메뉴 건너뛰기




Volumn 9781461407577, Issue , 2013, Pages 327-366

Counter-forensics: Attacking image forensics

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; DIGITAL FORENSICS; IMAGE ANALYSIS;

EID: 84929134231     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4614-0757-7_12     Document Type: Chapter
Times cited : (120)

References (52)
  • 5
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Aucsmith D (ed) Springer, Berlin
    • Cachin C (1998) An information-theoretic model for steganography. In: Aucsmith D (ed) Information hiding, second international workshop, IH 98. Springer, Berlin, pp 306-318
    • (1998) Information Hiding, Second International Workshop, IH , vol.98 , pp. 306-318
    • Cachin, C.1
  • 8
    • 85192427820 scopus 로고    scopus 로고
    • Chinese Academy of Sciences, Institute of Automation: Casia tampered image detection evaluation database
    • Chinese Academy of Sciences, Institute of Automation: Casia tampered image detection evaluation database (2009/2010). http://forensics.idealtest.org
    • (2009)
  • 9
    • 84874227481 scopus 로고    scopus 로고
    • A study on features for the detection of copy-move forgeries
    • Freiling FC (ed) Gesellschaft für Informatik e.V., Bonn
    • Christlein V, Riess C, Angelopoulou E (2010) A study on features for the detection of copy-move forgeries. In: Freiling FC (ed) Sicherheit 2010, pp. 105-116. Gesellschaft für Informatik e.V., Bonn
    • (2010) Sicherheit 2010 , pp. 105-116
    • Christlein, V.1    Riess, C.2    Angelopoulou, E.3
  • 11
    • 78650053641 scopus 로고    scopus 로고
    • Avoiding twisted pixels: Ethical guidelines for the appropriate use and manipulation of scientific digital images
    • Cromey DW (2010) Avoiding twisted pixels: ethical guidelines for the appropriate use and manipulation of scientific digital images. Sci Eng Ethics 16(4):639-667
    • (2010) Sci Eng Ethics , vol.16 , Issue.4 , pp. 639-667
    • Cromey, D.W.1
  • 12
    • 0038005383 scopus 로고    scopus 로고
    • Identification of bitmap compression history: JPEG detection and quantizer estimation
    • Fan Z, Queiroz RL (2003) Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process 12(2):230-235
    • (2003) IEEE Trans Image Process , vol.12 , Issue.2 , pp. 230-235
    • Fan, Z.1    Queiroz, R.L.2
  • 13
    • 85032752368 scopus 로고    scopus 로고
    • Digital image forensics
    • Fridrich J (2009) Digital image forensics. IEEE Signal Process Mag 26(2):26-37
    • (2009) IEEE Signal Process Mag , vol.26 , Issue.2 , pp. 26-37
    • Fridrich, J.1
  • 15
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • Friedman G (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron 39(4):905-910
    • (1993) IEEE Trans Consum Electron , vol.39 , Issue.4 , pp. 905-910
    • Friedman, G.1
  • 16
    • 70350460002 scopus 로고    scopus 로고
    • Feature-based camera model identification works in practice: Results of a comprehensive evaluation study
    • Katzenbeisser S, Sadeghi AR (eds) Springer, Berlin
    • Gloe T, Borowka K, Winkler A (2009) Feature-based camera model identification works in practice: results of a comprehensive evaluation study. In: Katzenbeisser S, Sadeghi AR (eds) Information hiding, 11th international workshop, IH 2009. Lecture notes in computer science, vol 5806. Springer, Berlin, pp 262-276
    • (2009) Information Hiding, 11th International Workshop, IH 2009. Lecture Notes in Computer Science , vol.5806 , pp. 262-276
    • Gloe, T.1    Borowka, K.2    Winkler, A.3
  • 18
    • 77951842370 scopus 로고    scopus 로고
    • Sensor noise camera identification: Countering counter-forensics
