-
1
-
-
1642412717
-
Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices
-
Sep.
-
G. N. Ali, P.-J. Chiang, A. K. Mikkilineni, J. P. Allebach, G. T. C. Chiu, E. J. Delp, "Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices," in Proc. IS&T's NIP19: Int. Conf. Digital Printing Technol., vol. 19, pp. 511-515, Sep. 2003.
-
(2003)
Proc. IS&T's NIP19: Int. Conf. Digital Printing Technol.
, vol.19
, pp. 511-515
-
-
Ali, G.N.1
Chiang, P.-J.2
Mikkilineni, A.K.3
Allebach, J.P.4
Chiu, G.T.C.5
Delp, E.J.6
-
2
-
-
11844303521
-
Group-oriented-ngerprinting for multimedia forensics
-
Oct.
-
Z. Wang, M. Wu, W. Trappe, and K. J. R. Liu, "Group-oriented- ngerprinting for multimedia forensics," EURASIP J. Appl. Signal Process., vol. 2004, pp. 2153-2173, Oct. 2004.
-
(2004)
EURASIP J. Appl. Signal Process.
, vol.2004
, pp. 2153-2173
-
-
Wang, Z.1
Wu, M.2
Trappe, W.3
Liu, K.J.R.4
-
3
-
-
84863690117
-
Image manipulation detection with binary similarity measures
-
S. Bayram, I. Avcibas, B. Sankur, and N. Memon, "Image manipulation detection with binary similarity measures," in Proc. 13th Eur. Signal Process. Conf., vol. 1. 2005, pp. 752-755.
-
(2005)
Proc. 13th Eur. Signal Process. Conf.
, vol.1
, pp. 752-755
-
-
Bayram, S.1
Avcibas, I.2
Sankur, B.3
Memon, N.4
-
4
-
-
33847671791
-
Image manipulation detection
-
S. Bayram, I. Avcibas, B. Sankur, and N. Memon, "Image manipulation detection," J. Electron. Imag., vol. 15, no. 4, pp. 041102-1-041102-17, 2006.
-
(2006)
J. Electron. Imag.
, vol.15
, Issue.4
, pp. 0411021-04110217
-
-
Bayram, S.1
Avcibas, I.2
Sankur, B.3
Memon, N.4
-
5
-
-
77951773086
-
-
1st ed. Cambridge, U.K.: Cambridge, Cambridge Univ. Press
-
J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, 1st ed. Cambridge, U.K.: Cambridge, Cambridge Univ. Press, 2010.
-
(2010)
Steganography in Digital Media: Principles, Algorithms, and Applications
-
-
Fridrich, J.1
-
6
-
-
4344600402
-
Blind detection of photomontage using higher order statistics
-
May
-
T.-T. Ng, S.-F. Chang, and Q. Sun, "Blind detection of photomontage using higher order statistics," in Proc. Int. Symp. Circuits Syst., vol. 5. May 2004, pp. V-688-V-691.
-
(2004)
Proc. Int. Symp. Circuits Syst.
, vol.5
-
-
Ng, T.-T.1
Chang, S.-F.2
Sun, Q.3
-
7
-
-
34250373244
-
Image splicing detection using 2-d phase congruency and statistical moments of characteristic function
-
W. Chen, Y. Q. Shi, and W. Su, "Image splicing detection using 2-D phase congruency and statistical moments of characteristic function," in Proc. SPIE Security, Steganogr. 9th Watermarking Multimedia Contents, vol. 6505, 2007, pp. 65050R-1-65050R-8.
-
(2007)
Proc. SPIE Security, Steganogr. 9th Watermarking Multimedia Contents
, vol.6505
-
-
Chen, W.1
Shi, Y.Q.2
Su, W.3
-
8
-
-
38849209052
-
A natural image model approach to splicing detection
-
Y. Q. Shi, C. Chen, and W. Chen, "A natural image model approach to splicing detection," in Proc. ACM 9th Workshop Multimedia Security, 2007, pp. 51-62.
-
(2007)
Proc. ACM 9th Workshop Multimedia Security
, pp. 51-62
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
9
-
-
84954462362
-
Higher-order wavelet statistics and their application to digital forensics
-
Jun.
-
H. Farid and S. Lyu, "Higher-order wavelet statistics and their application to digital forensics," in Proc. Conf. Comput. Vis. Pattern Recognit. Workshop, vol. 8. Jun. 2003, p. 94.
-
(2003)
Proc. Conf. Comput. Vis. Pattern Recognit. Workshop
, vol.8
, pp. 94
-
-
Farid, H.1
Lyu, S.2
-
10
-
-
13244253845
-
How realistic is photorealistic
-
Feb.
-
S. Lyu and H. Farid, "How realistic is photorealistic," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 845-850, Feb. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.2
, pp. 845-850
-
-
Lyu, S.1
Farid, H.2
-
11
-
-
84883130375
-
Physicsmotivated features for distinguishing photographic images and computer graphics
-
T.-T. Ng, S.-F. Chang, J. Hsu, L. Xie, and M.-P. Tsui, "Physicsmotivated features for distinguishing photographic images and computer graphics," in Proc. 13th Annu. ACM Int. Conf. Multimedia, 2005, pp. 239-248.
-
(2005)
Proc. 13th Annu. ACM Int. Conf. Multimedia
, pp. 239-248
-
-
Ng, T.-T.1
Chang, S.-F.2
Hsu, J.3
Xie, L.4
Tsui, M.-P.5
-
12
-
-
0003782852
-
-
San Mateo, CA, USA: Morgan Kaufman Publishers
-
I. Cox, J. Bloom and M. Miller, Digital Watermarking: Principles & Practice, San Mateo, CA, USA: Morgan Kaufman Publishers, 2001.
-
(2001)
Digital Watermarking: Principles & Practice
-
-
Cox, I.1
Bloom, J.2
Miller, M.3
-
15
-
-
33745117985
-
Detecting doctored images using camera response normality and consistency
-
Jun.
-
Z. Lin, R. Wang, X. Tang, and H.-Y. Shum, "Detecting doctored images using camera response normality and consistency," in Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 1. Jun. 2005, pp. 1087-1092.
-
(2005)
Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit.
, vol.1
, pp. 1087-1092
-
-
Lin, Z.1
Wang, R.2
Tang, X.3
Shum, H.-Y.4
-
16
-
-
34247636825
-
Detecting image splicing using geometry invariants and camera characteristics consistency
-
Jul.
-
Y.-F. Hsu and S.-F. Chang, "Detecting image splicing using geometry invariants and camera characteristics consistency," in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2006, pp. 549-552.
-
(2006)
Proc. IEEE Int. Conf. Multimedia Expo
, pp. 549-552
-
-
Hsu, Y.-F.1
Chang, S.-F.2
-
17
-
-
78649395962
-
Camera response functions for image forensics: An automatic algorithm for splicing detection
-
Dec.
-
Y.-F. Hsu and S.-F. Chang, "Camera response functions for image forensics: An automatic algorithm for splicing detection," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 816-825, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 816-825
-
-
Hsu, Y.-F.1
Chang, S.-F.2
-
19
-
-
67349211082
-
Using noise inconsistencies for blind image forensics
-
B. Mahdian and S. Saic, "Using noise inconsistencies for blind image forensics," Image Vis. Comput., vol. 27, no. 10, pp. 1497-1503, 2009.
-
(2009)
Image Vis. Comput.
, vol.27
, Issue.10
, pp. 1497-1503
-
-
Mahdian, B.1
Saic, S.2
-
20
-
-
80054782322
-
Exposing image forgery with blind noise estimation
-
X. Pan, X. Zhang, and S. Lyu, "Exposing image forgery with blind noise estimation," in Proc. 13th ACM Multimedia Workshop Multimedia Security, 2011, pp. 15-20.
-
(2011)
Proc. 13th ACM Multimedia Workshop Multimedia Security
, pp. 15-20
-
-
Pan, X.1
Zhang, X.2
Lyu, S.3
-
21
-
-
84863669377
-
Exposing image splicing with inconsistent local noise variances
-
Apr.
-
X. Pan, X. Zhang, and S. Lyu, "Exposing image splicing with inconsistent local noise variances," in Proc. IEEE Int. Conf. Comput. Photogr., Apr. 2012, pp. 1-10.
