-
1
-
-
0026142897
-
The JPEG still picture compression standard
-
Apr.
-
G. K. Wallace, "The JPEG still picture compression standard," Commun. ACM, vol. 34, no. 4, pp. 30-44, Apr. 1991.
-
(1991)
Commun ACM
, vol.34
, Issue.4
, pp. 30-44
-
-
Wallace, G.K.1
-
2
-
-
0038005383
-
Identification of bitmap compression history: JPEG detection and quantizer estimation
-
Feb.
-
Z. Fan and R. L. de Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Trans. Image Process., vol. 12, no. 2, pp. 230-235, Feb. 2003.
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
De Queiroz, R.L.2
-
3
-
-
33646863861
-
JPEG compression history estimation for color images
-
Jun.
-
R. N. Neelamani, R. de Queiroz, Z. Fan, S. Dash, and R. G. Baraniuk, "JPEG compression history estimation for color images," IEEE Trans. Image Process., vol. 15, no. 6, pp. 1365-1378, Jun. 2006.
-
(2006)
IEEE Trans. Image Process.
, vol.15
, Issue.6
, pp. 1365-1378
-
-
Neelamani, R.N.1
De Queiroz, R.2
Fan, Z.3
Dash, S.4
Baraniuk, R.G.5
-
4
-
-
77955676537
-
JPEG error analysis and its applications to digital image forensics
-
Sep.
-
W. Luo, J. Huang, and G. Qiu, "JPEG error analysis and its applications to digital image forensics," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 480-491, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 480-491
-
-
Luo, W.1
Huang, J.2
Qiu, G.3
-
5
-
-
84861122288
-
Image forgery localization via block-grained analysis of JPEG artifacts
-
Jun.
-
T. Bianchi and A. Piva, "Image forgery localization via block-grained analysis of JPEG artifacts," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1003-1017, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 1003-1017
-
-
Bianchi, T.1
Piva, A.2
-
6
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
Mar.
-
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
7
-
-
67649410199
-
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
-
Nov.
-
Z. Lin, J. He, X. Tang, and C.-K. Tang, "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognit., vol. 42, no. 11, pp. 2492-2501, Nov. 2009.
-
(2009)
Pattern Recognit.
, vol.42
, Issue.11
, pp. 2492-2501
-
-
Lin, Z.1
He, J.2
Tang, X.3
Tang, C.-K.4
-
8
-
-
33847714243
-
Estimation of primary quantization matrix in double compressed JPEG images
-
J. Lukás and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," in Proc. Digit. Forensic Res. Workshop, 2003, pp. 5-8.
-
(2003)
Proc. Digit. Forensic Res. Workshop
, pp. 5-8
-
-
Lukás, J.1
Fridrich, J.2
-
10
-
-
34250355507
-
A generalized Benford's law for JPEG coefficients and its applications in image forensics
-
Feb.
-
D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," Proc. SPIE, vol. 6505, p. 65051L, Feb. 2007.
-
(2007)
Proc. SPIE
, vol.6505
, pp. 65051L
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
11
-
-
58049107658
-
Detecting doubly compressed JPEG images by using mode based first digit features
-
Oct.
-
B. Li, Y. Q. Shi, and J. Huang, "Detecting doubly compressed JPEG images by using mode based first digit features," in Proc. IEEE Int. Workshop Multimedia Signal Process., Oct. 2008, pp. 730-735.
-
(2008)
Proc IEEE Int. Workshop Multimedia Signal Process.
, pp. 730-735
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
12
-
-
44049087452
-
Detection of double-compression in JPEG images for applications in steganography
-
Jun.
-
T. Pevný and J. Fridrich, "Detection of double-compression in JPEG images for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevný, T.1
Fridrich, J.2
-
13
-
-
77955699524
-
A machine learning based scheme for double JPEG compression detection
-
Dec.
-
C. Chen, Y. Q. Shi, and W. Su, "A machine learning based scheme for double JPEG compression detection," in Proc. 19th Int. Conf. Pattern Recognit., Dec. 2008, pp. 1-4.
