-
1
-
-
84864277926
-
Digital image splicing detection based on Markov features in DCT and DWT domain
-
Z. He, W. Lu, W. Sun, and J. Huang. "Digital image splicing detection based on Markov features in DCT and DWT domain". Pattern Recognition, vol. 45, pp. 4292-4299, 2012
-
(2012)
Pattern Recognition
, vol.45
, pp. 4292-4299
-
-
He, Z.1
Lu, W.2
Sun, W.3
Huang, J.4
-
2
-
-
84860434682
-
Rich models for steganalysis of digital images
-
june
-
J. Fridrich, and J. Kodovský. "Rich models for steganalysis of digital images". IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, june 2012
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
4
-
-
85172636704
-
-
http://ifc.recod.ic.unicamp.br/fc.website/index.py?sec=0
-
-
-
-
6
-
-
49549105094
-
Blind identification of source cell-phone model
-
sep
-
O. Ç eliktutan, B. Sankur and I. Avcibaş. "Blind Identification of Source Cell-Phone Model". IEEE Trans. on Information Forensics and Security, vol. 3, no. 3, pp. 553-566, sep. 2008
-
(2008)
IEEE Trans. on Information Forensics and Security
, vol.3
, Issue.3
, pp. 553-566
-
-
Çeliktutan, O.1
Sankur, B.2
Avcibaş, I.3
-
7
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
june
-
T. Pevný, P. Bas, and J. Fridrich. "Steganalysis by subtractive pixel adjacency matrix". IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 215-224, june 2010
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
8
-
-
77951863205
-
On detection of median filtering in digital images
-
jan
-
M. Kirchner and J. Fridrich. "On Detection of Median Filtering in Digital Images". SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, pp. 101-112, jan. 2010
-
(2010)
SPIE, Electronic Imaging, Media Forensics and Security XII
, vol.7541
, pp. 101-112
-
-
Kirchner, M.1
Fridrich, J.2
-
9
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukas. "Determining image origin and integrity using sensor noise". IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74-90, 2008
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
10
-
-
84870264329
-
An evaluation of popular copy-move forgery detection approaches
-
V. Christlein, C. Riess, J. Jordan, and E. Angelopoulou. "An Evaluation of Popular Copy-Move Forgery Detection Approaches". IEEE Trans. on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, 2012
-
(2012)
IEEE Trans. on Information Forensics and Security
, vol.7
, Issue.6
, pp. 1841-1854
-
-
Christlein, V.1
Riess, C.2
Jordan, J.3
Angelopoulou, E.4
-
11
-
-
78649426066
-
Region duplication detection using image feature matching
-
dec
-
X. Pan, and S. Lyu. "Region duplication detection using image feature matching". IEEE Trans. on Information Forensics and Security, vol. 5, no. 4, pp. 857-867, dec. 2010
-
(2010)
IEEE Trans. on Information Forensics and Security
, vol.5
, Issue.4
, pp. 857-867
-
-
Pan, X.1
Lyu, S.2
-
12
-
-
84880672623
-
Rotation invariant localization of duplicated image regions based on Zernike moments
-
aug
-
S.-J. Ryu, M. Kirchner, M.-J. Lee and H.-K. Lee. "Rotation invariant localization of duplicated image regions based on Zernike moments". IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1355-1370, aug. 2013
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.8
, pp. 1355-1370
-
-
Ryu, S.-J.1
Kirchner, M.2
Lee, M.-J.3
Lee, H.-K.4
-
14
-
-
79957470147
-
Detecting recompression of jpeg images via periodicity analysis of compression artifacts for tampering detection
-
Jun
-
Y.-L. Chen, and C.-T. Hsu. "Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection". IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 396-406, Jun. 2011
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.2
, pp. 396-406
-
-
Chen, Y.-L.1
Hsu, C.-T.2
-
15
-
-
84861122288
-
Image forgery localization via block- grained analysis of jpeg artifacts
-
Jun
-
T. Bianchi, and A. Piva. "Image Forgery Localization via Block- Grained Analysis of JPEG Artifacts". IEEE Transactions on Information Forensics and Security, vol. 7, pp. 1003-1017, Jun. 2012
