-
2
-
-
84947713141
-
-
Photo tampering throughout history, Accessed: 2015-03-27, 2004
-
Photo tampering throughout history, (http://http://www.fourandsix.com/photo-tampering-history?currentPage=4), Accessed: 2015-03-27, 2004.
-
-
-
-
3
-
-
84888386204
-
Information forensics: An overview of the first decade
-
M.C. Stamm, M. Wu, and K. Liu Information forensics: an overview of the first decade IEEE Access 1 2013 167 200
-
(2013)
IEEE Access
, vol.1
, pp. 167-200
-
-
Stamm, M.C.1
Wu, M.2
Liu, K.3
-
4
-
-
78651398372
-
Digital image forensics: A booklet for beginners
-
J.A. Redi, W. Taktak, and J.-L. Dugelay Digital image forensics: a booklet for beginners Multimed. Tools Appl. 51 1 2011 133 162
-
(2011)
Multimed. Tools Appl.
, vol.51
, Issue.1
, pp. 133-162
-
-
Redi, J.A.1
Taktak, W.2
Dugelay, J.-L.3
-
5
-
-
85032768213
-
Image forgery detection: A survey
-
H. Farid Image forgery detection: a survey IEEE Signal Process. Mag. 26 2 2009 16 25
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
6
-
-
77953650817
-
A bibliography on blind methods for identifying image forgery
-
B. Mahdian, and S. Saic A bibliography on blind methods for identifying image forgery Signal Process.: Image Commun. 25 6 2010 389 399
-
(2010)
Signal Process.: Image Commun.
, vol.25
, Issue.6
, pp. 389-399
-
-
Mahdian, B.1
Saic, S.2
-
7
-
-
84890463165
-
An overview on image forensics
-
A. Piva An overview on image forensics ISRN Signal Process. 2013 1 22
-
(2013)
ISRN Signal Process.
, pp. 1-22
-
-
Piva, A.1
-
8
-
-
84886685372
-
Survey on blind image forgery detection
-
T. Qazi, K. Hayat, S.U. Khan, S.A. Madani, I.A. Khan, J. Kołodziej, H. Li, W. Lin, K.C. Yow, and C.-Z. Xu Survey on blind image forgery detection IET Image Process. 7 7 2013 660 670
-
(2013)
IET Image Process.
, vol.7
, Issue.7
, pp. 660-670
-
-
Qazi, T.1
Hayat, K.2
Khan, S.U.3
Madani, S.A.4
Khan, I.A.5
Kołodziej, J.6
Li, H.7
Lin, W.8
Yow, K.C.9
Xu, C.-Z.10
-
9
-
-
84880306849
-
Passive detection of copy-move forgery in digital images: State-of-The-art
-
O.M. Al-Qershi, and B.E. Khoo Passive detection of copy-move forgery in digital images: state-of-the-art Forensic Sci. Int. 231 1-3 2013 284 295
-
(2013)
Forensic Sci. Int.
, vol.231
, Issue.1-3
, pp. 284-295
-
-
Al-Qershi, O.M.1
Khoo, B.E.2
-
10
-
-
84884593770
-
Digital image forgery detection using passive techniques: A survey
-
G.K. Birajdar, and V.H. Mankar Digital image forgery detection using passive techniques: a survey Digit. Investig. 10 3 2013 226 245
-
(2013)
Digit. Investig.
, vol.10
, Issue.3
, pp. 226-245
-
-
Birajdar, G.K.1
Mankar, V.H.2
-
11
-
-
84901372003
-
A review on copy move image forgery detection techniques
-
IEEE, Barcelona, Spain
-
M. Ali Qureshi, M. Deriche, A review on copy move image forgery detection techniques, in: 11th International Multi-Conference on Systems, Signals & Devices (SSD), IEEE, Barcelona, Spain, 2014, pp. 1-5.
-
(2014)
11th International Multi-Conference on Systems, Signals & Devices (SSD)
, pp. 1-5
-
-
Ali Qureshi, M.1
Deriche, M.2
-
13
-
-
84947744624
-
-
40 Amazing Before and After Photo Retouching Photos, Accessed: 2015-03-27, March 2013
-
40 Amazing Before and After Photo Retouching Photos, (http://10steps.sg/inspirations/artworks/40-cool-before-and-after-photo-retouching-photos), Accessed: 2015-03-27, March 2013.
-
-
-
-
14
-
-
84947796113
-
-
Jopseph Casers: Sin Photoshop Y Con Photoshop, Accessed: 2015-03-27, April 2013
-
Jopseph Casers: Sin Photoshop Y Con Photoshop, (http://merengala.blogspot.com/2010/12/sin-photoshop-y-con-photoshop.html), Accessed: 2015-03-27, April 2013.
-
-
-
-
16
-
-
80155190686
-
-
Accessed: 2015-02-21, 2008
-
M. Nizza, P.J. Lyons, In an iranian image, a missile too many, (http://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile-too-many/), Accessed: 2015-02-21, 2008.
-
An Iranian Image, A Missile Too Many
-
-
Nizza, M.1
Lyons, P.J.2
-
19
-
-
84889567956
-
CASIA image tampering detection evaluation database
-
IEEE, Beijing, China
-
J. Dong, W. Wang, T. Tan, CASIA image tampering detection evaluation database, in: IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP), IEEE, Beijing, China, 2013, pp. 422-426.
-
(2013)
IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)
, pp. 422-426
-
-
Dong, J.1
Wang, W.2
Tan, T.3
-
21
-
-
13244263593
-
-
Marcel Dekker, New York, USA
-
M. Barni, F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, Signal Processing and Communications, Marcel Dekker, New York, USA, 2004.
-
(2004)
Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, Signal Processing and Communications
-
-
Barni, M.1
Bartolini, F.2
-
22
-
-
85013855044
-
-
2nd edition Morgan Kaufmann Francisco, CA, USA
-
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker Digital WaterMarking and Steganography 2nd edition 2008 Morgan Kaufmann Francisco, CA, USA
-
(2008)
Digital WaterMarking and Steganography
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
24
-
-
34250355507
-
A generalized Benford's law for JPEG coefficients and its applications in image forensics
-
San Jose, CA, USA
-
D. Fu, Y.Q. Shi, W. Su, A generalized Benford's law for JPEG coefficients and its applications in image forensics, in: Electronic Imaging, vol. 6505, International Society for Optics and Photonics, San Jose, CA, USA, 2007, p. 65051L.
-
(2007)
Electronic Imaging, International Society for Optics and Photonics
, vol.6505
, pp. 65051L
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
25
-
-
58049107658
-
Detecting doubly compressed JPEG images by using mode based first digit features
-
IEEE, Cairns, QLD, Australia
-
B. Li, Y.Q. Shi, J. Huang, Detecting doubly compressed JPEG images by using mode based first digit features, in: 10th Workshop on Multimedia Signal Processing, IEEE, Cairns, QLD, Australia, 2008, pp. 730-735.
-
(2008)
10th Workshop on Multimedia Signal Processing
, pp. 730-735
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
26
-
-
84861122288
-
Image forgery localization via block-grained analysis of JPEG artifacts
-
T. Bianchi, and A. Piva Image forgery localization via block-grained analysis of JPEG artifacts IEEE Trans. Inf. Forensics Secur. 7 3 2012 1003 1017
-
(2012)
IEEE Trans. Inf. Forensics Secur.
, vol.7
, Issue.3
, pp. 1003-1017
-
-
Bianchi, T.1
Piva, A.2
-
27
-
-
84858394859
-
Detection of nonaligned double JPEG compression based on integer periodicity maps
-
T. Bianchi, and A. Piva Detection of nonaligned double JPEG compression based on integer periodicity maps IEEE Trans. Inf. Forensics Secur. 7 2 2012 842 848
-
(2012)
IEEE Trans. Inf. Forensics Secur.
, vol.7
, Issue.2
, pp. 842-848
-
-
Bianchi, T.1
Piva, A.2
-
28
-
-
84867616246
-
Discriminating multiple JPEG compression using first digit features
-
IEEE, Kyoto, Japan
-
S. Milani, M. Tagliasacchi, S. Tubaro, Discriminating multiple JPEG compression using first digit features, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Kyoto, Japan, 2012, pp. 2253-2256.
-
(2012)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 2253-2256
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
29
-
-
84929251338
-
Multiple JPEG compression detection by means of Benford-Fourier coefficients
-
IEEE, Atlanta, GA, USA
-
C. Pasquini, G. Boato, F. Perez-Gonzalez, Multiple JPEG compression detection by means of Benford-Fourier coefficients, in: International Workshop on Information Forensics and Security (WIFS), IEEE, Atlanta, GA, USA, 2014, pp. 113-118.
-
(2014)
International Workshop on Information Forensics and Security (WIFS)
, pp. 113-118
-
-
Pasquini, C.1
Boato, G.2
Perez-Gonzalez, F.3
-
30
-
-
0038005383
-
Identification of bitmap compression history: JPEG detection and quantizer estimation
-
Z. Fan, and R.L. De Queiroz Identification of bitmap compression history: JPEG detection and quantizer estimation IEEE Trans. Image Process. 12 2 2003 230 235
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.2
, pp. 230-235
-
-
Fan, Z.1
De Queiroz, R.L.2
-
31
-
-
33750929814
-
Exposing digital forgeries through chromatic aberration
-
ACM, New York, NY, USA
-
M.K. Johnson, H. Farid, Exposing digital forgeries through chromatic aberration, in: 8th Workshop on Multimedia and Security, ACM, New York, NY, USA, 2006, pp. 48-55.