-
(2012)
Proc. IEEE Int. Conf. Comput. Photogr.
, pp. 1-10
-
-
Pan, X.1
Zhang, X.2
Lyu, S.3
-
22
-
-
77955707653
-
Forensic detection of image manipulation using statistical intrinsic-ngerprints
-
Sep.
-
M. C. Stamm and K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic-ngerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492-506, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 492-506
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
23
-
-
27844554394
-
Detection of copy-move forgery in digital images
-
J. Fridrich, D. Soukal, and J. Luka, "Detection of copy-move forgery in digital images," in Proc. Digital Forensic Res. Workshop, 2003, pp. 1-10.
-
(2003)
Proc. Digital Forensic Res. Workshop
, pp. 1-10
-
-
Fridrich, J.1
Soukal, D.2
Luka, J.3
-
24
-
-
58149235809
-
A sorted neighborhood approach for detecting duplicated regions in image forgeries based on dwt and svd
-
Jul.
-
G. Li, Q. Wu, D. Tu, and S. Sun, "A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD," in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2007, pp. 1750-1753.
-
(2007)
Proc. IEEE Int. Conf. Multimedia Expo
, pp. 1750-1753
-
-
Li, G.1
Wu, Q.2
Tu, D.3
Sun, S.4
-
25
-
-
27844542239
-
Exposing digital forgeries by detecting duplicated image regions
-
Dartmouth College Private Ivy League Res. Univ., Dartmouth, NH, USA, Tech. Rep. TR2004-515
-
A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Dept. Comput. Sci., Dartmouth College Private Ivy League Res. Univ., Dartmouth, NH, USA, Tech. Rep. TR2004-515, 2004.
-
(2004)
Dept. Comput. Sci.
-
-
Popescu, A.C.1
Farid, H.2
-
26
-
-
34147142845
-
Robust detection of region-duplication forgery in digital image
-
Aug.
-
W. Luo, J. Huang, and G. Qiu, "Robust detection of region-duplication forgery in digital image," in Proc. Int. Conf. Pattern Recognit., vol. 4. Aug. 2006, pp. 746-749.
-
(2006)
Proc. Int. Conf. Pattern Recognit.
, vol.4
, pp. 746-749
-
-
Luo, W.1
Huang, J.2
Qiu, G.3
-
27
-
-
70349199203
-
An efficient and robust method for detecting copy-move forgery
-
Apr.
-
S. Bayram, H.T. Sencar, and N. Memon, "An efficient and robust method for detecting copy-move forgery," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., Apr. 2009, pp. 1053-1056.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, pp. 1053-1056
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
28
-
-
34547689478
-
Detection of copy move forgery using a method based on blur moment invariants
-
B. Mahdian and S. Saic, "Detection of copy.move forgery using a method based on blur moment invariants," Forensic Sci. Int., vol. 171, nos. 2-3, pp. 180-189, 2007.
-
(2007)
Forensic Sci. Int.
, vol.171
, Issue.2-3
, pp. 180-189
-
-
Mahdian, B.1
Saic, S.2
-
29
-
-
63149091707
-
Detection of copy-move forgery in digital images using sift algorithm
-
Dec.
-
H. Huang, W. Guo, and Y. Zhang, "Detection of copy-move forgery in digital images using sift algorithm," in Proc. Pacific-Asia Workshop Comput. Intell. Ind. Appl., vol. 2. Dec. 2008, pp. 272-276.
-
(2008)
Proc. Pacific-Asia Workshop Comput. Intell. Ind. Appl.
, vol.2
, pp. 272-276
-
-
Huang, H.1
Guo, W.2
Zhang, Y.3
-
30
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
Nov.
-
D. G. Lowe, "Distinctive image features from scale-invariant keypoints," Int. J. Comput. Vis., vol. 60, no. 2, pp. 91-110, Nov. 2004.
-
(2004)
Int. J. Comput. Vis.
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.G.1
-
31
-
-
78649426066
-
Region duplication detection using image feature matching
-
Dec.
-
X. Pan and S. Lyu, "Region duplication detection using image feature matching," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 857-867, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 857-867
-
-
Pan, X.1
Lyu, S.2
-
32
-
-
80051734185
-
A siftbased forensic method for copy-move attack detection and transformation recovery
-
Sep
-
I. Amerini, L. Ballan, R. Caldelli, A. del Bimbo, and G. Serra, "A siftbased forensic method for copy-move attack detection and transformation recovery," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 1099-1110, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 1099-1110
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Molina-Markham, A.4
Serra, G.5
-
33
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
Feb.
-
A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
34
-
-
56749171108
-
Fast and reliable resampling detection by spectral analysis of-xed linear predictor residue
-
M. Kirchner, "Fast and reliable resampling detection by spectral analysis of-xed linear predictor residue," in Proc. 10th ACMWorkshop Multimedia Security, 2008, pp. 11-20.
-
(2008)
Proc. 10th ACMWorkshop Multimedia Security
, pp. 11-20
-
-
Kirchner, M.1
-
36
-
-
84938576712
-
Detection of linear and cubic interpolation in jpeg compressed images
-
May
-
A. C. Gallagher, "Detection of linear and cubic interpolation in JPEG compressed images," in Proc. Can. Conf. Comput. Robot Vis., May 2005, pp. 65-72.
-
(2005)
Proc. Can. Conf. Comput. Robot Vis.
, pp. 65-72
-
-
Gallagher, A.C.1
-
37
-
-
49549116860
-
Blind authentication using periodic properties of interpolation
-
Sep.
-
B. Mahdian and S. Saic, "Blind authentication using periodic properties of interpolation," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 529-538, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 529-538
-
-
Mahdian, B.1
Saic, S.2
-
38
-
-
69949189564
-
Blind forensics of contrast enhancement in digital images
-
Oct.
-
M. Stamm and K. J. R. Liu, "Blind forensics of contrast enhancement in digital images," in Proc. IEEE Int. Conf. Image Process., Oct. 2008, pp. 3112-3115.
-
(2008)
Proc. IEEE Int. Conf. Image Process.
, pp. 3112-3115
-
-
Stamm, M.1
Liu, K.J.R.2
-
39
-
-
78049407658
-
Forensic estimation and reconstruction of a contrast enhancement mapping
-
Mar.
-
M. C. Stamm and K. J. R. Liu, "Forensic estimation and reconstruction of a contrast enhancement mapping," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., Mar. 2010, pp. 1698-1701.
-
(2010)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process.
, pp. 1698-1701
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
40
-
-
0023330781
-
Streaking in median-ltered images
-
Apr.
-
A. Bovik, "Streaking in median-ltered images," IEEE Trans. Acoust., Speech Signal Process., vol. 35, no. 4, pp. 493-503, Apr. 1987.
-
(1987)
IEEE Trans. Acoust., Speech Signal Process.
, vol.35
, Issue.4
, pp. 493-503
-
-
Bovik, A.1
-
41
-
-
77951863205
-
On detection of median-ltering in digital images
-
Feb
-
M. Kirchner and J. Fridrich, "On detection of median-ltering in digital images," in Proc. SPIE Electronic Imag., Security, Steganogr., Watermarking Multimedia Contents, vol. 7541. Feb. 2010, pp. 1-6.
-
(2010)
Proc. SPIE Electronic Imag., Security, Steganogr., Watermarking Multimedia Contents
, vol.7541
, pp. 1-6
-
-
Kirchner, M.1
Fridrich, J.2
-
42
-
-
78349262619
-
Forensic detection of median-ltering in digital images
-
Jul.
-
G. Cao, Y. Zhao, R. Ni, L. Yu, and H. Tian, "Forensic detection of median-ltering in digital images," in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2010, pp. 89-94.
-
(2010)
Proc. IEEE Int. Conf. Multimedia Expo
, pp. 89-94
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Yu, L.4
Tian, H.5
-
43
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun.
-
T. Pevny, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
44
-
-
82055176931
-
Blind forensics of median-ltering in digital images
-
Dec
-
H.-D. Yuan, "Blind forensics of median-ltering in digital images," IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1335-1345, Dec. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.4
, pp. 1335-1345
-
-
Yuan, H.-D.1
-
45
-
-
84874407434
-
Robust median-ltering forensics based on the autoregressive model of median-ltered residual
-
Dec.
