-
1
-
-
67649410199
-
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
-
Zhouchen Lin, Junfeng He, Xiaoou Tang, and Chi-Keung Tang, "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognition, vol. 42, no. 11, pp. 2492-2501, 2009.
-
(2009)
Pattern Recognition
, vol.42
, Issue.11
, pp. 2492-2501
-
-
Lin, Z.1
He, J.2
Tang, X.3
Tang, C.-K.4
-
2
-
-
84861122288
-
Image forgery localization via block-grained analysis of JPEG artifacts
-
Tiziano Bianchi and Alessandro Piva, "Image forgery localization via block-grained analysis of JPEG artifacts," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1003-1017, 2012.
-
(2012)
IEE Transactions on Information Forensics and Security
, vol.7
, Issue.3
, pp. 1003-1017
-
-
Bianchi, T.1
Piva, A.2
-
3
-
-
84870264329
-
An evaluation of popular copymove forgery detection approaches
-
Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, and Elli Angelopoulou, "An evaluation of popular copymove forgery detection approaches," IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.6
, pp. 1841-1854
-
-
Christlein, V.1
Riess, C.2
Jordan, J.3
Riess, C.4
Angelopoulou, E.5
-
4
-
-
84866278567
-
Image forgery localization via fine-grained analysis of CFA artifacts
-
2012
-
Pasquale Ferrara, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva, "Image forgery localization via fine-grained analysis of CFA artifacts," IEEE Transactions on Information Forensics and Security, vol. 7, no. 5, pp. 1566-1577, 2012.
-
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.5
, pp. 1566-1577
-
-
Ferrara, P.1
Bianchi, T.2
De Rosa, A.3
Piva, A.4
-
5
-
-
67349211082
-
Using noise inconsistencies for blind image forensics
-
Babak Mahdian and Stanislav Saic, "Using noise inconsistencies for blind image forensics," Image and Vision Computing, vol. 27, no. 10, pp. 1497-1503, 2009.
-
(2009)
Image and Vision Computing
, vol.27
, Issue.10
, pp. 1497-1503
-
-
Mahdian, B.1
Saic, S.2
-
6
-
-
79957470147
-
Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
-
Yi-Lei Chen and Chiou-Ting Hsu, "Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection," IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 396-406, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.2
, pp. 396-406
-
-
Chen, Y.-L.1
Hsu, C.-T.2
-
7
-
-
80051606276
-
Improved DCT coefficient analysis for forgery localization in JPEG images
-
IEEE
-
Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva, "Improved DCT coefficient analysis for forgery localization in JPEG images," in ICASSP. 2011, pp. 2444-2447, IEEE.
-
(2011)
ICASSP
, pp. 2444-2447
-
-
Tiziano, B.1
Rosa, A.D.2
Piva, A.3
-
8
-
-
60449117421
-
Exposing digital forgeries from JPEG ghosts
-
Hany Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 154-160, 2009.
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.1
, pp. 154-160
-
-
Farid, H.1
-
9
-
-
85036670435
-
Detecting digital image splicing in chroma spaces
-
Springer
-
Xudong Zhao, Jianhua Li, Shenghong Li, and Shilin Wang, "Detecting digital image splicing in chroma spaces," in IWDW. 2010, vol. 6526 of Lecture Notes in Computer Science, pp. 12-22, Springer.
-
(2010)
IWDW of Lecture Notes in Computer Science
, vol.6526
, pp. 12-22
-
-
Zhao, X.1
Li, J.2
Li, S.3
Wang, S.4
-
10
-
-
84899992554
-
Image forgery detection using steerable pyramid transform and local binary pattern
-
Ghulam Muhammad, Muneer H. Al-Hammadi, Muhammad Hussain, and George Bebis, "Image forgery detection using steerable pyramid transform and local binary pattern," Machine Vision and Applications, vol. 25, no. 4, pp. 985-995, 2014.
-
(2014)
Machine Vision and Applications
, vol.25
, Issue.4
, pp. 985-995
-
-
Muhammad, G.1
Al-Hammadi, M.H.2
Hussain, M.3
Bebis, G.4
-
11
-
-
84892401715
-
Comofod-new database for copy-move forgery detection
-
Dijana Tralic, Ivan Zupancic, Sonja Grgic, and Mislay Grgic, "Comofod-new database for copy-move forgery detection," in ELMAR, 55th International Symposium, 2013, pp. 49-54.
-
(2013)
ELMAR, 55th International Symposium
, pp. 49-54
-
-
Tralic, D.1
Zupancic, I.2
Grgic, S.3
Grgic, M.4
-
12
-
-
34247636825
-
Detecting image splicing using geometry invariants and camera characteristics consistency
-
IEEE Computer Society
-
Yu-Feng Hsu and Shih-Fu Chang, "Detecting image splicing using geometry invariants and camera characteristics consistency," in ICME. 2006, pp. 549-552, IEEE Computer Society.
-
(2006)
ICME
, pp. 549-552
-
-
Hsu, Y.-F.1
Chang, S.-F.2
-
13
-
-
84874819920
-
A framework for decision fusion in image forensics based on dempster-shafer theory of evidence
-
Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni, "A framework for decision fusion in image forensics based on dempster-shafer theory of evidence," IEEE Transactions on Information Forensics and Security, vol. 8, no. 4, pp. 593-607, 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.4
, pp. 593-607
-
-
Fontani, M.1
Bianchi, T.2
Rosa, A.D.3
Piva, A.4
Barni, M.5
-
14
-
-
84893135215
-
Faking sandy: Characterizing and identifying fake images on twitter during hurricane sandy
-
ACM
-
Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi, "Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy," in 22nd International World Wide Web Conference, WWW '13. 2013, pp. 729-736, ACM.
-
(2013)
22nd International World Wide Web Conference, WWW
, vol.13
, pp. 729-736
-
-
Gupta, A.1
Lamba, H.2
Kumaraguru, P.3
Joshi, A.4
-
15
-
-
84945547013
-
Challenges of computational verification in social multimedia
-
ACM
-
Christina Boididou, Symeon Papadopoulos, Yiannis Kompatsiaris, Steve Schifferes, and Nic Newman, "Challenges of computational verification in social multimedia," in 23rd International World Wide Web Conference, WWW '14. 2014, pp. 743-748, ACM.
-
(2014)
23rd International World Wide Web Conference, WWW '14
, pp. 743-748
-
-
Boididou, C.1
Papadopoulos, S.2
Kompatsiaris, Y.3
Schifferes, S.4
Newman, N.5
|