-
(2006)
8th Workshop on Multimedia and Security
, pp. 48-55
-
-
Johnson, M.K.1
Farid, H.2
-
32
-
-
33847748167
-
Nonintrusive component forensics of visual sensors using output images
-
A. Swaminathan, M. Wu, and K.R. Liu Nonintrusive component forensics of visual sensors using output images IEEE Trans. Inf. Forensics Secur. 2 1 2007 91 106
-
(2007)
IEEE Trans. Inf. Forensics Secur.
, vol.2
, Issue.1
, pp. 91-106
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.R.3
-
34
-
-
77951971717
-
Image tamper detection based on demosaicing artifacts.
-
IEEE, San Diego, CA, USA
-
A.E. Dirik, N.D. Memon, Image tamper detection based on demosaicing artifacts., in: International Conference on Image Processing (ICIP), IEEE, San Diego, CA, USA, 2009, pp. 1497-1500.
-
(2009)
International Conference on Image Processing (ICIP)
, pp. 1497-1500
-
-
Dirik, A.E.1
Memon, N.D.2
-
35
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukáš Determining image origin and integrity using sensor noise IEEE Trans. Inf. Forensics Secur. 3 1 2008 74 90
-
(2008)
IEEE Trans. Inf. Forensics Secur.
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukáš, J.4
-
36
-
-
33749254274
-
Source camera identification based on CFA interpolation
-
IEEE, Genova, Italy
-
S. Bayram, H. Sencar, N. Memon, I. Avcibas, Source camera identification based on CFA interpolation, in: International Conference on Image Processing (ICIP), vol. 3, IEEE, Genova, Italy, 2005, p. III-69.
-
(2005)
International Conference on Image Processing (ICIP)
, vol.3
, pp. III-69
-
-
Bayram, S.1
Sencar, H.2
Memon, N.3
Avcibas, I.4
-
37
-
-
33748068816
-
Exposing digital forgeries by detecting inconsistencies in lighting
-
ACM, Geneva, Switzerland
-
M.K. Johnson, H. Farid, Exposing digital forgeries by detecting inconsistencies in lighting, in: 7th Workshop on Multimedia and Security, ACM, Geneva, Switzerland, 2005, pp. 1-10.
-
(2005)
7th Workshop on Multimedia and Security
, pp. 1-10
-
-
Johnson, M.K.1
Farid, H.2
-
38
-
-
34548056428
-
Exposing digital forgeries in complex lighting environments
-
M.K. Johnson, and H. Farid Exposing digital forgeries in complex lighting environments IEEE Trans. Inf. Forensics Secur. 2 3 2007 450 461
-
(2007)
IEEE Trans. Inf. Forensics Secur.
, vol.2
, Issue.3
, pp. 450-461
-
-
Johnson, M.K.1
Farid, H.2
-
39
-
-
79952502867
-
Exposing digital forgeries from 3-D lighting environments
-
IEEE, Seattle, WA, USA
-
E. Kee, H. Farid, Exposing digital forgeries from 3-D lighting environments, in: International Workshop on Information Forensics and Security (WIFS), IEEE, Seattle, WA, USA, 2010, pp. 1-6.
-
(2010)
International Workshop on Information Forensics and Security (WIFS)
, pp. 1-6
-
-
Kee, E.1
Farid, H.2
-
40
-
-
58449107098
-
Detecting photographic composites of people
-
Springer, Guangzhou, China
-
M.K. Johnson, H. Farid, Detecting photographic composites of people, in: 6th International Workshop on Digital Watermarking (IWDW), Springer, Guangzhou, China, 2007, pp. 19-33.
-
(2007)
6th International Workshop on Digital Watermarking (IWDW)
, pp. 19-33
-
-
Johnson, M.K.1
Farid, H.2
-
41
-
-
34250380665
-
-
Department of Computer Science, Dartmouth College
-
M.K. Johnson, H. Farid, Metric Measurements on a Plane from a Single Image, Technical Report TR2006-579, Department of Computer Science, Dartmouth College, 2006.
-
(2006)
Metric Measurements on A Plane from A Single Image, Technical Report TR2006-579
-
-
Johnson, M.K.1
Farid, H.2
-
42
-
-
70449602768
-
Detecting photographic composites using two-view geometrical constraints
-
W. Zhang, X. Cao, Z. Feng, J. Zhang, P. Wang, Detecting photographic composites using two-view geometrical constraints, in: International Conference on Multimedia and Expo (ICME), 2009, pp. 1078-1081.
-
(2009)
International Conference on Multimedia and Expo (ICME)
, pp. 1078-1081
-
-
Zhang, W.1
Cao, X.2
Feng, Z.3
Zhang, J.4
Wang, P.5
-
43
-
-
84871264812
-
An efficient scheme for detecting copy-move forged images by Local Binary Patterns
-
L. Li, S. Li, H. Zhu, S.-C. Chu, J.F. Roddick, and J.-S. Pan An efficient scheme for detecting copy-move forged images by Local Binary Patterns J. Inf. Hiding Multimed. Signal Process. 4 1 2013 46 56
-
(2013)
J. Inf. Hiding Multimed. Signal Process.
, vol.4
, Issue.1
, pp. 46-56
-
-
Li, L.1
Li, S.2
Zhu, H.3
Chu, S.-C.4
Roddick, J.F.5
Pan, J.-S.6
-
44
-
-
34547689478
-
Detection of copy-move forgery using a method based on blur moment invariants
-
B. Mahdian, and S. Saic Detection of copy-move forgery using a method based on blur moment invariants Forensic Sci. Int. 171 2 2007 180 189
-
(2007)
Forensic Sci. Int.
, vol.171
, Issue.2
, pp. 180-189
-
-
Mahdian, B.1
Saic, S.2
-
45
-
-
74049111557
-
Fast and robust forensics for image region-duplication forgery
-
J.-W. Wang, G.-J. Liu, Z. Zhang, Y. Dai, and Z. Wang Fast and robust forensics for image region-duplication forgery Acta Autom. Sin. 35 12 2009 1488 1495
-
(2009)
Acta Autom. Sin.
, vol.35
, Issue.12
, pp. 1488-1495
-
-
Wang, J.-W.1
Liu, G.-J.2
Zhang, Z.3
Dai, Y.4
Wang, Z.5
-
46
-
-
79960906058
-
A passive image authentication scheme for detecting region-duplication forgery with rotation
-
G. Liu, J. Wang, S. Lian, and Z. Wang A passive image authentication scheme for detecting region-duplication forgery with rotation J. Netw. Comput. Appl. 34 5 2011 1557 1565
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.5
, pp. 1557-1565
-
-
Liu, G.1
Wang, J.2
Lian, S.3
Wang, Z.4
-
47
-
-
78549275481
-
Detection of copy-rotate-move forgery using Zernike moments
-
Springer, Berlin, Heidelberg
-
S.-J. Ryu, M.-J. Lee, H.-K. Lee, Detection of copy-rotate-move forgery using Zernike moments, in: Information Hiding, Springer, Berlin, Heidelberg, 2010, pp. 51-65.
-
(2010)
Information Hiding
, pp. 51-65
-
-
Ryu, S.-J.1
Lee, M.-J.2
Lee, H.-K.3
-
48
-
-
84880672623
-
Rotation invariant localization of duplicated image regions based on Zernike moments
-
S.-J. Ryu, M. Kirchner, M.-J. Lee, and H.-K. Lee Rotation invariant localization of duplicated image regions based on Zernike moments IEEE Trans. Inf. Forensics Secur. 8 8 2013 1355 1370
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.8
, pp. 1355-1370
-
-
Ryu, S.-J.1
Kirchner, M.2
Lee, M.-J.3
Lee, H.-K.4
-
49
-
-
84983185860
-
A fast no reference image quality assessment using laws texture moments
-
IEEE, Atlanta, GA, USA
-
M.A. Qureshi, M. Deriche, A fast no reference image quality assessment using laws texture moments, in: Global Conference on Signal and Information Processing (GlobalSIP), IEEE, Atlanta, GA, USA, 2014, pp. 979-983.
-
(2014)
Global Conference on Signal and Information Processing (GlobalSIP)
, pp. 979-983
-
-
Qureshi, M.A.1
Deriche, M.2
-
50
-
-
34147142845
-
Robust detection of region-duplication forgery in digital image
-
IEEE, Hong Kong
-
W. Luo, J. Huang, G. Qiu, Robust detection of region-duplication forgery in digital image, in: 18th International Conference on Pattern Recognition, (ICPR), vol. 4, IEEE, Hong Kong, 2006, pp. 746-749.
-
(2006)
18th International Conference on Pattern Recognition, (ICPR)
, vol.4
, pp. 746-749
-
-
Luo, W.1
Huang, J.2
Qiu, G.3
-
52
-
-
84880396631
-
Fast and efficient region duplication detection in digital images using sub-blocking method
-
V.K. Singh, and R. Tripathi Fast and efficient region duplication detection in digital images using sub-blocking method Int. J. Adv. Sci. Technol. 35 2011 93 102
-
(2011)
Int. J. Adv. Sci. Technol.
, vol.35
, pp. 93-102
-
-
Singh, V.K.1
Tripathi, R.2
-
53
-
-
79952523514
-
On rotation invariance in copy-move forgery detection
-
IEEE, Seattle, WA, USA
-
V. Christlein, C. Riess, E. Angelopoulou, On rotation invariance in copy-move forgery detection, in: International Workshop on Information Forensics and Security (WIFS), IEEE, Seattle, WA, USA, 2010, pp. 1-6.
