-
1
-
-
84890444751
-
Anti-forensics of median filtering
-
Vancouver, Canada, May
-
Z.-H. Wu, M. C. Stamm, K. J. R. Liu, "Anti-Forensics of Median Filtering", IEEE Int. Conf. Acoustic, Speech, and Signal Processing, Vancouver, Canada, pp. 3043-3047, May 2013.
-
(2013)
IEEE Int. Conf. Acoustic, Speech, and Signal Processing
, pp. 3043-3047
-
-
Wu, Z.-H.1
Stamm, M.C.2
Liu, K.J.R.3
-
2
-
-
37849032097
-
Can we trust digital image forensics
-
Sept.
-
T. Gloe, M. Kirchner, A. Winkler, and R. Bohme, "Can we trust digital image forensics?" Multimedia '07, Proceedings of the 15th international conference on Multimedia, pp. 78-86, Sept. 2007.
-
(2007)
Multimedia '07, Proceedings of the 15th International Conference on Multimedia
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Bohme, R.4
-
3
-
-
80051605162
-
Anti-forensics of digital image compression
-
M. C. Stamm, K. J. R. Liu, "Anti-forensics of digital image compression," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1050-1065, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
4
-
-
84865701450
-
Alternative anti-forensics method for contrast enhancement in proceedings of the 10th international conference on digital-forensics and watermarking
-
Y. Shi, H. Kim, and F. Perez-Gonzalez (Eds.).Springer Berlin Heidelberg
-
C. Kwok, O. C. Au, and S. Chui. "Alternative anti-forensics method for contrast enhancement," In Proceedings of the 10th international conference on Digital-Forensics and Watermarking, Y. Shi, H. Kim, and F. Perez-Gonzalez (Eds.). Lecture Notes In Computer Science, Vol. 7128. Springer Berlin Heidelberg, pp. 398-410, 2011.
-
(2011)
Lecture Notes in Computer Science
, vol.7128
, pp. 398-410
-
-
Kwok, C.1
Au, O.C.2
Chui, S.3
-
5
-
-
84869807478
-
Hiding traces of median filtering in digital images
-
Aug.
-
M. Fontani, M. Barni, "Hiding traces of median filtering in digital images," Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European, vol., no., pp. 1239-1243, Aug. 2012.
-
(2012)
Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European
, pp. 1239-1243
-
-
Fontani, M.1
Barni, M.2
-
6
-
-
79951834941
-
Defending against fingerprint-copy attack in sensor-based camera identification
-
M. Goljan, J. Fridrich, and M. Chen, "Defending against fingerprint-copy attack in sensor-based camera identification," IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 227-236, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.1
, pp. 227-236
-
-
Goljan, M.1
Fridrich, J.2
Chen, M.3
-
7
-
-
80053033238
-
Countering counter-forensics: The case of JPEG compression
-
Springer Berlin Heidelberg
-
S. Lai, R. Böhme, "Countering counter-forensics: The case of JPEG compression," Information Hiding. Springer Berlin Heidelberg, 2011, pp. 285-298.
-
(2011)
Information Hiding
, pp. 285-298
-
-
Lai, S.1
Böhme, R.2
-
8
-
-
84864034865
-
Forensics vs antiforensics: A decision and game theoretic framework
-
Kyoto
-
M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Forensics vs. antiforensics: A decision and game theoretic framework," IEEE Int. Conf. Acoustic, Speech, and Signal Processing, pp. 1749-1752, Kyoto, 2012.
-
(2012)
IEEE Int. Conf. Acoustic, Speech, and Signal Processing
, pp. 1749-1752
-
-
Stamm, M.C.1
Lin, W.S.2
Liu, K.J.R.3
-
9
-
-
84873669138
-
The source identification game: An information theoretic perspective
-
M. Barni and B. Tondi. "The source identification game: An information theoretic perspective," IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 450-463, 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.3
, pp. 450-463
-
-
Barni, M.1
Tondi, B.2
-
10
-
-
77951863205
-
On detection of median filtering in digital images
-
M. Kirchner and J. Fridrich, "On detection of median filtering in digital images," in Proc. SPIE, Electronic Imaging, Media Forensics and Security II, 2010, vol. 7541, pp. 1-12.
