-
1
-
-
0038005383
-
Identification of bitmap compression history: JPEG detection and quantizer estimation
-
Z. Fan and R. De Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Transactions on Image Processing, vol. 12, n. 2, pp. 230-235, 2003.
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
De Queiroz, R.2
-
2
-
-
34250355507
-
A generalized Benford's law for JPEG coefficients and its applications in image forensics
-
D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Proceedings of SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, 2007, vol. 6505.
-
(2007)
Proceedings of SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
, vol.6505
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
3
-
-
48149107008
-
Benford's law in image processing
-
F. Pérez-González, G. L. Heileman, and C. T. Abdallah, "Benford's law in image processing," in Proceedings of IEEE ICIP, 2007, pp. 405-408.
-
(2007)
Proceedings of IEEE ICIP
, pp. 405-408
-
-
Pérez-González, F.1
Heileman, G.L.2
Abdallah, C.T.3
-
4
-
-
84861122288
-
Image forgery localization via blockgrained analysis of JPEG artifacts
-
T. Bianchi and A. Piva, "Image forgery localization via blockgrained analysis of JPEG artifacts," IEEE Transactions on Information Forensics and Security, vol. 7, n. 3, pp. 1003-1017, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.3
, pp. 1003-1017
-
-
Bianchi, T.1
Piva, A.2
-
5
-
-
84867616246
-
Discriminating multiple JPEG compression using first digit features
-
S. Milani, M. Tagliasacchi, and S. Tubaro, "Discriminating multiple JPEG compression using first digit features," in Proceedings of IEEE ICASSP, 2012, pp. 25-30.
-
(2012)
Proceedings of IEEE ICASSP
, pp. 25-30
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
6
-
-
79957470147
-
Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
-
Y. L. Chen and C. T. Hsu, "Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection," IEEE Transactions on Information Forensics and Security, vol. 6, n. 2, pp. 396-406, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.2
, pp. 396-406
-
-
Chen, Y.L.1
Hsu, C.T.2
-
7
-
-
84874819920
-
A framework for decision fusion in image forensics based on Dempster-Shafer theory of evidence
-
M. Fontani, T. Bianchi, A. De Rosa, A. Piva, and M. Barni, "A framework for decision fusion in image forensics based on Dempster-Shafer theory of evidence," IEEE Transactions on Information Forensics and Security, vol. 8, n. 4, pp. 593-607, 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.4
, pp. 593-607
-
-
Fontani, M.1
Bianchi, T.2
De Rosa, A.3
Piva, A.4
Barni, M.5
-
8
-
-
33646863861
-
JPEG compression history estimation for color images
-
R. Neelamani, R. De Queiroz, Z. Fan, S. Dash, and R. G. Baraniuk, "JPEG compression history estimation for color images," IEEE Transactions on Image Processing, vol. 15, n. 2, pp. 1363-1378, 2006.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.2
, pp. 1363-1378
-
-
Neelamani, R.1
De Queiroz, R.2
Fan, Z.3
Dash, S.4
Baraniuk, R.G.5
-
9
-
-
80051605162
-
Anti-forensics of digital image compression
-
M. C. Stamm and K. J. Ray Liu, "Anti-forensics of digital image compression," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1050-1065, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.C.1
Ray Liu, K.J.2
-
10
-
-
84867466942
-
A universal technique to hide traces of histogram-based image manipulations
-
M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations," in Proceedings of ACM Workshop on Multimedia and Security, 2012, pp. 97-104.
-
(2012)
Proceedings of ACM Workshop on Multimedia and Security
, pp. 97-104
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
12
-
-
84890447451
-
Antiforensics attack to Benford's law for the detection of double compressed images
-
S. Milani, M. Tagliasacchi, and S. Tubaro, "Antiforensics attack to Benford's law for the detection of double compressed images," in Proceedings of IEEE ICASSP, 2013, pp. 3053-3057.
-
(2013)
Proceedings of IEEE ICASSP
, pp. 3053-3057
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
13
-
-
84892527710
-
JPEG compression anti-forensics based on first significant digit distribution
-
C. Pasquini and G. Boato, "JPEG compression anti-forensics based on first significant digit distribution," in Proceedings of IEEE MMSP, 2013, pp. 500-505.
-
(2013)
Proceedings of IEEE MMSP
, pp. 500-505
-
-
Pasquini, C.1
Boato, G.2
-
14
-
-
84905222835
-
Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
-
C. Pasquini, P. Comesaña-Alfaro, F. Pérez-González, and G. Boato, "Transportation-theoretic image counterforensics to First Significant Digit histogram forensics," in Proceedings of ICASSP, 2014, pp. 2718-2722.
-
(2014)
Proceedings of ICASSP
, pp. 2718-2722
-
-
Pasquini, C.1
Comesaña-Alfaro, P.2
Pérez-González, F.3
Boato, G.4
-
15
-
-
84929234139
-
Application of Benford's law to images
-
S. J. Miller, A. Berger and T. Hill (Eds), Princeton University Press
-
F. Pérez-González, T. T. Quach, S. J. Miller, C. T. Abdallah, and G. L. Heileman, "Application of Benford's law to images," S. J. Miller, A. Berger and T. Hill (Eds), The Theory and Applications of Benford's law, Princeton University Press, 2014.
-
(2014)
The Theory and Applications of Benford's Law
-
-
Pérez-González, F.1
Quach, T.T.2
Miller, S.J.3
Abdallah, C.T.4
Heileman, G.L.5
-
16
-
-
0027681636
-
Distribution shape of two-dimensional DCT coefficients of natural images
-
F. Muller, "Distribution shape of two-dimensional DCT coefficients of natural images," IEEE Electronic letters, vol. 29, n. 22, pp. 1935-1936, 1993.
-
(1993)
IEEE Electronic Letters
, vol.29
, Issue.22
, pp. 1935-1936
-
-
Muller, F.1
-
18
-
-
84944485718
-
Mathematical analysis of random noise
-
S. O. Rice, "Mathematical analysis of random noise," Bell System Technical Journal, vol. 24, pp. 46-156, 1945.
-
(1945)
Bell System Technical Journal
, vol.24
, pp. 46-156
-
-
Rice, S.O.1
-
19
-
-
84855316756
-
Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery
-
Q. Liu, "Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery," in Proceedings of ACM Workshop on Multimedia Forensics and Intelligence, 2011, pp. 25-30.
-
(2011)
Proceedings of ACM Workshop on Multimedia Forensics and Intelligence
, pp. 25-30
-
-
Liu, Q.1
-
21
-
-
77954723646
-
The Dresden image database for benchmarking digital image forensics
-
T. Gloe and R. Boehme, "The Dresden image database for benchmarking digital image forensics," in Proceedings of ACM Symposium on Applied Computing, 2010, vol. 2, pp. 1585-1591.
-
(2010)
Proceedings of ACM Symposium on Applied Computing
, vol.2
, pp. 1585-1591
-
-
Gloe, T.1
Boehme, R.2
|