-
X. Kang, M. C. Stamm, A. Peng, and K. J. R. Liu, "Robust median-ltering forensics based on the autoregressive model of median-ltered residual," in Proc. Asia-Pacific Signal Inf. Process. Assoc. Annu. Summit Conf., Dec. 2012, pp. 1-9.
-
(2012)
Proc. Asia-Pacific Signal Inf. Process. Assoc. Annu. Summit Conf.
, pp. 1-9
-
-
Kang, X.1
Stamm, M.C.2
Peng, A.3
Liu, K.J.R.4
-
46
-
-
0038005383
-
Identification of bitmap compression history: Jpeg detection and quantizer estimation
-
Feb.
-
Z. Fan and R. De Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Trans. Image Process., vol. 12, no. 2, pp. 230-235, Feb. 2003.
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
De Queiroz, R.2
-
47
-
-
69749097361
-
Digital image source coder forensics via intrinsic-ngerprints
-
Sep.
-
W. S. Lin, S. K. Tjoa, H. V. Zhao, and K. J. Ray Liu, "Digital image source coder forensics via intrinsic-ngerprints," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 460-475, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.3
, pp. 460-475
-
-
Lin, W.S.1
Tjoa, S.K.2
Zhao, H.V.3
Ray Liu, K.J.4
-
48
-
-
34547499116
-
Block size forensic analysis in digital images
-
Apr.
-
S. Tjoa, W. S. Lin, H. V. Zhao, and K. J. R. Liu, "Block size forensic analysis in digital images," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., vol. 1. Apr. 2007, pp. 633-636.
-
(2007)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, vol.1
, pp. 633-636
-
-
Tjoa, S.1
Lin, W.S.2
Zhao, H.V.3
Liu, K.J.R.4
-
49
-
-
48149105475
-
Transform coder classification for digital image forensics
-
Oct.
-
S. Tjoa, W. S. Lin, and K. J. R. Liu, "Transform coder classification for digital image forensics," in Proc. IEEE Int. Conf. Image Process., vol. 6. Oct. 2007, pp. 105-108.
-
(2007)
Proc. IEEE Int. Conf. Image Process.
, vol.6
, pp. 105-108
-
-
Tjoa, S.1
Lin, W.S.2
Liu, K.J.R.3
-
50
-
-
33847714243
-
Estimation of primary quantization matrix in double compressed jpeg images
-
Aug.
-
J. Luka and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," in Proc. Digital Forensic Res. Workshop, Aug. 2003, pp. 5-8.
-
(2003)
Proc. Digital Forensic Res. Workshop
, pp. 5-8
-
-
Luka, J.1
Fridrich, J.2
-
52
-
-
44049087452
-
Detection of double-compression in jpeg images for applications in steganography
-
Jun.
-
T. Pevny and J. Fridrich, "Detection of double-compression in JPEG images for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevny, T.1
Fridrich, J.2
-
53
-
-
78649396720
-
Detecting double jpeg compression with the same quantization matrix
-
Dec.
-
F. Huang, J. Huang, and Y. Q. Shi, "Detecting double JPEG compression with the same quantization matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 848-856, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 848-856
-
-
Huang, F.1
Huang, J.2
Shi, Y.Q.3
-
54
-
-
34250355507
-
A generalized benford's law for jpeg coef-cients and its applications in image forensics
-
Jan.
-
D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coef-cients and its applications in image forensics," in Proc. SPIE, Electron. Imag., Security, Steganogr.,Watermarking Multimedia Contents, vol. 6505. Jan. 2007, pp. 1-11.
-
(2007)
Proc. SPIE, Electron. Imag., Security, Steganogr.,Watermarking Multimedia Contents
, vol.6505
, pp. 1-11
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
55
-
-
58049107658
-
Detecting doubly compressed jpeg images by using mode based-rst digit features
-
Oct.
-
B. Li, Y. Q. Shi, and J. Huang, "Detecting doubly compressed JPEG images by using mode based-rst digit features," in Proc. IEEE Workshop Multimedia Signal Process., Oct. 2008, pp. 730-735.
-
(2008)
Proc. IEEE Workshop Multimedia Signal Process.
, pp. 730-735
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
56
-
-
33745830178
-
Detecting doctored jpeg images via dct coefficient analysis
-
Mar.
-
J. He, Z. Lin, L.Wang, and X. Tang, "Detecting doctored JPEG images via DCT coefficient analysis," in Proc. Comput. Vis..ECCV, vol. 3953. Mar. 2006, pp. 423-435.
-
(2006)
Proc. Comput. Vis..ECCV
, vol.3953
, pp. 423-435
-
-
He, J.1
Lin, Z.2
Wang, L.3
Tang, X.4
-
57
-
-
67649410199
-
Fast, automatic and-ne-grained tampered jpeg image detection via dct coefficient analysis
-
Z. Lin, J. He, X. Tang, and C.-K. Tang, "Fast, automatic and-ne-grained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognit., vol. 42, no. 11, pp. 2492-2501, 2009.
-
(2009)
Pattern Recognit.
, vol.42
, Issue.11
, pp. 2492-2501
-
-
Lin, Z.1
He, J.2
Tang, X.3
Tang, C.-K.4
-
58
-
-
79957470147
-
Detecting recompression of jpeg images via periodicity analysis of compression artifacts for tampering detection
-
Jun
-
Y.-L. Chen and C.-T. Hsu, "Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 396-406, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 396-406
-
-
Chen, Y.-L.1
Hsu, C.-T.2
-
59
-
-
84858394859
-
Detection of nonaligned double jpeg compression based on integer periodicity maps
-
Apr
-
T. Bianchi and A. Piva, "Detection of nonaligned double JPEG compression based on integer periodicity maps," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 842-848, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 842-848
-
-
Bianchi, T.1
Piva, A.2
-
60
-
-
84861122288
-
Image forgery localization via block-grained analysis of jpeg artifacts
-
Jun
-
T. Bianchi and A. Piva, "Image forgery localization via block-grained analysis of JPEG artifacts," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1003-1017, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 1003-1017
-
-
Bianchi, T.1
Piva, A.2
-
61
-
-
60449117421
-
Exposing digital forgeries from jpeg ghosts
-
Mar.
-
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
62
-
-
67349284349
-
Passive detection of doctored jpeg image via block artifact grid extraction
-
W. Li, Y. Yuan, and N. Yu, "Passive detection of doctored JPEG image via block artifact grid extraction," Signal Process., vol. 89, no. 9, pp. 1821-1829, 2009.
-
(2009)
Signal Process.
, vol.89
, Issue.9
, pp. 1821-1829
-
-
Li, W.1
Yuan, Y.2
Yu, N.3
-
63
-
-
46449089083
-
Detecting digital image forgeries by measuring inconsistencies of blocking artifact
-
Jul.
-
S. Ye, Q. Sun, and E.-C. Chang, "Detecting digital image forgeries by measuring inconsistencies of blocking artifact," in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2007, pp. 12-15.
-
(2007)
Proc. IEEE Int. Conf. Multimedia Expo
, pp. 12-15
-
-
Ye, S.1
Sun, Q.2
Chang, E.-C.3
-
64
-
-
77956003150
-
Identification of cut & paste tampering by means of double-jpeg detection and image segmentation
-
Jun.
-
M. Barni, A. Costanzo, and L. Sabatini, "Identification of cut & paste tampering by means of double-JPEG detection and image segmentation," in Proc. IEEE Int. Symp. Circuits Syst., Jun. 2010, pp. 1687-1690.
-
(2010)
Proc. IEEE Int. Symp. Circuits Syst.
, pp. 1687-1690
-
-
Barni, M.1
Costanzo, A.2
Sabatini, L.3
-
65
-
-
34547529764
-
A novel method for detecting cropped and recompressed image block
-
Apr.
-
W. Luo, Z. Qu, J. Huang, and G. Qiu, "A novel method for detecting cropped and recompressed image block," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., vol. 2. Apr. 2007, pp. 217-220.
-
(2007)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, vol.2
, pp. 217-220
-
-
Luo, W.1
Qu, Z.2
Huang, J.3
Qiu, G.4
-
66
-
-
70449629685
-
Exposing digital forgeries in video by detecting double quantization
-
W. Wang and H. Farid, "Exposing digital forgeries in video by detecting double quantization," in Proc. 11th ACM Workshop Multimedia Security, 2009, pp. 39-48.