-
(2010)
Proc. SPIE, Electronic Imaging, Media Forensics and Security II
, vol.7541
, pp. 1-12
-
-
Kirchner, M.1
Fridrich, J.2
-
11
-
-
78349262619
-
Forensic detection of median filtering in digital images
-
G. Cao, Y. Zhao, R. R. Ni, L. F.Yu, and H.W. Tian, "Forensic detection of median filtering in digital images," in Proc. 2010 IEEE Int. Conf. Multimedia and EXPO, 2010, pp. 89-94.
-
(2010)
Proc. 2010 IEEE Int. Conf. Multimedia and EXPO
, pp. 89-94
-
-
Cao, G.1
Zhao, Y.2
Ni, R.R.3
Yu, L.F.4
Tian, H.W.5
-
12
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
A. Ker and R. Böhme, "Revisiting weighted stego-image steganalysis," in Proc. SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 2008, vol. 6819, pp. 501-517.
-
(2008)
Proc. SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 501-517
-
-
Ker, A.1
Böhme, R.2
-
13
-
-
82055176931
-
Blind forensics of median filtering in digital images
-
Dec.
-
H. Yuan, "Blind forensics of median filtering in digital images," IEEE Transactions on Information Forensics and Security, vol. 6, no. 4, pp.1335-1345, Dec. 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.4
, pp. 1335-1345
-
-
Yuan, H.1
-
14
-
-
84885127873
-
Blind median filtering detection using statistics in difference domain
-
Berkerly, USA, May
-
C. Chen, J. Ni, R. Huang, J. Huang, "Blind median filtering detection using statistics in difference domain," in Proc. of information Hiding 2012, Berkerly, USA, May 2012.
-
(2012)
Proc. of Information Hiding 2012
-
-
Chen, C.1
Ni, J.2
Huang, R.3
Huang, J.4
-
15
-
-
84882957962
-
Robust median filtering forensics using an autoregressive model
-
Sept.
-
X. Kang, M. C. Stamm, A. Peng, K. J. R. Liu, "Robust Median Filtering Forensics Using an Autoregressive Model," IEEE Transactions on Information Forensics and Security, vol.8, no.9, pp.1456,1468, Sept. 2013
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.9
, pp. 1456-1468
-
-
Kang, X.1
Stamm, M.C.2
Peng, A.3
Liu, K.J.R.4
-
16
-
-
33847140979
-
Multivariate statistical modeling of images with the curvelet transform
-
L. Boubchir and J. M. Fadili, "Multivariate statistical modeling of images with the curvelet transform," in Signal Processing and Its Applications, 2005. Proceedings of the Eighth International Symposium on, 28-31, 2005, vol. 2, pp. 747-750.
-
(2005)
Signal Processing and Its Applications, 2005. Proceedings of the Eighth International Symposium On, 28-31
, vol.2
, pp. 747-750
-
-
Boubchir, L.1
Fadili, J.M.2
-
18
-
-
77955667691
-
Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery
-
Sept.
-
W. Wei, S. Wang, X. Zhang, Z. Tang, "Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery," IEEE Transactions on Information Forensics and Security, vol.5, no.3, pp.507,517, Sept. 2010
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.3
, pp. 507-517
-
-
Wei, W.1
Wang, S.2
Zhang, X.3
Tang, Z.4
-
19
-
-
79955401108
-
The dresden image database for benchmarking digital image forensics
-
T. Gloe and R. Bohme, "The dresden image database for benchmarking digital image forensics," Journal of Digital Forensic Practice, vol. 3, no. 2-4, pp. 150-159, 2010.
-
(2010)
Journal of Digital Forensic Practice
, vol.3
, Issue.2-4
, pp. 150-159
-
-
Gloe, T.1
Bohme, R.2
|