-
1
-
-
0043201448
-
Digital watermarking
-
Jul.
-
M. M. Yeung, "Digital watermarking," Commun. ACM, vol. 41, no. 7, pp. 30-33, Jul. 1998.
-
(1998)
Commun. ACM
, vol.41
, Issue.7
, pp. 30-33
-
-
Yeung, M.M.1
-
2
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Feb.
-
C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153-168, Feb. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
3
-
-
0742272656
-
Fast fingerprint verification using subregions of fingerprint images
-
Jan.
-
K. C. Chan, Y. S. Moon, and P. S. Cheng, "Fast fingerprint verification using subregions of fingerprint images," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 95-101, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.1
, pp. 95-101
-
-
Chan, K.C.1
Moon, Y.S.2
Cheng, P.S.3
-
4
-
-
78650283590
-
Wavelet-based image watermarking with visibility range estimation based on HVS and neural networks
-
Apr.
-
H.-H. Tsai and C.-C. Liu, "Wavelet-based image watermarking with visibility range estimation based on HVS and neural networks," Pattern Recognit., vol. 44, no. 4, pp. 751-763, Apr. 2011.
-
(2011)
Pattern Recognit.
, vol.44
, Issue.4
, pp. 751-763
-
-
Tsai, H.-H.1
Liu, C.-C.2
-
5
-
-
84954462362
-
Higher-order wavelet statistics and their application to digital forensics
-
Madison, WA, USA Jun.
-
H. Farid and S. Lyu, "Higher-order wavelet statistics and their application to digital forensics," in Proc. Conf. Comput. Vis. Pattern Recognit. (CVPR) Workshop, Madison, WA, USA, Jun. 2003, p. 94.
-
(2003)
Proc. Conf. Comput. Vis. Pattern Recognit. (CVPR) Workshop
, pp. 94
-
-
Farid, H.1
Lyu, S.2
-
6
-
-
4344600402
-
Blind detection of photomontage using higher order statistics
-
Vancouver, BC, Canada May
-
T.-T. Ng, S.-F. Chang, and Q. Sun, "Blind detection of photomontage using higher order statistics," in Proc. Int. Symp. Circuits Syst. (ISCAS), Vancouver, BC, Canada, May 2004, pp. V-688-V-691.
-
(2004)
Proc. Int. Symp. Circuits Syst. (ISCAS)
, pp. V688-V691
-
-
Ng, T.-T.1
Chang, S.-F.2
Sun, Q.3
-
7
-
-
34250373244
-
Image splicing detection using 2-D phase congruency and statistical moments of characteristic function
-
San Jose, CA, USA Jan.
-
W. Chen, Y. Q. Shi, and W. Su, "Image splicing detection using 2-D phase congruency and statistical moments of characteristic function," in Proc. SPIE Conf. Secur., Steganogr., Watermarking Multimedia Contents, San Jose, CA, USA, Jan. 2007, pp. 1-8.
-
(2007)
Proc. SPIE Conf. Secur., Steganogr., Watermarking Multimedia Contents
, pp. 1-8
-
-
Chen, W.1
Shi, Y.Q.2
Su, W.3
-
8
-
-
79953744980
-
A passive-blind forgery detection scheme based on content-adaptive quantization table estimation
-
Apr.
-
T. C.-I. Lin, M.-K. Chang, and Y.-L. Chen, "A passive-blind forgery detection scheme based on content-adaptive quantization table estimation," IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 4, pp. 421-434, Apr. 2011.
-
(2011)
IEEE Trans. Circuits Syst. Video Technol.
, vol.21
, Issue.4
, pp. 421-434
-
-
Lin, T.C.-I.1
Chang, M.-K.2
Chen, Y.-L.3
-
9
-
-
78650323484
-
Run-length and edge statistics based approach for image splicing detection
-
J. Dong, W. Wang, T. Tan, and Y. Q. Shi, "Run-length and edge statistics based approach for image splicing detection," in Proc. 7th Int. Workshop Digit. Watermarking (IWDW), Busan, Korea, 2009, pp. 76-87.
