-
1
-
-
78049366470
-
Forensics aided steganalysis of heterogeneous images
-
2010
-
Barni M, Cancelli G, Esposito A (2010) Forensics aided steganalysis of heterogeneous images. In: IEEE international conference on acoustics, speech and signal processing, ICASSP 2010, 1690-1693 2010
-
(2010)
IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2010
, pp. 1690-1693
-
-
Barni, M.1
Cancelli, G.2
Esposito, A.3
-
4
-
-
70349303469
-
Multimedia forensics is not computer foren-sics
-
Geradts ZJ, Franke KY, Veenman CJ (eds) Springer, Berlin
-
Böhme R, Freiling F, Gloe T, Kirchner M (2009) Multimedia forensics is not computer foren-sics. In: Geradts ZJ, Franke KY, Veenman CJ (eds) Computational forensics, 3rd international workshop, IWCF 2009. Lecture notes in computer science, vol 5718. Springer, Berlin, pp 90-103
-
(2009)
Computational Forensics, 3rd International Workshop, IWCF 2009. Lecture Notes in Computer Science
, vol.5718
, pp. 90-103
-
-
Böhme, R.1
Freiling, F.2
Gloe, T.3
Kirchner, M.4
-
5
-
-
84957868624
-
An information-theoretic model for steganography
-
Aucsmith D (ed) Springer, Berlin
-
Cachin C (1998) An information-theoretic model for steganography. In: Aucsmith D (ed) Information hiding, second international workshop, IH 98. Springer, Berlin, pp 306-318
-
(1998)
Information Hiding, Second International Workshop, IH
, vol.98
, pp. 306-318
-
-
Cachin, C.1
-
6
-
-
78149263012
-
Anti-forensics of contrast enhancement in digital images
-
ACM Press, New York 2010
-
Cao G, Zhao Y, Ni R, Tian H (2010) Anti-forensics of contrast enhancement in digital images. In: Proceedings of the 12th ACM workshop on multimedia and security MM&Sec '10, pp 25-34. ACM Press, New York 2010
-
(2010)
Proceedings of the 12th ACM Workshop on Multimedia and Security MM&Sec '10
, pp. 25-34
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Tian, H.4
-
7
-
-
78349262619
-
Forensic detection of median filtering in digital images
-
IEEE 2010
-
Cao G, Zhao Y, Ni R, Yu L, Tian H (2010) Forensic detection of median filtering in digital images. In: IEEE international conference on multimedia and EXPO, ICME 2010, pp 89-94. IEEE 2010
-
(2010)
IEEE International Conference on Multimedia and EXPO, ICME 2010
, pp. 89-94
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Yu, L.4
Tian, H.5
-
8
-
-
85192427820
-
-
Chinese Academy of Sciences, Institute of Automation: Casia tampered image detection evaluation database
-
Chinese Academy of Sciences, Institute of Automation: Casia tampered image detection evaluation database (2009/2010). http://forensics.idealtest.org
-
(2009)
-
-
-
9
-
-
84874227481
-
A study on features for the detection of copy-move forgeries
-
Freiling FC (ed) Gesellschaft für Informatik e.V., Bonn
-
Christlein V, Riess C, Angelopoulou E (2010) A study on features for the detection of copy-move forgeries. In: Freiling FC (ed) Sicherheit 2010, pp. 105-116. Gesellschaft für Informatik e.V., Bonn
-
(2010)
Sicherheit 2010
, pp. 105-116
-
-
Christlein, V.1
Riess, C.2
Angelopoulou, E.3
-
10
-
-
85013855044
-
-
Morgan Kaufmann, Burlington
-
Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganog-raphy. Morgan Kaufmann, Burlington
-
(2008)
Digital Watermarking and Steganog-raphy
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
Fridrich, J.4
Kalker, T.5
-
11
-
-
78650053641
-
Avoiding twisted pixels: Ethical guidelines for the appropriate use and manipulation of scientific digital images