-
(2009)
Proc. 11th ACM Workshop Multimedia Security
, pp. 39-48
-
-
Wang, W.1
Farid, H.2
-
67
-
-
33750927408
-
Exposing digital forgeries in video by detecting double mpeg compression
-
W. Wang and H. Farid, "Exposing digital forgeries in video by detecting double MPEG compression," in Proc. 8th Workshop Multimedia Security, 2006, pp. 37-47.
-
(2006)
Proc. 8th Workshop Multimedia Security
, pp. 37-47
-
-
Wang, W.1
Farid, H.2
-
68
-
-
84864056133
-
Temporal forensics and anti-forensics for motion compensated video
-
Aug
-
M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Temporal forensics and anti-forensics for motion compensated video," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1315-1329, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1315-1329
-
-
Stamm, M.C.1
Lin, W.S.2
Liu, K.J.R.3
-
69
-
-
33748068816
-
Exposing digital forgeries by detecting inconsistencies in lighting
-
M. K. Johnson and H. Farid, "Exposing digital forgeries by detecting inconsistencies in lighting," in Proc. 7th Workshop Multimedia Security, 2005, pp. 1-10.
-
(2005)
Proc. 7th Workshop Multimedia Security
, pp. 1-10
-
-
Johnson, M.K.1
Farid, H.2
-
70
-
-
34548056428
-
Exposing digital forgeries in complex lighting environments
-
Sep.
-
M. K. Johnson and H. Farid, "Exposing digital forgeries in complex lighting environments," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 450-461, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 450-461
-
-
Johnson, M.K.1
Farid, H.2
-
71
-
-
49949111385
-
Exposing digital forgeries through specular highlights on the eye
-
M. K. Johnson and H. Farid, "Exposing digital forgeries through specular highlights on the eye," in Proc. Inf. Hiding, vol. 4567. 2007, pp. 311-325.
-
(2007)
Proc. Inf. Hiding
, vol.4567
, pp. 311-325
-
-
Johnson, M.K.1
Farid, H.2
-
72
-
-
84855921857
-
Exposing digital forgeries in ballistic motion
-
Feb
-
V. Conotter, J. F. O'Brien, and H. Farid, "Exposing digital forgeries in ballistic motion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 283-296, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 283-296
-
-
Conotter, V.1
O'Brien, J.F.2
Farid, H.3
-
73
-
-
33847748167
-
Non-intrusive component forensics of visual sensors using output images
-
Mar.
-
A. Swaminathan, M. Wu, and K. J. R. Liu, "Non-intrusive component forensics of visual sensors using output images," IEEE Trans. Inf. Forensics Security, vol. 2, no. 1, pp. 91-106, Mar. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.1
, pp. 91-106
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
74
-
-
33847726765
-
Non-intrusive forensic analysis of visual sensors using output images
-
May
-
A. Swaminathan, M. Wu, and K. J. Ray Liu, "Non-intrusive forensic analysis of visual sensors using output images," in Proc. IEEE Conf. Acoustic, Speech Signal Process., May 2006, pp. 1-5.
-
(2006)
Proc. IEEE Conf. Acoustic, Speech Signal Process.
, pp. 1-5
-
-
Swaminathan, A.1
Wu, M.2
Ray Liu, K.J.3
-
75
-
-
0032207493
-
Capturing images with digital still cameras
-
Nov.-Dec.
-
S. Kawamura, "Capturing images with digital still cameras," IEEE Micro, vol. 18, no. 6, pp. 14-19, Nov.-Dec. 1998.
-
(1998)
IEEE Micro
, vol.18
, Issue.6
, pp. 14-19
-
-
Kawamura, S.1
-
76
-
-
85076037513
-
Interaction between color plane interpolation and other image processing functions in electronic photography
-
Feb.
-
J. Adams, "Interaction between color plane interpolation and other image processing functions in electronic photography," in Proc. SPIE, Cameras Syst. Electron. Photogr. Sci. Imag., vol. 2416. Feb. 1995, pp. 144-151.
-
(1995)
Proc. SPIE, Cameras Syst. Electron. Photogr. Sci. Imag.
, vol.2416
, pp. 144-151
-
-
Adams, J.1
-
77
-
-
0032207538
-
Color processing in digital cameras
-
Nov.-Dec.
-
J. Adams, K. Parulski, and K. Spaulding, "Color processing in digital cameras," Proc. IEEE, vol. 18, no. 6, pp. 20-30, Nov.-Dec. 1998.
-
(1998)
Proc. IEEE
, vol.18
, Issue.6
, pp. 20-30
-
-
Adams, J.1
Parulski, K.2
Spaulding, K.3
-
78
-
-
27844493797
-
Exposing digital forgeries in color-lter array interpolated images
-
Oct.
-
A. C. Popescu and H. Farid, "Exposing digital forgeries in color-lter array interpolated images," IEEE Trans. Signal Process., vol. 53, no. 10, pp. 3948-3959, Oct. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.10
, pp. 3948-3959
-
-
Popescu, A.C.1
Farid, H.2
-
79
-
-
44049088600
-
Component forensics of digital cameras: A non-intrusive approach
-
Mar.
-
A. Swaminathan, M. Wu, and K. J. Ray Liu, "Component forensics of digital cameras: A non-intrusive approach," in Proc. Conf. Inf. Sci. Syst., Mar. 2006, pp. 1-6.
-
(2006)
Proc. Conf. Inf. Sci. Syst.
, pp. 1-6
-
-
Swaminathan, A.1
Wu, M.2
Ray Liu, K.J.3
-
80
-
-
84869484544
-
Robustness of color interpolation identification against anti-forensic operations
-
May
-
W.-H. Chuang and M. Wu, "Robustness of color interpolation identification against anti-forensic operations," in Proc. Inf. Hiding Workshop, May 2012, pp. 16-30.
-
(2012)
Proc. Inf. Hiding Workshop
, pp. 16-30
-
-
Chuang, W.-H.1
Wu, M.2
-
81
-
-
70450271108
-
Accurate detection of demosaicing regularity for digital image forensics
-
Dec.
-
H. Cao and A. C. Kot, "Accurate detection of demosaicing regularity for digital image forensics," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 899-910, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 899-910
-
-
Cao, H.1
Kot, A.C.2
-
82
-
-
33749254274
-
Source camera identification based on cfa interpolation
-
Sep.
-
S. Bayram, H. T. Sencar, N. Memon, and I. Avcibas, "Source camera identification based on CFA interpolation," in Proc. IEEE Int. Conf. Image Process., vol. 3. Sep. 2005, pp. 69-72.
-
(2005)
Proc. IEEE Int. Conf. Image Process.
, vol.3
, pp. 69-72
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
Avcibas, I.4
-
83
-
-
46449086633
-
Improvements on source camera-model identification based on cfa interpolation
-
Jan.
-
S. Bayram, H. T. Sencar, and N. Memon, "Improvements on source camera-model identification based on CFA interpolation," in Proc. Int. Conf. Digital Forensics, Jan. 2006, pp. 1-9.
-
(2006)
Proc. Int. Conf. Digital Forensics
, pp. 1-9
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
84
-
-
33744736314
-
Digital camera identification from sensor pattern noise
-
Jun.
-
J. Luka, J. Fridrich, and M. Goljan, "Digital camera identification from sensor pattern noise," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 205-214, Jun. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.2
, pp. 205-214
-
-
Luka, J.1
Fridrich, J.2
Goljan, M.3
-
85
-
-
85032752368
-
Digital image forensics using sensor noise
-
Mar.
-
J. Fridrich, "Digital image forensics using sensor noise," IEEE Signal Proc. Mag., vol. 26, no. 2, pp. 26-37, Mar. 2009.
-
(2009)
IEEE Signal Proc. Mag.
, vol.26
, Issue.2
, pp. 26-37
-
-
Fridrich, J.1
-
86
-
-
77952591585
-
Source camera identification using enhanced sensor pattern noise
-
Jun.