-
(2010)
International Workshop on Information Forensics and Security (WIFS)
, pp. 1-6
-
-
Christlein, V.1
Riess, C.2
Angelopoulou, E.3
-
54
-
-
79955478772
-
Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics
-
S. Bravo-Solorio, and A.K. Nandi Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics Signal Process. 91 8 2011 1759 1770
-
(2011)
Signal Process.
, vol.91
, Issue.8
, pp. 1759-1770
-
-
Bravo-Solorio, S.1
Nandi, A.K.2
-
55
-
-
80051645137
-
Exposing duplicated regions affected by reflection, rotation and scaling
-
IEEE, Prague, Czech Republic
-
S. Bravo-Solorio, A.K. Nandi, Exposing duplicated regions affected by reflection, rotation and scaling, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Prague, Czech Republic, 2011, pp. 1880-1883.
-
(2011)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1880-1883
-
-
Bravo-Solorio, S.1
Nandi, A.K.2
-
56
-
-
0033284915
-
Object recognition from local scale-invariant features
-
IEEE, Kerkyra, Greece
-
D.G. Lowe, Object recognition from local scale-invariant features, in: 7th International Conference on Computer Vision (ICCV), vol. 2, IEEE, Kerkyra, Greece, 1999, pp. 1150-1157.
-
(1999)
7th International Conference on Computer Vision (ICCV)
, vol.2
, pp. 1150-1157
-
-
Lowe, D.G.1
-
57
-
-
63149091707
-
Detection of copy-move forgery in digital images using SIFT algorithm
-
IEEE, Wuhan, China
-
H. Huang, W. Guo, Y. Zhang, Detection of copy-move forgery in digital images using SIFT algorithm, in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA), vol. 2, IEEE, Wuhan, China, 2008, pp. 272-276.
-
(2008)
Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA)
, vol.2
, pp. 272-276
-
-
Huang, H.1
Guo, W.2
Zhang, Y.3
-
58
-
-
78049403223
-
Geometric tampering estimation by means of a sif-based forensic analysis
-
Dallas, TX, USA, Dallas, TX, USA
-
I. Amerini, L. Ballan, R. Caldelli, A. del Bimbo, G. Serra, Geometric tampering estimation by means of a sif-based forensic analysis, in: International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Dallas, TX, USA, Dallas, TX, USA, 2010, pp. 1702-1705.
-
(2010)
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
, pp. 1702-1705
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Serra, G.5
-
59
-
-
80051734185
-
A SIFT-based forensic method for copy-move attack detection and transformation recovery
-
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra A SIFT-based forensic method for copy-move attack detection and transformation recovery IEEE Trans. Inf. Forensics Secur. 6 3 2011 1099 1110
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, Issue.3
, pp. 1099-1110
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Serra, G.5
-
60
-
-
78649426066
-
Region duplication detection using image feature matching
-
X. Pan, and S. Lyu Region duplication detection using image feature matching IEEE Trans. Inf. Forensics Secur. 5 4 2010 857 867
-
(2010)
IEEE Trans. Inf. Forensics Secur.
, vol.5
, Issue.4
, pp. 857-867
-
-
Pan, X.1
Lyu, S.2
-
61
-
-
77957872283
-
Detecting image region duplication using SIFT features
-
Dallas, TX, USA
-
X. Pan, S. Lyu, Detecting image region duplication using SIFT features, in: International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Dallas, TX, USA, 2010, pp. 1706-1709.
-
(2010)
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
, pp. 1706-1709
-
-
Pan, X.1
Lyu, S.2
-
62
-
-
0019574599
-
Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography
-
M.A. Fischler, and R.C. Bolles Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography Commun. ACM 24 6 1981 381 395
-
(1981)
Commun. ACM
, vol.24
, Issue.6
, pp. 381-395
-
-
Fischler, M.A.1
Bolles, R.C.2
-
63
-
-
84878019726
-
Copy-move forgery detection and localization by means of robust clustering with J-Linkage
-
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo, and G. Serra Copy-move forgery detection and localization by means of robust clustering with J-Linkage Signal Process.: Image Commun. 28 6 2013 659 669
-
(2013)
Signal Process.: Image Commun.
, vol.28
, Issue.6
, pp. 659-669
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Del Tongo, L.5
Serra, G.6
-
64
-
-
84894902017
-
Accurate and robust localization of duplicated region in copy-move image forgery
-
M. Jaberi, G. Bebis, M. Hussain, and G. Muhammad Accurate and robust localization of duplicated region in copy-move image forgery Mach. Vis. Appl. 25 2 2014 451 475
-
(2014)
Mach. Vis. Appl.
, vol.25
, Issue.2
, pp. 451-475
-
-
Jaberi, M.1
Bebis, G.2
Hussain, M.3
Muhammad, G.4
-
65
-
-
84870281448
-
Detection of region duplication forgery in digital images using SURF
-
B. Shivakumar, and S.S. Baboo Detection of region duplication forgery in digital images using SURF Int. J. Comput. Sci. Issues 8 4 2011 199 205
-
(2011)
Int. J. Comput. Sci. Issues
, vol.8
, Issue.4
, pp. 199-205
-
-
Shivakumar, B.1
Baboo, S.S.2
-
66
-
-
84880263765
-
Automated forensic method for copy-move forgery detection based on Harris Interest Points and SIFT descriptors
-
B. Shivakumar, and S.S. Baboo Automated forensic method for copy-move forgery detection based on Harris Interest Points and SIFT descriptors Int. J. Comput. Appl. 27 3 2011 9 17
-
(2011)
Int. J. Comput. Appl.
, vol.27
, Issue.3
, pp. 9-17
-
-
Shivakumar, B.1
Baboo, S.S.2
-
67
-
-
78751489569
-
Image copy-move forgery detection based on SURF
-
IEEE, Nanjing, Jiangsu, China
-
X. Bo, W. Junwen, L. Guangjie, D. Yuewei, Image copy-move forgery detection based on SURF, in: International Conference on Multimedia Information Networking and Security (MINES), IEEE, Nanjing, Jiangsu, China, 2010, pp. 889-892.
-
(2010)
International Conference on Multimedia Information Networking and Security (MINES)
, pp. 889-892
-
-
Bo, X.1
Junwen, W.2
Guangjie, L.3
Yuewei, D.4
-
68
-
-
78650874889
-
Copy-move forgery detection via texture description
-
ACM, NY, USA
-
E. Ardizzone, A. Bruno, G. Mazzola, Copy-move forgery detection via texture description, in: 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, ACM, NY, USA, 2010, pp. 59-64.
-
(2010)
2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence
, pp. 59-64
-
-
Ardizzone, E.1
Bruno, A.2
Mazzola, G.3
-
69
-
-
79952443740
-
Improved DCT-based detection of copy-move forgery in images
-
Y. Huang, W. Lu, W. Sun, and D. Long Improved DCT-based detection of copy-move forgery in images Forensic Sci. Int. 206 1 2011 178 184
-
(2011)
Forensic Sci. Int.
, vol.206
, Issue.1
, pp. 178-184
-
-
Huang, Y.1
Lu, W.2
Sun, W.3
Long, D.4
-
70
-
-
79951638155
-
Reduced time complexity for detection of copy-move forgery using discrete wavelet transform
-
S. Khan, and A. Kulkarni Reduced time complexity for detection of copy-move forgery using discrete wavelet transform Int. J. Comput. Appl. 6 7 2010 31 36
-
(2010)
Int. J. Comput. Appl.
, vol.6
, Issue.7
, pp. 31-36
-
-
Khan, S.1
Kulkarni, A.2
-
71
-
-
79952526555
-
Wavelet-based multiresolution features for detecting duplications in images
-
M.K. Bashar, K. Noda, N. Ohnishi, H. Kudo, T. Matsumoto, Y. Takeuchi, Wavelet-based multiresolution features for detecting duplications in images, in: Conference on Machine Vision and Intelligence, 2007, pp. 264-267.
-
(2007)
Conference on Machine Vision and Intelligence
, pp. 264-267
-
-
Bashar, M.K.1
Noda, K.2
Ohnishi, N.3
Kudo, H.4
Matsumoto, T.5
Takeuchi, Y.6
-
72
-
-
70349199203
-
An efficient and robust method for detecting copy-move forgery
-
IEEE, Taipei, Taiwan
-
S. Bayram, H.T. Sencar, N. Memon, An efficient and robust method for detecting copy-move forgery, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Taipei, Taiwan, 2009, pp. 1053-1056.
-
(2009)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1053-1056
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
73
-
-
84863325954
-
Passive copy move image forgery detection using undecimated dyadic wavelet transform
-
G. Muhammad, M. Hussain, and G. Bebis Passive copy move image forgery detection using undecimated dyadic wavelet transform Digit. Investig. 9 1 2012 49 57
-
(2012)
Digit. Investig.
, vol.9
, Issue.1
, pp. 49-57
-
-
Muhammad, G.1
Hussain, M.2
Bebis, G.3
-
74
-
-
84873403801
-
Copy-move forgery detection based on PHT
-
IEEE, Trivandrum, India
-
L. Li, S. Li, J. Wang, Copy-move forgery detection based on PHT, in: World Congress on Information and Communication Technologies (WICT), IEEE, Trivandrum, India, 2012, pp. 1061-1065.
-
(2012)
World Congress on Information and Communication Technologies (WICT)
, pp. 1061-1065
-
-
Li, L.1
Li, S.2
Wang, J.3
-
75
-
-
84872395718
-
Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
-
Y. Li Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching Forensic Sci. Int. 224 1-3 2013 59 67
-
(2013)
Forensic Sci. Int.
