-
1
-
-
85032768213
-
Image forgery detection
-
Mar.
-
H. Farid, "Image forgery detection," IEEE Signal Process. Mag., vol. 26, no. 2, pp. 16-25, Mar. 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
2
-
-
77953650817
-
A bibliography on blind methods for identifying image forgery
-
Jul.
-
B. Mahdian and S. Saic, "A bibliography on blind methods for identifying image forgery," Image Commun., vol. 25, no. 6, pp. 389-399, Jul. 2010.
-
(2010)
Image Commun.
, vol.25
, Issue.6
, pp. 389-399
-
-
Mahdian, B.1
Saic, S.2
-
3
-
-
33847671791
-
Image manipulation detection
-
S. Bayram, I. Avcubas, B. Sankur, and N. Memon, "Image manipulation detection," J. Electron. Imag., vol. 15, no. 4, pp. 04110201-04110217, 2006.
-
(2006)
J. Electron. Imag.
, vol.15
, Issue.4
, pp. 04110201-04110217
-
-
Bayram, S.1
Avcubas, I.2
Sankur, B.3
Memon, N.4
-
4
-
-
39449103666
-
Digital image forensics via intrinsic fingerprints
-
DOI 10.1109/TIFS.2007.916010
-
A. Swaminathan, M. Wu, and K. J. R. Liu, "Digital image forensics via intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101-117, Mar. 2008. (Pubitemid 351270076)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 101-117
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
5
-
-
84861133533
-
Manipulation detection on image patches using FusionBoost
-
Jun.
-
H. Cao and A. C. Kot, "Manipulation detection on image patches using FusionBoost," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 992-1002, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 992-1002
-
-
Cao, H.1
Kot, A.C.2
-
6
-
-
84874838762
-
Estimating EXIF parameters based on noise features for image manipulation detection
-
Apr.
-
J. Fan, H. Cao, and A. C. Kot, "Estimating EXIF parameters based on noise features for image manipulation detection," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 608-618, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 608-618
-
-
Fan, J.1
Cao, H.2
Kot, A.C.3
-
7
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
DOI 10.1109/TSP.2004.839932
-
A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005. (Pubitemid 40181769)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
8
-
-
84858394859
-
Detection of non-aligned double JPEG compression based on integer periodicity maps
-
Apr.
-
T. Bianchi and A. Piva, "Detection of non-aligned double JPEG compression based on integer periodicity maps," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 842-848, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 842-848
-
-
Bianchi, T.1
Piva, A.2
-
9
-
-
80052396955
-
Unsharp masking sharpening detection via overshoot artifacts analysis
-
Oct.
-
G. Cao, Y. Zhao, R. Ni, and A. C. Kot, "Unsharp masking sharpening detection via overshoot artifacts analysis," IEEE Signal Process. Lett., vol. 18, no. 10, pp. 603-606, Oct. 2011.
-
(2011)
IEEE Signal Process. Lett.
, vol.18
, Issue.10
, pp. 603-606
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Kot, A.C.4
-
10
-
-
77955707653
-
Forensic detection of image manipulation using statistical intrinsic fingerprints
-
Sep.
-
M. C. Stamm and K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492-506, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 492-506
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
11
-
-
78049407658
-
Forensic estimation and reconstruction of a contrast enhancement mapping
-
Dallas, TX, USA, Mar.
-
M. C. Stamm and K. J. R. Liu, "Forensic estimation and reconstruction of a contrast enhancement mapping," in Proc. IEEE Int. Conf. Acoust., Speech Signal, Dallas, TX, USA, Mar. 2010, pp. 1698-1701.
-
(2010)
Proc. IEEE Int. Conf. Acoust., Speech Signa
, pp. 1698-1701
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
12
-
-
78651080888
-
Forensic estimation of gamma correction in digital images
-
Hong Kong
-
G. Cao, Y. Zhao, and R. Ni, "Forensic estimation of gamma correction in digital images," in Proc. 17th IEEE Int. Conf. Image Process., Hong Kong, 2010, pp. 2097-2100.
-
(2010)
Proc. 17th IEEE Int. Conf. Image Process.
, pp. 2097-2100
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
-
13
-
-
84892537537
-
Reverse engineering of double compressed images in the presence of contrast enhancement
-
Pula, Croatia, Sep./Oct.
-
P. Ferrara, T. Bianchiy, A. De Rosaz, and A. Piva, "Reverse engineering of double compressed images in the presence of contrast enhancement," in Proc. IEEE Workshop Multimedia Signal Process., Pula, Croatia, Sep./Oct. 2013, pp. 141-146.
-
(2013)
Proc. IEEE Workshop Multimedia Signal Process.
, pp. 141-146
-
-
Ferrara, P.1
Bianchiy, T.2
De Rosaz, A.3
Piva, A.4
-
14
-
-
77951863205
-
On detection of median filtering in digital images
-
San Jose, CA, USA, Jan.
-
M. Kirchner and J. Fridrich, "On detection of median filtering in digital images," in Proc. SPIE, Electronic Imaging, Media Forensics and Security II, vol. 7541, San Jose, CA, USA, Jan. 2010, pp. 1-12.
