로고    scopus 로고
    • Exposing digital forgeries in video by detecting double quantization
    • W. Wang and H. Farid, "Exposing digital forgeries in video by detecting double quantization," in Proc. 11th ACM Workshop Multimedia Security, 2009, pp. 39-48.
    • (2009) Proc. 11th ACM Workshop Multimedia Security , pp. 39-48
    • Wang, W.1    Farid, H.2
  • 67
    • 33750927408 scopus 로고    scopus 로고
    • Exposing digital forgeries in video by detecting double mpeg compression
    • W. Wang and H. Farid, "Exposing digital forgeries in video by detecting double MPEG compression," in Proc. 8th Workshop Multimedia Security, 2006, pp. 37-47.
    • (2006) Proc. 8th Workshop Multimedia Security , pp. 37-47
    • Wang, W.1    Farid, H.2
  • 68
    • 84864056133 scopus 로고    scopus 로고
    • Temporal forensics and anti-forensics for motion compensated video
    • Aug
    • M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Temporal forensics and anti-forensics for motion compensated video," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1315-1329, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1315-1329
    • Stamm, M.C.1    Lin, W.S.2    Liu, K.J.R.3
  • 69
    • 33748068816 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting inconsistencies in lighting
    • M. K. Johnson and H. Farid, "Exposing digital forgeries by detecting inconsistencies in lighting," in Proc. 7th Workshop Multimedia Security, 2005, pp. 1-10.
    • (2005) Proc. 7th Workshop Multimedia Security , pp. 1-10
    • Johnson, M.K.1    Farid, H.2
  • 70
    • 34548056428 scopus 로고    scopus 로고
    • Exposing digital forgeries in complex lighting environments
    • Sep.
    • M. K. Johnson and H. Farid, "Exposing digital forgeries in complex lighting environments," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 450-461, Sep. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.3 , pp. 450-461
    • Johnson, M.K.1    Farid, H.2
  • 71
    • 49949111385 scopus 로고    scopus 로고
    • Exposing digital forgeries through specular highlights on the eye
    • M. K. Johnson and H. Farid, "Exposing digital forgeries through specular highlights on the eye," in Proc. Inf. Hiding, vol. 4567. 2007, pp. 311-325.
    • (2007) Proc. Inf. Hiding , vol.4567 , pp. 311-325
    • Johnson, M.K.1    Farid, H.2
  • 73
    • 33847748167 scopus 로고    scopus 로고
    • Non-intrusive component forensics of visual sensors using output images
    • Mar.
    • A. Swaminathan, M. Wu, and K. J. R. Liu, "Non-intrusive component forensics of visual sensors using output images," IEEE Trans. Inf. Forensics Security, vol. 2, no. 1, pp. 91-106, Mar. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.1 , pp. 91-106
    • Swaminathan, A.1    Wu, M.2    Liu, K.J.R.3
  • 75
    • 0032207493 scopus 로고    scopus 로고
    • Capturing images with digital still cameras
    • Nov.-Dec.
    • S. Kawamura, "Capturing images with digital still cameras," IEEE Micro, vol. 18, no. 6, pp. 14-19, Nov.-Dec. 1998.
    • (1998) IEEE Micro , vol.18 , Issue.6 , pp. 14-19
    • Kawamura, S.1
  • 76
    • 85076037513 scopus 로고
    • Interaction between color plane interpolation and other image processing functions in electronic photography
    • Feb.
    • J. Adams, "Interaction between color plane interpolation and other image processing functions in electronic photography," in Proc. SPIE, Cameras Syst. Electron. Photogr. Sci. Imag., vol. 2416. Feb. 1995, pp. 144-151.
    • (1995) Proc. SPIE, Cameras Syst. Electron. Photogr. Sci. Imag. , vol.2416 , pp. 144-151
    • Adams, J.1
  • 77
    • 0032207538 scopus 로고    scopus 로고
    • Color processing in digital cameras
    • Nov.-Dec.
    • J. Adams, K. Parulski, and K. Spaulding, "Color processing in digital cameras," Proc. IEEE, vol. 18, no. 6, pp. 20-30, Nov.-Dec. 1998.
    • (1998) Proc. IEEE , vol.18 , Issue.6 , pp. 20-30
    • Adams, J.1    Parulski, K.2    Spaulding, K.3
  • 78
    • 27844493797 scopus 로고    scopus 로고
    • Exposing digital forgeries in color-lter array interpolated images
    • Oct.
