-
2
-
-
70449598250
-
Detection of image sharpening based on histogram aberration and ringing artifacts
-
New York, NY
-
Cao, G., Zhao, Y., & Ni, R. (2010). Detection of image sharpening based on histogram aberration and ringing artifacts. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME), New York, NY.
-
(2010)
Proceedings of the IEEE International Conference on Multimedia and Expo (ICME)
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
-
3
-
-
78149263012
-
Anti-forensics of contrast enhancement in digital images
-
New York, NY
-
Cao, G., Zhao, Y., & Ni, R. (2010). Anti-forensics of contrast enhancement in digital images. In Proceedings of the 12th ACM Workshop on Multimedia and Security, New York, NY.
-
(2010)
Proceedings of the 12th ACM Workshop on Multimedia and Security
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
-
4
-
-
80052396955
-
Unsharp masking sharpening detection via overshoot artifacts analysis
-
doi:10.1109/LSP.2011.2164791
-
Cao, G., Zhao, Y., & Ni, R. (2011). Unsharp masking sharpening detection via overshoot artifacts analysis. IEEE Signal Processing Letters, 18(10), 603-606. doi:10.1109/LSP.2011.2164791.
-
(2011)
IEEE Signal Processing Letters
, vol.18
, Issue.10
, pp. 603-606
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
-
5
-
-
84870264329
-
An evaluation of popular copy-move forgery detection approaches
-
doi:10.1109/TIFS.2012.2218597
-
Christlein, V., Riess, C., Jordan, J., Riess, C., & Angelopoulou, E. (2012). An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security, 7(6), 1841-1854. doi:10.1109/TIFS.2012.2218597.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.6
, pp. 1841-1854
-
-
Christlein, V.1
Riess, C.2
Jordan, J.3
Riess, C.4
Angelopoulou, E.5
-
6
-
-
0038005383
-
Identification of bitmap compression history: Jpeg detection and quantizer estimation
-
doi:10.1109/TIP.2002.807361 PMID:18237903
-
Fan, Z., & Queiroz, R. L. (2003). Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transactions on Image Processing, 12(2), 230-235. doi:10.1109/TIP.2002.807361 PMID:18237903.
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
Queiroz, R.L.2
-
7
-
-
84866278567
-
Image forgery localization via fine- grained analysis of cfa artifacts
-
doi:10.1109/TIFS.2012.2202227
-
Ferrara, P., Bianchi, T., Rosa, A. D., & Piva, A. (2012). Image forgery localization via fine- grained analysis of CFA artifacts. IEEE Transactions on Information Forensics and Security, 7(5), 1566-1577. doi:10.1109/TIFS.2012.2202227.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.5
, pp. 1566-1577
-
-
Ferrara, P.1
Bianchi, T.2
Rosa, A.D.3
Piva, A.4
-
9
-
-
56749180518
-
Hiding traces of resampling in digital images
-
doi:10.1109/TIFS.2008.2008214
-
Kirchner, M., & Böhme, R. (2008). Hiding traces of resampling in digital images. IEEE Transactions on Information Forensics and Security, 3(4), 582-592. doi:10.1109/TIFS.2008.2008214.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 582-592
-
-
Kirchner, M.1
Böhme, R.2
-
11
-
-
84865701450
-
Alternative anti-forensics method for contrast enhancement
-
doi:10.1007/978-3-642-32205-1-32
-
Kwok, C., Au, O., & Chui, S. (2012). Alternative anti-forensics method for contrast enhancement. Lecture Notes in Computer Science, 7128, 398-410. doi:10.1007/978-3-642-32205-1-32.
-
(2012)
Lecture Notes in Computer Science
, vol.7128
, pp. 398-410
-
-
Kwok, C.1
Au, O.2
Chui, S.3
-
12
-
-
84863351586
-
Color-decoupled photo response non-uniformity for digital image forensics
-
doi:10.1109/TCSVT.2011.2160750
-
Li, C. T., & Li, Y. (2012). Color-decoupled photo response non-uniformity for digital image forensics. IEEE Transactions on Circuits and Systems for Video Technology, 22(2), 260-271. doi:10.1109/TCSVT.2011.2160750.
-
(2012)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.22
, Issue.2
, pp. 260-271
-
-
Li, C.T.1
Li, Y.2
-
13
-
-
49549116860
-
Blind authentication using periodic properties of interpolation
-
doi:10.1109/TIFS.2004.924603
-
Mahdian, B., & Saic, S. (2008). Blind authentication using periodic properties of interpolation. IEEE Transactions on Information Forensics and Security, 3(3), 529-538. doi:10.1109/TIFS.2004.924603.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 529-538
-
-
Mahdian, B.1
Saic, S.2
-
14
-
-
80052337449
-
A complete passive blind image copy-move forensics scheme based on compound statistics features
-
doi:10.1016/j.forsciint.2011.06.011 PMID:21726968
-
Peng, F., Nie, Y. Y., & Long, M. (2011). A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Science International, 212(1-3), e21-e25. doi:10.1016/j.forsciint.2011.06.011 PMID:21726968.
-
(2011)
Forensic Science International
, vol.212
, Issue.1-3
-
-
Peng, F.1
Nie, Y.Y.2
Long, M.3
-
16
-
-
78049407658
-
Forensic estimation and reconstruction of a contrast enhancement mapping
-
Dallas, TX
-
Stamm, M., & Liu, K. J. R. (2010). Forensic estimation and reconstruction of a contrast enhancement mapping. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, TX.
-
(2010)
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
-
-
Stamm, M.1
Liu, K.J.R.2
-
18
-
-
80051605162
-
Anti-forensics of digital image compression
-
doi:10.1109/TIFS.2011.2119314
-
Stamm, M., & Liu, K. J. R. (2011). Anti-forensics of digital image compression. IEEE Transactions on Information Forensics and Security, 6(3), 1050-1065. doi:10.1109/TIFS.2011.2119314.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.1
Liu, K.J.R.2
-
19
-
-
79953078612
-
Digital image splicing using edges
-
doi:10.4018/jdcf.2010100105
-
Weir, J., Lau, R., & Yan, W. Q. (2010). Digital image splicing using edges. International Journal of Digital Crime and Forensics, 2(4), 63-75. doi:10.4018/jdcf.2010100105.
-
(2010)
International Journal of Digital Crime and Forensics
, vol.2
, Issue.4
, pp. 63-75
-
-
Weir, J.1
Lau, R.2
Yan, W.Q.3
|