-
(2008)
Proc. 19th Int. Conf. Pattern Recognit
, pp. 1-4
-
-
Chen, C.1
Shi, Y.Q.2
Su, W.3
-
14
-
-
84937814312
-
F5-A steganographic algorithm: High capacity despite better steganalysis
-
A. Westfeld, "F5-A steganographic algorithm: High capacity despite better steganalysis," in Proc. 4th Int. Workshop Inf. Hiding, 2001, pp. 289-302.
-
(2001)
Proc. 4th Int. Workshop Inf. Hiding
, pp. 289-302
-
-
Westfeld, A.1
-
15
-
-
85084160704
-
Defending against statistical steganalysis
-
Aug.
-
N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX Secur. Symp., Aug. 2001, pp. 323-336.
-
(2001)
Proc. 10th USENIX Secur. Symp
, pp. 323-336
-
-
Provos, N.1
-
16
-
-
78649396720
-
Detecting double JPEG compression with the same quantization matrix
-
Dec.
-
F. Huang, J. Huang, and Y. Q. Shi, "Detecting double JPEG compression with the same quantization matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 848-856, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 848-856
-
-
Huang, F.1
Huang, J.2
Shi, Y.Q.3
-
17
-
-
84890509559
-
Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection
-
May
-
S. Lai and R. Böhme, "Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., May 2013, pp. 3028-3032.
-
(2013)
Proc IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 3028-3032
-
-
Lai, S.1
Böhme, R.2
-
18
-
-
79957470147
-
Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
-
Jun.
-
Y.-L. Chen and C.-T. Hsu, "Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 396-406, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 396-406
-
-
Chen, Y.-L.1
Hsu, C.-T.2
-
19
-
-
84858394859
-
Detection of nonaligned double JPEG compression based on integer periodicity maps
-
Apr.
-
T. Bianchi and A. Piva, "Detection of nonaligned double JPEG compression based on integer periodicity maps," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 842-848, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 842-848
-
-
Bianchi, T.1
Piva, A.2
-
20
-
-
34547529764
-
A novel method for detecting cropped and recompressed image block
-
Apr.
-
W. Luo, Z. Qu, J. Huang, and G. Qiu, "A novel method for detecting cropped and recompressed image block," in Proc. IEEE ICASSP, vol. 2. Apr. 2007, pp. 217-220.
-
(2007)
Proc IEEE ICASSP
, vol.2
, pp. 217-220
-
-
Luo, W.1
Qu, Z.2
Huang, J.3
Qiu, G.4
-
21
-
-
84878464981
-
Image tampering localization via estimating the non-aligned double JPEG compression
-
Mar.
-
L. Wu, X. Kong, B. Wang, and S. Shang, "Image tampering localization via estimating the non-aligned double JPEG compression," Proc. SPIE, vol. 8665, p. 86650R, Mar. 2013.
-
(2013)
Proc. SPIE
, vol.8665
, pp. 86650R
-
-
Wu, L.1
Kong, X.2
Wang, B.3
Shang, S.4
-
22
-
-
84867616246
-
Discriminating multiple JPEG compression using first digit features
-
Mar.
-
S. Milani, M. Tagliasacchi, and S. Tubaro, "Discriminating multiple JPEG compression using first digit features," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Mar. 2012, pp. 2253-2256.
-
Proc IEEE Int. Conf. Acoust., Speech, Signal Process.
, vol.2012
, pp. 2253-2256
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
23
-
-
8844280843
-
UCID-An uncompressed colour image database
-
Jan.
-
G. Schaefer and M. Stich, "UCID-An uncompressed colour image database," Proc. SPIE, pp. 472-480, Jan. 2004.
-
(2004)
Proc. SPIE
, pp. 472-480
-
-
Schaefer, G.1
Stich, M.2
-
24
-
-
84908038808
-
-
NRCS Photo Gallery[Online]. Available accessed Sep. 1, 2012
-
NRCS Photo Gallery.[Online]. Available: http://photogallery.nrcs. usda.gov, accessed Sep. 1, 2012.
-
-
-
|