    • A. C. Popescu and H. Farid, "Exposing digital forgeries in color-lter array interpolated images," IEEE Trans. Signal Process., vol. 53, no. 10, pp. 3948-3959, Oct. 2005.
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.10 , pp. 3948-3959
    • Popescu, A.C.1    Farid, H.2
  • 79
    • 44049088600 scopus 로고    scopus 로고
    • Component forensics of digital cameras: A non-intrusive approach
    • Mar.
    • A. Swaminathan, M. Wu, and K. J. Ray Liu, "Component forensics of digital cameras: A non-intrusive approach," in Proc. Conf. Inf. Sci. Syst., Mar. 2006, pp. 1-6.
    • (2006) Proc. Conf. Inf. Sci. Syst. , pp. 1-6
    • Swaminathan, A.1    Wu, M.2    Ray Liu, K.J.3
  • 80
    • 84869484544 scopus 로고    scopus 로고
    • Robustness of color interpolation identification against anti-forensic operations
    • May
    • W.-H. Chuang and M. Wu, "Robustness of color interpolation identification against anti-forensic operations," in Proc. Inf. Hiding Workshop, May 2012, pp. 16-30.
    • (2012) Proc. Inf. Hiding Workshop , pp. 16-30
    • Chuang, W.-H.1    Wu, M.2
  • 81
    • 70450271108 scopus 로고    scopus 로고
    • Accurate detection of demosaicing regularity for digital image forensics
    • Dec.
    • H. Cao and A. C. Kot, "Accurate detection of demosaicing regularity for digital image forensics," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 899-910, Dec. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.4 , pp. 899-910
    • Cao, H.1    Kot, A.C.2
  • 83
    • 46449086633 scopus 로고    scopus 로고
    • Improvements on source camera-model identification based on cfa interpolation
    • Jan.
    • S. Bayram, H. T. Sencar, and N. Memon, "Improvements on source camera-model identification based on CFA interpolation," in Proc. Int. Conf. Digital Forensics, Jan. 2006, pp. 1-9.
    • (2006) Proc. Int. Conf. Digital Forensics , pp. 1-9
    • Bayram, S.1    Sencar, H.T.2    Memon, N.3
  • 84
    • 33744736314 scopus 로고    scopus 로고
    • Digital camera identification from sensor pattern noise
    • Jun.
    • J. Luka, J. Fridrich, and M. Goljan, "Digital camera identification from sensor pattern noise," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 205-214, Jun. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.2 , pp. 205-214
    • Luka, J.1    Fridrich, J.2    Goljan, M.3
  • 85
    • 85032752368 scopus 로고    scopus 로고
    • Digital image forensics using sensor noise
    • Mar.
    • J. Fridrich, "Digital image forensics using sensor noise," IEEE Signal Proc. Mag., vol. 26, no. 2, pp. 26-37, Mar. 2009.
    • (2009) IEEE Signal Proc. Mag. , vol.26 , Issue.2 , pp. 26-37
    • Fridrich, J.1
  • 86
    • 77952591585 scopus 로고    scopus 로고
    • Source camera identification using enhanced sensor pattern noise
    • Jun.
    • C..T. Li, "Source camera identification using enhanced sensor pattern noise," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 280-287, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 280-287
    • Li, C.T.1
  • 87
    • 34548294226 scopus 로고    scopus 로고
    • Source digital camcorder identification using sensor photo-response nonuniformity
    • Jan.
    • M. Chen, J. Fridrich, M. Goljan, and J. Lukas, "Source digital camcorder identification using sensor photo-response nonuniformity," Proc. SPIE Int. Soc. Opt. Eng., vol. 6505, p. 65051G, Jan. 2007.
    • (2007) Proc. SPIE Int. Soc. Opt. Eng. , vol.6505
    • Chen, M.1    Fridrich, J.2    Goljan, M.3    Lukas, J.4
  • 89
    • 84856241325 scopus 로고    scopus 로고
    • Exploring compression effects for improved source camera identification using strongly compressed video
    • Sep.
    • W.-H. Chuang, H. Su, and M. Wu, "Exploring compression effects for improved source camera identification using strongly compressed video," in Proc. IEEE Int. Conf. Image Process., Sep. 2011, pp. 1953-1956.
