메뉴 건너뛰기




Volumn , Issue , 2014, Pages 5322-5326

A Benford-Fourier JPEG compression detector

Author keywords

Binary hypothesis testing; Image forensics; JPEG compression

Indexed keywords

FOURIER ANALYSIS; IMAGE COMPRESSION; STATISTICAL METHODS;

EID: 84942534799     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIP.2014.7026077     Document Type: Conference Paper
Times cited : (25)

References (21)
  • 1
    • 0038005383 scopus 로고    scopus 로고
    • Identification of bitmap compression history: JPEG detection and quantizer estimation
    • Z. Fan and R. De Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Transactions on Image Processing, vol. 12, n. 2, pp. 230-235, 2003.
    • (2003) IEEE Transactions on Image Processing , vol.12 , Issue.2 , pp. 230-235
    • Fan, Z.1    De Queiroz, R.2
  • 4
    • 84861122288 scopus 로고    scopus 로고
    • Image forgery localization via blockgrained analysis of JPEG artifacts
    • T. Bianchi and A. Piva, "Image forgery localization via blockgrained analysis of JPEG artifacts," IEEE Transactions on Information Forensics and Security, vol. 7, n. 3, pp. 1003-1017, 2012.
    • (2012) IEEE Transactions on Information Forensics and Security , vol.7 , Issue.3 , pp. 1003-1017
    • Bianchi, T.1    Piva, A.2
  • 5
    • 84867616246 scopus 로고    scopus 로고
    • Discriminating multiple JPEG compression using first digit features
    • S. Milani, M. Tagliasacchi, and S. Tubaro, "Discriminating multiple JPEG compression using first digit features," in Proceedings of IEEE ICASSP, 2012, pp. 25-30.
    • (2012) Proceedings of IEEE ICASSP , pp. 25-30
    • Milani, S.1    Tagliasacchi, M.2    Tubaro, S.3
  • 6
    • 79957470147 scopus 로고    scopus 로고
    • Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
    • Y. L. Chen and C. T. Hsu, "Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection," IEEE Transactions on Information Forensics and Security, vol. 6, n. 2, pp. 396-406, 2011.
    • (2011) IEEE Transactions on Information Forensics and Security , vol.6 , Issue.2 , pp. 396-406
    • Chen, Y.L.1    Hsu, C.T.2
  • 12
    • 84890447451 scopus 로고    scopus 로고
    • Antiforensics attack to Benford's law for the detection of double compressed images
    • S. Milani, M. Tagliasacchi, and S. Tubaro, "Antiforensics attack to Benford's law for the detection of double compressed images," in Proceedings of IEEE ICASSP, 2013, pp. 3053-3057.
    • (2013) Proceedings of IEEE ICASSP , pp. 3053-3057
    • Milani, S.1    Tagliasacchi, M.2    Tubaro, S.3
  • 13
    • 84892527710 scopus 로고    scopus 로고
    • JPEG compression anti-forensics based on first significant digit distribution
    • C. Pasquini and G. Boato, "JPEG compression anti-forensics based on first significant digit distribution," in Proceedings of IEEE MMSP, 2013, pp. 500-505.
    • (2013) Proceedings of IEEE MMSP , pp. 500-505
    • Pasquini, C.1    Boato, G.2
  • 14
    • 84905222835 scopus 로고    scopus 로고
    • Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
    • C. Pasquini, P. Comesaña-Alfaro, F. Pérez-González, and G. Boato, "Transportation-theoretic image counterforensics to First Significant Digit histogram forensics," in Proceedings of ICASSP, 2014, pp. 2718-2722.
    • (2014) Proceedings of ICASSP , pp. 2718-2722
    • Pasquini, C.1    Comesaña-Alfaro, P.2    Pérez-González, F.3    Boato, G.4
  • 16
    • 0027681636 scopus 로고
    • Distribution shape of two-dimensional DCT coefficients of natural images
    • F. Muller, "Distribution shape of two-dimensional DCT coefficients of natural images," IEEE Electronic letters, vol. 29, n. 22, pp. 1935-1936, 1993.
    • (1993) IEEE Electronic Letters , vol.29 , Issue.22 , pp. 1935-1936
    • Muller, F.1
  • 18
    • 84944485718 scopus 로고
    • Mathematical analysis of random noise
    • S. O. Rice, "Mathematical analysis of random noise," Bell System Technical Journal, vol. 24, pp. 46-156, 1945.
    • (1945) Bell System Technical Journal , vol.24 , pp. 46-156
    • Rice, S.O.1
  • 19
    • 84855316756 scopus 로고    scopus 로고
    • Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery
    • Q. Liu, "Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery," in Proceedings of ACM Workshop on Multimedia Forensics and Intelligence, 2011, pp. 25-30.
    • (2011) Proceedings of ACM Workshop on Multimedia Forensics and Intelligence , pp. 25-30
    • Liu, Q.1
  • 21
    • 77954723646 scopus 로고    scopus 로고
    • The Dresden image database for benchmarking digital image forensics
    • T. Gloe and R. Boehme, "The Dresden image database for benchmarking digital image forensics," in Proceedings of ACM Symposium on Applied Computing, 2010, vol. 2, pp. 1585-1591.
    • (2010) Proceedings of ACM Symposium on Applied Computing , vol.2 , pp. 1585-1591
    • Gloe, T.1    Boehme, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.