-
(2010)
Proc. SPIE, Electronic Imaging, Media Forensics and Security II
, vol.7541
, pp. 1-12
-
-
Kirchner, M.1
Fridrich, J.2
-
15
-
-
84885095860
-
Blind detection of median filtering in digital images: A difference domain based approach
-
Dec.
-
C. Chen, J. Ni, and J. Huang, "Blind detection of median filtering in digital images: A difference domain based approach," IEEE Trans. Image Process., vol. 22, no. 12, pp. 4699-4710, Dec. 2013.
-
(2013)
IEEE Trans. Image Process.
, vol.22
, Issue.12
, pp. 4699-4710
-
-
Chen, C.1
Ni, J.2
Huang, J.3
-
16
-
-
37549050220
-
A theory of frequency domain invariants: Spherical harmonic identities for BRDF/lighting transfer and image consistency
-
Feb.
-
D. Mahajan, R. Ramamoorthi, and B. Curless, "A theory of frequency domain invariants: Spherical harmonic identities for BRDF/lighting transfer and image consistency," IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 2, pp. 197-213, Feb. 2008.
-
(2008)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.30
, Issue.2
, pp. 197-213
-
-
Mahajan, D.1
Ramamoorthi, R.2
Curless, B.3
-
17
-
-
79952185658
-
Digital image forgery detection based on lens and sensor aberration
-
I. Yerushalmy and H. Hel-Or, "Digital image forgery detection based on lens and sensor aberration," Int. J. Comput. Vis., vol. 92, no. 1, pp. 71-91, 2011.
-
(2011)
Int. J. Comput. Vis.
, vol.92
, Issue.1
, pp. 71-91
-
-
Yerushalmy, I.1
Hel-Or, H.2
-
18
-
-
84858113264
-
Exposing photo manipulation with inconsistent reflections
-
J. O'Brien and H. Farid, "Exposing photo manipulation with inconsistent reflections," ACM Trans. Graph., vol. 31, no. 1, pp. 1-11, 2012.
-
(2012)
ACM Trans. Graph.
, vol.31
, Issue.1
, pp. 1-11
-
-
O'Brien, J.1
Farid, H.2
-
19
-
-
78149263012
-
Anti-forensics of contrast enhancement in digital images
-
Rome, Italy
-
G. Cao, Y. Zhao, R. Ni, and H. Tian, "Anti-forensics of contrast enhancement in digital images," in Proc. ACM Multimedia Security Workshop, Rome, Italy, 2010, pp. 25-34.
-
(2010)
Proc. ACM Multimedia Security Workshop
, pp. 25-34
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Tian, H.4
-
20
-
-
84867466942
-
A universal technique to hide traces of histogram-based image manipulations
-
Coventry, England
-
M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations," in Proc. ACM Multimedia Security Workshop, Coventry, England, 2012, pp. 97-104.
-
(2012)
Proc. ACM Multimedia Security Workshop
, pp. 97-104
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
21
-
-
84873305449
-
Efficient contrast enhancement using adaptive gamma correction with weighting distribution
-
Mar.
-
S.-C. Huang, F.-C. Cheng, and Y.-S. Chiu, "Efficient contrast enhancement using adaptive gamma correction with weighting distribution," IEEE Trans. Image Process., vol. 22, no. 3, pp. 1032-1041, Mar. 2013.
-
(2013)
IEEE Trans. Image Process.
, vol.22
, Issue.3
, pp. 1032-1041
-
-
Huang, S.-C.1
Cheng, F.-C.2
Chiu, Y.-S.3
-
22
-
-
69349099614
-
A histogram modification framework and its application for image contrast enhancement
-
Sep.
-
T. Arici, S. Dikbas, and Y. Altunbasak, "A histogram modification framework and its application for image contrast enhancement," IEEE Trans. Image Process., vol. 18, no. 9, pp. 1921-1935, Sep. 2009.
-
(2009)
IEEE Trans. Image Process.
, vol.18
, Issue.9
, pp. 1921-1935
-
-
Arici, T.1
Dikbas, S.2
Altunbasak, Y.3
-
23
-
-
10444273340
-
Automatic image enhancement by content dependent exposure correction
-
Jan.
-
S. Battiato, A. Bosco, A. Castorina, and G. Messina, "Automatic image enhancement by content dependent exposure correction," EURASIP J. Appl. Signal Process., vol. 12, pp. 1849-1860, Jan. 2004.
-
(2004)
EURASIP J. Appl. Signal Process.
, vol.12
, pp. 1849-1860
-
-
Battiato, S.1
Bosco, A.2
Castorina, A.3
Messina, G.4
-
25
-
-
8844280843
-
UCID-An uncompressed colour image database
-
San Jose, CA, USA
-
G. Schaefer and M. Stich, "UCID-An uncompressed colour image database," in Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, San Jose, CA, USA, 2004, pp. 472-480.
-
(2004)
Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia
, vol.5307
, pp. 472-480
-
-
Schaefer, G.1
Stich, M.2
-
26
-
-
80053005547
-
Break our steganographic system-The ins and outs of organizing BOSS
-
Czech Republic
-
P. Bas, T. Filler, and T. Pevny, "Break our steganographic system-The ins and outs of organizing BOSS," in Proc. Inf. Hiding, Prague, Czech Republic, 2011, pp. 59-70.
-
(2011)
Proc. Inf. Hiding, Prague
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevny, T.3
|