    • (2011) Proc. IEEE Int. Conf. Image Process. , pp. 1953-1956
    • Chuang, W.-H.1    Su, H.2    Wu, M.3
  • 90
    • 77949794850 scopus 로고    scopus 로고
    • Camera response function signature for digital forensics part i: Theory and data selection and part II: Signature extraction
    • Dec.
    • T.-T. Ng and M.-P. Tsui, "Camera response function signature for digital forensics.Part I: Theory and data selection and Part II: Signature extraction," in Proc. IEEEWorkshop Inf. Forensics Security, Dec. 2009, pp. 156-160.
    • (2009) Proc. IEEEWorkshop Inf. Forensics Security , pp. 156-160
    • Ng, T.-T.1    Tsui, M.-P.2
  • 93
    • 60449090714 scopus 로고    scopus 로고
    • Scanner identification using feature-based processing and analysis
    • Mar.
    • N. Khanna, A. K. Mikkilineni, and E. J. Delp, "Scanner identification using feature-based processing and analysis," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 123-139, Mar. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 123-139
    • Khanna, N.1    Mikkilineni, A.K.2    Delp, E.J.3
  • 94
    • 69749111736 scopus 로고    scopus 로고
    • Intrinsic sensor noise features for forensic analysis on scanners and scanned images
    • Sep.
    • H. Gou, A. Swaminathan, and M. Wu, "Intrinsic sensor noise features for forensic analysis on scanners and scanned images," IEEE Trans. Info. Forensics Security, vol. 4, no. 3, pp. 476-491, Sep. 2009.
    • (2009) IEEE Trans. Info. Forensics Security , vol.4 , Issue.3 , pp. 476-491
    • Gou, H.1    Swaminathan, A.2    Wu, M.3
  • 98
    • 77951971717 scopus 로고    scopus 로고
    • Image tamper detection based on demosaicing artifacts
    • Nov.
    • A. E. Dirik and N. Memon, "Image tamper detection based on demosaicing artifacts," in Proc. IEEE Int. Conf. Image Process., Nov. 2009, pp. 1497-1500.
    • (2009) Proc. IEEE Int. Conf. Image Process. , pp. 1497-1500
    • Dirik, A.E.1    Memon, N.2
  • 100
    • 39449103666 scopus 로고    scopus 로고
    • Digital image forensics via intrinsic-ngerprints
    • Mar.
    • A. Swaminathan, M. Wu, and K. J. R. Liu, "Digital image forensics via intrinsic-ngerprints," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101-117, Mar. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.1 , pp. 101-117
    • Swaminathan, A.1    Wu, M.2    Liu, K.J.R.3
  • 102
    • 33645671569 scopus 로고    scopus 로고
    • Detecting digital image forgeries using sensor pattern noise
    • J. Luka, J. Fridrich, and M. Goljan, "Detecting digital image forgeries using sensor pattern noise," in Proc. SPIE Electron. Imag., vol. 6072. 2006, p. 60720Y.
    • (2006) Proc. SPIE Electron. Imag. , vol.6072
    • Luka, J.1    Fridrich, J.2    Goljan, M.3
  • 103
    • 39449126219 scopus 로고    scopus 로고
    • Determining image origin and integrity using sensor noise
    • Mar.
    • M. Chen, J. Fridrich, M. Goljan, and J. Luka, "Determining image origin and integrity using sensor noise," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74-90, Mar. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.1 , pp. 74-90
    • Chen, M.1    Fridrich, J.2    Goljan, M.3    Luka, J.4
  • 104
    • 48149112790 scopus 로고    scopus 로고
    • Noise features for image tampering detection and steganalysis
    • Sep.
    • H. Gou, A. Swaminathan, and M.Wu, "Noise features for image tampering detection and steganalysis," in Proc. IEEE Int. Conf. Image Process., Sep. 2007, pp. 97-100.
    • (2007) Proc. IEEE Int. Conf. Image Process. , pp. 97-100
    • Gou, H.1    Swaminathan, A.2    Wu, M.3
  • 106
    • 84878170594 scopus 로고    scopus 로고
    • NPR, ( [Online]. Available
    • NPR, (2009). Visualizing the U.S. Electric Grid [Online]. Available: http://www.npr.org/templates/story/story.php?storyId=110997398
    • (2009) Visualizing the U.S. Electric Grid
  • 108
    • 33947379497 scopus 로고    scopus 로고
    • Applications of enf criterion in forensics: Audio, video, computer and telecommunication analysis
    • C. Grigoras, "Applications of ENF criterion in forensics: Audio, video, computer and telecommunication analysis," Forensic Sci. Int., vol. 167, nos. 2-3, pp. 136-145, 2007.