-
C..T. Li, "Source camera identification using enhanced sensor pattern noise," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 280-287, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 280-287
-
-
Li, C.T.1
-
87
-
-
34548294226
-
Source digital camcorder identification using sensor photo-response nonuniformity
-
Jan.
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukas, "Source digital camcorder identification using sensor photo-response nonuniformity," Proc. SPIE Int. Soc. Opt. Eng., vol. 6505, p. 65051G, Jan. 2007.
-
(2007)
Proc. SPIE Int. Soc. Opt. Eng.
, vol.6505
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
89
-
-
84856241325
-
Exploring compression effects for improved source camera identification using strongly compressed video
-
Sep.
-
W.-H. Chuang, H. Su, and M. Wu, "Exploring compression effects for improved source camera identification using strongly compressed video," in Proc. IEEE Int. Conf. Image Process., Sep. 2011, pp. 1953-1956.
-
(2011)
Proc. IEEE Int. Conf. Image Process.
, pp. 1953-1956
-
-
Chuang, W.-H.1
Su, H.2
Wu, M.3
-
90
-
-
77949794850
-
Camera response function signature for digital forensics part i: Theory and data selection and part II: Signature extraction
-
Dec.
-
T.-T. Ng and M.-P. Tsui, "Camera response function signature for digital forensics.Part I: Theory and data selection and Part II: Signature extraction," in Proc. IEEEWorkshop Inf. Forensics Security, Dec. 2009, pp. 156-160.
-
(2009)
Proc. IEEEWorkshop Inf. Forensics Security
, pp. 156-160
-
-
Ng, T.-T.1
Tsui, M.-P.2
-
91
-
-
34548257263
-
Robust scanner identification based on noise features
-
H. Gou, A. Swaminathan, and M. Wu, "Robust scanner identification based on noise features," in Proc. SPIE Electron. Imag. Conf. Security, Watermarking Steganography, vol. 6505. 2007, pp. 1-11.
-
(2007)
Proc. SPIE Electron. Imag. Conf. Security, Watermarking Steganography
, vol.6505
, pp. 1-11
-
-
Gou, H.1
Swaminathan, A.2
Wu, M.3
-
92
-
-
34548222588
-
Scanner identification using sensor pattern noise
-
N. Khanna, A. K. Mikkilineni, G. T. C. Chiu, J. P. Allebach, and E. J. Delp, "Scanner identification using sensor pattern noise," in Proc. SPIE Electron. Imag. Conf. Security, Watermarking Steganography, vol. 6505. 2007, pp. 1-11.
-
(2007)
Proc. SPIE Electron. Imag. Conf. Security, Watermarking Steganography
, vol.6505
, pp. 1-11
-
-
Khanna, N.1
Mikkilineni, A.K.2
Chiu, G.T.C.3
Allebach, J.P.4
Delp, E.J.5
-
93
-
-
60449090714
-
Scanner identification using feature-based processing and analysis
-
Mar.
-
N. Khanna, A. K. Mikkilineni, and E. J. Delp, "Scanner identification using feature-based processing and analysis," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 123-139, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 123-139
-
-
Khanna, N.1
Mikkilineni, A.K.2
Delp, E.J.3
-
94
-
-
69749111736
-
Intrinsic sensor noise features for forensic analysis on scanners and scanned images
-
Sep.
-
H. Gou, A. Swaminathan, and M. Wu, "Intrinsic sensor noise features for forensic analysis on scanners and scanned images," IEEE Trans. Info. Forensics Security, vol. 4, no. 3, pp. 476-491, Sep. 2009.
-
(2009)
IEEE Trans. Info. Forensics Security
, vol.4
, Issue.3
, pp. 476-491
-
-
Gou, H.1
Swaminathan, A.2
Wu, M.3
-
95
-
-
51449114231
-
Forensic techniques for classifying scanner, computer generated and digital camera images
-
Apr.
-
N. Khanna, G. T.-C. Chiu, J. P. Allebach, E. J. Delp, "Forensic techniques for classifying scanner, computer generated and digital camera images," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Apr. 2008, pp. 1653-1656.
-
(2008)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 1653-1656
-
-
Khanna, N.1
Chiu, G.T.-C.2
Allebach, J.P.3
Delp, E.J.4
-
96
-
-
51449093025
-
Image acquisition forensics: Forensic analysis to identify imaging source
-
Apr.
-
C.E. McKay, A. Swaminathan, H. Gou, and M. Wu, "Image acquisition forensics: Forensic analysis to identify imaging source," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Apr. 2008, pp. 1657-1660.
-
(2008)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 1657-1660
-
-
McKay, C.E.1
Swaminathan, A.2
Gou, H.3
Wu, M.4
-
98
-
-
77951971717
-
Image tamper detection based on demosaicing artifacts
-
Nov.
-
A. E. Dirik and N. Memon, "Image tamper detection based on demosaicing artifacts," in Proc. IEEE Int. Conf. Image Process., Nov. 2009, pp. 1497-1500.
-
(2009)
Proc. IEEE Int. Conf. Image Process.
, pp. 1497-1500
-
-
Dirik, A.E.1
Memon, N.2
-
99
-
-
78649851582
-
Image tampering identification using blind deconvolution
-
Oct.
-
A. Swaminathan, M.Wu, and K. J. R. Liu, "Image tampering identification using blind deconvolution," in Proc. IEEE Int. Conf. Image Process., Oct. 2006, pp. 2309-2312.
-
(2006)
Proc. IEEE Int. Conf. Image Process.
, pp. 2309-2312
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
100
-
-
39449103666
-
Digital image forensics via intrinsic-ngerprints
-
Mar.
-
A. Swaminathan, M. Wu, and K. J. R. Liu, "Digital image forensics via intrinsic-ngerprints," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101-117, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 101-117
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
101
-
-
70349214858
-
Tampering identification using empirical frequency response
-
Apr.
-
W.-H. Chuang, A. Swaminathan, and M. Wu, "Tampering identification using empirical frequency response," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Apr. 2009 pp. 1517-1520.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 1517-1520
-
-
Chuang, W.-H.1
Swaminathan, A.2
Wu, M.3
-
102
-
-
33645671569
-
Detecting digital image forgeries using sensor pattern noise
-
J. Luka, J. Fridrich, and M. Goljan, "Detecting digital image forgeries using sensor pattern noise," in Proc. SPIE Electron. Imag., vol. 6072. 2006, p. 60720Y.
-
(2006)
Proc. SPIE Electron. Imag.
, vol.6072
-
-
Luka, J.1
Fridrich, J.2
Goljan, M.3
-
103
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
Mar.
-
M. Chen, J. Fridrich, M. Goljan, and J. Luka, "Determining image origin and integrity using sensor noise," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74-90, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Luka, J.4
-
104
-
-
48149112790
-
Noise features for image tampering detection and steganalysis
-
Sep.
-
H. Gou, A. Swaminathan, and M.Wu, "Noise features for image tampering detection and steganalysis," in Proc. IEEE Int. Conf. Image Process., Sep. 2007, pp. 97-100.
-
(2007)
Proc. IEEE Int. Conf. Image Process.
, pp. 97-100
-
-
Gou, H.1
Swaminathan, A.2
Wu, M.3
-
106
-
-
84878170594
-
-
NPR, ( [Online]. Available
-
NPR, (2009). Visualizing the U.S. Electric Grid [Online]. Available: http://www.npr.org/templates/story/story.php?storyId=110997398
-
(2009)
Visualizing the U.S. Electric Grid
-
-
-
108
-
-
33947379497
-
Applications of enf criterion in forensics: Audio, video, computer and telecommunication analysis
-
C. Grigoras, "Applications of ENF criterion in forensics: Audio, video, computer and telecommunication analysis," Forensic Sci. Int., vol. 167, nos. 2-3, pp. 136-145, 2007.
-
(2007)
Forensic Sci. Int.
, vol.167
, Issue.2-3
, pp. 136-145
-
-
Grigoras, C.1
-
109
-
-
84455192720
-
Seeing' enf: Natural time stamp for digital video via optical sensing and signal processing
-
Nov.
-
R. Garg, A. L. Varna, and M. Wu, "Seeing' ENF: Natural time stamp for digital video via optical sensing and signal processing," in Proc. ACM Multimedia, Nov. 2011, pp. 1-10.
