메뉴 건너뛰기




Volumn 9028, Issue , 2014, Pages

Image counter-forensics based on feature injection

Author keywords

bisection method; constrained minimization; counter forensics; feature decomposition; feature injection; gradient descent; mage forensics; numerical computation

Indexed keywords

MOLECULAR PHYSICS;

EID: 84900444491     PISSN: 0277786X     EISSN: 1996756X     Source Type: Conference Proceeding    
DOI: 10.1117/12.2042234     Document Type: Conference Paper
Times cited : (6)

References (24)
  • 1
    • 84890463165 scopus 로고    scopus 로고
    • An overview on image forensics
    • Article ID 496701
    • Piva, A., An overview on image forensics, ISRN Signal Processing 2013, Article ID 496701, 22 pages (2013)
    • (2013) ISRN Signal Processing , pp. 22
    • Piva, A.1
  • 4
    • 13244251141 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting traces of re-sampling
    • Popescu, A. C. and Farid, H., Exposing digital forgeries by detecting traces of re-sampling, IEEE Transactions on Signal Processing 53(2), 758-767 (2005)
    • (2005) IEEE Transactions on Signal Processing , vol.53 , Issue.2 , pp. 758-767
    • Popescu, A.C.1    Farid, H.2
  • 8
    • 84900424303 scopus 로고    scopus 로고
    • Synthesis of color filter array pattern in digital images
    • Delp, E. J., Dittmann, J., Memon, N., and Wong, P. W., eds
    • Kirchner, M. and Bohme, R., Synthesis of color filter array pattern in digital images, in [SPIE Conference on Media Forensics and Security], Delp, E. J., Dittmann, J., Memon, N., and Wong, P. W., eds. (2009)
    • (2009) SPIE Conference on Media Forensics and Security
    • Kirchner, M.1    Bohme, R.2
  • 14
    • 80053033238 scopus 로고    scopus 로고
    • Countering counter-forensics: The case of JPEG compression
    • Filler, T., Pevny, T., Craver, S., and Ker, A., eds. , Springer-Verlag
    • Lai, S. and Bohme, R., Countering counter-forensics: The case of JPEG compression, in [, 13th International Conference on Information Hiding], Filler, T., Pevny, T., Craver, S., and Ker, A., eds., 6958, 285-298, Springer- Verlag (2011)
    • (2011) 13th International Conference on Information Hiding , vol.6958 , pp. 285-298
    • Lai, S.1    Bohme, R.2
  • 16
    • 0038005383 scopus 로고    scopus 로고
    • Identification of bitmap compression history: JPEG detection and quantizer estimation
    • Fan, Z. and de Queiroz, R., Identification of bitmap compression history: JPEG detection and quantizer estimation, IEEE Transactions on Image Processing 12(2), 230-235 (2003)
    • (2003) IEEE Transactions on Image Processing , vol.12 , Issue.2 , pp. 230-235
    • Fan, Z.1    De Queiroz, R.2
  • 17
    • 84867466942 scopus 로고    scopus 로고
    • A universal technique to hide traces of histogram-based image manipulations
    • Barni, M., Fontani, M., and Tondi, B., A universal technique to hide traces of histogram-based image manipulations, in [ACM Multimedia and Security Workshop], (2012)
    • (2012) ACM Multimedia and Security Workshop
    • Barni, M.1    Fontani, M.2    Tondi, B.3
  • 19
    • 85032752368 scopus 로고    scopus 로고
    • Digital image forensic using sensor noise
    • Fridrich, J., Digital image forensic using sensor noise, IEEE Signal Processing Magazine 26(2), 26-37 (2009)
    • (2009) IEEE Signal Processing Magazine , vol.26 , Issue.2 , pp. 26-37
    • Fridrich, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.