    • (2007) Forensic Sci. Int. , vol.167 , Issue.2-3 , pp. 136-145
    • Grigoras, C.1
  • 109
    • 84455192720 scopus 로고    scopus 로고
    • Seeing' enf: Natural time stamp for digital video via optical sensing and signal processing
    • Nov.
    • R. Garg, A. L. Varna, and M. Wu, "Seeing' ENF: Natural time stamp for digital video via optical sensing and signal processing," in Proc. ACM Multimedia, Nov. 2011, pp. 1-10.
    • (2011) Proc. ACM Multimedia , pp. 1-10
    • Garg, R.1    Varna, A.L.2    Wu, M.3
  • 110
    • 84863919973 scopus 로고    scopus 로고
    • Enf extraction from digital recordings using adaptive techniques and frequency tracking
    • Aug
    • O. Ojowu, J. Karlsson, J. Li, and Y. Liu, "ENF extraction from digital recordings using adaptive techniques and frequency tracking," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1330-1338, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1330-1338
    • Ojowu, O.1    Karlsson, J.2    Li, J.3    Liu, Y.4
  • 114
    • 77955689262 scopus 로고    scopus 로고
    • Audio authenticity: Detecting enf discontinuity with high precision phase analysis
    • Sep.
    • D. Rodriguez, J. Apolinario, and L. Biscainho, "Audio authenticity: Detecting ENF discontinuity with high precision phase analysis," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 534-543, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 534-543
    • Rodriguez, D.1    Apolinario, J.2    Biscainho, L.3
  • 116
    • 56749180518 scopus 로고    scopus 로고
    • Hiding traces of resampling in digital images
    • Dec.
    • M. Kirchner and R. Bohme, "Hiding traces of resampling in digital images," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 582-592, Dec. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.4 , pp. 582-592
    • Kirchner, M.1    Bohme, R.2
  • 117
    • 80051605162 scopus 로고    scopus 로고
    • Anti-forensics of digital image compression
    • Sep
    • M. C. Stamm and K. J. R. Liu, "Anti-forensics of digital image compression," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 1050-1065, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 1050-1065
    • Stamm, M.C.1    Liu, K.J.R.2
  • 119
  • 120
  • 123
    • 79951834941 scopus 로고    scopus 로고
    • Defending against-ngerprint-copy attack in sensor-based camera identification
    • Mar
    • M. Goljan, J. Fridrich, and M. Chen, "Defending against-ngerprint- copy attack in sensor-based camera identification," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 227-236, Mar. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.1 , pp. 227-236
    • Goljan, M.1    Fridrich, J.2    Chen, M.3
  • 124
    • 80051649252 scopus 로고    scopus 로고
    • Anti-forensics for frame deletion/addition in mpeg video
    • May
    • S. Lai and R. Bohme, "Anti-forensics for frame deletion/addition in MPEG video," in Proc. Inf. Hiding Conf., May 2011, pp. 1876-1879.
    • (2011) Proc. Inf. Hiding Conf. , pp. 1876-1879
    • Lai, S.1    Bohme, R.2
  • 127
    • 84873669138 scopus 로고    scopus 로고
    • The source identification game: An informationtheoretic perspective
    • Mar.
    • M. Barni and B. Tondi, "The source identification game: An informationtheoretic perspective," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 450-463, Mar. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.3 , pp. 450-463
    • Barni, M.1    Tondi, B.2
  • 129
    • 85032751604 scopus 로고    scopus 로고
    • Collusion resistant-ngerprinting for multimedia
    • Mar.
    • M. Wu, W. Trappe, Z. Wang, and K. J. R. Liu, "Collusion resistant-ngerprinting for multimedia," IEEE Signal Process. Mag., vol. 21, no. 2, pp. 15-27, Mar. 2004.
    • (2004) IEEE Signal Process. Mag. , vol.21 , Issue.2 , pp. 15-27
    • Wu, M.1    Trappe, W.2    Wang, Z.3    Liu, K.J.R.4
  • 130
  • 131
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • Dec.