-
(2011)
Proc. ACM Multimedia
, pp. 1-10
-
-
Garg, R.1
Varna, A.L.2
Wu, M.3
-
110
-
-
84863919973
-
Enf extraction from digital recordings using adaptive techniques and frequency tracking
-
Aug
-
O. Ojowu, J. Karlsson, J. Li, and Y. Liu, "ENF extraction from digital recordings using adaptive techniques and frequency tracking," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1330-1338, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1330-1338
-
-
Ojowu, O.1
Karlsson, J.2
Li, J.3
Liu, Y.4
-
113
-
-
84890526834
-
Geo-location estimation from electrical network frequency signals
-
May
-
R. Garg, A. Hajj-Ahmad, and M. Wu, "Geo-location estimation from electrical network frequency signals," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., May 2013, pp. 1-3.
-
(2013)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 1-3
-
-
Garg, R.1
Molina-Markham, A.2
Wu, M.3
-
114
-
-
77955689262
-
Audio authenticity: Detecting enf discontinuity with high precision phase analysis
-
Sep.
-
D. Rodriguez, J. Apolinario, and L. Biscainho, "Audio authenticity: Detecting ENF discontinuity with high precision phase analysis," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 534-543, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 534-543
-
-
Rodriguez, D.1
Apolinario, J.2
Biscainho, L.3
-
115
-
-
37849032097
-
Can we trust digital image forensics
-
T. Gloe, M. Kirchner, A. Winkler, and R. Bohme, "Can we trust digital image forensics," in Proc. 15th Int. Conf. Multimedia, 2007, pp. 78-86.
-
(2007)
Proc. 15th Int. Conf. Multimedia
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Bohme, R.4
-
116
-
-
56749180518
-
Hiding traces of resampling in digital images
-
Dec.
-
M. Kirchner and R. Bohme, "Hiding traces of resampling in digital images," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 582-592, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 582-592
-
-
Kirchner, M.1
Bohme, R.2
-
117
-
-
80051605162
-
Anti-forensics of digital image compression
-
Sep
-
M. C. Stamm and K. J. R. Liu, "Anti-forensics of digital image compression," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 1050-1065, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
118
-
-
78049404806
-
Anti-forensics of jpeg compression
-
Mar.
-
M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, "Anti-forensics of JPEG compression," in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Process., Mar. 2010, pp. 1694-1697.
-
(2010)
Proc. IEEE Int. Conf. Acoustics, Speech, Signal Process
, pp. 1694-1697
-
-
Stamm, M.C.1
Tjoa, S.K.2
Lin, W.S.3
Liu, K.J.R.4
-
120
-
-
78651088596
-
Undetectable image tampering through jpeg compression anti-forensics
-
Sep.
-
M. C. Stamm, S. K. Tjoa,W. S. Lin, and K. J. R. Liu, "Undetectable image tampering through JPEG compression anti-forensics," in Proc. IEEE Int. Conf. Image Process., Sep. 2010, pp. 2109-2112.
-
(2010)
Proc. IEEE Int. Conf. Image Process.
, pp. 2109-2112
-
-
Stamm, M.C.1
TjoaW.S. Lin, S.K.2
Liu, K.J.R.3
-
121
-
-
84890502071
-
Concealability-ratedistortion tradedoff in image compression anti-forensics
-
May
-
X. Chu, M. C. Stamm, Y. Chen, and K. J. R. Liu, "Concealability- ratedistortion tradedoff in image compression anti-forensics," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., May 2013, pp. 1-3.
-
(2013)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 1-3
-
-
Chu, X.1
Stamm, M.C.2
Chen, Y.3
Liu, K.J.R.4
-
122
-
-
80051649252
-
Anti-forensics for frame deletion/addition in mpeg video
-
May
-
M. C. Stamm and K. J. R. Liu, "Anti-forensics for frame deletion/addition in MPEG video," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., May 2011, pp. 1876-1879.
-
(2011)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 1876-1879
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
123
-
-
79951834941
-
Defending against-ngerprint-copy attack in sensor-based camera identification
-
Mar
-
M. Goljan, J. Fridrich, and M. Chen, "Defending against-ngerprint- copy attack in sensor-based camera identification," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 227-236, Mar. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.1
, pp. 227-236
-
-
Goljan, M.1
Fridrich, J.2
Chen, M.3
-
124
-
-
80051649252
-
Anti-forensics for frame deletion/addition in mpeg video
-
May
-
S. Lai and R. Bohme, "Anti-forensics for frame deletion/addition in MPEG video," in Proc. Inf. Hiding Conf., May 2011, pp. 1876-1879.
-
(2011)
Proc. Inf. Hiding Conf.
, pp. 1876-1879
-
-
Lai, S.1
Bohme, R.2
-
125
-
-
84923318331
-
Forensics versus. Anti-forensics: A decision and game theoretic framework
-
Sep.
-
G. Valenzise, V. Nobile, M. Tagliasacchi, and S. Tubaro, "Forensics versus. anti-forensics: A decision and game theoretic framework," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., Sep. 2011, pp. 1749-1752.
-
(2011)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process.
, pp. 1749-1752
-
-
Valenzise, G.1
Nobile, V.2
Tagliasacchi, M.3
Tubaro, S.4
-
126
-
-
84869407144
-
How secure are power network signature based time stamps
-
Oct.
-
W. H. Chuang, R. Garg, and M. Wu, "How secure are power network signature based time stamps," in Proc. ACM Conf. Comput. Commun. Security, Oct. 2012, pp. 428-438.
-
(2012)
Proc. ACM Conf. Comput. Commun. Security
, pp. 428-438
-
-
Chuang, W.H.1
Garg, R.2
Wu, M.3
-
127
-
-
84873669138
-
The source identification game: An informationtheoretic perspective
-
Mar.
-
M. Barni and B. Tondi, "The source identification game: An informationtheoretic perspective," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 450-463, Mar. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.3
, pp. 450-463
-
-
Barni, M.1
Tondi, B.2
-
128
-
-
54049100264
-
-
Nasr, Cairo, Egypt, Hindawi Publishing Corporations 4. Dec.
-
K. J. R. Liu, W. Trappe, Z. J. Wang, M. Wu, and H. Zhao, Multimedia Fingerprinting Forensics for Traitor Tracing, Nasr, Cairo, Egypt, Hindawi Publishing Corporations, vol. 4. Dec. 2005.
-
(2005)
Multimedia Fingerprinting Forensics for Traitor Tracing
-
-
Liu, K.J.R.1
Trappe, W.2
Wang, Z.J.3
Wu, M.4
Zhao, H.5
-
129
-
-
85032751604
-
Collusion resistant-ngerprinting for multimedia
-
Mar.
-
M. Wu, W. Trappe, Z. Wang, and K. J. R. Liu, "Collusion resistant-ngerprinting for multimedia," IEEE Signal Process. Mag., vol. 21, no. 2, pp. 15-27, Mar. 2004.
-
(2004)
IEEE Signal Process. Mag.
, vol.21
, Issue.2
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, Z.3
Liu, K.J.R.4
-
131
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Proc., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Proc.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, F.3
Shamoon, T.4
-
132
-
-
0032072279
-
Image adaptive watermarking using visual models
-
May
-
C. Podilchuk and W. Zeng, "Image adaptive watermarking using visual models," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 525-539, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.4
, pp. 525-539
-
-
Podilchuk, C.1
Zeng, W.2
-
133
-
-
0035335388
-
Rotation, scale, and translation resilient public watermarking for images
-
May
-
C.-Y. Lin, M. Wu, Y.-M. Lui, J. A. Bloom, M. L. Miller, and I. J. Cox, "Rotation, scale, and translation resilient public watermarking for images," IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.5
, pp. 767-782
-
-
Lin, C.-Y.1
Wu, M.2
Lui, Y.-M.3
Bloom, J.A.4
Miller, M.L.5
Cox, I.J.6
-
134
-
-
0242408710
-
Robust, content-dependent, high-delity watermark for tracking in digital cinema
-
Jan.
-
J. Lubin, J. Bloom, and H. Cheng, "Robust, content-dependent, high-delity watermark for tracking in digital cinema," in Proc. Security Watermarking Multimedia Contents, SPIE, vol. 5020, Jan. 2003, pp. 536-545.
