-
1
-
-
84944701899
-
Forensic camera model identification
-
Ho, T., Li, S. (eds.) Wiley-IEEE Press
-
Kirchner, M., Gloe, T.: Forensic camera model identification. In: Ho, T., Li, S. (eds.) Handbook of Digital Forensics of Multimedia Data and Devices.Wiley-IEEE Press (2015)
-
(2015)
Handbook of Digital Forensics of Multimedia Data and Devices
-
-
Kirchner, M.1
Gloe, T.2
-
2
-
-
33744736314
-
Digital camera identification from sensor pattern noise
-
Luk`aˇs, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1(2), 205-214 (2006)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 205-214
-
-
Lukàˇs, J.1
Fridrich, J.2
Goljan, M.3
-
3
-
-
69949138613
-
Using sensor pattern noise for camera model identification
-
Filler, T., Fridrich, J., Goljan, M.: Using sensor pattern noise for camera model identification. In: IEEE International Conference on Image Processing, pp. 1296-1299 (2008)
-
(2008)
IEEE International Conference on Image Processing
, pp. 1296-1299
-
-
Filler, T.1
Fridrich, J.2
Goljan, M.3
-
4
-
-
33749254274
-
Source camera identification based on CFA interpolation
-
Bayram, S., Sencar, H., Memon, N., Avcibas, I.: Source camera identification based on CFA interpolation. In: IEEE Int. Conference on Image Processing, pp. 69-72 (2005)
-
(2005)
IEEE Int. Conference on Image Processing
, pp. 69-72
-
-
Bayram, S.1
Sencar, H.2
Memon, N.3
Avcibas, I.4
-
5
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
Popescu, A., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53(2), 758-767 (2005)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.1
Farid, H.2
-
6
-
-
33847748167
-
Rich models for steganalysis of digital images
-
Swaminathan, A., Wu, M., Liu, K.J.R.: Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 2(1), 91-105 (2007)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.1
, pp. 91-105
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
7
-
-
70450271108
-
Accurate detection of demosaicing regularity for digital image forensics
-
Cao, H., Kot, A.: Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans. on Information Forensics and Security 4(4), 899-910 (2009)
-
(2009)
IEEE Trans. on Information Forensics and Security
, vol.4
, Issue.4
, pp. 899-910
-
-
Cao, H.1
Kot, A.2
-
8
-
-
85086795030
-
Improvements on source camera-model identification based on CFA
-
Bayram, S., Sencar, H., Memon, N.: Improvements on source camera-model identification based on CFA. In: Advances in Digital Forensics II, IFIP International Conference on Digital Forensics, pp. 289-299 (2006)
-
(2006)
Advances in Digital Forensics II, IFIP International Conference on Digital Forensics
, pp. 289-299
-
-
Bayram, S.1
Sencar, H.2
Memon, N.3
-
9
-
-
34547582679
-
Source Camera identification by JPEG compression statistics for image forensics
-
Fan, N., Jin, C., Huang, Y.: Source Camera identification by JPEG compression statistics for image forensics. In: TENCON, pp. 1-4 (2006)
-
(2006)
TENCON
, pp. 1-4
-
-
Fan, N.1
Jin, C.2
Huang, Y.3
-
10
-
-
84933677366
-
Camera model identification based on dct coefficient statistics
-
Thai, T., Retraint, F., Cogranne, R.: Camera model identification based on dct coefficient statistics. Digital Signal Processing 4, 88-100 (2015)
-
(2015)
Digital Signal Processing
, vol.4
, pp. 88-100
-
-
Thai, T.1
Retraint, F.2
Cogranne, R.3
-
11
-
-
46449101577
-
Identifying source cell phone using chromatic aberration
-
Van, L., Emmanuel, S., Kankanhalli, M.: Identifying source cell phone using chromatic aberration. In: IEEE International Conference on Multimedia and Expo, pp. 883-886 (2007)
-
(2007)
IEEE International Conference on Multimedia and Expo
, pp. 883-886
-
-
Van, L.1
Emmanuel, S.2
Kankanhalli, M.3
-
12
-
-
84891296342
-
Camera model identification based on the heteroscedastic noise model
-
Thai, T., Cogranne, R., Retraint, F.: Camera model identification based on the heteroscedastic noise model. IEEE Transactions on Image Processing 23(1), 250-263 (2014)
-
(2014)
IEEE Transactions on Image Processing
, vol.23
, Issue.1
, pp. 250-263
-
-
Thai, T.1
Cogranne, R.2
Retraint, F.3
-
13
-
-
20444438052
-
Blind source camera identification
-