-
Cromey DW (2010) Avoiding twisted pixels: ethical guidelines for the appropriate use and manipulation of scientific digital images. Sci Eng Ethics 16(4):639-667
-
(2010)
Sci Eng Ethics
, vol.16
, Issue.4
, pp. 639-667
-
-
Cromey, D.W.1
-
12
-
-
0038005383
-
Identification of bitmap compression history: JPEG detection and quantizer estimation
-
Fan Z, Queiroz RL (2003) Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process 12(2):230-235
-
(2003)
IEEE Trans Image Process
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
Queiroz, R.L.2
-
13
-
-
85032752368
-
Digital image forensics
-
Fridrich J (2009) Digital image forensics. IEEE Signal Process Mag 26(2):26-37
-
(2009)
IEEE Signal Process Mag
, vol.26
, Issue.2
, pp. 26-37
-
-
Fridrich, J.1
-
15
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
Friedman G (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron 39(4):905-910
-
(1993)
IEEE Trans Consum Electron
, vol.39
, Issue.4
, pp. 905-910
-
-
Friedman, G.1
-
16
-
-
70350460002
-
Feature-based camera model identification works in practice: Results of a comprehensive evaluation study
-
Katzenbeisser S, Sadeghi AR (eds) Springer, Berlin
-
Gloe T, Borowka K, Winkler A (2009) Feature-based camera model identification works in practice: results of a comprehensive evaluation study. In: Katzenbeisser S, Sadeghi AR (eds) Information hiding, 11th international workshop, IH 2009. Lecture notes in computer science, vol 5806. Springer, Berlin, pp 262-276
-
(2009)
Information Hiding, 11th International Workshop, IH 2009. Lecture Notes in Computer Science
, vol.5806
, pp. 262-276
-
-
Gloe, T.1
Borowka, K.2
Winkler, A.3
-
17
-
-
37849032097
-
Can we trust digital image forensics?
-
ACM Press, New York, NY, 2007
-
Gloe T, Kirchner M, Winkler A, Böhme R (2007) Can we trust digital image forensics? In: Proceedings of the 15th international conference on multimedia, MULTIMEDIA '07, pp 78-86. ACM Press, New York, NY, 2007
-
(2007)
Proceedings of the 15th International Conference on Multimedia, MULTIMEDIA '07
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Böhme, R.4
-
18
-
-
77951842370
-
Sensor noise camera identification: Countering counter-forensics
-
Memon ND, Dittmann J, Alattar AM, Delp EJ (eds) SPIE, Bellingham, WA, 2010
-
Goljan M, Fridrich J, Chen M (2010) Sensor noise camera identification: Countering counter-forensics. In: Memon ND, Dittmann J, Alattar AM, Delp EJ (eds) Media forensics and security II, Proceedings of SPIE, vol 7541, p 75410S. SPIE, Bellingham, WA, 2010
-
(2010)
Media Forensics and Security II, Proceedings of SPIE
, vol.7541
, pp. 75410S
-
-
Goljan, M.1
Fridrich, J.2
Chen, M.3
-
19
-
-
34247636825
-
Detecting image splicing using geometry invariants and camera characteristics consistency
-
IEEE 2006
-
Hsu YF, Chang SF (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In: IEEE international conference on multimedia and EXPO, ICME 2006, pp. 549-552. IEEE 2006
-
(2006)
IEEE International Conference on Multimedia and EXPO, ICME 2006
, pp. 549-552
-
-
Hsu, Y.F.1
Chang, S.F.2
-
20
-
-
32544433269
-
Can digital image forgery detection be unevadable? A case study: Color filter array interpolation statistical feature recovery
-
Li S, Pereira F, Shum HY, Tescher AG (eds) 2005
-