, vol.224
, Issue.1-3
, pp. 59-67
-
-
Li, Y.1
-
76
-
-
78651097828
-
Rotation robust detection of copy-move forgery
-
IEEE, Hong Kong
-
W. Li, N. Yu, Rotation robust detection of copy-move forgery, in: 17th International Conference on Image Processing (ICIP), IEEE, Hong Kong, 2010, pp. 2113-2116.
-
(2010)
17th International Conference on Image Processing (ICIP)
, pp. 2113-2116
-
-
Li, W.1
Yu, N.2
-
77
-
-
78649506895
-
Detection of image region-duplication with rotation and scaling tolerance
-
Springer, Kaohsiung, Taiwan
-
Q. Wu, S. Wang, X. Zhang, Detection of image region-duplication with rotation and scaling tolerance, in: International Conference on Computer and Computational Intelligence (ICCCI), Springer, Kaohsiung, Taiwan, 2010, pp. 100-108.
-
(2010)
International Conference on Computer and Computational Intelligence (ICCCI)
, pp. 100-108
-
-
Wu, Q.1
Wang, S.2
Zhang, X.3
-
78
-
-
27844542239
-
-
Technical Report TR2004-515, Department of Computer Science, Dartmouth College, Hanover, New Hampshire
-
A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report TR2004-515, Department of Computer Science, Dartmouth College, Hanover, New Hampshire, 2004.
-
(2004)
Exposing Digital Forgeries by Detecting Duplicated Image Regions
-
-
Popescu, A.C.1
Farid, H.2
-
79
-
-
84947734953
-
Exploring duplicated regions in natural images
-
2012
-
M.K.V. Hulmukhe, N. KKWIEER, S. Sane, M.A.A. Borse, Exploring duplicated regions in natural images, in: International Conference in Computational Intelligence (ICCIA), 2012.
-
International Conference in Computational Intelligence (ICCIA)
-
-
Hulmukhe, M.K.V.1
Kkwieer, N.2
Sane, S.3
Borse, M.A.A.4
-
81
-
-
79951544608
-
Identifying tampered regions using singular value decomposition in digital image forensics
-
IEEE, Wuhan, China
-
X. Kang, S. Wei, Identifying tampered regions using singular value decomposition in digital image forensics, in: International Conference on Computer Science and Software Engineering, vol. 3, IEEE, Wuhan, China, 2008, pp. 926-930.
-
(2008)
International Conference on Computer Science and Software Engineering
, vol.3
, pp. 926-930
-
-
Kang, X.1
Wei, S.2
-
82
-
-
73849084145
-
Copy-move forgery detection based on SVD in digital image
-
IEEE, Tianjin, China
-
Z. Ting, W. Rang-ding, Copy-move forgery detection based on svd in digital image, in: 2nd International Congress on and Signal Processing (CISP), IEEE, Tianjin, China, 2009, pp. 1-5.
-
(2009)
2nd International Congress on and Signal Processing (CISP)
, pp. 1-5
-
-
Ting, Z.1
Rang-Ding, W.2
-
83
-
-
84870579359
-
Detection of copy-move forgery image using Gabor descriptor
-
IEEE, Taipei, Taiwan
-
H.-C. Hsu, M.-S. Wang, Detection of copy-move forgery image using Gabor descriptor, in: International Conference on Anti-Counterfeiting, Security and Identification (ASID), IEEE, Taipei, Taiwan, 2012, pp. 1-4.
-
(2012)
International Conference on Anti-Counterfeiting, Security and Identification (ASID)
, pp. 1-4
-
-
Hsu, H.-C.1
Wang, M.-S.2
-
84
-
-
80051932982
-
Robust detection of copy-move forgery using texture features
-
IEEE, Tehran, Iran
-
F. Gharibi, J. RavanJamjah, F. Akhlaghian, B.Z. Azami, J. Alirezaie, Robust detection of copy-move forgery using texture features, in: 19th Iranian Conference on Electrical Engineering (ICEE), IEEE, Tehran, Iran, 2011, pp. 1-4.
-
(2011)
19th Iranian Conference on Electrical Engineering (ICEE)
, pp. 1-4
-
-
Gharibi, F.1
RavanJamjah, J.2
Akhlaghian, F.3
Azami, B.Z.4
Alirezaie, J.5
-
85
-
-
62949177156
-
A new approach for detecting copy-move forgery in digital images
-
IEEE, Guangzhou, China
-
J. Zhang, Z. Feng, Y. Su, A new approach for detecting copy-move forgery in digital images, in: 11th International Conference on Communication Systems (ICCS), IEEE, Guangzhou, China, 2008, pp. 362-366.
-
(2008)
11th International Conference on Communication Systems (ICCS)
, pp. 362-366
-
-
Zhang, J.1
Feng, Z.2
Su, Y.3
-
86
-
-
79952781257
-
DWT-PCA (EVD) based copy-move image forgery detection
-
M. Zimba, and S. Xingming DWT-PCA (EVD) based copy-move image forgery detection Int. J. Digit. Content Technol. Appl. 5 1 2011 251 258
-
(2011)
Int. J. Digit. Content Technol. Appl.
, vol.5
, Issue.1
, pp. 251-258
-
-
Zimba, M.1
Xingming, S.2
-
87
-
-
58149235809
-
A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD
-
IEEE, Beijing, China
-
G. Li, Q. Wu, D. Tu, S. Sun, A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD, in: International Conference on Multimedia and Expo (ICME), IEEE, Beijing, China, 2007, pp. 1750-1753.
-
(2007)
International Conference on Multimedia and Expo (ICME)
, pp. 1750-1753
-
-
Li, G.1
Wu, Q.2
Tu, D.3
Sun, S.4
-
88
-
-
5044233274
-
PCA-SIFT: A more distinctive representation for local image descriptors
-
IEEE, Washington, DC, USA
-
Y. Ke, R. Sukthankar, PCA-SIFT: a more distinctive representation for local image descriptors, in: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, (CVPR), vol. 2, IEEE, Washington, DC, USA, 2004, pp. II-506.
-
(2004)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition, (CVPR)
, vol.2
, pp. II-506
-
-
Ke, Y.1
Sukthankar, R.2
-
89
-
-
80055037788
-
DWT-DCT (QCD) based copy-move image forgery detection
-
IEEE, Sarajevo, Bosnia
-
M. Ghorbani, M. Firouzmand, A. Faraahi, DWT-DCT (QCD) based copy-move image forgery detection, in: 18th International Conference on Systems, Signals and Image Processing (IWSSIP), IEEE, Sarajevo, Bosnia, 2011, pp. 1-4.
-
(2011)
18th International Conference on Systems, Signals and Image Processing (IWSSIP)
, pp. 1-4
-
-
Ghorbani, M.1
Firouzmand, M.2
Faraahi, A.3
-
90
-
-
84927766982
-
Image duplication forgery detection using two robust features
-
M. Zahra Image duplication forgery detection using two robust features Res. J. Recent Sci. 1 12 2012 1 6
-
(2012)
Res. J. Recent Sci.
, vol.1
, Issue.12
, pp. 1-6
-
-
Zahra, M.1
-
91
-
-
80755169418
-
Robust copy-move image forgery detection using undecimated wavelets and Zernike moments
-
ACM, Chengdu, China
-
G. Muhammad, M.S. Hossain, Robust copy-move image forgery detection using undecimated wavelets and Zernike moments, in: 3rd International Conference on Internet Multimedia Computing and Service, ACM, Chengdu, China, 2011, pp. 95-98.
-
(2011)
3rd International Conference on Internet Multimedia Computing and Service
, pp. 95-98
-
-
Muhammad, G.1
Hossain, M.S.2
-
92
-
-
77749279983
-
Detection of image region duplication forgery using model with circle block
-
IEEE, Hubei, China
-
J. Wang, G. Liu, H. Li, Y. Dai, Z. Wang, Detection of image region duplication forgery using model with circle block, in: International Conference on Multimedia Information Networking and Security (MINES), vol. 1, IEEE, Hubei, China, 2009, pp. 25-29.
-
(2009)
International Conference on Multimedia Information Networking and Security (MINES)
, vol.1
, pp. 25-29
-
-
Wang, J.1
Liu, G.2
Li, H.3
Dai, Y.4
Wang, Z.5
-
93
-
-
68549088815
-
Robust forensics for image regional duplication and forgery based on DWT and Zernike moment
-
J.-W. Wang, G.-J. Liu, Z. Zhang, Y.-W. Dai, and Z.-Q. Wang Robust forensics for image regional duplication and forgery based on DWT and Zernike moment Opt. Precis. Eng. 17 7 2009 1687 1693
-
(2009)
Opt. Precis. Eng.
, vol.17
, Issue.7
, pp. 1687-1693
-
-
Wang, J.-W.1
Liu, G.-J.2
Zhang, Z.3
Dai, Y.-W.4
Wang, Z.-Q.5
-
94
-
-
79952517536
-
A study on features for the detection of copy-move forgeries
-
V. Christlein, C. Riess, E. Angelopoulou, A study on features for the detection of copy-move forgeries, in: SICHERHEIT, vol. 2010, 2010, pp. 105-116.
-
(2010)
SICHERHEIT
, vol.2010
, pp. 105-116
-
-
Christlein, V.1
Riess, C.2
Angelopoulou, E.3
-
95
-
-
33845361183
-
An efficient match-based duplication detection algorithm
-
IEEE, Quebec, Canada
-
A. Langille, M. Gong, An efficient match-based duplication detection algorithm, in: 3rd Canadian Conference on Computer and Robot Vision, IEEE, Quebec, Canada, 2006, pp. 64-64.
