-
1
-
-
84873669138
-
The Source Identification Game: An Information-Theoretic Perspective
-
March
-
M. Barni, B. Tondi, "The Source Identification Game: an Information-Theoretic Perspective," IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 450-463, March 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.3
, pp. 450-463
-
-
Barni, M.1
Tondi, B.2
-
4
-
-
84861122288
-
Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
-
October
-
T. Bianchi, A. Piva, "Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts," IEEE Transactions on Information Forensics and Security, vol. 7, n. 3, pp. 1003 - 1017, October 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.3
, pp. 1003-1017
-
-
Bianchi, T.1
Piva, A.2
-
5
-
-
84858394859
-
Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps
-
October
-
T. Bianchi, A. Piva, "Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps," IEEE Transactions on Information Forensics and Security, vol. 7, n. 2, pp. 842 - 848, October 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 842-848
-
-
Bianchi, T.1
Piva, A.2
-
7
-
-
85032768213
-
Image forgery detection
-
March
-
H. Farid, "Image forgery detection," IEEE Signal Processing Magazine, vol. 26, n. 2, pp. 16-25, March 2009.
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
8
-
-
0038005383
-
Identification of bitmap compression history: JPEG detection and quantizer estimation
-
February
-
Z. Fan, R. L. de Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 230-235, February 2003.
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
De Queiroz, R.L.2
-
10
-
-
34250355507
-
A Generalized Benford's Law for JPEG Coefficients and Its Applications in Image Forensics
-
D. Fu, Y.Q. Shi, W. Su, "A Generalized Benford's Law for JPEG Coefficients and Its Applications in Image Forensics," Proceedings of SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, 2007.
-
Proceedings of SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, 2007
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
11
-
-
37849032097
-
Can we Trust Digital Image Forensics?
-
T. Gloe, M. Kirchner, A. Winkler, R. Boehme, "Can we Trust Digital Image Forensics?," Proceedings of the 15th International Conference on Multimedia, 2007.
-
Proceedings of the 15th International Conference on Multimedia, 2007
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Boehme, R.4
-
14
-
-
0035250707
-
Images and Benford's law
-
J.M. Jolion, "Images and Benford's law," Journal of Mathematical Imaging and Vision, vol. 14, n. 1, pp. 73-81, 2001.
-
(2001)
Journal of Mathematical Imaging and Vision
, vol.14
, Issue.1
, pp. 73-81
-
-
Jolion, J.M.1
-
15
-
-
56749180518
-
Hiding Traces of Resampling in Digital Images
-
December
-
M. Kirchner, R. Boehme, "Hiding Traces of Resampling in Digital Images," IEEE Transactions on Information Forensics and Security, vol. 3, n. 4, pp. 582-592, December 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 582-592
-
-
Kirchner, M.1
Boehme, R.2
-
17
-
-
84873623957
-
Counter-Forensics: Attacking Image Forensics
-
H.T. Sencar and N.D. Memon (eds.): Springer, New York
-
M. Kirchner, R. Boehme, "Counter-Forensics: Attacking Image Forensics," In H.T. Sencar and N.D. Memon (eds.): Digital Image Forensics, pp. 327366, Springer, New York, 2013.
-
(2013)
Digital Image Forensics
, pp. 327366
-
-
Kirchner, M.1
Boehme, R.2
-
19
-
-
0034298708
-
A mathematical analysis of the DCT coefficient distributions for images
-
October
-
E. Y. Lam and J. W. Goodman, "A mathematical analysis of the DCT coefficient distributions for images," IEEE Transactions on Image Processing, vol. 9, n. 10, pp. 1661-1666, October 2000.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.10
, pp. 1661-1666
-
-
Lam, E.Y.1
Goodman, J.W.2
-
20
-
-
58049107658
-
Detecting doubly compressed JPEG images by using mode based first digit features
-
Li, Y. Q. Shi, J. Huang, "Detecting doubly compressed JPEG images by using mode based first digit features," Proceedings of MMSP, 2008.
-
Proceedings of MMSP, 2008
-
-
Li, Y.1
Shi, Q.2
Huang, J.3
-
21
-
-
33745117985
-
Detecting doctored images using camera response normality and consistency
-
Z. Lin, R. Wang, X. Tang, and H-V Shum, "Detecting doctored images using camera response normality and consistency," Proceedings of Computer Vision and Pattern Recognition, 2005.
-
Proceedings of Computer Vision and Pattern Recognition, 2005
-
-
Lin, Z.1
Wang, R.2
Tang, X.3
Shum, H.-V.4
-
24
-
-
80051605162
-
Anti-Forensics of Digital Image Compression
-
September
-
M. C. Stamm, K. J. Ray Liu, "Anti-Forensics of Digital Image Compression," IEEE Transactions on Information Forensics and Security, vol. 6, n. 3, pp. 1050-1065, September 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.C.1
Ray Liu, K.J.2
-
26
-
-
78651088596
-
Undetectable Image Tampering Through JPEG Compression Anti-Forensics
-
M. C. Stamm, S. K. Tjoa, W. S. Lin, K. J. R. Liu, "Undetectable Image Tampering Through JPEG Compression Anti-Forensics," Proceedings of ICIP, 2010.
-
Proceedings of ICIP, 2010
-
-
Stamm, M.C.1
Tjoa, S.K.2
Lin, W.S.3
Liu, K.J.R.4
-
28
-
-
84872328080
-
Revealing the traces of JPEG compression anti-forensics
-
February
-
G. Valenzise, M. Tagliasacchi, S. Tubaro, "Revealing the traces of JPEG compression anti-forensics," IEEE Transactions on Information Security and Forensics, vol. 8, n. 2, pp. 335-349, February 2013.
-
(2013)
IEEE Transactions on Information Security and Forensics
, vol.8
, Issue.2
, pp. 335-349
-
-
Valenzise, G.1
Tagliasacchi, M.2
Tubaro, S.3
|