-
(2009)
Proc. 7th Int. Workshop Digit. Watermarking (IWDW), Busan, Korea
, pp. 76-87
-
-
Dong, J.1
Wang, W.2
Tan, T.3
Shi, Y.Q.4
-
10
-
-
58349116041
-
Steganalysis versus splicing detection
-
Guangzhou, China
-
Y. Q. Shi, C. Chen, G. Xuan, and W. Su, "Steganalysis versus splicing detection," in Proc. 6th Int. Workshop Digit. Watermarking (IWDW), Guangzhou, China, 2008, pp. 158-172.
-
(2008)
Proc. 6th Int. Workshop Digit. Watermarking (IWDW)
, pp. 158-172
-
-
Shi, Y.Q.1
Chen, C.2
Xuan, G.3
Su, W.4
-
11
-
-
79959193080
-
Digital image splicing detection based on approximate run length
-
Sep.
-
Z. He,W. Sun,W. Lu, and H. Lu, "Digital image splicing detection based on approximate run length," Pattern Recognit. Lett., vol. 32, no. 12, pp. 1591-1597, Sep. 2011.
-
(2011)
Pattern Recognit. Lett.
, vol.32
, Issue.12
, pp. 1591-1597
-
-
He, Z.1
Sun, W.2
Lu, W.3
Lu, H.4
-
12
-
-
79957502155
-
Exposing digital image forgeries by detecting discrepancies in motion blur
-
Jun.
-
P. Kakar, N. Sudha, and W. Ser, "Exposing digital image forgeries by detecting discrepancies in motion blur," IEEE Trans. Multimedia, vol. 13, no. 3, pp. 443-452, Jun. 2011.
-
(2011)
IEEE Trans. Multimedia
, vol.13
, Issue.3
, pp. 443-452
-
-
Kakar, P.1
Sudha, N.2
Ser, W.3
-
13
-
-
85036670435
-
Detecting digital image splicing in chroma spaces
-
X. Zhao, J. Li, S. Li, and S. Wang, "Detecting digital image splicing in chroma spaces," in Proc. 9th Int. Workshop Digit. Watermarking (IWDW), Seoul, Korea, 2011, pp. 12-22.
-
(2011)
Proc. 9th Int. Workshop Digit. Watermarking (IWDW), Seoul, Korea
, pp. 12-22
-
-
Zhao, X.1
Li, J.2
Li, S.3
Wang, S.4
-
14
-
-
34548056428
-
Exposing digital forgeries in complex lighting environments
-
Sep.
-
M. K. Johnson and H. Farid, "Exposing digital forgeries in complex lighting environments," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 450-461, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 450-461
-
-
Johnson, M.K.1
Farid, H.2
-
15
-
-
38849209052
-
A natural image model approach to splicing detection
-
Dallas, TX, USA
-
Y. Q. Shi, C. Chen, and W. Chen, "A natural image model approach to splicing detection," in Proc. 9th Workshop Multimedia Secur. (MM & Sec), Dallas, TX, USA, 2007, pp. 51-62.
-
(2007)
Proc. 9th Workshop Multimedia Secur. (MM & Sec)
, pp. 51-62
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
16
-
-
77951953873
-
Effective image splicing detection based on image chroma
-
Cairo, Egypt, Nov.
-
W. Wang, J. Dong, and T. Tan, "Effective image splicing detection based on image chroma," in Proc. 16th IEEE Int. Conf. Image Process. (ICIP), Cairo, Egypt, Nov. 2009, pp. 1257-1260.
-
(2009)
Proc. 16th IEEE Int. Conf. Image Process. (ICIP)
, pp. 1257-1260
-
-
Wang, W.1
Dong, J.2
Tan, T.3
-
17
-
-
77956006938
-
New developments in color image tampering detection
-
Paris, France, May/Jun.
