-
1
-
-
84888386204
-
Information forensics: An overview of the first decade
-
M. C. Stamm, M. Wu, and K. J. R. Liu, "Information forensics: An overview of the first decade," Access, IEEE, vol. 1, pp. 167-200, 2013.
-
(2013)
Access, IEEE
, vol.1
, pp. 167-200
-
-
Stamm, M.C.1
Wu, M.2
Liu, K.J.R.3
-
2
-
-
33645696767
-
Source camera identification using footprints from lens aberration
-
Feb.
-
K. S. Choi, E. Y. Lam, and K. Wong, "Source camera identification using footprints from lens aberration," in Proc. SPIE Digit. Photography, vol. 6069, Feb. 2006, pp. 172-179.
-
(2006)
Proc. SPIE Digit. Photography
, vol.6069
, pp. 172-179
-
-
Choi, K.S.1
Lam, E.Y.2
Wong, K.3
-
3
-
-
33744736314
-
Digital camera identification from sensor pattern noise
-
Jun.
-
J. Lukas, J. Fridrich, and M. Goljan, "Digital camera identification from sensor pattern noise," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 205-214, Jun. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.2
, pp. 205-214
-
-
Lukas, J.1
Fridrich, J.2
Goljan, M.3
-
4
-
-
84896478610
-
A bayesianmrf approach for prnu-based image forgery detection
-
Apr.
-
G. Chierchia, G. Poggi, C. Sansone, and L. Verdoliva, "A bayesianmrf approach for prnu-based image forgery detection," IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 554-567, Apr. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.4
, pp. 554-567
-
-
Chierchia, G.1
Poggi, G.2
Sansone, C.3
Verdoliva, L.4
-
5
-
-
34250786106
-
Image based source camera identification using demosaicking
-
Oct.
-
Y. Long and Y. Huang, "Image based source camera identification using demosaicking," in IEEE Workshop Multimedia Signal Process., Oct. 2006, pp. 419-424.
-
(2006)
IEEE Workshop Multimedia Signal Process
, pp. 419-424
-
-
Long, Y.1
Huang, Y.2
-
6
-
-
33847748167
-
Nonintrusive component forensics of visual sensors using output images
-
Mar.
-
A. Swaminathan, M. Wu, and K. J. R. Liu, "Nonintrusive component forensics of visual sensors using output images," IEEE Trans. Inf. Forensics Security, vol. 2, no. 1, pp. 91-106, Mar. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.1
, pp. 91-106
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
7
-
-
84863059671
-
Source camera identification using auto-white balance approximation
-
Nov.
-
Z. Deng, A. Gijsenij, and J. Zhang, "Source camera identification using auto-white balance approximation," in Proc. IEEE Int. Conf. Comput. Vis., Nov. 2011, pp. 57-64.
-
(2011)
Proc. IEEE Int. Conf. Comput. Vis.
, pp. 57-64
-
-
Deng, Z.1
Gijsenij, A.2
Zhang, J.3
-
8
-
-
34547582679
-
Source camera identification by JPEG compression statistics for image forensics
-
Nov.
-
K. S. Choi, E. Y. Lam, and K. K. Y. Wong, "Source camera identification by JPEG compression statistics for image forensics," in IEEE Region Conf. TENCON, Nov. 2006, pp. 1-4.
-
(2006)
IEEE Region Conf. TENCON
, pp. 1-4
-
-
Choi, K.S.1
Lam, E.Y.2
Wong, K.K.Y.3
-
9
-
-
84891296342
-
Camera model identification based on the heteroscedastic noise model
-
Jan.
-
T. H. Thai, R. Cogranne, and F. Retraint, "Camera model identification based on the heteroscedastic noise model," IEEE Trans. Image Process., vol. 23, no. 1, pp. 250-263, Jan. 2014.
-
(2014)
IEEE Trans. Image Process.
, vol.23
, Issue.1
, pp. 250-263
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
12
-
-
84880064175
-
Statistical model of natural images
-
Sep.
-
T. H. Thai, R. Cogranne, and F. Retraint, "Statistical model of natural images," in Proc. IEEE. Int. Conf. Image Process., Sep. 2012, pp. 2525-2528.
-
(2012)
Proc. IEEE. Int. Conf. Image Process
, pp. 2525-2528
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
13
-
-
84897792025
-
Steganalysis of jsteg algorithm based on a novel statistical model of quantized DCT coefficients
-
Sep.
-
-, "Steganalysis of jsteg algorithm based on a novel statistical model of quantized DCT coefficients," in Proc. IEEE Int. Conf. Image Process., Sep. 2013, pp. 4427-4431.
-
(2013)
Proc. IEEE Int. Conf. Image Process
, pp. 4427-4431
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
14
-
-
84898049332
-
Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm
-
May
-
-, "Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm," IEEE Trans. Image Process., vol. 23, no. 5, pp. 1980-1993, May 2014.
-
(2014)
IEEE Trans. Image Process
, vol.23
, Issue.5
, pp. 1980-1993
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
17
-
-
0036389689
-
Laplace approximations for hypergeometric functions with matrix argument
-
R. Butler and A. Wood, "Laplace approximations for hypergeometric functions with matrix argument," Ann. Statist., vol. 30, no. 4, pp. 1155-1177, 2002.
-
(2002)
Ann. Statist.
, vol.30
, Issue.4
, pp. 1155-1177
-
-
Butler, R.1
Wood, A.2
-
18
-
-
77954723646
-
The Dresden image database for benchmarking digital image forensics
-
T. Gloe and R. Bohme, "The Dresden image database for benchmarking digital image forensics," in Proc. ACM Symposium Applied Comput., vol. 2, 2010, pp. 1585-1591.
-
(2010)
Proc. ACM Symposium Applied Comput.
, vol.2
, pp. 1585-1591
-
-
Gloe, T.1
Bohme, R.2
|