메뉴 건너뛰기




Volumn , Issue , 2013, Pages 156-161

Joint detection of full-frame linear filtering and JPEG compression in digital images

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84894137076     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIFS.2013.6707811     Document Type: Conference Paper
Times cited : (10)

References (18)
  • 5
    • 84858113264 scopus 로고    scopus 로고
    • Exposing photo manipulation with inconsistent reflections
    • J. O'Brien and H. Farid, "Exposing photo manipulation with inconsistent reflections", ACM Transactions on Graphics, vol. 1, no. 31, pp. 1-11, 2012.
    • (2012) ACM Transactions on Graphics , vol.1 , Issue.31 , pp. 1-11
    • O'Brien, J.1    Farid, H.2
  • 7
    • 84890463165 scopus 로고    scopus 로고
    • An overview on image forensics
    • Article ID 496701
    • A. Piva, "An overview on image forensics", ISRN Signal Processing, vol. 2013, p. 22 Article ID 496701, 2013.
    • (2013) ISRN Signal Processing , vol.2013 , pp. 22
    • Piva, A.1
  • 9
    • 77955676537 scopus 로고    scopus 로고
    • JPEG error analysis and its application to digital image forensics
    • W. Luo, J. Huang, and G. Qiu;, "JPEG error analysis and its application to digital image forensics", IEEE Transactions on Irormation Forensics and Security, vol. 5, no. 3, pp. 480-491, 2010.
    • (2010) IEEE Transactions on Irormation Forensics and Security , vol.5 , Issue.3 , pp. 480-491
    • Luo, W.1    Huang, J.2    Qiu, G.3
  • 11
    • 84858394859 scopus 로고    scopus 로고
    • Detection of nonaligned double JPEG compression based on integer periodicity maps
    • T. Bianchi and A. Piva, "Detection of nonaligned double JPEG compression based on integer periodicity maps", IEEE Transactions on Irormation Forensics and Security, vol. 7, no. 2, pp. 842-848, 2012.
    • (2012) IEEE Transactions on Irormation Forensics and Security , vol.7 , Issue.2 , pp. 842-848
    • Bianchi, T.1    Piva, A.2
  • 12
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression in JPEG images for applications in steganography
    • T. Penvy and J. Friedrich, "Detection of double-compression in JPEG images for applications in steganography", IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 247-258, 2008.
    • (2008) IEEE Transactions on Information Forensics and Security , vol.3 , Issue.2 , pp. 247-258
    • Penvy, T.1    Friedrich, J.2
  • 17
    • 27644523356 scopus 로고    scopus 로고
    • A rate control algorithm for DCT-based video coding using simple rate estimation and linear source model
    • J.-Y. Lee and H. W. Park, "A rate control algorithm for DCT-based video coding using simple rate estimation and linear source model", IEEE Transactions on Circuits and Systems for Video Technology, vol. 15, pp. 1077-1085, 2005.
    • (2005) IEEE Transactions on Circuits and Systems for Video Technology , vol.15 , pp. 1077-1085
    • Lee, J.-Y.1    Park, H.W.2
  • 18
    • 79955702502 scopus 로고    scopus 로고
    • LIBSYM: A library for support vector machines
    • C.-C. Chang and C.-J. Lin, "LIBSYM: A library for support vector machines", ACM Transactions on Intelligent Systems and Technology, vol. 2, pp. 27:1-27:27, 2011, software available at http://www.csie.ntu.edu.tw/ cjlinllibsvm.
    • (2011) ACM Transactions on Intelligent Systems and Technology , vol.2 , pp. 271-2727
    • Chang, C.-C.1    Lin, C.-J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.