-
(2006)
3rd Canadian Conference on Computer and Robot Vision
, pp. 64-64
-
-
Langille, A.1
Gong, M.2
-
96
-
-
78149302558
-
The generalized patchmatch correspondence algorithm
-
Springer, Heraklion, Crete, Greece
-
C. Barnes, E. Shechtman, D.B. Goldman, A. Finkelstein, The generalized patchmatch correspondence algorithm, in: 11th European Conference on Computer Vision (ECCV), vol. 6313, Springer, Heraklion, Crete, Greece, 2010, pp. 29-43.
-
(2010)
11th European Conference on Computer Vision (ECCV)
, vol.6313
, pp. 29-43
-
-
Barnes, C.1
Shechtman, E.2
Goldman, D.B.3
Finkelstein, A.4
-
97
-
-
70349655522
-
Patchmatch: A randomized correspondence algorithm for structural image editing
-
C. Barnes, E. Shechtman, A. Finkelstein, D. Goldman, Patchmatch: a randomized correspondence algorithm for structural image editing, ACM Trans. Graph. 28 (3) (2009) 24:1-24:11.
-
(2009)
ACM Trans. Graph.
, vol.28
, Issue.3
, pp. 241-2411
-
-
Barnes, C.1
Shechtman, E.2
Finkelstein, A.3
Goldman, D.4
-
98
-
-
84929244180
-
Copy-move forgery detection based on patchmatch
-
IEEE, Paris, France
-
D. Cozzolino, G. Poggi, L. Verdoliva, Copy-move forgery detection based on patchmatch, in: International Conference on Image Processing (ICIP), IEEE, Paris, France, 2014, pp. 5312-5316.
-
(2014)
International Conference on Image Processing (ICIP)
, pp. 5312-5316
-
-
Cozzolino, D.1
Poggi, G.2
Verdoliva, L.3
-
99
-
-
84877841117
-
Efficient image duplicated region detection model using sequential block clustering
-
M.A. Sekeh, M.A. Maarof, M.F. Rohani, and B. Mahdian Efficient image duplicated region detection model using sequential block clustering Digit. Investig. 10 1 2013 73 84
-
(2013)
Digit. Investig.
, vol.10
, Issue.1
, pp. 73-84
-
-
Sekeh, M.A.1
Maarof, M.A.2
Rohani, M.F.3
Mahdian, B.4
-
100
-
-
84929230919
-
Adaptive matching for copy-move forgery detection
-
IEEE, Atlanta, GA, USA
-
M. Zandi, A. Mahmoudi-Aznaveh, A. Mansouri, Adaptive matching for copy-move forgery detection, in: International Workshop on Information Forensics and Security (WIFS), IEEE, Atlanta, GA, USA, 2014, pp. 119-124.
-
(2014)
International Workshop on Information Forensics and Security (WIFS)
, pp. 119-124
-
-
Zandi, M.1
Mahmoudi-Aznaveh, A.2
Mansouri, A.3
-
101
-
-
20444503952
-
A model for image splicing
-
IEEE, Singapore
-
T.-T. Ng, S.-F. Chang, A model for image splicing, in: International Conference on Image Processing (ICIP), vol. 2, IEEE, Singapore, 2004, pp. 1169-1172.
-
(2004)
International Conference on Image Processing (ICIP)
, vol.2
, pp. 1169-1172
-
-
Ng, T.-T.1
Chang, S.-F.2
-
102
-
-
20444471753
-
-
Columbia University, ADVENT Technical Report
-
T.-T. Ng, S.-F. Chang, Q. Sun, A Data Set of Authentic and Spliced Image Blocks, Columbia University, ADVENT Technical Report, 2004, pp. 203-204.
-
(2004)
A Data Set of Authentic and Spliced Image Blocks
, pp. 203-204
-
-
Ng, T.-T.1
Chang, S.-F.2
Sun, Q.3
-
103
-
-
4344600402
-
Blind detection of photomontage using higher order statistics
-
IEEE, Vancouver, BC, Canada
-
T.-T. Ng, S.-F. Chang, Q. Sun, Blind detection of photomontage using higher order statistics, in: International Symposium on Circuits and Systems (ISCAS), vol. 5, IEEE, Vancouver, BC, Canada, 2004, pp. 688-691.
-
(2004)
International Symposium on Circuits and Systems (ISCAS)
, vol.5
, pp. 688-691
-
-
Ng, T.-T.1
Chang, S.-F.2
Sun, Q.3
-
104
-
-
33845464635
-
Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition
-
Springer, Jeju Island, Korea
-
D. Fu, Y.Q. Shi, W. Su, Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition, in: 5th International Workshop on Digital Watermarking, vol. 4283, Springer, Jeju Island, Korea, 2006, pp. 177-187.
-
(2006)
5th International Workshop on Digital Watermarking
, vol.4283
, pp. 177-187
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
105
-
-
79951662516
-
Image splicing detection based on moment features and Hilbert-Huang transform
-
IEEE, Beijing, China
-
X. Li, T. Jing, X. Li, Image splicing detection based on moment features and Hilbert-Huang transform, in: International Conference on Information Theory and Information Security (ICITIS), IEEE, Beijing, China, 2010, pp. 1127-1130.
-
(2010)
International Conference on Information Theory and Information Security (ICITIS)
, pp. 1127-1130
-
-
Li, X.1
Jing, T.2
Li, X.3
-
106
-
-
78650323484
-
Run-length and edge statistics based approach for image splicing detection
-
Springer, Berlin, Heidelberg
-
J. Dong, W. Wang, T. Tan, Y.Q. Shi, Run-length and edge statistics based approach for image splicing detection, in: 7th International Workshop on Digital Watermarking (IWDW), vol. 5450, Springer, Berlin, Heidelberg, 2009, pp. 76-87.
-
(2009)
7th International Workshop on Digital Watermarking (IWDW)
, vol.5450
, pp. 76-87
-
-
Dong, J.1
Wang, W.2
Tan, T.3
Shi, Y.Q.4
-
107
-
-
79959193080
-
Digital image splicing detection based on approximate run length
-
Z. He, W. Sun, W. Lu, and H. Lu Digital image splicing detection based on approximate run length Pattern Recognit. Lett. 32 12 2011 1591 1597
-
(2011)
Pattern Recognit. Lett.
, vol.32
, Issue.12
, pp. 1591-1597
-
-
He, Z.1
Sun, W.2
Lu, W.3
Lu, H.4
-
108
-
-
34250373244
-
Image splicing detection using 2-d phase congruency and statistical moments of characteristic function
-
Citeseer, San Jose, CA, USA
-
W. Chen, Y.Q. Shi, W. Su, Image splicing detection using 2-d phase congruency and statistical moments of characteristic function, in: Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol. 6505, Citeseer, San Jose, CA, USA, 2007.
-
(2007)
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series
, vol.6505
-
-
Chen, W.1
Shi, Y.Q.2
Su, W.3
-
109
-
-
38849209052
-
A natural image model approach to splicing detection
-
Y.Q. Shi, C. Chen, W. Chen, A natural image model approach to splicing detection, in: 9th Workshop on Multimedia & Security, ACM, 2007, pp. 51-62.
-
(2007)
9th Workshop on Multimedia & Security, ACM
, pp. 51-62
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
110
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
Springer, Alexandria, VA, USA
-
Y.Q. Shi, C. Chen, W. Chen, A Markov process based approach to effective attacking JPEG steganography, in: 8th International Workshop on Information Hiding, vol. 4437, Springer, Alexandria, VA, USA, 2007, pp. 249-264.
-
(2007)
8th International Workshop on Information Hiding
, vol.4437
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
111
-
-
33750555925
-
Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network
-
IEEE, Amsterdam, Netherlands
-
Y.Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen, C. Chen, Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network, in: International Conference on Multimedia and Expo (ICME), IEEE, Amsterdam, Netherlands, 2005.
-
(2005)
International Conference on Multimedia and Expo (ICME)
-
-
Shi, Y.Q.1
Xuan, G.2
Zou, D.3
Gao, J.4
Yang, C.5
Zhang, Z.6
Chai, P.7
Chen, W.8
Chen, C.9
-
112
-
-
84865693837
-
A comprehensive study on third order statistical features for image splicing detection
-
Springer, Atlantic City, NY, USA
-
X. Zhao, S. Wang, S. Li, J. Li, A comprehensive study on third order statistical features for image splicing detection, in: 10th International Workshop on Digital Forensics and Watermarking, vol. 7128, Springer, Atlantic City, NY, USA, 2012, pp. 243-256.
-
(2012)
10th International Workshop on Digital Forensics and Watermarking
, vol.7128
, pp. 243-256
-
-
Zhao, X.1
Wang, S.2
Li, S.3
Li, J.4
-
113
-
-
84874148290
-
Revealing image splicing forgery using Local Binary Patterns of DCT coefficients
-
Springer, Gold Coast, Australia
-
Y. Zhang, C. Zhao, Y. Pi, S. Li, Revealing image splicing forgery using Local Binary Patterns of DCT coefficients, in: International Conference on Communications, Signal Processing, and Systems, vol. 202, Springer, Gold Coast, Australia, 2012, pp. 181-189.
