-
1
-
-
84890463165
-
An overview on image forensics
-
Article ID 496701
-
Piva, A., An overview on image forensics, ISRN Signal Processing 2013, Article ID 496701, 22 pages (2013)
-
(2013)
ISRN Signal Processing
, pp. 22
-
-
Piva, A.1
-
3
-
-
56749180518
-
Hiding traces of resampling in digital images
-
Kirchner, M. and Bohme, R., Hiding traces of resampling in digital images, IEEE Transactions on Information Forensics and Security 3(4), 582-592 (2008)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 582-592
-
-
Kirchner, M.1
Bohme, R.2
-
4
-
-
13244251141
-
Exposing digital forgeries by detecting traces of re-sampling
-
Popescu, A. C. and Farid, H., Exposing digital forgeries by detecting traces of re-sampling, IEEE Transactions on Signal Processing 53(2), 758-767 (2005)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
5
-
-
37849032097
-
Can we trust digital image forensics?
-
Gloe, T., Kirchner, M., Winkler, A., and Bohme, R., Can we trust digital image forensics?, in [International Conference on Multimedia], 78-86 (2007)
-
(2007)
International Conference on Multimedia
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Bohme, R.4
-
6
-
-
79951834941
-
Defending against fingerprint-copy attack in sensor-based camera identification
-
Goljan, M., Fridrich, J., and Chen, M., Defending against fingerprint-copy attack in sensor-based camera identification, IEEE Transactions on Information Forensics and Security 6(1), 227-236 (2011)
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.1
, pp. 227-236
-
-
Goljan, M.1
Fridrich, J.2
Chen, M.3
-
7
-
-
84856484007
-
An analysis on attacker actions in fingerprint-copy attack in source camera identification
-
Caldelli, R., Amerini, I., and Novi, A., An analysis on attacker actions in fingerprint-copy attack in source camera identification, in [IEEE International Workshop on Information Forensics and Security], (2011)
-
(2011)
IEEE International Workshop on Information Forensics and Security
-
-
Caldelli, R.1
Amerini, I.2
Novi, A.3
-
8
-
-
84900424303
-
Synthesis of color filter array pattern in digital images
-
Delp, E. J., Dittmann, J., Memon, N., and Wong, P. W., eds
-
Kirchner, M. and Bohme, R., Synthesis of color filter array pattern in digital images, in [SPIE Conference on Media Forensics and Security], Delp, E. J., Dittmann, J., Memon, N., and Wong, P. W., eds. (2009)
-
(2009)
SPIE Conference on Media Forensics and Security
-
-
Kirchner, M.1
Bohme, R.2
-
9
-
-
78049404806
-
Anti-forensics of JPEG compression
-
Stamm, M., Tjoa, S., Lin, W. S., and Liu, K. J. R., Anti-forensics of JPEG compression, in [International Conference on Acoustics, Speech, and Signal Processing], 1694-1697 (2010)
-
(2010)
International Conference on Acoustics, Speech, and Signal Processing
, pp. 1694-1697
-
-
Stamm, M.1
Tjoa, S.2
Lin, W.S.3
Liu, K.J.R.4
-
10
-
-
80051605162
-
Anti-forensics of digital image compression
-
Stamm, M. and Liu, K. J. R., Anti-forensics of digital image compression, IEEE Transactions on Information Forensics and Security 6(3), 1050-1065 (2011)
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.1
Liu, K.J.R.2
-
11
-
-
69749097361
-
Digital image source coder forensics via intrinsic fingerprints
-
Lin, W. S., Tjoa, S., Zhao, H. V., and Liu, K. J. R., Digital image source coder forensics via intrinsic fingerprints, IEEE Transactions on Information Forensics and Security 4(3), 460-475 (2009)
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.3
, pp. 460-475
-
-
Lin, W.S.1
Tjoa, S.2
Zhao, H.V.3
Liu, K.J.R.4
-
12
-
-
80051643956
-
The cost of JPEG compression anti-forensics
-
Valenzise, G., Tagliasacchi, M., and Tubaro, S., The cost of JPEG compression anti-forensics, in [International Conference on Acoustics, Speech and Signal Processing], (2011)
-
(2011)
International Conference on Acoustics, Speech and Signal Processing
-
-
Valenzise, G.1
Tagliasacchi, M.2
Tubaro, S.3
-
13
-
-
84856278454
-
Countering JPEG anti-forensics
-
Valenzise, G., Nobile, V., Tagliasacchi, M., and Tubaro, S., Countering JPEG anti-forensics, in [International Conference on Image Processing], (2011)