Huang Y (2005) Can digital image forgery detection be unevadable? A case study: color filter array interpolation statistical feature recovery. In: Li S, Pereira F, Shum HY, Tescher AG (eds) Proceedings of SPIE: visual communications and image processing, vol SPIE 5960, p 59602W, 2005
-
(2005)
Proceedings of SPIE: Visual Communications and Image Processing, Vol SPIE
, vol.5960
, pp. 59602W
-
-
Huang, Y.1
-
21
-
-
34548056428
-
Exposing digital forgeries in complex lighting environments
-
Johnson MK, Farid H (2007) Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensics Secur 2(3):450-461
-
(2007)
IEEE Trans Inf Forensics Secur
, vol.2
, Issue.3
, pp. 450-461
-
-
Johnson, M.K.1
Farid, H.2
-
24
-
-
50049126671
-
Tamper hiding: Defeating image forensics
-
Furon T, Cayre F, Doërr G, Bas P (eds) Springer, Berlin
-
Kirchner M, Böhme R (2007) Tamper hiding: defeating image forensics. In: Furon T, Cayre F, Doërr G, Bas P (eds) Information hiding, 9th international workshop, IH 2007, Lecture notes in computer science, vol 4567. Springer, Berlin, pp 326-341
-
(2007)
Information Hiding, 9th International Workshop, IH 2007, Lecture Notes in Computer Science
, vol.4567
, pp. 326-341
-
-
Kirchner, M.1
Böhme, R.2
-
25
-
-
56749180518
-
Hiding traces of resampling in digital images
-
Kirchner M, Böhme R (2008) Hiding traces of resampling in digital images. IEEE Trans Inf Forensics Secur 3(4):582-592
-
(2008)
IEEE Trans Inf Forensics Secur
, vol.3
, Issue.4
, pp. 582-592
-
-
Kirchner, M.1
Böhme, R.2
-
26
-
-
70349367592
-
Synthesis of color filter array pattern in digital images
-
Delp EJ, Dittmann J, Memon ND, Wong PW (eds) SPIE, Bellingham, WA 2009
-
Kirchner M, Böhme R (2009) Synthesis of color filter array pattern in digital images. In: Delp EJ, Dittmann J, Memon ND, Wong PW (eds) Media forensics and security, Proceedings of SPIE, vol 7254, p 72540K. SPIE, Bellingham, WA 2009
-
(2009)
Media Forensics and Security, Proceedings of SPIE
, vol.7254
, pp. 72540K
-
-
Kirchner, M.1
Böhme, R.2
-
27
-
-
77951863205
-
On detection of median filtering in digital images
-
Memon ND, Dittmann J, Alattar AM, Delp EJ (eds) San Jose, CA, USA 2010
-
Kirchner M, Fridrich J (2010) On detection of median filtering in digital images. In: Memon ND, Dittmann J, Alattar AM, Delp EJ (eds) Media forensics and security II, Proceedings of SPIE-IS&T electronic imaging, vol SPIE 7541, p 754110. San Jose, CA, USA 2010
-
(2010)
Media Forensics and Security II, Proceedings of SPIE-IS&T Electronic Imaging, Vol SPIE
, vol.7541
, pp. 754110
-
-
Kirchner, M.1
Fridrich, J.2
-
28
-
-
80053033238
-
Countering counter-forensics: The case of JPEG compression
-
Filler T, Pevný T, Craver S, Ker A (eds) Springer, Berlin
-
Lai S, Böhme R (2011) Countering counter-forensics: the case of JPEG compression. In: Filler T, Pevný T, Craver S, Ker A (eds) Information Hiding, 13th International Conference, IH 2011, vol 6958. Springer, Berlin, pp 285-298
-
(2011)
Information Hiding, 13th International Conference, IH 2011
, vol.6958
, pp. 285-298
-
-
Lai, S.1
Böhme, R.2
-
29
-
-
0034298708
-
A mathematical analysis of the DCT coefficient distributions for images
-
Lam EY, Goodman JW (2000) A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans Image Process 9(10):1661-1666
-
(2000)
IEEE Trans Image Process
, vol.9
, Issue.10
, pp. 1661-1666
-
-
Lam, E.Y.1
Goodman, J.W.2
-
30
-
-
84885891736
-
On the repudiability of device identification and image integrity verification using sensor pattern noise
