-
1
-
-
85032751542
-
Digital forensics
-
E. Delp and M.Wu, "Digital forensics," IEEE Signal Processing Magazine, vol. 2, no. 26, pp. 14-15, 2009.
-
(2009)
IEEE Signal Processing Magazine
, vol.2
, Issue.26
, pp. 14-15
-
-
Delp, E.1
Wu, M.2
-
2
-
-
78651398372
-
Digital image forensics: A booklet for beginners
-
J. Rhedi, W. Taktak, and J-L. Dugelay, "Digital image forensics: A booklet for beginners.," Multimedia Application Tools, vol. 51, pp. 133-162, 2011.
-
(2011)
Multimedia Application Tools
, vol.51
, pp. 133-162
-
-
Rhedi, J.1
Taktak, W.2
Dugelay, J.-L.3
-
3
-
-
33646863861
-
JPEG compression history estimation for color images
-
R. Neelamani, R. de Queiroz, Z. Fan, S. Dash, and R. Baraniuk, "JPEG compression history estimation for color images," IEEE Transactions on Image Processing, vol. 15, no. 6, pp. 1365-1378, 2006.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.6
, pp. 1365-1378
-
-
Neelamani, R.1
De Queiroz, R.2
Fan, Z.3
Dash, S.4
Baraniuk, R.5
-
4
-
-
77955676537
-
JPEG error analysis and its application to digital image forensics
-
W. Luo, J. Huang, and G. Qiu;, "JPEG error analysis and its application to digital image forensics," IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 480-491, 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.3
, pp. 480-491
-
-
Luo, W.1
Huang, J.2
Qiu, G.3
-
5
-
-
34250355507
-
A generalized benford's law for JPEG coefficients and its applications in image forensics
-
D. Fu, Y. Shi, and W. Su, "A generalized benford's law for JPEG coefficients and its applications in image forensics," SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, vol. 6505, 2007.
-
(2007)
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
, vol.6505
-
-
Fu, D.1
Shi, Y.2
Su, W.3
-
6
-
-
44049087452
-
Detection of double-compression in JPEG images for applications in steganography
-
T. Pevny and J. Fridrich, "Detection of double-compression in JPEG images for applications in steganography," IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 247-258, 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevny, T.1
Fridrich, J.2
-
12
-
-
0036709581
-
A framework for evaluating the data-hiding capacity of image sources
-
P. Moulin and M. Kvanç Mihçak, "A framework for evaluating the data-hiding capacity of image sources," IEEE Transactions on Image Processing, vol. 11, no. 9, pp. 1029-1042, 2002.
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.9
, pp. 1029-1042
-
-
Moulin, P.1
Kvanc Mihcak, M.2
-
13
-
-
79960452698
-
The quadratic-chi histogram distance family
-
O. Pele and M. Werman, "The quadratic-chi histogram distance family," Computer Vision-ECCV 2010, vol. 6321, pp. 749-762, 2010.
-
(2010)
Computer Vision-ECCV 2010
, vol.6321
, pp. 749-762
-
-
Pele, O.1
Werman, M.2
-
14
-
-
0030678780
-
Non-parametric similarity measures for unsupervised texture segmentation and image retrieval
-
J. Puzicha, T. Hofmann, and J. Buhmann, "Non-parametric similarity measures for unsupervised texture segmentation and image retrieval," IEEE Computer Society Conference on Computer Vision and Patter Recognition (CVPR), pp. 267-272, 1997.
-
(1997)
IEEE Computer Society Conference on Computer Vision and Patter Recognition (CVPR)
, pp. 267-272
-
-
Puzicha, J.1
Hofmann, T.2
Buhmann, J.3
|