-
(2012)
International Conference on Communications, Signal Processing, and Systems
, vol.202
, pp. 181-189
-
-
Zhang, Y.1
Zhao, C.2
Pi, Y.3
Li, S.4
-
114
-
-
84864277926
-
Digital image splicing detection based on Markov features in DCT and DWT domain
-
Z. He, W. Lu, W. Sun, and J. Huang Digital image splicing detection based on Markov features in DCT and DWT domain Pattern Recognit. 45 12 2012 4292 4299
-
(2012)
Pattern Recognit.
, vol.45
, Issue.12
, pp. 4292-4299
-
-
He, Z.1
Lu, W.2
Sun, W.3
Huang, J.4
-
115
-
-
51749089283
-
JPEG image steganalysis utilizing both intrablock and interblock correlations
-
IEEE, Seattle, WA, USA
-
C. Chen, Y.Q. Shi, JPEG image steganalysis utilizing both intrablock and interblock correlations, in: International Symposium on Circuits and Systems (ISCAS), IEEE, Seattle, WA, USA, 2008, pp. 3029-3032.
-
(2008)
International Symposium on Circuits and Systems (ISCAS)
, pp. 3029-3032
-
-
Chen, C.1
Shi, Y.Q.2
-
116
-
-
0037277963
-
On advances in statistical modeling of natural images
-
A. Srivastava, A.B. Lee, E.P. Simoncelli, and S.-C. Zhu On advances in statistical modeling of natural images J. Math. Imaging Vis. 18 1 2003 17 33
-
(2003)
J. Math. Imaging Vis.
, vol.18
, Issue.1
, pp. 17-33
-
-
Srivastava, A.1
Lee, A.B.2
Simoncelli, E.P.3
Zhu, S.-C.4
-
117
-
-
0036161259
-
Gene selection for cancer classification using support vector machines
-
I. Guyon, J. Weston, S. Barnhill, and V. Vapnik Gene selection for cancer classification using support vector machines Mach. Learn. 46 1-3 2002 389 422
-
(2002)
Mach. Learn.
, vol.46
, Issue.1-3
, pp. 389-422
-
-
Guyon, I.1
Weston, J.2
Barnhill, S.3
Vapnik, V.4
-
118
-
-
84937814771
-
Combining spatial and DCT based markov features for enhanced blind detection of image splicing
-
E.-S.M. El-Alfy, and M.A. Qureshi Combining spatial and DCT based markov features for enhanced blind detection of image splicing Pattern Anal. Appl. 18 3 2014 713 723
-
(2014)
Pattern Anal. Appl.
, vol.18
, Issue.3
, pp. 713-723
-
-
El-Alfy, E.-S.M.1
Qureshi, M.A.2
-
119
-
-
77951953873
-
Effective image splicing detection based on image chroma
-
IEEE, San Diego, CA, USA
-
W. Wang, J. Dong, T. Tan, Effective image splicing detection based on image chroma, in: 16th International Conference on Image Processing (ICIP), IEEE, San Diego, CA, USA, 2009, pp. 1257-1260.
-
(2009)
16th International Conference on Image Processing (ICIP)
, pp. 1257-1260
-
-
Wang, W.1
Dong, J.2
Tan, T.3
-
120
-
-
78651098681
-
Image tampering detection based on stationary distribution of Markov chain
-
IEEE, Hong Kong
-
W. Wang, J. Dong, T. Tan, Image tampering detection based on stationary distribution of Markov chain, in: 17th International Conference on Image Processing (ICIP), IEEE, Hong Kong, 2010, pp. 2101-2104.
-
(2010)
17th International Conference on Image Processing (ICIP)
, pp. 2101-2104
-
-
Wang, W.1
Dong, J.2
Tan, T.3
-
121
-
-
85036670435
-
Detecting digital image splicing in chroma spaces
-
X. Zhao, J. Li, S. Li, S. Wang, Detecting digital image splicing in chroma spaces, in: Digital Watermarking, Springer, Seoul, Korea, 2011, pp. 12-22.
-
(2011)
Digital Watermarking, Springer, Seoul, Korea
, pp. 12-22
-
-
Zhao, X.1
Li, J.2
Li, S.3
Wang, S.4
-
122
-
-
84899992554
-
Image forgery detection using steerable pyramid transform and local binary pattern
-
G. Muhammad, M.H. Al-Hammadi, M. Hussain, and G. Bebis Image forgery detection using steerable pyramid transform and local binary pattern Mach. Vis. Appl. 25 4 2014 985 995
-
(2014)
Mach. Vis. Appl.
, vol.25
, Issue.4
, pp. 985-995
-
-
Muhammad, G.1
Al-Hammadi, M.H.2
Hussain, M.3
Bebis, G.4
-
123
-
-
77956006938
-
New developments in color image tampering detection
-
IEEE, Paris, France
-
P. Sutthiwan, Y.-Q. Shi, J. Dong, T. Tan, T.-T. Ng, New developments in color image tampering detection, in: International Symposium on Circuits and Systems (ISCAS), IEEE, Paris, France, 2010, pp. 3064-3067.
-
(2010)
International Symposium on Circuits and Systems (ISCAS)
, pp. 3064-3067
-
-
Sutthiwan, P.1
Shi, Y.-Q.2
Dong, J.3
Tan, T.4
Ng, T.-T.5
-
124
-
-
78349285902
-
Rake transform and edge statistics for image forgery detection
-
IEEE, Suntec City, Singapore
-
P. Sutthiwan, Y.Q. Shi, W. Su, T.-T. Ng, Rake transform and edge statistics for image forgery detection, in: International Conference on Multimedia and Expo (ICME), IEEE, Suntec City, Singapore, 2010, pp. 1463-1468.
-
(2010)
International Conference on Multimedia and Expo (ICME)
, pp. 1463-1468
-
-
Sutthiwan, P.1
Shi, Y.Q.2
Su, W.3
Ng, T.-T.4
-
125
-
-
79953662386
-
Revealing digital fakery using multiresolution decomposition and higher order statistics
-
W. Lu, W. Sun, F.-L. Chung, and H. Lu Revealing digital fakery using multiresolution decomposition and higher order statistics Eng. Appl. Artif. Intell. 24 4 2011 666 672
-
(2011)
Eng. Appl. Artif. Intell.
, vol.24
, Issue.4
, pp. 666-672
-
-
Lu, W.1
Sun, W.2
Chung, F.-L.3
Lu, H.4
-
126
-
-
84888243899
-
Evaluation of image forgery detection using multi-scale weber local descriptors
-
Springer, Rethymnon, Crete, Greece
-
S.Q. Saleh, M. Hussain, G. Muhammad, G. Bebis, Evaluation of image forgery detection using multi-scale weber local descriptors, in: 9th International Symposium on Advances in Visual Computing (ISVC), vol. 8034, Springer, Rethymnon, Crete, Greece, 2013, pp. 416-424.
-
(2013)
9th International Symposium on Advances in Visual Computing (ISVC)
, vol.8034
, pp. 416-424
-
-
Saleh, S.Q.1
Hussain, M.2
Muhammad, G.3
Bebis, G.4
-
127
-
-
84897726900
-
Splicing image forgery detection based on DCT and Local Binary Pattern
-
IEEE, Austin, TX, USA
-
A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad, G. Bebis, et al., Splicing image forgery detection based on DCT and Local Binary Pattern, in: Global Conference on Signal and Information Processing (GlobalSIP), IEEE, Austin, TX, USA, 2013, pp. 253-256.
-
(2013)
Global Conference on Signal and Information Processing (GlobalSIP)
, pp. 253-256
-
-
Alahmadi, A.1
Hussain, M.2
Aboalsamh, H.3
Muhammad, G.4
Bebis, G.5
-
128
-
-
84931366666
-
Improving RLRN image splicing detection with the use of PCA and Kernel PCA
-
Z. Moghaddasi, H.A. Jalab, R. Md Noor, S. Aghabozorgi, Improving RLRN image splicing detection with the use of PCA and Kernel PCA, Sci. World J. (2014), 10.1155/2014/606570.
-
(2014)
Sci. World J.
-
-
Moghaddasi, Z.1
Jalab, H.A.2
Md Noor, R.3
Aghabozorgi, S.4
-
129
-
-
77949536881
-
A new approach merging markov and DCT features for image splicing detection
-
IEEE, Shanghai, China
-
J. Zhang, Y. Zhao, Y. Su, A new approach merging markov and DCT features for image splicing detection, in: International Conference on Intelligent Computing and Intelligent Systems (ICIS), vol. 4, IEEE, Shanghai, China, 2009, pp. 390-394.
-
(2009)
International Conference on Intelligent Computing and Intelligent Systems (ICIS)
, vol.4
, pp. 390-394
-
-
Zhang, J.1
Zhao, Y.2
Su, Y.3
-
130
-
-
84929260895
-
Splicing forgeries localization through the use of first digit features
-
IEEE, Atlanta, GA, USA
-
I. Amerini, R. Becarelli, R. Caldelli, A.D. Mastio, Splicing forgeries localization through the use of first digit features, in: International Workshop on Information Forensics and Security (WIFS), IEEE, Atlanta, GA, USA, 2014, pp. 143-148.
