-
1
-
-
84931082449
-
-
http://ifc. recod. ic. unicamp. br/fc. website/index. py?sec=0.
-
-
-
-
2
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukas, "Determining image origin and integrity using sensor noise," IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74-90, 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
3
-
-
33645671569
-
Detecting digital image forgeries using sensor pattern noise
-
J. Lukas, J. Fridrich, and M. Goljan, "Detecting digital image forgeries using sensor pattern noise," Proc. of SPIE, vol. 6072, pp. 362-372, 2006.
-
(2006)
Proc. of SPIE
, vol.6072
, pp. 362-372
-
-
Lukas, J.1
Fridrich, J.2
Goljan, M.3
-
4
-
-
84896478610
-
A Bayesian-MRF approach for PRNU-based image forgery detection
-
apr.
-
G. Chierchia, G. Poggi, C. Sansone, and L. Verdoliva, "A Bayesian-MRF approach for PRNU-based image forgery detection," IEEE Trans. on Information Forensics and Security, vol. 9, no. 4, pp. 554-567, apr. 2014.
-
(2014)
IEEE Trans. on Information Forensics and Security
, vol.9
, Issue.4
, pp. 554-567
-
-
Chierchia, G.1
Poggi, G.2
Sansone, C.3
Verdoliva, L.4
-
5
-
-
39549111653
-
Blind camera fingerprinting and image clustering
-
Mar.
-
G. J. Bloy, "Blind camera fingerprinting and image clustering," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, no. 3, pp. 532-535, Mar. 2008.
-
(2008)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.30
, Issue.3
, pp. 532-535
-
-
Bloy, G.J.1
-
6
-
-
77951865751
-
Digital camera identification from images-Estimating false acceptance probability
-
M. Goljan, "Digital camera identification from images-Estimating false acceptance probability," in Proc. 8th Int. Workshop Digital Watermarking, vol. 5450, pp. 454-468, 2008.
-
(2008)
Proc. 8th Int. Workshop Digital Watermarking
, vol.5450
, pp. 454-468
-
-
Goljan, M.1
-
7
-
-
42949094707
-
Camera identification from cropped and scaled images
-
M. Goljan and J. Fridrich, "Camera identification from cropped and scaled images," in Proc. SPIE, Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 681900-68190E, 2008.
-
(2008)
Proc. SPIE, Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 681900-68190E
-
-
Goljan, M.1
Fridrich, J.2
-
8
-
-
34547760736
-
Image denoising by sparse 3-D transform-domain collaborative filtering
-
Aug.
-
K. Dabov, A. Foi, V. Katkovnik, K. Egiazarian, "Image denoising by sparse 3-D transform-domain collaborative filtering," IEEE Transactions on Image Processing, vol. 16, no. 8, pp. 2080-2095, Aug. 2007.
-
(2007)
IEEE Transactions on Image Processing
, vol.16
, Issue.8
, pp. 2080-2095
-
-
Dabov, K.1
Foi, A.2
Katkovnik, V.3
Egiazarian, K.4
-
9
-
-
78650918699
-
On the influence of denoising in PRNU based forgery detection
-
G. Chierchia, S. Parrilli, G. Poggi, C. Sansone, and L. Verdoliva, "On the influence of denoising in PRNU based forgery detection," in Proc. of the 2nd ACM workshop on Multimedia in Forensics, Security and Intelligence pp. 117-122, 2010.
-
(2010)
Proc. of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence
, pp. 117-122
-
-
Chierchia, G.1
Parrilli, S.2
Poggi, G.3
Sansone, C.4
Verdoliva, L.5
-
10
-
-
70349655522
-
PatchMatch: A randomized correspondence algorithm for structural image editing
-
C. Barnes, E. Shechtman, A. Finkelstein, and D. B. Goldman, "PatchMatch: A randomized correspondence algorithm for structural image editing," ACM Transactions on Graphics, vol. 28, no. 3, 2009.
-
(2009)
ACM Transactions on Graphics
, vol.28
, Issue.3
-
-
Barnes, C.1
Shechtman, E.2
Finkelstein, A.3
Goldman, D.B.4
-
11
-
-
84860434682
-
Rich models for steganalysis of digital images
-
june
-
J. Fridrich, and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, june 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
12
-
-
84870264329
-
An evaluation of popular copy-move forgery detection approaches
-
V. Christlein, C. Riess, J. Jordan, and E. Angelopoulou, "An Evaluation of Popular Copy-Move Forgery Detection Approaches," IEEE Trans. on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, 2012.
-
(2012)
IEEE Trans. on Information Forensics and Security
, vol.7
, Issue.6
, pp. 1841-1854
-
-
Christlein, V.1
Riess, C.2
Jordan, J.3
Angelopoulou, E.4
-
13
-
-
78649426066
-
Region duplication detection using image feature matching
-
dec.
-
X. Pan, and S. Lyu, "Region duplication detection using image feature matching," IEEE Trans. on Information Forensics and Security, vol. 5, no. 4, pp. 857-867, dec. 2010.