-
P. Sutthiwan, Y.-Q. Shi, J. Dong, T. Tan, and T.-T. Ng, "New developments in color image tampering detection," in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), Paris, France, May/Jun. 2010, pp. 3064-3067.
-
(2010)
Proc. IEEE Int. Symp. Circuits Syst. (ISCAS)
, pp. 3064-3067
-
-
Sutthiwan, P.1
Shi, Y.-Q.2
Dong, J.3
Tan, T.4
Ng, T.-T.5
-
18
-
-
78349285902
-
Rake transform and edge statistics for image forgery detection
-
Singapore, Jul.
-
P. Sutthiwan, Y. Q. Shi, W. Su, and T.-T. Ng, "Rake transform and edge statistics for image forgery detection," in Proc. IEEE Int. Conf. Multimedia Expo (ICME), Singapore, Jul. 2010, pp. 1463-1468.
-
(2010)
Proc. IEEE Int. Conf. Multimedia Expo (ICME)
, pp. 1463-1468
-
-
Sutthiwan, P.1
Shi, Y.Q.2
Su, W.3
Ng, T.-T.4
-
19
-
-
78651098681
-
Image tampering detection based on stationary distribution of Markov chain
-
Hong Kong, Sep.
-
W. Wang, J. Dong, and T. Tan, "Image tampering detection based on stationary distribution of Markov chain," in Proc. 17th IEEE Int. Conf. Image Process. (ICIP), Hong Kong, Sep. 2010, pp. 2101-2104.
-
(2010)
Proc. 17th IEEE Int. Conf. Image Process. (ICIP)
, pp. 2101-2104
-
-
Wang, W.1
Dong, J.2
Tan, T.3
-
20
-
-
84863039243
-
Markovian rake transform for digital image tampering detection
-
Jul.
-
S. Patchara, Y. Q. Shi, H. Zhao, T.-T. Ng, and W. Su, "Markovian rake transform for digital image tampering detection," Trans. Data Hiding Multimedia Secur. VI, vol. 6730, pp. 1-17, Jul. 2011.
-
(2011)
Trans. Data Hiding Multimedia Secur. VI
, vol.6730
, pp. 1-17
-
-
Patchara, S.1
Shi, Y.Q.2
Zhao, H.3
Ng, T.-T.4
Su, W.5
-
21
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun.
-
T. Pevny, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
22
-
-
77951863205
-
On detection of median filtering in digital images
-
Jan.
-
M. Kirchner and J. Fridrich, "On detection of median filtering in digital images," Proc. SPIE, Media Forensics Secur. II, vol. 7541, pp. 754110-1-754110-12, Jan. 2010.
-
(2010)
Proc. SPIE, Media Forensics Secur. II
, vol.7541
, pp. 7541101-75411012
-
-
Kirchner, M.1
Fridrich, J.2
-
23
-
-
84864277926
-
Digital image splicing detection based on Markov features in DCT and DWT domain
-
Dec.
-
Z. He, W. Lu, W. Sun, and J. Huang, "Digital image splicing detection based on Markov features in DCT and DWT domain," Pattern Recognit., vol. 45, no. 12, pp. 4292-4299, Dec. 2012.
-
(2012)
Pattern Recognit.
, vol.45
, Issue.12
, pp. 4292-4299
-
-
He, Z.1
Lu, W.2
Sun, W.3
Huang, J.4
-
25
-
-
0033882275
-
Image classification by a twodimensional hidden Markov model
-
Feb.
-
J. Li, A. Najmi, and R. M. Gray, "Image classification by a twodimensional hidden Markov model," IEEE Trans. Signal Process., vol. 48, no. 2, pp. 517-533, Feb. 2000.
-
(2000)
IEEE Trans. Signal Process.
, vol.48
, Issue.2
, pp. 517-533
-
-
Li, J.1
Najmi, A.2
Gray, R.M.3
-
26
-
-
67349225720
-
Video event classification and image segmentation based on noncausal multidimensional hidden Markov models
-
Jun.