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, pp. 1003-1017
-
-
Bianchi, T.1
Piva, A.2
-
17
-
-
56749171108
-
Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue
-
ACM Press
-
M. Kirchner. "Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue". Proceedings of the Multimedia and Security Workshop, pp. 11-20, ACM Press, 2008
-
(2008)
Proceedings of the Multimedia and Security Workshop
, pp. 11-20
-
-
Kirchner, M.1
-
18
-
-
39449103666
-
Digital image forensics via intrinsic fingerprints
-
March
-
A. Swaminathan, M. Wu and K.J. Ray Liu. "Digital Image Forensics via Intrinsic Fingerprints". IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 101-117, March 2008
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 101-117
-
-
Swaminathan, A.1
Wu, M.2
Ray Liu, K.J.3
-
19
-
-
70450271108
-
Accurate detection of demosaicing regularity for digital image forensics
-
Dec
-
A.C. Kot. "Accurate Detection of Demosaicing Regularity for Digital Image Forensics". IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 899-910, Dec. 2009
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.4
, pp. 899-910
-
-
Kot, A.C.1
-
20
-
-
84896478610
-
A bayesian- mrf approach for prnu-based image forgery detection
-
G. Chierchia, G. Poggi, C. Sansone, and L. Verdoliva. "A Bayesian- MRF approach for PRNU-based image forgery detection". IEEE Trans. on Information Forensics and Security, vol. 9, no. 4, pp. 554-567, 2014
-
(2014)
IEEE Trans. on Information Forensics and Security
, vol.9
, Issue.4
, pp. 554-567
-
-
Chierchia, G.1
Poggi, G.2
Sansone, C.3
Verdoliva, L.4
-
21
-
-
82055176931
-
Blind forensics of median filtering in digital images
-
dec
-
H.-D. Yuan. "Blind Forensics of Median Filtering in Digital Images". IEEE Trans. on Information Forensics and Security, vol. 6, no. 4, pp. 1335-1345, dec. 2011
-
(2011)
IEEE Trans. on Information Forensics and Security
, vol.6
, Issue.4
, pp. 1335-1345
-
-
Yuan, H.-D.1
-
22
-
-
84897811383
-
Image splicing detection based on noncausal markov model
-
sep
-
X. Zhao, S. Wang, S. Li, J. Li and Q. Yuan. "Image splicing detection based on noncausal Markov model". IEEE International Conference on Image Processing (ICIP), pp. 4462-4466, sep. 2013
-
(2013)
IEEE International Conference on Image Processing (ICIP
, pp. 4462-4466
-
-
Zhao, X.1
Wang, S.2
Li, S.3
Li, J.4
Yuan, Q.5
-
24
-
-
84869436579
-
No-reference image quality assessment in the spatial domain
-
dec
-
A. Mittal, A.K. Moorthy and A.C. Bovik. "No-Reference Image Quality Assessment in the Spatial Domain". IEEE Transactions on Image Processing, vol. 21, no. 12, pp. 4695-4708, dec. 2012
-
(2012)
IEEE Transactions on Image Processing
, vol.21
, Issue.12
, pp. 4695-4708
-
-
Mittal, A.1
Moorthy, A.K.2
Bovik, A.C.3
-
25
-
-
84873400956
-
Making a completely blind image quality analyzer
-
march
-
A. Mittal, R. Soundararajan and A.C. Bovik. "Making a "completely blind" image quality analyzer". IEEE Signal Processing Letters, vol. 20, no. 3, pp. 209-212, march 2013
-
(2013)
IEEE Signal Processing Letters
, vol.20
, Issue.3
, pp. 209-212
-
-
Mittal, A.1
Soundararajan, R.2
Bovik, A.C.3
-
26
-
-
84866278567
-
Image forgery localization via fine-grained analysis of cfa artifacts
-
P. Ferrara, T. Bianchi, A. De Rosa, and A. Piva. "Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts". IEEE Trans. on Information Forensics and Security, vol. 7, pp. 1566-1577, 2012
-
(2012)
IEEE Trans. on Information Forensics and Security
, vol.7
, pp. 1566-1577
-
-
Ferrara, P.1
Bianchi, T.2
De Rosa, A.3
Piva, A.4
-
27
-
-
84905259148
-
Guided filtering for prnu-based localization of small-size image forgeries
-
G. Chierchia, D. Cozzolino, G. Poggi, C. Sansone, and L. Verdoliva. "Guided filtering for PRNU-based localization of small-size image forgeries". IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 6273-6276, 2014
-
(2014)
IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 6273-6276
-
-
Chierchia, G.1
Cozzolino, D.2
Poggi, G.3
Sansone, C.4
Verdoliva, L.5
|