-
Weerasinghe D (ed) Springer, Berlin
-
Li CT, Chang CY, Li Y (2010) On the repudiability of device identification and image integrity verification using sensor pattern noise. In: Weerasinghe D (ed) Information security and digital forensics, first international conference, ISDF 2009, Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, vol 41. Springer, Berlin, pp 19-25
-
(2010)
Information Security and Digital Forensics, First International Conference, ISDF 2009, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.41
, pp. 19-25
-
-
Li, C.T.1
Chang, C.Y.2
Li, Y.3
-
31
-
-
2042544770
-
Blocking artifacts suppression in block-coded images using overcomplete wavelet representation
-
Liew AWC, Yan H (2004) Blocking artifacts suppression in block-coded images using overcomplete wavelet representation. IEEE Trans Circ Syst Video Technology 14(4):450-461
-
(2004)
IEEE Trans Circ Syst Video Technology
, vol.14
, Issue.4
, pp. 450-461
-
-
Liew, A.W.C.1
Yan, H.2
-
32
-
-
21844463849
-
Detecting digital image forgeries using sensor pattern noise
-
Said A, Apostolopoulos JG (eds)
-
Lukáš J, Fridrich J, Goljan M (2005) Detecting digital image forgeries using sensor pattern noise. In: Said A, Apostolopoulos JG (eds) Proceedings of SPIE: image and video communications and processing 2005, vol 5685, pp 249-260
-
(2005)
Proceedings of SPIE: Image and Video Communications and Processing 2005
, vol.5685
, pp. 249-260
-
-
Lukáš, J.1
Fridrich, J.2
Goljan, M.3
-
35
-
-
20444471753
-
-
Tech Rep ADVENT 203-2004-3, Department of Electrical Engineering, Columbia University, USA
-
Ng TT, Chang SF (2004) A data set of authentic and spliced image blocks. Tech Rep ADVENT 203-2004-3, Department of Electrical Engineering, Columbia University, USA
-
(2004)
A Data Set of Authentic and Spliced Image Blocks
-
-
Ng, T.T.1
Chang, S.F.2
-
36
-
-
67349189862
-
Image manipulation as research misconduct
-
Parrish D, Noonan B (2008) Image manipulation as research misconduct. Sci Eng Ethics 15(2):161-167
-
(2008)
Sci Eng Ethics
, vol.15
, Issue.2
, pp. 161-167
-
-
Parrish, D.1
Noonan, B.2
-
37
-
-
78649989557
-
-
Version 0.34)
-
Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http://dud.inf.tu-dresden.de/AnonTerminology.shtml 2010. (Version 0.34)
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
-
Pfitzmann, A.1
Hansen, M.2
-
38
-
-
35048816032
-
Statistical tools for digital forensics
-
Fridrich J (ed) Springer, Berlin
-
Popescu AC, Farid H (2004) Statistical tools for digital forensics. In: Fridrich J (ed) Information hiding, 6th international workshop, IH 2004. Lecture notes in computer science, vol 3200. Springer, Berlin, pp 128-147
-
(2004)
Information Hiding, 6th International Workshop, IH 2004. Lecture Notes in Computer Science
, vol.3200
, pp. 128-147
-
-
Popescu, A.C.1
Farid, H.2
-
39
-
-
27844493797
-
Exposing digital forgeries in color filter array interpolated images
-
Popescu AC, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948-3959
-
(2005)
IEEE Trans Signal Process
, vol.53
, Issue.10
, pp. 3948-3959
-
-
Popescu, A.C.1
Farid, H.2
-
40
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
Sallee P (2005) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167-189
-
(2005)
Int J Image Graph
, vol.5
, Issue.1
, pp. 167-189
-
-
Sallee, P.1
-
43
-
-
78049404806
-
Anti-forensics of JPEG compression
-