    • I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Proc., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
    • (1997) IEEE Trans. Image Proc. , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.1    Kilian, J.2    Leighton, F.3    Shamoon, T.4
  • 132
    • 0032072279 scopus 로고    scopus 로고
    • Image adaptive watermarking using visual models
    • May
    • C. Podilchuk and W. Zeng, "Image adaptive watermarking using visual models," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 525-539, May 1998.
    • (1998) IEEE J. Sel. Areas Commun. , vol.16 , Issue.4 , pp. 525-539
    • Podilchuk, C.1    Zeng, W.2
  • 133
    • 0035335388 scopus 로고    scopus 로고
    • Rotation, scale, and translation resilient public watermarking for images
    • May
    • C.-Y. Lin, M. Wu, Y.-M. Lui, J. A. Bloom, M. L. Miller, and I. J. Cox, "Rotation, scale, and translation resilient public watermarking for images," IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.5 , pp. 767-782
    • Lin, C.-Y.1    Wu, M.2    Lui, Y.-M.3    Bloom, J.A.4    Miller, M.L.5    Cox, I.J.6
  • 134
    • 0242408710 scopus 로고    scopus 로고
    • Robust, content-dependent, high-delity watermark for tracking in digital cinema
    • Jan.
    • J. Lubin, J. Bloom, and H. Cheng, "Robust, content-dependent, high-delity watermark for tracking in digital cinema," in Proc. Security Watermarking Multimedia Contents, SPIE, vol. 5020, Jan. 2003, pp. 536-545.
    • (2003) Proc. Security Watermarking Multimedia Contents, SPIE , vol.5020 , pp. 536-545
    • Lubin, J.1    Bloom, J.2    Cheng, H.3
  • 135
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 136
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • Mar.
    • P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.A.2
  • 137
  • 138
    • 27844562245 scopus 로고    scopus 로고
    • Data hiding in curves with applications to-ngerprinting maps
    • Oct.
    • H. Gou and M. Wu, "Data hiding in curves with applications to-ngerprinting maps," IEEE Trans. Signal Proc., vol. 53, no. 10, pp. 3988-4005, Oct. 2005.
    • (2005) IEEE Trans. Signal Proc. , vol.53 , Issue.10 , pp. 3988-4005
    • Gou, H.1    Wu, M.2
  • 139
    • 84957610906 scopus 로고    scopus 로고
    • A note on the limits of collusionresistant watermarks
    • Jan.
    • F. Ergun, J. Kilian, and R. Kumar, "A note on the limits of collusionresistant watermarks," Eurocrypt Lecture Notes Comput. Sci., vol. 1592, pp. 140-149, Jan. 1999.
    • (1999) Eurocrypt Lecture Notes Comput. Sci. , vol.1592 , pp. 140-149
    • Ergun, F.1    Kilian, J.2    Kumar, R.3
  • 142
    • 20444373301 scopus 로고    scopus 로고
    • Anticollusion forensics of multimedia-ngerprinting using orthogonal modulation
    • Jun.
    • Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, "Anticollusion forensics of multimedia-ngerprinting using orthogonal modulation," IEEE Trans. Image Proc., vol. 14, no. 6, pp. 804-821, Jun. 2005.
    • (2005) IEEE Trans. Image Proc. , vol.14 , Issue.6 , pp. 804-821
    • Wang, Z.J.1    Wu, M.2    Zhao, H.3    Trappe, W.4    Liu, K.J.R.5
  • 143
    • 69749101534 scopus 로고    scopus 로고
    • Performance of orthogonal-ngerprinting codes under worst-case noise
    • Sep.
    • N. Kiyavash and P. Moulin, "Performance of orthogonal-ngerprinting codes under worst-case noise," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 293-301, Sep. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.3 , pp. 293-301
    • Kiyavash, N.1    Moulin, P.2
  • 145
    • 33744722091 scopus 로고    scopus 로고
    • Joint coding and embedding techniques for multimedia-ngerprinting
    • Jun.
    • S. He and M. Wu, "Joint coding and embedding techniques for multimedia-ngerprinting," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 231-247, Jun. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.2 , pp. 231-247
    • He, S.1    Wu, M.2
  • 146
    • 21844449883 scopus 로고    scopus 로고
    • Performance study of ecc-based collusion-resistant multimedia- ngerprinting
    • Mar.