    • Memon ND, Dittmann J, Alattar AM, Delp EJ (eds) SPIE, Bellingham, WA, 2010
    • Goljan M, Fridrich J, Chen M (2010) Sensor noise camera identification: Countering counter-forensics. In: Memon ND, Dittmann J, Alattar AM, Delp EJ (eds) Media forensics and security II, Proceedings of SPIE, vol 7541, p 75410S. SPIE, Bellingham, WA, 2010
    • (2010) Media Forensics and Security II, Proceedings of SPIE , vol.7541 , pp. 75410S
    • Goljan, M.1    Fridrich, J.2    Chen, M.3
  • 19
    • 34247636825 scopus 로고    scopus 로고
    • Detecting image splicing using geometry invariants and camera characteristics consistency
    • IEEE 2006
    • Hsu YF, Chang SF (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In: IEEE international conference on multimedia and EXPO, ICME 2006, pp. 549-552. IEEE 2006
    • (2006) IEEE International Conference on Multimedia and EXPO, ICME 2006 , pp. 549-552
    • Hsu, Y.F.1    Chang, S.F.2
  • 20
    • 32544433269 scopus 로고    scopus 로고
    • Can digital image forgery detection be unevadable? A case study: Color filter array interpolation statistical feature recovery
    • Li S, Pereira F, Shum HY, Tescher AG (eds) 2005
    • Huang Y (2005) Can digital image forgery detection be unevadable? A case study: color filter array interpolation statistical feature recovery. In: Li S, Pereira F, Shum HY, Tescher AG (eds) Proceedings of SPIE: visual communications and image processing, vol SPIE 5960, p 59602W, 2005
    • (2005) Proceedings of SPIE: Visual Communications and Image Processing, Vol SPIE , vol.5960 , pp. 59602W
    • Huang, Y.1
  • 21
    • 34548056428 scopus 로고    scopus 로고
    • Exposing digital forgeries in complex lighting environments
    • Johnson MK, Farid H (2007) Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensics Secur 2(3):450-461
    • (2007) IEEE Trans Inf Forensics Secur , vol.2 , Issue.3 , pp. 450-461
    • Johnson, M.K.1    Farid, H.2
  • 25
    • 56749180518 scopus 로고    scopus 로고
    • Hiding traces of resampling in digital images
    • Kirchner M, Böhme R (2008) Hiding traces of resampling in digital images. IEEE Trans Inf Forensics Secur 3(4):582-592
    • (2008) IEEE Trans Inf Forensics Secur , vol.3 , Issue.4 , pp. 582-592
    • Kirchner, M.1    Böhme, R.2
  • 26
    • 70349367592 scopus 로고    scopus 로고
    • Synthesis of color filter array pattern in digital images
    • Delp EJ, Dittmann J, Memon ND, Wong PW (eds) SPIE, Bellingham, WA 2009
    • Kirchner M, Böhme R (2009) Synthesis of color filter array pattern in digital images. In: Delp EJ, Dittmann J, Memon ND, Wong PW (eds) Media forensics and security, Proceedings of SPIE, vol 7254, p 72540K. SPIE, Bellingham, WA 2009
    • (2009) Media Forensics and Security, Proceedings of SPIE , vol.7254 , pp. 72540K
    • Kirchner, M.1    Böhme, R.2
  • 28
    • 80053033238 scopus 로고    scopus 로고
    • Countering counter-forensics: The case of JPEG compression
    • Filler T, Pevný T, Craver S, Ker A (eds) Springer, Berlin
    • Lai S, Böhme R (2011) Countering counter-forensics: the case of JPEG compression. In: Filler T, Pevný T, Craver S, Ker A (eds) Information Hiding, 13th International Conference, IH 2011, vol 6958. Springer, Berlin, pp 285-298
    • (2011) Information Hiding, 13th International Conference, IH 2011 , vol.6958 , pp. 285-298
    • Lai, S.1    Böhme, R.2
  • 29
    • 0034298708 scopus 로고    scopus 로고
    • A mathematical analysis of the DCT coefficient distributions for images
    • Lam EY, Goodman JW (2000) A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans Image Process 9(10):1661-1666