Stamm MC, Tjoa SK, Lin WS, Liu KJR (2010) Anti-forensics of JPEG compression. In: IEEE international conference on acoustics, speech and signal processing, ICASSP 2010, pp 1694-1697
-
(2010)
IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2010
, pp. 1694-1697
-
-
Stamm, M.C.1
Tjoa, S.K.2
Lin, W.S.3
Liu, K.J.R.4
-
45
-
-
77952087271
-
Cell phone camera ballistics: Attacks and counter-measures
-
Creutzburg R, Akopian D (eds) SPIE, Bellingham, WA
-
Steinebach M, Liu H, Fan P, Katzenbeisser S Cell phone camera ballistics: attacks and counter-measures. In: Creutzburg R, Akopian D (eds) Multimedia on mobile devices 2010, Proceedings of SPIE, vol 7542, p 75420B. SPIE, Bellingham, WA (2010)
-
(2010)
Multimedia on Mobile Devices 2010, Proceedings of SPIE
, vol.7542
, pp. 75420B
-
-
Steinebach, M.1
Liu, H.2
Fan, P.3
Katzenbeisser, S.4
-
46
-
-
84885891684
-
On the reliability of cell phone camera fingerprint recognition
-
Goel S (ed) Springer, Berlin
-
Steinebach M, Ouariachi ME, Liu H, Katzenbeisser S (2009) On the reliability of cell phone camera fingerprint recognition. In: Goel S (ed) Digital forensics and cyber crime, first international ICST conference, ICDF2C 2009. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, vol 31. Springer, Berlin, pp 69-76
-
(2009)
Digital Forensics and Cyber Crime, First International ICST Conference, ICDF2C 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.31
, pp. 69-76
-
-
Steinebach, M.1
Ouariachi, M.E.2
Liu, H.3
Katzenbeisser, S.4
-
47
-
-
0002194143
-
Image interpolation and resampling
-
Academic Press, Orlando, FL 2000
-
Thèvenaz P, Blu T, Unser M (2000) Image interpolation and resampling. In: Handbook of medical imaging, pp 393-420. Academic Press, Orlando, FL 2000
-
(2000)
Handbook of Medical Imaging
, pp. 393-420
-
-
Thèvenaz, P.1
Blu, T.2
Unser, M.3
-
48
-
-
58349093736
-
Weaknesses of MB2
-
Shi YQ, Kim HJ, Katzenbeisser S (eds) Springer-Verlag, Berlin, Heidelberg
-
Ullerich C, Westfeld A (2008) Weaknesses of MB2. In: Shi YQ, Kim HJ, Katzenbeisser S (eds) Digital watermarking (Proceedings of IWDW 2007). Lecture notes in computer science, vol 5041. Springer-Verlag, Berlin, Heidelberg, pp 127-142
-
(2008)
Digital Watermarking (Proceedings of IWDW 2007). Lecture Notes in Computer Science
, vol.5041
, pp. 127-142
-
-
Ullerich, C.1
Westfeld, A.2
-
49
-
-
80051643956
-
The cost of JPEG compression anti-forensics
-
IEEE
-
Valenzise G, Tagliasacchi M, Tubaro S (2011) The cost of JPEG compression anti-forensics. In: IEEE international conference on acoustics, speech and signal processing, ICASSP 2011, pp. 1884-1887. IEEE
-
(2011)
IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2011
, pp. 1884-1887
-
-
Valenzise, G.1
Tagliasacchi, M.2
Tubaro, S.3
-
51
-
-
82055176931
-
Blind forensics of median filtering in digital images
-
Yuan HD (2011) Blind forensics of median filtering in digital images. IEEE Trans Inf Forensics Secur 6(4):1335-1345
-
(2011)
IEEE Trans Inf Forensics Secur
, vol.6
, Issue.4
, pp. 1335-1345
-
-
Yuan, H.D.1
-
52
-
-
64149118633
-
Efficient image deblocking based on postfiltering in shifted windows
-
Zhai G, Zhang W, Yang X, Lin W, Xu Y (2008) Efficient image deblocking based on postfiltering in shifted windows. IEEE Trans Circ Syst Video Tech 18(1):122-126
-
(2008)
IEEE Trans Circ Syst Video Tech
, vol.18
, Issue.1
, pp. 122-126
-
-
Zhai, G.1
Zhang, W.2
Yang, X.3
Lin, W.4
Xu, Y.5
|