    • S. He and M. Wu, "Performance study of ecc-based collusion-resistant multimedia-ngerprinting," in Proc. 38th CISS, Mar. 2004, pp. 827-832.
    • (2004) Proc. 38th CISS , pp. 827-832
    • He, S.1    Wu, M.2
  • 147
    • 0003538515 scopus 로고    scopus 로고
    • Analysis of attacks on image watermarks with randomized coefficients
    • Princeton, NJ, USA, Tech. Rep.
    • H. S. Stone, "Analysis of attacks on image watermarks with randomized coefficients," NEC Res. Inst. Princeton Univ., Princeton, NJ, USA, Tech. Rep. 96-045, 1996.
    • (1996) NEC Res. Inst. Princeton Univ. , pp. 96-9045
    • Stone, H.S.1
  • 149
    • 18844450187 scopus 로고    scopus 로고
    • Forensic analysis of nonlinear collusion attacks for multimedia- ngerprinting
    • May
    • H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Forensic analysis of nonlinear collusion attacks for multimedia-ngerprinting," IEEE Trans. Image Proc., vol. 14, no. 5, pp. 646-661, May 2005.
    • (2005) IEEE Trans. Image Proc. , vol.14 , Issue.5 , pp. 646-661
    • Zhao, H.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 150
    • 0038527384 scopus 로고    scopus 로고
    • Antificollusion-ngerprinting for multimedia
    • Apr.
    • W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, "Antificollusion- ngerprinting for multimedia," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4 , pp. 1069-1087
    • Trappe, W.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 151
    • 13144275283 scopus 로고    scopus 로고
    • Statistical invisibility for collusion-resistant digital video watermarking
    • Feb.
    • K. Su, D. Kundur, and D. Hatzinakos, "Statistical invisibility for collusion-resistant digital video watermarking," IEEE Trans. Multimedia, vol. 7, no. 1, pp. 43-51, Feb. 2005.
    • (2005) IEEE Trans. Multimedia , vol.7 , Issue.1 , pp. 43-51
    • Su, K.1    Kundur, D.2    Hatzinakos, D.3
  • 152
    • 0032070304 scopus 로고    scopus 로고
    • Multiresolution scenebased video watermarking using perceptual models
    • May
    • M. D. Swanson, B. Zhu, and A. T. Tewfik, "Multiresolution scenebased video watermarking using perceptual models," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 540-550, May 1998.
    • (1998) IEEE J. Sel. Areas Commun. , vol.16 , Issue.4 , pp. 540-550
    • Swanson, M.D.1    Zhu, B.2    Tewfik, A.T.3
  • 153
    • 36348997652 scopus 로고    scopus 로고
    • Collusion-resistant video-ngerprinting for large user group
    • Dec.
    • S. He and M. Wu, "Collusion-resistant video-ngerprinting for large user group," IEEE Trans. Info. Forensics Security, vol. 2, no. 4, pp. 697-709, Dec. 2007.
    • (2007) IEEE Trans. Info. Forensics Security , vol.2 , Issue.4 , pp. 697-709
    • He, S.1    Wu, M.2
  • 154
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure-ngerprinting for digital data
    • Sep.
    • D. Boneh and J. Shaw, "Collusion-secure-ngerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 155
    • 84937541590 scopus 로고    scopus 로고
    • Improved boneh-shaw content-ngerprinting
    • Y. Yacobi, "Improved Boneh-Shaw content-ngerprinting," in Proc. CTRSA Lecture Notes Comput. Sci., vol. 2020, pp. 378-91, 2001.
    • (2001) Proc. CTRSA Lecture Notes Comput. Sci. , vol.2020 , pp. 378-391
    • Yacobi, Y.1
  • 157
    • 56749173460 scopus 로고    scopus 로고
    • On the design and optimization of tardos probabilistic-ngerprinting codes
    • T. Furon, A. Guyader, and F. Cerou, "On the design and optimization of tardos probabilistic-ngerprinting codes," in Proc. Inf. Hiding Workshop, vol. 5284, 2008, pp. 341-356.
    • (2008) Proc. Inf. Hiding Workshop , vol.5284 , pp. 341-356
    • Furon, T.1    Guyader, A.2    Cerou, F.3
  • 158
    • 0000676728 scopus 로고    scopus 로고
    • Combining digital watermarks and collusion secure-ngerprints for digital images
    • Jan.