-
(2014)
International Workshop on Information Forensics and Security (WIFS)
, pp. 143-148
-
-
Amerini, I.1
Becarelli, R.2
Caldelli, R.3
Mastio, A.D.4
-
131
-
-
33645671569
-
Detecting digital image forgeries using sensor pattern noise
-
J. Lukáš, J. Fridrich, and M. Goljan Detecting digital image forgeries using sensor pattern noise Proc. SPIE 6072 2006 362 372
-
(2006)
Proc. SPIE
, vol.6072
, pp. 362-372
-
-
Lukáš, J.1
Fridrich, J.2
Goljan, M.3
-
132
-
-
78650918699
-
On the influence of denoising in PRNU based forgery detection
-
ACM, Firenze, Italy
-
G. Chierchia, S. Parrilli, G. Poggi, C. Sansone, L. Verdoliva, On the influence of denoising in PRNU based forgery detection, in: 2nd ACM workshop on Multimedia in Forensics, Security and Intelligence (MiFOR), ACM, Firenze, Italy, 2010, pp. 117-122.
-
(2010)
2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence (MiFOR)
, pp. 117-122
-
-
Chierchia, G.1
Parrilli, S.2
Poggi, G.3
Sansone, C.4
Verdoliva, L.5
-
133
-
-
84892501264
-
PRNU-based forgery detection with regularity constraints and global optimization
-
IEEE, Pula, Croatia
-
G. Chierchia, G. Poggi, C. Sansone, L. Verdoliva, PRNU-based forgery detection with regularity constraints and global optimization, in: 15th International Workshop on Multimedia Signal Processing (MMSP), IEEE, Pula, Croatia, 2013, pp. 236-241.
-
(2013)
15th International Workshop on Multimedia Signal Processing (MMSP)
, pp. 236-241
-
-
Chierchia, G.1
Poggi, G.2
Sansone, C.3
Verdoliva, L.4
-
134
-
-
79957502155
-
Exposing digital image forgeries by detecting discrepancies in motion blur
-
P. Kakar, N. Sudha, and W. Ser Exposing digital image forgeries by detecting discrepancies in motion blur IEEE Trans. Multimed. 13 3 2011 443 452
-
(2011)
IEEE Trans. Multimed.
, vol.13
, Issue.3
, pp. 443-452
-
-
Kakar, P.1
Sudha, N.2
Ser, W.3
-
135
-
-
84894123907
-
Splicing detection in out-of-focus blurred images
-
IEEE, Guangzhou, China
-
K. Bahrami, A.C. Kot, J. Fan, Splicing detection in out-of-focus blurred images, in: International Workshop on Information Forensics and Security (WIFS), IEEE, Guangzhou, China, 2013, pp. 144-149.
-
(2013)
International Workshop on Information Forensics and Security (WIFS)
, pp. 144-149
-
-
Bahrami, K.1
Kot, A.C.2
Fan, J.3
-
136
-
-
84947743091
-
-
IEEE Information Forensics and Security Technical Committee (IFS-TC) 2013
-
IEEE Information Forensics and Security Technical Committee (IFS-TC) (http://ifc.recod.ic.unicamp.br/fc.website/index.py?sec=0), 2013.
-
-
-
-
137
-
-
84931062199
-
Image forgery detection through residual-based local descriptors and block-matching
-
IEEE, Paris, France
-
D. Cozzolino, D. Gragnaniello, L. Verdoliva, Image forgery detection through residual-based local descriptors and block-matching, in: International Conference on Image Processing (ICIP), IEEE, Paris, France, 2014, pp. 5297-5301.
-
(2014)
International Conference on Image Processing (ICIP)
, pp. 5297-5301
-
-
Cozzolino, D.1
Gragnaniello, D.2
Verdoliva, L.3
-
138
-
-
84931070072
-
Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques
-
IEEE, Paris, France
-
D. Cozzolino, D. Gragnaniello, L. Verdoliva, Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques, in: International Conference on Image Processing (ICIP), IEEE, Paris, France, 2014, pp. 5302-5306.
-
(2014)
International Conference on Image Processing (ICIP)
, pp. 5302-5306
-
-
Cozzolino, D.1
Gragnaniello, D.2
Verdoliva, L.3
-
139
-
-
84929245888
-
Multi-Clue image tampering localization
-
IEEE
-
L. Gaborini, P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro, Multi-Clue image tampering localization, in: International Workshop on Information Forensics and Security (WIFS), IEEE, 2014, pp. 125-130.
-
(2014)
International Workshop on Information Forensics and Security (WIFS)
, pp. 125-130
-
-
Gaborini, L.1
Bestagini, P.2
Milani, S.3
Tagliasacchi, M.4
Tubaro, S.5
-
141
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
A.C. Popescu, and H. Farid Exposing digital forgeries by detecting traces of resampling IEEE Trans. Signal Process. 53 2 2005 758 767
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
142
-
-
84938576712
-
Detection of linear and cubic interpolation in JPEG compressed images
-
IEEE, Victoria, BC, Canada
-
A.C. Gallagher, Detection of linear and cubic interpolation in JPEG compressed images, in: 2nd Canadian Conference on Computer and Robot Vision, IEEE, Victoria, BC, Canada, 2005, pp. 65-72.
-
(2005)
2nd Canadian Conference on Computer and Robot Vision
, pp. 65-72
-
-
Gallagher, A.C.1
-
143
-
-
34247609854
-
On resampling detection and its application to detect image tampering
-
IEEE, Toronto, Canada
-
S. Prasad, K. Ramakrishnan, On resampling detection and its application to detect image tampering, in: International Conference on Multimedia and Expo (ICME), IEEE, Toronto, Canada, 2006, pp. 1325-1328.
-
(2006)
International Conference on Multimedia and Expo (ICME)
, pp. 1325-1328
-
-
Prasad, S.1
Ramakrishnan, K.2
-
144
-
-
56749171108
-
Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue
-
ACM, New York, NY, USA
-
M. Kirchner, Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue, in: 10th ACM Workshop on Multimedia and Security, ACM, New York, NY, USA, 2008, pp. 11-20.
-
(2008)
10th ACM Workshop on Multimedia and Security
, pp. 11-20
-
-
Kirchner, M.1
-
145
-
-
77949784981
-
On resampling detection in re-compressed images
-
IEEE, London, UK
-
M. Kirchner, T. Gloe, On resampling detection in re-compressed images, in: 1st International Workshop on Information Forensics and Security (WIFS), IEEE, London, UK, 2009, pp. 21-25.
-
(2009)
1st International Workshop on Information Forensics and Security (WIFS)
, pp. 21-25
-
-
Kirchner, M.1
Gloe, T.2
-
146
-
-
78149274271
-
Linear row and column predictors for the analysis of resized images
-
ACM, New York, NY, USA
-
M. Kirchner, Linear row and column predictors for the analysis of resized images, in: 12th ACM Workshop on Multimedia and Security, ACM, New York, NY, USA, 2010, pp. 13-18.
-
(2010)
12th ACM Workshop on Multimedia and Security
, pp. 13-18
-
-
Kirchner, M.1
-
147
-
-
42949105061
-
On the detectability of local resampling in digital images
-
International Society for Optics and Photonics, San Jose, CA, USA
-
M. Kirchner, On the detectability of local resampling in digital images, in: Electronic Imaging, vol. 6819, International Society for Optics and Photonics, San Jose, CA, USA, 2008, pp. 68190F-7.
-
(2008)
Electronic Imaging
, vol.6819
, pp. 68190F-681907F
-
-
Kirchner, M.1
-
148
-
-
42949104387
-
On periodic properties of interpolation and their application to image authentication
-
IEEE, Manchester, UK
-
B. Mahdian, S. Saic, On periodic properties of interpolation and their application to image authentication, in: 3rd International Symposium on Information Assurance and Security (IAS), IEEE, Manchester, UK, 2007, pp. 439-446.
-
(2007)
3rd International Symposium on Information Assurance and Security (IAS)
, pp. 439-446
-
-
Mahdian, B.1
Saic, S.2
-
149
-
-
58449109985
-
Estimation of rescaling factor and detection of image splicing
-
IEEE, Hangzhou, China
-
W. Weimin, W. Shuozhong, T. Zhenjun, Estimation of rescaling factor and detection of image splicing, in: 11th International Conference on Communication Technology (ICCT), IEEE, Hangzhou, China, 2008, pp. 676-679.
-
(2008)
11th International Conference on Communication Technology (ICCT)
, pp. 676-679
-
-
Weimin, W.1
Shuozhong, W.2
Zhenjun, T.3
-
150
-
-
78651109013
-
On the role of differentiation for resampling detection
-
IEEE, Hong Kong
-
N. Dalgaard, C. Mosquera, F. Pérez-González, On the role of differentiation for resampling detection, in: 17th International Conference on Image Processing (ICIP), IEEE, Hong Kong, 2010, pp. 1753-1756.
-
(2010)
17th International Conference on Image Processing (ICIP)
, pp. 1753-1756
-
-
Dalgaard, N.1
Mosquera, C.2
Pérez-González, F.3
-
151
-
-
79952974193
-
A new estimation approach of resampling factors using threshold-based peak detection
-
IEEE, Berlin, Germany
-
G.-S. Song, Y.-I. Yun, W.-H. Lee, A new estimation approach of resampling factors using threshold-based peak detection, in: International Conference on Consumer Electronics (ICCE), IEEE, Berlin, Germany, 2011, pp. 731-732.
-
(2011)
International Conference on Consumer Electronics (ICCE)
, pp. 731-732
-
-
Song, G.-S.1
Yun, Y.-I.2
Lee, W.-H.3
-
152
-
-
49549116860
-
Blind authentication using periodic properties of interpolation
-
B. Mahdian, and S. Saic Blind authentication using periodic properties of interpolation IEEE Trans. Inf. Forensics Secur. 3 3 2008 529 538
-
(2008)
IEEE Trans. Inf. Forensics Secur.