-
(2003)
Proc. Security Watermarking Multimedia Contents, SPIE
, vol.5020
, pp. 536-545
-
-
Lubin, J.1
Bloom, J.2
Cheng, H.3
-
135
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
136
-
-
0037353686
-
Information-theoretic analysis of information hiding
-
Mar.
-
P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
138
-
-
27844562245
-
Data hiding in curves with applications to-ngerprinting maps
-
Oct.
-
H. Gou and M. Wu, "Data hiding in curves with applications to-ngerprinting maps," IEEE Trans. Signal Proc., vol. 53, no. 10, pp. 3988-4005, Oct. 2005.
-
(2005)
IEEE Trans. Signal Proc.
, vol.53
, Issue.10
, pp. 3988-4005
-
-
Gou, H.1
Wu, M.2
-
139
-
-
84957610906
-
A note on the limits of collusionresistant watermarks
-
Jan.
-
F. Ergun, J. Kilian, and R. Kumar, "A note on the limits of collusionresistant watermarks," Eurocrypt Lecture Notes Comput. Sci., vol. 1592, pp. 140-149, Jan. 1999.
-
(1999)
Eurocrypt Lecture Notes Comput. Sci.
, vol.1592
, pp. 140-149
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
140
-
-
84890411878
-
Resistance of digital watermarks to collusive attacks
-
Aug.
-
J. Kilian, T. Leighton, L. Matheson, T. Shamoon, R. Tarjan, and F. Zane, "Resistance of digital watermarks to collusive attacks," in Proc. IEEE Int. Symp. Inf. Theory, Aug. 1998, p. 271.
-
(1998)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 271
-
-
Kilian, J.1
Leighton, T.2
Matheson, L.3
Shamoon, T.4
Tarjan, R.5
Zane, F.6
-
141
-
-
84908491832
-
Resistance of orthogonal gaussian-ngerprints to collusion attacks
-
Apr.
-
Z. J.Wang, M.Wu, H. Zhao,W. Trappe, and K. J. R. Liu, "Resistance of orthogonal gaussian-ngerprints to collusion attacks," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Apr. 2003, pp. 617-620.
-
(2003)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 617-620
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.3
Liu, K.J.R.4
-
142
-
-
20444373301
-
Anticollusion forensics of multimedia-ngerprinting using orthogonal modulation
-
Jun.
-
Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, "Anticollusion forensics of multimedia-ngerprinting using orthogonal modulation," IEEE Trans. Image Proc., vol. 14, no. 6, pp. 804-821, Jun. 2005.
-
(2005)
IEEE Trans. Image Proc.
, vol.14
, Issue.6
, pp. 804-821
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.3
Trappe, W.4
Liu, K.J.R.5
-
143
-
-
69749101534
-
Performance of orthogonal-ngerprinting codes under worst-case noise
-
Sep.
-
N. Kiyavash and P. Moulin, "Performance of orthogonal-ngerprinting codes under worst-case noise," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 293-301, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.3
, pp. 293-301
-
-
Kiyavash, N.1
Moulin, P.2
-
144
-
-
0036293565
-
Collusion-resistant-ngerprinting for multimedia
-
Mar.
-
W. Trappe, M. Wu, and K. J. R. Liu, "Collusion-resistant- ngerprinting for multimedia," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Mar. 2002, pp. 3309-3312.
-
(2002)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 3309-3312
-
-
Trappe, W.1
Wu, M.2
Liu, K.J.R.3
-
145
-
-
33744722091
-
Joint coding and embedding techniques for multimedia-ngerprinting
-
Jun.
-
S. He and M. Wu, "Joint coding and embedding techniques for multimedia-ngerprinting," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 231-247, Jun. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.2
, pp. 231-247
-
-
He, S.1
Wu, M.2
-
146
-
-
21844449883
-
Performance study of ecc-based collusion-resistant multimedia- ngerprinting
-
Mar.
-
S. He and M. Wu, "Performance study of ecc-based collusion-resistant multimedia-ngerprinting," in Proc. 38th CISS, Mar. 2004, pp. 827-832.
-
(2004)
Proc. 38th CISS
, pp. 827-832
-
-
He, S.1
Wu, M.2
-
147
-
-
0003538515
-
Analysis of attacks on image watermarks with randomized coefficients
-
Princeton, NJ, USA, Tech. Rep.
-
H. S. Stone, "Analysis of attacks on image watermarks with randomized coefficients," NEC Res. Inst. Princeton Univ., Princeton, NJ, USA, Tech. Rep. 96-045, 1996.
-
(1996)
NEC Res. Inst. Princeton Univ.
, pp. 96-9045
-
-
Stone, H.S.1
-
148
-
-
34047228408
-
Nonlinear collusion attacks on independent-ngerprints for multimedia
-
Apr.
-
H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Nonlinear collusion attacks on independent-ngerprints for multimedia," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Apr. 2003, pp. 613-616.
-
(2003)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 613-616
-
-
Zhao, H.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
149
-
-
18844450187
-
Forensic analysis of nonlinear collusion attacks for multimedia- ngerprinting
-
May
-
H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Forensic analysis of nonlinear collusion attacks for multimedia-ngerprinting," IEEE Trans. Image Proc., vol. 14, no. 5, pp. 646-661, May 2005.
-
(2005)
IEEE Trans. Image Proc.
, vol.14
, Issue.5
, pp. 646-661
-
-
Zhao, H.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
150
-
-
0038527384
-
Antificollusion-ngerprinting for multimedia
-
Apr.
-
W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, "Antificollusion- ngerprinting for multimedia," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
151
-
-
13144275283
-
Statistical invisibility for collusion-resistant digital video watermarking
-
Feb.
-
K. Su, D. Kundur, and D. Hatzinakos, "Statistical invisibility for collusion-resistant digital video watermarking," IEEE Trans. Multimedia, vol. 7, no. 1, pp. 43-51, Feb. 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.1
, pp. 43-51
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
152
-
-
0032070304
-
Multiresolution scenebased video watermarking using perceptual models
-
May
-
M. D. Swanson, B. Zhu, and A. T. Tewfik, "Multiresolution scenebased video watermarking using perceptual models," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 540-550, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.4
, pp. 540-550
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.T.3
-
153
-
-
36348997652
-
Collusion-resistant video-ngerprinting for large user group
-
Dec.
-
S. He and M. Wu, "Collusion-resistant video-ngerprinting for large user group," IEEE Trans. Info. Forensics Security, vol. 2, no. 4, pp. 697-709, Dec. 2007.
-
(2007)
IEEE Trans. Info. Forensics Security
, vol.2
, Issue.4
, pp. 697-709
-
-
He, S.1
Wu, M.2
-
154
-
-
0032162672
-
Collusion-secure-ngerprinting for digital data
-
Sep.
-
D. Boneh and J. Shaw, "Collusion-secure-ngerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
155
-
-
84937541590
-
Improved boneh-shaw content-ngerprinting
-
Y. Yacobi, "Improved Boneh-Shaw content-ngerprinting," in Proc. CTRSA Lecture Notes Comput. Sci., vol. 2020, pp. 378-91, 2001.
-
(2001)
Proc. CTRSA Lecture Notes Comput. Sci.
, vol.2020
, pp. 378-391
-
-
Yacobi, Y.1
-
157
-
-
56749173460
-
On the design and optimization of tardos probabilistic-ngerprinting codes
-
T. Furon, A. Guyader, and F. Cerou, "On the design and optimization of tardos probabilistic-ngerprinting codes," in Proc. Inf. Hiding Workshop, vol. 5284, 2008, pp. 341-356.
-
(2008)
Proc. Inf. Hiding Workshop
, vol.5284
, pp. 341-356
-
-
Furon, T.1
Guyader, A.2
Cerou, F.3
-
158
-
-
0000676728
-
Combining digital watermarks and collusion secure-ngerprints for digital images
-
Jan.
-
J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, "Combining digital watermarks and collusion secure-ngerprints for digital images,"J. Electron. Imag., vol. 9, pp. 456-467, Jan. 2000.
-
(2000)
J. Electron. Imag.
, vol.9
, pp. 456-467
-
-
Dittmann, J.1
Schmitt, P.2
Saar, E.3
Schwenk, J.4
Ueberberg, J.5
-
159
-
-
0037399342
-
Digital-ngerprinting codes: Problem statements, constructions, identification of traitors
-
Apr.