    • (2000) IEEE Trans Image Process , vol.9 , Issue.10 , pp. 1661-1666
    • Lam, E.Y.1    Goodman, J.W.2
  • 31
    • 2042544770 scopus 로고    scopus 로고
    • Blocking artifacts suppression in block-coded images using overcomplete wavelet representation
    • Liew AWC, Yan H (2004) Blocking artifacts suppression in block-coded images using overcomplete wavelet representation. IEEE Trans Circ Syst Video Technology 14(4):450-461
    • (2004) IEEE Trans Circ Syst Video Technology , vol.14 , Issue.4 , pp. 450-461
    • Liew, A.W.C.1    Yan, H.2
  • 35
    • 20444471753 scopus 로고    scopus 로고
    • Tech Rep ADVENT 203-2004-3, Department of Electrical Engineering, Columbia University, USA
    • Ng TT, Chang SF (2004) A data set of authentic and spliced image blocks. Tech Rep ADVENT 203-2004-3, Department of Electrical Engineering, Columbia University, USA
    • (2004) A Data Set of Authentic and Spliced Image Blocks
    • Ng, T.T.1    Chang, S.F.2
  • 36
    • 67349189862 scopus 로고    scopus 로고
    • Image manipulation as research misconduct
    • Parrish D, Noonan B (2008) Image manipulation as research misconduct. Sci Eng Ethics 15(2):161-167
    • (2008) Sci Eng Ethics , vol.15 , Issue.2 , pp. 161-167
    • Parrish, D.1    Noonan, B.2
  • 39
    • 27844493797 scopus 로고    scopus 로고
    • Exposing digital forgeries in color filter array interpolated images
    • Popescu AC, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948-3959
    • (2005) IEEE Trans Signal Process , vol.53 , Issue.10 , pp. 3948-3959
    • Popescu, A.C.1    Farid, H.2
  • 40
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • Sallee P (2005) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167-189
    • (2005) Int J Image Graph , vol.5 , Issue.1 , pp. 167-189
    • Sallee, P.1
  • 45
    • 77952087271 scopus 로고    scopus 로고
    • Cell phone camera ballistics: Attacks and counter-measures
    • Creutzburg R, Akopian D (eds) SPIE, Bellingham, WA
    • Steinebach M, Liu H, Fan P, Katzenbeisser S Cell phone camera ballistics: attacks and counter-measures. In: Creutzburg R, Akopian D (eds) Multimedia on mobile devices 2010, Proceedings of SPIE, vol 7542, p 75420B. SPIE, Bellingham, WA (2010)
    • (2010) Multimedia on Mobile Devices 2010, Proceedings of SPIE , vol.7542 , pp. 75420B
    • Steinebach, M.1    Liu, H.2    Fan, P.3    Katzenbeisser, S.4
  • 47
    • 0002194143 scopus 로고    scopus 로고
    • Image interpolation and resampling
    • Academic Press, Orlando, FL 2000
    • Thèvenaz P, Blu T, Unser M (2000) Image interpolation and resampling. In: Handbook of medical imaging, pp 393-420. Academic Press, Orlando, FL 2000
    • (2000) Handbook of Medical Imaging , pp. 393-420
    • Thèvenaz, P.1    Blu, T.2    Unser, M.3
  • 51
    • 82055176931 scopus 로고    scopus 로고
    • Blind forensics of median filtering in digital images
    • Yuan HD (2011) Blind forensics of median filtering in digital images. IEEE Trans Inf Forensics Secur 6(4):1335-1345
    • (2011) IEEE Trans Inf Forensics Secur , vol.6 , Issue.4 , pp. 1335-1345
    • Yuan, H.D.1
  • 52
    • 64149118633 scopus 로고    scopus 로고
    • Efficient image deblocking based on postfiltering in shifted windows
    • Zhai G, Zhang W, Yang X, Lin W, Xu Y (2008) Efficient image deblocking based on postfiltering in shifted windows. IEEE Trans Circ Syst Video Tech 18(1):122-126
    • (2008) IEEE Trans Circ Syst Video Tech , vol.18 , Issue.1 , pp. 122-126
    • Zhai, G.1    Zhang, W.2    Yang, X.3    Lin, W.4    Xu, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.