-
(2010)
IEEE Trans. on Information Forensics and Security
, vol.5
, Issue.4
, pp. 857-867
-
-
Pan, X.1
Lyu, S.2
-
15
-
-
84886431657
-
A forgery detection algorithm for exemplar-based inpainting images using multiregion relation
-
Oct.
-
I.-C. Chang, J. C. Yu, and C.-C. Chang, "A forgery detection algorithm for exemplar-based inpainting images using multiregion relation," Image and Vision Computing, vol. 31, no. 1, pp. 57-71, Oct. 2013.
-
(2013)
Image and Vision Computing
, vol.31
, Issue.1
, pp. 57-71
-
-
Chang, I.-C.1
Yu, J.C.2
Chang, C.-C.3
-
17
-
-
84864277926
-
Digital image splicing detection basedon Markov features in DCT and DWT domain
-
Z. He, W. Lu, W. Sun, and J. Huang, "Digital image splicing detection basedon Markov features in DCT and DWT domain," Pattern Recognition, vol. 45, pp. 4292-4299, 2012.
-
(2012)
Pattern Recognition
, vol.45
, pp. 4292-4299
-
-
He, Z.1
Lu, W.2
Sun, W.3
Huang, J.4
-
18
-
-
84897811383
-
Image splicing detection based on noncausal Markov model
-
sep.
-
X. Zhao, S. Wang, S. Li, J. Li and Q. Yuan, "Image splicing detection based on noncausal Markov model," IEEE International Conference on Image Processing (ICIP), pp. 4462-4466, sep. 2013.
-
(2013)
IEEE International Conference on Image Processing (ICIP)
, pp. 4462-4466
-
-
Zhao, X.1
Wang, S.2
Li, S.3
Li, J.4
Yuan, Q.5
-
19
-
-
84878019726
-
Copy-move forgery detection and localization by means of robust clustering with J-Linkage
-
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo and G. Serra, "Copy-move forgery detection and localization by means of robust clustering with J-Linkage," Signal Processing: Image Communication, vol. 28, no. 6, pp. 659-669, 2013.
-
(2013)
Signal Processing: Image Communication
, vol.28
, Issue.6
, pp. 659-669
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Del Tongo, L.5
Serra, G.6
-
20
-
-
80051606276
-
Improved DCT coefficients analysis for forgery localization in JPEG images
-
may
-
T. Bianchi, A. De Rosa and A. Piva, "Improved DCT coefficients analysis for forgery localization in JPEG images," International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2444-2447, may 2011.
-
(2011)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 2444-2447
-
-
Bianchi, T.1
De Rosa, A.2
Piva, A.3
-
21
-
-
84866278567
-
Image forgery localization via fine-grained analysis of CFA artifacts
-
P. Ferrara, T. Bianchi, A. De Rosa and A. Piva, "Image forgery localization via fine-grained analysis of CFA artifacts," IEEE Trans. on Information Forensics and Security, vol. 7, no. 5, pp. 1566-1577, 2012.
-
(2012)
IEEE Trans. on Information Forensics and Security
, vol.7
, Issue.5
, pp. 1566-1577
-
-
Ferrara, P.1
Bianchi, T.2
De Rosa, A.3
Piva, A.4
-
22
-
-
84884706379
-
Multiple classifier systems for image forgery detection
-
D. Cozzolino, F. Gargiulo, C. Sansone, L. Verdoliva, "Multiple classifier systems for image forgery detection," International Conference on Image Analysis and Processing (ICIAP), vol. 8157, pp. 259-268, 2013.
-
(2013)
International Conference on Image Analysis and Processing (ICIAP)
, vol.8157
, pp. 259-268
-
-
Cozzolino, D.1
Gargiulo, F.2
Sansone, C.3
Verdoliva, L.4
-
23
-
-
84874819920
-
A framework for decision fusion in image forensics based on Dempster-Shafer theory of evidence
-
apr.
-
M. Fontani, T. Bianchi, A. De Rosa, A. Piva and M. Barni, "A framework for decision fusion in image forensics based on Dempster-Shafer theory of evidence," IEEE Transactions on Information Forensics and Security, vol. 8, no. 4, pp. 593-607, apr. 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.4
, pp. 593-607
-
-
Fontani, M.1
Bianchi, T.2
De Rosa, A.3
Piva, A.4
Barni, M.5
-
24
-
-
84894144919
-
The watchful forensic analyst: Multi-clue information fusion with background knowledge
-
nov.
-
M. Fontani, E. Argones-Rua, C. Troncoso and M. Barni, "The watchful forensic analyst: multi-clue information fusion with background knowledge," IEEE International Workshop on Information Forensics and Security (WIFS), pp. 120-125, nov. 2013.
-
(2013)
IEEE International Workshop on Information Forensics and Security (WIFS)
, pp. 120-125
-
-
Fontani, M.1
Argones-Rua, E.2
Troncoso, C.3
Barni, M.4
|