    • J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, "Combining digital watermarks and collusion secure-ngerprints for digital images,"J. Electron. Imag., vol. 9, pp. 456-467, Jan. 2000.
    • (2000) J. Electron. Imag. , vol.9 , pp. 456-467
    • Dittmann, J.1    Schmitt, P.2    Saar, E.3    Schwenk, J.4    Ueberberg, J.5
  • 159
    • 0037399342 scopus 로고    scopus 로고
    • Digital-ngerprinting codes: Problem statements, constructions, identification of traitors
    • Apr.
    • A. Barg, G. R. Blakley, and G. Kabatiansky, "Digital-ngerprinting codes: Problem statements, constructions, identification of traitors," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 852.-865, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.4 , pp. 852-865
    • Barg, A.1    Blakley, G.R.2    Kabatiansky, G.3
  • 160
    • 84959043688 scopus 로고    scopus 로고
    • Collusion secure q-Ary-ngerprinting for perceptual content
    • Feb.
    • R. Safavi-Naini and Y. Wang, "Collusion secure q-Ary-ngerprinting for perceptual content," Security Privacy Digital Rights Manage., vol. 2320, pp. 57-75, Feb. 2002.
    • (2002) Security Privacy Digital Rights Manage. , vol.2320 , pp. 57-75
    • Safavi-Naini, R.1    Wang, Y.2
  • 161
    • 8844258240 scopus 로고    scopus 로고
    • Efficient watermark detection and collusion security
    • Feb.
    • F. Zane, "Efficient watermark detection and collusion security," in Proc. 4th Int. Conf. Financial Cryptogr., Feb. 2000, pp. 21-32.
    • (2000) Proc. 4th Int. Conf. Financial Cryptogr. , pp. 21-32
    • Zane, F.1
  • 162
    • 0035270516 scopus 로고    scopus 로고
    • Combinatorial properties of frameproof and traceability codes
    • Mar.
    • J. N. Staddon, D. R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1042-1049, Mar. 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.3 , pp. 1042-1049
    • Staddon, J.N.1    Stinson, D.R.2    Wei, R.3
  • 164
    • 30144437180 scopus 로고    scopus 로고
    • Fingerprint multicast for secure video streaming
    • Jan.
    • H. V. Zhao and K. J. R. Liu, "Fingerprint multicast for secure video streaming," IEEE Trans. Image Process., vol. 15, no. 1, pp. 12-29, Jan. 2006.
    • (2006) IEEE Trans. Image Process. , vol.15 , Issue.1 , pp. 12-29
    • Zhao, H.V.1    Liu, K.J.R.2
  • 165
    • 33748105251 scopus 로고    scopus 로고
    • Behavior forensics for scalable multiuser collusion: Fairness versus effectiveness
    • Sep.
    • H. V. Zhao and K. J. R. Liu, "Behavior forensics for scalable multiuser collusion: Fairness versus effectiveness," IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 311-329, Sep. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.3 , pp. 311-329
    • Zhao, H.V.1    Liu, K.J.R.2
  • 166
    • 48149092288 scopus 로고    scopus 로고
    • Multifiuser collusion behavior forensics: Game-theoretic formulation of fairness dynamics
    • Sep.
    • W. S. Lin, H. V. Zhao, and K. J. R. Liu, "Multifiuser collusion behavior forensics: Game-theoretic formulation of fairness dynamics," in Proc. IEEE Int. Conf. Image Process., Sep. 2007, pp. 109-112.
    • (2007) Proc. IEEE Int. Conf. Image Process. , pp. 109-112
    • Lin, W.S.1    Zhao, H.V.2    Liu, K.J.R.3
  • 167
    • 79952971621 scopus 로고    scopus 로고
    • Game-theoretic strategies and equilibriums in multimedia-ngerprinting social networks
    • Apr
    • W. S. Lin, H. V. Zhao, and K. J. R. Liu, "Game-theoretic strategies and equilibriums in multimedia-ngerprinting social networks," IEEE Trans. Multimedia, vol. 13, no. 2, pp. 191-205, Apr. 2011.
