-
1
-
-
84890463324
-
Coping with the enemy: Advances in adversary-aware signal processing
-
M. Barni and F. Pérez-González, "Coping with the enemy: Advances in adversary-aware signal processing," in Proceedings of IEEE ICASSP, 2013, pp. 8682-8686.
-
(2013)
Proceedings of IEEE ICASSP
, pp. 8682-8686
-
-
Barni, M.1
Pérez-González, F.2
-
2
-
-
56749180518
-
Hiding traces of resampling in digital images
-
M. Kirchner and R. Boehme, "Hiding traces of resampling in digital images," in IEEE Transactions on Information Forensics and Security, 2008, vol. 3, no.4, pp. 582-592.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 582-592
-
-
Kirchner, M.1
Boehme, R.2
-
3
-
-
84869807478
-
Hiding traces of median filtering in digital images
-
M. Fontani and M. Barni, "Hiding traces of median filtering in digital images," in Proceedings of IEEE EUSIPCO, 2012, pp. 1239-1243.
-
(2012)
Proceedings of IEEE EUSIPCO
, pp. 1239-1243
-
-
Fontani, M.1
Barni, M.2
-
4
-
-
84892496918
-
Counterforensics of median filtering
-
D.T. Dang-Nguyen, I.D. Gebru, V. Conotter, G. Boato, and F.G.B. De Natale, "Counterforensics of median filtering," in Proceedings of IEEE MMSP, 2013.
-
(2013)
Proceedings of IEEE MMSP
-
-
Dang-Nguyen, D.T.1
Gebru, I.D.2
Conotter, V.3
Boato, G.4
De Natale, F.G.B.5
-
5
-
-
80051605162
-
Anti-forensics of digital image compression
-
M.C. Stamm and K. J. Ray Liu, "Anti-forensics of digital image compression," in IEEE Transactions on Information Forensics and Security, 2011, vol. 6, no. 3, pp. 1050-1065.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.C.1
Ray Liu, K.J.2
-
6
-
-
84892527710
-
JPEG compression anti-forensics based on first significant digit distribution
-
C. Pasquini and G. Boato, "JPEG compression anti-forensics based on first significant digit distribution," in Proceedings of IEEE MMSP, 2013.
-
(2013)
Proceedings of IEEE MMSP
-
-
Pasquini, C.1
Boato, G.2
-
7
-
-
37849032097
-
Can we trust digital forensics?
-
T. Gloe, M. Kirchner, A. Winkler, and R. Boehme, "Can we trust digital forensics," in Proceedings of the 15th ACM International Conference on Multimedia, 2007, pp. 78-86.
-
(2007)
Proceedings of the 15th ACM International Conference on Multimedia
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Boehme, R.4
-
8
-
-
84867466942
-
A universal technique to hide traces of histogram-based image manipulations
-
M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations," in Proceedings of ACM Workshop on Multimedia and Security, 2012, pp. 97-104.
-
(2012)
Proceedings of ACM Workshop on Multimedia and Security
, pp. 97-104
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
11
-
-
48149107008
-
Benford's law in image processing
-
F. Peréz-González, G. L. Heileman, and C.T. Abdallah, "Benford's law in image processing," in Proceedings of IEEE ICIP, 2007, pp. 405-408.
-
(2007)
Proceedings of IEEE ICIP
, pp. 405-408
-
-
Peréz-González, F.1
Heileman, G.L.2
Abdallah, C.T.3
-
12
-
-
34250355507
-
A generalized benford's law for jpeg coefficients and its applications in image forensics
-
D. Fu, Y.Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Proceedings of SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, 2007, vol. 6505.
-
(2007)
Proceedings of SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
, pp. 6505
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
13
-
-
58049107658
-
Detecting doubly compressed JPEG images by using mode based first digit features
-
B. Li, Y.Q. Shi, and J. Huang, "Detecting doubly compressed JPEG images by using mode based first digit features," in Proceedings of IEEE MMSP, 2008, pp. 730-735.
-
(2008)
Proceedings of IEEE MMSP
, pp. 730-735
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
14
-
-
84867616246
-
Discriminating multiple JPEG compression using first digit features
-
S. Milani, M. Tagliasacchi, and S. Tubaro, "Discriminating multiple JPEG compression using first digit features," in Proceedings of IEEE ICASSP, 2012, pp. 2253-2256.
-
(2012)
Proceedings of IEEE ICASSP
, pp. 2253-2256
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
15
-
-
84890447451
-
Antiforensics attack to Benford's law for the detection of double compressed images
-
S. Milani, M. Tagliasacchi, and S. Tubaro, "Antiforensics attack to Benford's law for the detection of double compressed images," in Proceedings of IEEE ICASSP, 2013, pp. 3053-3057.
-
(2013)
Proceedings of IEEE ICASSP
, pp. 3053-3057
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
17
-
-
45849126497
-
Resource allocation for delay differentiated traffic in multiuser ODFM systems
-
M. Tao, Y.C. Liang, and F. Zhang, "Resource allocation for delay differentiated traffic in multiuser ODFM systems," in IEEE Transactions on Wireless Communications, 2008, vol. 7, no. 6, pp. 2190-2201.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.6
, pp. 2190-2201
-
-
Tao, M.1
Liang, Y.C.2
Zhang, F.3
-
18
-
-
8844280843
-
UCID-An uncompressed colour image database
-
Schaefer G. and M. Stich, "UCID-An uncompressed colour image database," in Proceedings of SPIE, 2004, vol. 5307.
-
(2004)
Proceedings of SPIE
, pp. 5307
-
-
Schaefer, G.1
Stich, M.2
|