-
(2011)
International Conference on Image Processing
-
-
Valenzise, G.1
Nobile, V.2
Tagliasacchi, M.3
Tubaro, S.4
-
14
-
-
80053033238
-
Countering counter-forensics: The case of JPEG compression
-
Filler, T., Pevny, T., Craver, S., and Ker, A., eds. , Springer-Verlag
-
Lai, S. and Bohme, R., Countering counter-forensics: The case of JPEG compression, in [, 13th International Conference on Information Hiding], Filler, T., Pevny, T., Craver, S., and Ker, A., eds., 6958, 285-298, Springer- Verlag (2011)
-
(2011)
13th International Conference on Information Hiding
, vol.6958
, pp. 285-298
-
-
Lai, S.1
Bohme, R.2
-
15
-
-
78651088596
-
Undetectable image tampering through JPEG compression anti-forensics
-
Stamm, M., Tjoa, S., Lin, W. S., and Liu, K. J. R., Undetectable image tampering through JPEG compression anti-forensics, in [International Conference on Image Processing], (2010)
-
(2010)
International Conference on Image Processing
-
-
Stamm, M.1
Tjoa, S.2
Lin, W.S.3
Liu, K.J.R.4
-
16
-
-
0038005383
-
Identification of bitmap compression history: JPEG detection and quantizer estimation
-
Fan, Z. and de Queiroz, R., Identification of bitmap compression history: JPEG detection and quantizer estimation, IEEE Transactions on Image Processing 12(2), 230-235 (2003)
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
De Queiroz, R.2
-
17
-
-
84867466942
-
A universal technique to hide traces of histogram-based image manipulations
-
Barni, M., Fontani, M., and Tondi, B., A universal technique to hide traces of histogram-based image manipulations, in [ACM Multimedia and Security Workshop], (2012)
-
(2012)
ACM Multimedia and Security Workshop
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
18
-
-
84890488801
-
A variational approach to JPEG anti-forensics
-
Fan, W., Wang, K., Cayre, F., and Xiong, Z., A variational approach to JPEG anti-forensics, in [Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on], 3058-3062 (2013)
-
(2013)
Acoustics, Speech and Signal Processing (ICASSP) 2013 IEEE International Conference on
, pp. 3058-3062
-
-
Fan, W.1
Wang, K.2
Cayre, F.3
Xiong, Z.4
-
19
-
-
85032752368
-
Digital image forensic using sensor noise
-
Fridrich, J., Digital image forensic using sensor noise, IEEE Signal Processing Magazine 26(2), 26-37 (2009)
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, Issue.2
, pp. 26-37
-
-
Fridrich, J.1
-
20
-
-
0032626656
-
Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising
-
mar
-
Kivanc Mihcak, M., Kozintsev, I., and Ramchandran, K., Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising, in [Acoustics, Speech, and Signal Processing, 1999. Proceedings., 1999 IEEE International Conference on], 6, 3253-3256 vol.6 (mar 1999)
-
(1999)
Acoustics, Speech, and Signal Processing 1999. Proceedings. 1999 IEEE International Conference On]
, vol.6
, pp. 3253-3256
-
-
Kivanc Mihcak, M.1
Kozintsev, I.2
Ramchandran, K.3
-
21
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
Chen, M., Fridrich, J., Goljan, M., and Lukas, J., Determining image origin and integrity using sensor noise, IEEE Transactions on Information Forensics and Security 3(1), 74-90 (2008)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
22
-
-
84866278567
-
Image forgery localization via fine-grained analysis of CFA artifacts
-
Ferrara, P., Bianchi, T., De Rosa, A., and Piva, A., Image forgery localization via fine-grained analysis of CFA artifacts, IEEE Transactions on Information Forensics and Security 7(5), 1566 -1577 (2012)
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.5
, pp. 1566-1577
-
-
Ferrara, P.1
Bianchi, T.2
De Rosa, A.3
Piva, A.4
-
23
-
-
77955676537
-
JPEG error analysis and its applications to digital image forensics
-
Luo, W., Huang, J., and Qiu, G., JPEG error analysis and its applications to digital image forensics, IEEE Transactions on Information Forensics and Security 5(3), 480-491 (2010)
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.3
, pp. 480-491
-
-
Luo, W.1
Huang, J.2
Qiu, G.3
|