    • (2011) IEEE Trans. Multimedia , vol.13 , Issue.2 , pp. 191-205
    • Lin, W.S.1    Zhao, H.V.2    Liu, K.J.R.3
  • 168
    • 0004260006 scopus 로고
    • 3rd ed. San Diego, CA, USA: Academic Press
    • G. Owen, Game Theory, 3rd ed. San Diego, CA, USA: Academic Press, 1995.
    • (1995) Game Theory
    • Owen, G.1
  • 169
    • 33845615855 scopus 로고    scopus 로고
    • Traitor-within-traitor behavior forensics: Strategy and risk minimization
    • Dec.
    • H. V. Zhao and K. J. R. Liu, "Traitor-within-traitor behavior forensics: Strategy and risk minimization," IEEE Trans. Inf. Forensics Security, vol. 1, no. 4, pp. 440-456, Dec. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.4 , pp. 440-456
    • Zhao, H.V.1    Liu, K.J.R.2
  • 170
    • 70450247410 scopus 로고    scopus 로고
    • Behavior forensics with side information for multimedia-ngerprinting social networks
    • Dec.
    • W. S. Lin, H. V. Zhao, and K. J. R. Liu, "Behavior forensics with side information for multimedia-ngerprinting social networks," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 911-927, Dec. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.4 , pp. 911-927
    • Lin, W.S.1    Zhao, H.V.2    Liu, K.J.R.3
  • 171
    • 77954780181 scopus 로고    scopus 로고
    • Impact of social network structure on multimedia-ngerprinting misbehavior detection and identification
    • Aug.
    • H. V. Zhao and K. J. R. Liu, "Impact of social network structure on multimedia-ngerprinting misbehavior detection and identification," IEEE J. Sel. Topics Signal Process., vol. 4, no. 4, pp. 687-703, Aug. 2010.
    • (2010) IEEE J. Sel. Topics Signal Process. , vol.4 , Issue.4 , pp. 687-703
    • Zhao, H.V.1    Liu, K.J.R.2
  • 172
    • 85032751193 scopus 로고    scopus 로고
    • Behavior modeling and forensics for multimedia social networks
    • Jan.
    • H. V. Zhao,W. S. Lin, and K. J. R. Liu, "Behavior modeling and forensics for multimedia social networks," IEEE Signal Process. Mag., vol. 26, no. 1, pp. 118-139, Jan. 2009.
    • (2009) IEEE Signal Process. Mag. , vol.26 , Issue.1 , pp. 118-139
    • ZhaoW.S. Lin, H.V.1    Liu, K.J.R.2
  • 174
    • 84875836798 scopus 로고    scopus 로고
    • Forensic identification of compressive sensing in nearly sparse signals
    • Oct.
    • X. Chu, M. C. Stamm, and K. J. R. Liu, "Forensic identification of compressive sensing in nearly sparse signals," in Proc. IEEE Int. Conf. Image Process., Oct. 2012, pp. 257-260.
    • (2012) Proc. IEEE Int. Conf. Image Process. , pp. 257-260
    • Chu, X.1    Stamm, M.C.2    Liu, K.J.R.3
  • 177
    • 77951834415 scopus 로고    scopus 로고
    • Forensic hash for multimedia information
    • Jan.
    • W. Lu, A. L. Varna, and M. Wu, "Forensic hash for multimedia information," Proc. SPIE, vol. 7541, pp. 7541-7544, Jan. 2010.
    • (2010) Proc. SPIE , vol.7541 , pp. 7541-7544
    • Lu, W.1    Varna, A.L.2    Wu, M.3
  • 178
    • 78651096334 scopus 로고    scopus 로고
    • Multimedia forensic hash based on visual words
    • Sep.
    • W. Lu and M.Wu, "Multimedia forensic hash based on visual words," in Proc. IEEE Int. Conf. Image Process., Sep. 2010, pp. 989-992.
    • (2010) Proc. IEEE Int. Conf. Image Process. , pp. 989-992
    • Lu, W.1    Wu, M.2
  • 179
    • 80054783214 scopus 로고    scopus 로고
    • Seam carving estimation using forensic hash
    • Sep.
    • W. Lu and M. Wu, "Seam carving estimation using forensic hash," in Prof. ACM Multimedia Security Workshop, Sep. 2011, pp. 1-11.
    • (2011) Prof. ACM Multimedia Security Workshop , pp. 1-11
    • Lu, W.1    Wu, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.