-
1
-
-
85032768213
-
Image forgery detection
-
H. Farid, "Image Forgery Detection," IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16-25, 2009.
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
2
-
-
84873623957
-
Counter-forensics: Attacking image forensics
-
H. T. Sencar and N. Memon (eds.)
-
R. Böhme and M. Kirchner, "Counter-Forensics: Attacking Image Forensics," H. T. Sencar and N. Memon (eds.): Digital Image Forensics, 2012.
-
(2012)
Digital Image Forensics
-
-
Böhme, R.1
Kirchner, M.2
-
3
-
-
21844463849
-
Determining digital image origin using sensor imperfections
-
J. Lukás, J. Fridrich and M. Goljan "Determining digital image origin using sensor imperfections," SPIE Electronic Imaging, Image and Video Communication and Processing, vol. 5685, pp. 249-260, 2005.
-
(2005)
SPIE Electronic Imaging, Image and Video Communication and Processing
, vol.5685
, pp. 249-260
-
-
Lukás, J.1
Fridrich, J.2
Goljan, M.3
-
4
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
mar.
-
M. Chen, J. Fridrich, M. Goljan and J. Lukás, "Determining image origin and integrity using sensor noise," IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74-90, mar. 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukás, J.4
-
5
-
-
77952591585
-
Source camera identification using enhanced sensor pattern noise
-
jun.
-
C.-T. Li, "Source camera identification using enhanced sensor pattern noise," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 280-287, jun. 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 280-287
-
-
Li, C.-T.1
-
6
-
-
84888383508
-
Robust digital camera identification based on pairwise magnitude relations of clustered sensor pattern noise
-
dec.
-
Y. Tomioka, Y. Ito and H. Kitazawa, "Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise," IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1986-1995, dec. 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.12
, pp. 1986-1995
-
-
Tomioka, Y.1
Ito, Y.2
Kitazawa, H.3
-
7
-
-
33645671569
-
Detecting digital image forgeries using sensor pattern noise
-
J. Lukás, J. Fridrich and M. Goljan "Detecting digital image forgeries using sensor pattern noise," SPIE, Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 362-372, 2006.
-
(2006)
SPIE, Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 362-372
-
-
Lukás, J.1
Fridrich, J.2
Goljan, M.3
-
8
-
-
84896478610
-
A Bayesian-MRF approach for PRNU-based image forgery detection
-
apr.
-
G. Chierchia, G. Poggi, C. Sansone and L. Verdoliva, "A Bayesian-MRF approach for PRNU-based image forgery detection," IEEE Transactions on Information Forensics and Security, vol. 9, no. 4, pp. 554-567, apr. 2014.
-
(2014)
IEEE Transactions on Information Forensics and Security
, vol.9
, Issue.4
, pp. 554-567
-
-
Chierchia, G.1
Poggi, G.2
Sansone, C.3
Verdoliva, L.4
-
9
-
-
37849032097
-
Can we trust digital image forensics
-
T. Gloe, M. Kirchner, A. Winkler and R. Böhme, "Can we trust digital image forensics," ACM 15th Int. Conf. Multimedia, pp. 78-86, 2007.
-
(2007)
ACM 15th Int. Conf. Multimedia
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Böhme, R.4
-
10
-
-
79951834941
-
Defending against fingerprint-copy attack in sensor-based camera identification
-
mar.
-
M. Goljan, J. Fridrich and M. Chen, "Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification," IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 227-236, mar. 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.1
, pp. 227-236
-
-
Goljan, M.1
Fridrich, J.2
Chen, M.3
-
13
-
-
84931065563
-
Anti-forensics of the triangle test by random fingerprint-copy attack
-
Q. Rao, H. Li, W. Luo and J. Huang, "Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack," Computational Visual Media Conference, pp. 1-6, 2013.
-
(2013)
Computational Visual Media Conference
, pp. 1-6
-
-
Rao, Q.1
Li, H.2
Luo, W.3
Huang, J.4
-
14
-
-
0032626656
-
Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising
-
M. K. Mihcak, I. Kozintsev and K. Ramchandran, "Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising," IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), pp. 3253-3256, 1999.
-
(1999)
IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP)
, pp. 3253-3256
-
-
Mihcak, M.K.1
Kozintsev, I.2
Ramchandran, K.3
-
15
-
-
77954723646
-
The dresden image database for benchmarking digital image forensics categories and subject descriptors
-
T. Gloe and R. Böhme, "The Dresden Image Database for Benchmarking Digital Image Forensics Categories and Subject Descriptors," ACM Symposium on Applied Computing, pp. 1584-1590, 2010.
-
(2010)
ACM Symposium on Applied Computing
, pp. 1584-1590
-
-
Gloe, T.1
Böhme, R.2
|