-
2
-
-
78651398372
-
Digital image forensics: A booklet for beginners
-
J. Rhedi, W. Taktak, and J.-L. Dugelay, "Digital image forensics: a booklet for beginners." Multimedia Application Tools, vol. 51, pp. 133-162, 2011.
-
(2011)
Multimedia Application Tools
, vol.51
, pp. 133-162
-
-
Rhedi, J.1
Taktak, W.2
Dugelay, J.-L.3
-
3
-
-
33646863861
-
JPEG compression history estimation for color images
-
R. Neelamani, R. de Queiroz, Z. Fan, S. Dash, and R. Baraniuk, "JPEG compression history estimation for color images", IEEE Transactions on Image Processing, vol. 15, no. 6, pp. 1365-1378, 2006.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.6
, pp. 1365-1378
-
-
Neelamani, R.1
De Queiroz, R.2
Fan, Z.3
Dash, S.4
Baraniuk, R.5
-
4
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukas, "Determining image origin and integrity using sensor noise", IEEE Transactions on Irormation Forensics and Security, vol. 3, no. 1, pp. 74-90, 2008.
-
(2008)
IEEE Transactions on Irormation Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
5
-
-
84858113264
-
Exposing photo manipulation with inconsistent reflections
-
J. O'Brien and H. Farid, "Exposing photo manipulation with inconsistent reflections", ACM Transactions on Graphics, vol. 1, no. 31, pp. 1-11, 2012.
-
(2012)
ACM Transactions on Graphics
, vol.1
, Issue.31
, pp. 1-11
-
-
O'Brien, J.1
Farid, H.2
-
6
-
-
84855921857
-
Exposing digital forgeries in ballistic motion
-
V. Conotter, J. O'Brien, and H. Farid, "Exposing digital forgeries in ballistic motion", IEEE Transactions on Irormation Forensics and Security, vol. 7, no. 1, pp. 283-296, 2012.
-
(2012)
IEEE Transactions on Irormation Forensics and Security
, vol.7
, Issue.1
, pp. 283-296
-
-
Conotter, V.1
O'Brien, J.2
Farid, H.3
-
7
-
-
84890463165
-
An overview on image forensics
-
Article ID 496701
-
A. Piva, "An overview on image forensics", ISRN Signal Processing, vol. 2013, p. 22 Article ID 496701, 2013.
-
(2013)
ISRN Signal Processing
, vol.2013
, pp. 22
-
-
Piva, A.1
-
8
-
-
56749180518
-
Hiding traces of resampling in digital images
-
M. Kirchner and R. Bohme, "Hiding traces of resampling in digital images", 15th International Conference on Multimedia, vol. 3, no. 4, pp. 582-592, 2008.
-
(2008)
15th International Conference on Multimedia
, vol.3
, Issue.4
, pp. 582-592
-
-
Kirchner, M.1
Bohme, R.2
-
9
-
-
77955676537
-
JPEG error analysis and its application to digital image forensics
-
W. Luo, J. Huang, and G. Qiu;, "JPEG error analysis and its application to digital image forensics", IEEE Transactions on Irormation Forensics and Security, vol. 5, no. 3, pp. 480-491, 2010.
-
(2010)
IEEE Transactions on Irormation Forensics and Security
, vol.5
, Issue.3
, pp. 480-491
-
-
Luo, W.1
Huang, J.2
Qiu, G.3
-
10
-
-
34250355507
-
A generalized Benford's law for JPEG coefficients and its applications in image forensics
-
D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics", SPIE Corerence on Security, Steganography, and Watermarking of Multimedia Contents, vol. 6505. 2007.
-
(2007)
SPIE Corerence on Security, Steganography, and Watermarking of Multimedia Contents
, vol.6505
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
11
-
-
84858394859
-
Detection of nonaligned double JPEG compression based on integer periodicity maps
-
T. Bianchi and A. Piva, "Detection of nonaligned double JPEG compression based on integer periodicity maps", IEEE Transactions on Irormation Forensics and Security, vol. 7, no. 2, pp. 842-848, 2012.
-
(2012)
IEEE Transactions on Irormation Forensics and Security
, vol.7
, Issue.2
, pp. 842-848
-
-
Bianchi, T.1
Piva, A.2
-
12
-
-
44049087452
-
Detection of double-compression in JPEG images for applications in steganography
-
T. Penvy and J. Friedrich, "Detection of double-compression in JPEG images for applications in steganography", IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 247-258, 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Penvy, T.1
Friedrich, J.2
-
13
-
-
84867616246
-
Discriminating multiple JPEG compression using first digit features
-
S. Milani, M. Tagliasacchi, and S. Tubaro, "Discriminating multiple JPEG compression using first digit features", International Conference on Acoustic, Speech ans Signal processing (ICASSP), pp. 2253-2256, 2012.
-
(2012)
International Conference on Acoustic, Speech Ans Signal Processing (ICASSP)
, pp. 2253-2256
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
17
-
-
27644523356
-
A rate control algorithm for DCT-based video coding using simple rate estimation and linear source model
-
J.-Y. Lee and H. W. Park, "A rate control algorithm for DCT-based video coding using simple rate estimation and linear source model", IEEE Transactions on Circuits and Systems for Video Technology, vol. 15, pp. 1077-1085, 2005.
-
(2005)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.15
, pp. 1077-1085
-
-
Lee, J.-Y.1
Park, H.W.2
-
18
-
-
79955702502
-
LIBSYM: A library for support vector machines
-
C.-C. Chang and C.-J. Lin, "LIBSYM: A library for support vector machines", ACM Transactions on Intelligent Systems and Technology, vol. 2, pp. 27:1-27:27, 2011, software available at http://www.csie.ntu.edu.tw/ cjlinllibsvm.
-
(2011)
ACM Transactions on Intelligent Systems and Technology
, vol.2
, pp. 271-2727
-
-
Chang, C.-C.1
Lin, C.-J.2
|