-
X. Ma, D. Schonfeld, and A. A. Khokhar, "Video event classification and image segmentation based on noncausal multidimensional hidden Markov models," IEEE Trans. Image Process., vol. 18, no. 6, pp. 1304-1313, Jun. 2009.
-
(2009)
IEEE Trans. Image Process.
, vol.18
, Issue.6
, pp. 1304-1313
-
-
Ma, X.1
Schonfeld, D.2
Khokhar, A.A.3
-
27
-
-
0002629270
-
Maximum likelihood from incomplete data via the em algorithm
-
A. P. Dempster, N. M. Laird, and D. B. Rubin, "Maximum likelihood from incomplete data via the EM algorithm," J. Roy. Statist. Soc. B, vol. 39, no. 1, pp. 1-38, 1977.
-
(1977)
J. Roy. Statist. Soc. B
, vol.39
, Issue.1
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
29
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
C.-C. Chang and C.-J. Lin, "LIBSVM: A library for support vector machines," ACM Trans. Intell. Syst. Technol., vol. 2, no. 3, pp. 1-27, 2011.
-
(2011)
ACM Trans. Intell. Syst. Technol.
, vol.2
, Issue.3
, pp. 1-27
-
-
Chang, C.-C.1
Lin, C.-J.2
-
30
-
-
4944228528
-
A practical guide to support vector classification
-
Nat. Taiwan Univ., Taipei, Taiwan, Tech. Rep., Apr. [Online]. Available
-
C.-W. Hsu, C.-C. Chang, and C.-J. Lin, "A practical guide to support vector classification," Dept. Comput. Sci., Nat. Taiwan Univ., Taipei, Taiwan, Tech. Rep., Apr. 2010. [Online]. Available: http://www.csie.ntu.edu.tw/~cjlin/papers/guide/guide.pdf
-
(2010)
Dept. Comput. Sci.
-
-
Hsu, C.-W.1
Chang, C.-C.2
Lin, C.-J.3
-
31
-
-
0345438685
-
-
HP Labs, Palo Alto, CA, USA, Tech. Rep. HPL-2003-4
-
T. Fawcett, "ROC graphs: Notes and practical considerations for data mining researchers," HP Labs, Palo Alto, CA, USA, Tech. Rep. HPL-2003-4, 2004.
-
(2004)
ROC Graphs: Notes and Practical Considerations for Data Mining Researchers
-
-
Fawcett, T.1
-
32
-
-
34247636825
-
Detecting image splicing using geometry invariants and camera characteristics consistency
-
San Jose, CA, USA, Jul.
-
Y.-F. Hsu and S.-F. Chang, "Detecting image splicing using geometry invariants and camera characteristics consistency," in Proc. IEEE Int. Conf. Multimedia Expo, San Jose, CA, USA, Jul. 2006, pp. 549-552.
-
(2006)
Proc. IEEE Int. Conf. Multimedia Expo
, pp. 549-552
-
-
Hsu, Y.-F.1
Chang, S.-F.2
-
33
-
-
8844280843
-
UCID-An uncompressed colour image database
-
Dec.
-
G. Schaefer and M. Stich, "UCID-An uncompressed colour image database," Proc. SPIE, vol. 5307, pp. 472-480, Dec. 2003.
-
(2003)
Proc. SPIE
, vol.5307
, pp. 472-480
-
-
Schaefer, G.1
Stich, M.2
-
34
-
-
84923891804
-
The first IFS-TC image forensics challenge
-
Nov. [Online]. Available
-
A. R. Rocha, A. Piva, and J. Huang, "The first IFS-TC image forensics challenge," IEEE Inf. Forensics Security Tech. Committee, Nov. 2012. [Online]. Available: http://ifc.recod.ic.unicamp.br/fc.website/index.py
-
(2012)
IEEE Inf. Forensics Security Tech. Committee
-
-
Rocha, A.R.1
Piva, A.2
Huang, J.3
|