-
A. Barg, G. R. Blakley, and G. Kabatiansky, "Digital-ngerprinting codes: Problem statements, constructions, identification of traitors," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 852.-865, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.4
, pp. 852-865
-
-
Barg, A.1
Blakley, G.R.2
Kabatiansky, G.3
-
160
-
-
84959043688
-
Collusion secure q-Ary-ngerprinting for perceptual content
-
Feb.
-
R. Safavi-Naini and Y. Wang, "Collusion secure q-Ary-ngerprinting for perceptual content," Security Privacy Digital Rights Manage., vol. 2320, pp. 57-75, Feb. 2002.
-
(2002)
Security Privacy Digital Rights Manage.
, vol.2320
, pp. 57-75
-
-
Safavi-Naini, R.1
Wang, Y.2
-
161
-
-
8844258240
-
Efficient watermark detection and collusion security
-
Feb.
-
F. Zane, "Efficient watermark detection and collusion security," in Proc. 4th Int. Conf. Financial Cryptogr., Feb. 2000, pp. 21-32.
-
(2000)
Proc. 4th Int. Conf. Financial Cryptogr.
, pp. 21-32
-
-
Zane, F.1
-
162
-
-
0035270516
-
Combinatorial properties of frameproof and traceability codes
-
Mar.
-
J. N. Staddon, D. R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1042-1049, Mar. 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.3
, pp. 1042-1049
-
-
Staddon, J.N.1
Stinson, D.R.2
Wei, R.3
-
164
-
-
30144437180
-
Fingerprint multicast for secure video streaming
-
Jan.
-
H. V. Zhao and K. J. R. Liu, "Fingerprint multicast for secure video streaming," IEEE Trans. Image Process., vol. 15, no. 1, pp. 12-29, Jan. 2006.
-
(2006)
IEEE Trans. Image Process.
, vol.15
, Issue.1
, pp. 12-29
-
-
Zhao, H.V.1
Liu, K.J.R.2
-
165
-
-
33748105251
-
Behavior forensics for scalable multiuser collusion: Fairness versus effectiveness
-
Sep.
-
H. V. Zhao and K. J. R. Liu, "Behavior forensics for scalable multiuser collusion: Fairness versus effectiveness," IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 311-329, Sep. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.3
, pp. 311-329
-
-
Zhao, H.V.1
Liu, K.J.R.2
-
166
-
-
48149092288
-
Multifiuser collusion behavior forensics: Game-theoretic formulation of fairness dynamics
-
Sep.
-
W. S. Lin, H. V. Zhao, and K. J. R. Liu, "Multifiuser collusion behavior forensics: Game-theoretic formulation of fairness dynamics," in Proc. IEEE Int. Conf. Image Process., Sep. 2007, pp. 109-112.
-
(2007)
Proc. IEEE Int. Conf. Image Process.
, pp. 109-112
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
-
167
-
-
79952971621
-
Game-theoretic strategies and equilibriums in multimedia-ngerprinting social networks
-
Apr
-
W. S. Lin, H. V. Zhao, and K. J. R. Liu, "Game-theoretic strategies and equilibriums in multimedia-ngerprinting social networks," IEEE Trans. Multimedia, vol. 13, no. 2, pp. 191-205, Apr. 2011.
-
(2011)
IEEE Trans. Multimedia
, vol.13
, Issue.2
, pp. 191-205
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
-
168
-
-
0004260006
-
-
3rd ed. San Diego, CA, USA: Academic Press
-
G. Owen, Game Theory, 3rd ed. San Diego, CA, USA: Academic Press, 1995.
-
(1995)
Game Theory
-
-
Owen, G.1
-
169
-
-
33845615855
-
Traitor-within-traitor behavior forensics: Strategy and risk minimization
-
Dec.
-
H. V. Zhao and K. J. R. Liu, "Traitor-within-traitor behavior forensics: Strategy and risk minimization," IEEE Trans. Inf. Forensics Security, vol. 1, no. 4, pp. 440-456, Dec. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.4
, pp. 440-456
-
-
Zhao, H.V.1
Liu, K.J.R.2
-
170
-
-
70450247410
-
Behavior forensics with side information for multimedia-ngerprinting social networks
-
Dec.
-
W. S. Lin, H. V. Zhao, and K. J. R. Liu, "Behavior forensics with side information for multimedia-ngerprinting social networks," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 911-927, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 911-927
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
-
171
-
-
77954780181
-
Impact of social network structure on multimedia-ngerprinting misbehavior detection and identification
-
Aug.
-
H. V. Zhao and K. J. R. Liu, "Impact of social network structure on multimedia-ngerprinting misbehavior detection and identification," IEEE J. Sel. Topics Signal Process., vol. 4, no. 4, pp. 687-703, Aug. 2010.
-
(2010)
IEEE J. Sel. Topics Signal Process.
, vol.4
, Issue.4
, pp. 687-703
-
-
Zhao, H.V.1
Liu, K.J.R.2
-
172
-
-
85032751193
-
Behavior modeling and forensics for multimedia social networks
-
Jan.
-
H. V. Zhao,W. S. Lin, and K. J. R. Liu, "Behavior modeling and forensics for multimedia social networks," IEEE Signal Process. Mag., vol. 26, no. 1, pp. 118-139, Jan. 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.1
, pp. 118-139
-
-
ZhaoW.S. Lin, H.V.1
Liu, K.J.R.2
-
173
-
-
84890475043
-
Protection against reverse engineering in digital cameras
-
May
-
M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Protection against reverse engineering in digital cameras," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., May 2013, pp. 1-11.
-
(2013)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, pp. 1-11
-
-
Stamm, M.C.1
Lin, W.S.2
Liu, K.J.R.3
-
174
-
-
84875836798
-
Forensic identification of compressive sensing in nearly sparse signals
-
Oct.
-
X. Chu, M. C. Stamm, and K. J. R. Liu, "Forensic identification of compressive sensing in nearly sparse signals," in Proc. IEEE Int. Conf. Image Process., Oct. 2012, pp. 257-260.
-
(2012)
Proc. IEEE Int. Conf. Image Process.
, pp. 257-260
-
-
Chu, X.1
Stamm, M.C.2
Liu, K.J.R.3
-
175
-
-
48149086896
-
A component estimation framework for information forensics
-
Oct.
-
A. Swaminathan, M. Wu, and K. J. R. Liu, "A component estimation framework for information forensics," in Proc. IEEE Workshop Multimedia Signal Process., Oct. 2007, pp. 397-400.
-
(2007)
Proc. IEEE Workshop Multimedia Signal Process.
, pp. 397-400
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
176
-
-
51449123141
-
A pattern classification framework for theoretical analysis of component forensics
-
Apr.
-
A. Swaminathan, M. Wu, and K. J. R. Liu, "A pattern classification framework for theoretical analysis of component forensics," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Apr. 2008, pp. 1-3.
-
(2008)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 1-3
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
177
-
-
77951834415
-
Forensic hash for multimedia information
-
Jan.
-
W. Lu, A. L. Varna, and M. Wu, "Forensic hash for multimedia information," Proc. SPIE, vol. 7541, pp. 7541-7544, Jan. 2010.
-
(2010)
Proc. SPIE
, vol.7541
, pp. 7541-7544
-
-
Lu, W.1
Varna, A.L.2
Wu, M.3
-
178
-
-
78651096334
-
Multimedia forensic hash based on visual words
-
Sep.
-
W. Lu and M.Wu, "Multimedia forensic hash based on visual words," in Proc. IEEE Int. Conf. Image Process., Sep. 2010, pp. 989-992.
-
(2010)
Proc. IEEE Int. Conf. Image Process.
, pp. 989-992
-
-
Lu, W.1
Wu, M.2
-
179
-
-
80054783214
-
Seam carving estimation using forensic hash
-
Sep.
-
W. Lu and M. Wu, "Seam carving estimation using forensic hash," in Prof. ACM Multimedia Security Workshop, Sep. 2011, pp. 1-11.
-
(2011)
Prof. ACM Multimedia Security Workshop
, pp. 1-11
-
-
Lu, W.1
Wu, M.2
|