Kharrazi, M., Sencar, H., Memon, N.: Blind source camera identification. In: IEEE International Conference on Image Processing, pp. 709-712 (2004)
-
(2004)
IEEE International Conference on Image Processing
, pp. 709-712
-
-
Kharrazi, M.1
Sencar, H.2
Memon, N.3
-
14
-
-
0038343416
-
Steganalysis using image quality metrics
-
Avciba¸s, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE Transactions on Image Processing 12(2), 221-229 (2003)
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 221-229
-
-
Avciba¸s, I.1
Memon, N.2
Sankur, B.3
-
15
-
-
49549105094
-
Blind identification of source cell-phone model
-
C¸ eliktutan, O., Sankur, B., Avciba¸s, I.: Blind identification of source cell-phone model. IEEE Transactions on Information Forensics and Security 3(3), 553-566 (2008)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 553-566
-
-
C¸ eliktutan, O.1
Sankur, B.2
Avciba¸s, I.3
-
17
-
-
84962435646
-
Feature-based forensic camera model identification
-
Shi, Y.Q., Katzenbeisser, S. (eds.), LNCS, Springer, Heidelberg
-
Gloe, T.: Feature-based forensic camera model identification. In: Shi, Y.Q., Katzenbeisser, S. (eds.) Transactions on DHMS VIII. LNCS, vol. 7228, pp. 42-62. Springer, Heidelberg (2012)
-
(2012)
Transactions on DHMS VIII
, vol.7228
, pp. 42-62
-
-
Gloe, T.1
-
18
-
-
79955401108
-
The Dresden image database for benchmarking digital image forensics
-
Gloe, T., B¨ohme, R.: The Dresden image database for benchmarking digital image forensics. Journal of Digital Forensic Practice 3(2-4), 150-159 (2010)
-
(2010)
Journal of Digital Forensic Practice
, vol.3
, Issue.2-4
, pp. 150-159
-
-
Gloe, T.1
B¨ohme, R.2
-
20
-
-
84926325920
-
An investigation of local descriptors for biometric spoofing detection
-
Gragnaniello, D., Poggi, G., Sansone, C., Verdoliva, L.: An investigation of local descriptors for biometric spoofing detection. IEEE Transactions on Information Forensics and Security 10(4), 849-863 (2015)
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.4
, pp. 849-863
-
-
Gragnaniello, D.1
Poggi, G.2
Sansone, C.3
Verdoliva, L.4
-
21
-
-
70350536695
-
Camera-model identification using markovian transition probability matrix
-
Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.), LNCS, Springer, Heidelberg
-
Xu, G., Gao, S., Shi, Y.Q., Hu, R.M., Su, W.: Camera-model identification using markovian transition probability matrix. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 294-307. Springer, Heidelberg (2009)
-
(2009)
IWDW 2009
, vol.5703
, pp. 294-307
-
-
Xu, G.1
Gao, S.2
Shi, Y.Q.3
Hu, R.M.4
Su, W.5
-
22
-
-
38049166461
-
A markov process based approach to effective attacking JPEG steganography
-
Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.), LNCS, Springer, Heidelberg
-
Shi, Y.Q., Chen, C.-H., Chen, W.: A markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249-264. Springer, Heidelberg (2007)
-
(2007)
IH 2006
, vol.4437
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.-H.2
Chen, W.3
-
24
-
-
77951863205
-
On detection of median filtering in images
-
Kirchner, M., Fridrich, J.: On detection of median filtering in images. In: SPIE, Electronic Imaging, Media Forensics and Security XII, pp. 101-112 (2010)
-
(2010)
SPIE, Electronic Imaging, Media Forensics and Security XII
, pp. 101-112
-
-
Kirchner, M.1
Fridrich, J.2
-
25
-
-
84929254527
-
A feature-based approach for image tampering detection and localization
-
Verdoliva, L., Cozzolino, D., Poggi, G.: A feature-based approach for image tampering detection and localization. In: IEEE Workshop on Information Forensics and Security, pp. 149-154 (2014)
-
(2014)
IEEE Workshop on Information Forensics and Security
, pp. 149-154
-
-
Verdoliva, L.1
Cozzolino, D.2
Poggi, G.3
-
26
-
-
78650918699
-
On the influence of denoising in PRNU based forgery detection
-
Chierchia, G., Parrilli, S., Poggi, G., Sansone, C., Verdoliva, L.: On the influence of denoising in PRNU based forgery detection. In: 2nd ACM workshop on Multimedia in Forensics, Security and Intelligence, pp. 117-122 (2010)
-
(2010)
2nd ACM workshop on Multimedia in Forensics, Security and Intelligence
, pp. 117-122
-
-
Chierchia, G.1
Parrilli, S.2
Poggi, G.3
Sansone, C.4
Verdoliva, L.5
|