, vol.3
, Issue.3
, pp. 529-538
-
-
Mahdian, B.1
Saic, S.2
-
153
-
-
70350531478
-
Detection and description of geometrically transformed digital images
-
International Society for Optics and Photonics, San Jose, CA, USA
-
B. Mahdian, S. Saic, Detection and description of geometrically transformed digital images, in: Media Forensics and Security, Proceedings of SPIE Electronic Imaging, vol. 7254, International Society for Optics and Photonics, San Jose, CA, USA, 2009, pp. 1-10.
-
(2009)
Media Forensics and Security, Proceedings of SPIE Electronic Imaging
, vol.7254
, pp. 1-10
-
-
Mahdian, B.1
Saic, S.2
-
154
-
-
77951149162
-
A cyclostationarity analysis applied to image forensics
-
IEEE, Snowbird, Utah
-
B. Mahdian, S. Saic, A cyclostationarity analysis applied to image forensics, in: Workshop on Applications of Computer Vision (WACV), IEEE, Snowbird, Utah, 2009, pp. 1-6.
-
(2009)
Workshop on Applications of Computer Vision (WACV)
, pp. 1-6
-
-
Mahdian, B.1
Saic, S.2
-
155
-
-
78651107082
-
Two-dimensional statistical test for the presence of almost cyclostationarity on images
-
IEEE, Hong Kong
-
D. Vázquez-Padín, C. Mosquera, F. Pérez-González, Two-dimensional statistical test for the presence of almost cyclostationarity on images, in: 17th International Conference on Image Processing (ICIP), IEEE, Hong Kong, 2010, pp. 1745-1748.
-
(2010)
17th International Conference on Image Processing (ICIP)
, pp. 1745-1748
-
-
Vázquez-Padín, D.1
Mosquera, C.2
Pérez-González, F.3
-
156
-
-
84856444620
-
Prefilter design for forensic resampling estimation
-
IEEE, Iguacu Falls, Brazil
-
D. Vazquez-Padin, F. Perez-Gonzalez, Prefilter design for forensic resampling estimation, in: International Workshop on Information Forensics and Security (WIFS), IEEE, Iguacu Falls, Brazil, 2011, pp. 1-6.
-
(2011)
International Workshop on Information Forensics and Security (WIFS)
, pp. 1-6
-
-
Vazquez-Padin, D.1
Perez-Gonzalez, F.2
-
157
-
-
52249101583
-
Detection of resampling supplemented with noise inconsistencies analysis for image forensics
-
IEEE, Perugia, Umbria, Italy
-
B. Mahdian, S. Saic, Detection of resampling supplemented with noise inconsistencies analysis for image forensics, in: International Conference on Computational Sciences and Its Applications (ICCSA), IEEE, Perugia, Umbria, Italy, 2008, pp. 546-556.
-
(2008)
International Conference on Computational Sciences and Its Applications (ICCSA)
, pp. 546-556
-
-
Mahdian, B.1
Saic, S.2
-
158
-
-
84861167540
-
Normalized energy density-based forensic detection of resampled images
-
X. Feng, I.J. Cox, and G. Doërr Normalized energy density-based forensic detection of resampled images IEEE Trans. Multimed. 14 3 2012 536 545
-
(2012)
IEEE Trans. Multimed.
, vol.14
, Issue.3
, pp. 536-545
-
-
Feng, X.1
Cox, I.J.2
Doërr, G.3
-
159
-
-
84864139371
-
Spectral methods to determine the exact scaling factor of resampled digital images
-
IEEE, Rome, Italy
-
S. Pfennig, M. Kirchner, Spectral methods to determine the exact scaling factor of resampled digital images, in: 5th International Symposium on Communications Control and Signal Processing (ISCCSP), IEEE, Rome, Italy, 2012, pp. 1-6.
-
(2012)
5th International Symposium on Communications Control and Signal Processing (ISCCSP)
, pp. 1-6
-
-
Pfennig, S.1
Kirchner, M.2
-
160
-
-
69749111736
-
Intrinsic sensor noise features for forensic analysis on scanners and scanned images
-
H. Gou, A. Swaminathan, and M. Wu Intrinsic sensor noise features for forensic analysis on scanners and scanned images IEEE Trans. Inf. Forensics Secur. 4 3 2009 476 491
-
(2009)
IEEE Trans. Inf. Forensics Secur.
, vol.4
, Issue.3
, pp. 476-491
-
-
Gou, H.1
Swaminathan, A.2
Wu, M.3
-
161
-
-
78049375333
-
Identification of recaptured photographs on LCD screens
-
IEEE, Dallas, TX, USA
-
H. Cao, A.C. Kot, Identification of recaptured photographs on LCD screens, in: International Conference on Acoustics Speech and Signal Processing (ICASSP), IEEE, Dallas, TX, USA, 2010, pp. 1790-1793.
-
(2010)
International Conference on Acoustics Speech and Signal Processing (ICASSP)
, pp. 1790-1793
-
-
Cao, H.1
Kot, A.C.2
-
162
-
-
84890510326
-
An investigation into aliasing in images recaptured from an lcd monitor using a digital camera
-
IEEE, Vancouver, BC, Canada
-
H. Muammar, P.L. Dragotti, An investigation into aliasing in images recaptured from an lcd monitor using a digital camera, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Vancouver, BC, Canada, 2013, pp. 2242-2246.
-
(2013)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 2242-2246
-
-
Muammar, H.1
Dragotti, P.L.2
-
163
-
-
84927154627
-
An image recapture detection algorithm based on learning dictionaries of edge profiles
-
T. Thongkamwitoon, H. Muammar, and P.-L. Dragotti An image recapture detection algorithm based on learning dictionaries of edge profiles IEEE Trans. Inf. Forensics Secur. 10 5 2015 953 968
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.5
, pp. 953-968
-
-
Thongkamwitoon, T.1
Muammar, H.2
Dragotti, P.-L.3
-
164
-
-
84892554442
-
Modelling radial distortion chains for video recapture detection
-
IEEE, Pula, Croatia
-
M. Visentini-Scarzanella, P.L. Dragotti, Modelling radial distortion chains for video recapture detection, in: 15th International Workshop on Multimedia Signal Processing (MMSP), IEEE, Pula, Croatia, 2013, pp. 412-417.
-
(2013)
15th International Workshop on Multimedia Signal Processing (MMSP)
, pp. 412-417
-
-
Visentini-Scarzanella, M.1
Dragotti, P.L.2
-
165
-
-
51449114231
-
Forensic techniques for classifying scanner, computer generated and digital camera images
-
IEEE, Las Vegas, NV, USA
-
N. Khanna, G.T.-C. Chiu, J.P. Allebach, E.J. Delp, Forensic techniques for classifying scanner, computer generated and digital camera images, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Las Vegas, NV, USA, 2008, pp. 1653-1656.
-
(2008)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1653-1656
-
-
Khanna, N.1
Chiu, G.T.-C.2
Allebach, J.P.3
Delp, E.J.4
-
166
-
-
84869835192
-
Discrimination between computer generated and natural human faces based on asymmetry information
-
IEEE, Bucharest, Romania
-
D.-T. Dang-Nguyen, G. Boato, F.G. De Natale, Discrimination between computer generated and natural human faces based on asymmetry information, in: 20th European Signal Processing Conference (EUSIPCO), IEEE, Bucharest, Romania, 2012, pp. 1234-1238.
-
(2012)
20th European Signal Processing Conference (EUSIPCO)
, pp. 1234-1238
-
-
Dang-Nguyen, D.-T.1
Boato, G.2
De Natale, F.G.3
-
167
-
-
84924094828
-
Identification of natural images and computer-generated graphics based on statistical and textural features
-
F. Peng, J.-t. Li, and M. Long Identification of natural images and computer-generated graphics based on statistical and textural features J. Forensic Sci. 60 2 2015 435 443
-
(2015)
J. Forensic Sci.
, vol.60
, Issue.2
, pp. 435-443
-
-
Peng, F.1
Li, J.-T.2
Long, M.3
-
168
-
-
4344675264
-
Region filling and object removal by exemplar-based image inpainting
-
A. Criminisi, P. Pérez, and K. Toyama Region filling and object removal by exemplar-based image inpainting IEEE Trans. Image Process. 13 9 2004 1200 1212
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.9
, pp. 1200-1212
-
-
Criminisi, A.1
Pérez, P.2
Toyama, K.3
-
169
-
-
84936160417
-
Blind detection method for video inpainting forgery
-
S. Das, G.D. Shreyas, and L.D. Devan Blind detection method for video inpainting forgery Int. J. Comput. Appl. 60 11 2012 33 37
-
(2012)
Int. J. Comput. Appl.
, vol.60
, Issue.11
, pp. 33-37
-
-
Das, S.1
Shreyas, G.D.2
Devan, L.D.3
-
170
-
-
84886431657
-
A forgery detection algorithm for exemplar-based inpainting images using multi-region relation
-
I.-C. Chang, J.C. Yu, and C.-C. Chang A forgery detection algorithm for exemplar-based inpainting images using multi-region relation Image Vis. Comput. 31 1 2013 57 71
-
(2013)
Image Vis. Comput.
, vol.31
, Issue.1
, pp. 57-71
-
-
Chang, I.-C.1
Yu, J.C.2
Chang, C.-C.3
-
171
-
-
84926668823
-
An efficient forgery detection algorithm for object removal by exemplar-based image inpainting
-
Z. Liang, G. Yang, X. Ding, and L. Li An efficient forgery detection algorithm for object removal by exemplar-based image inpainting J. Visual Commun. Image Represent 30 2015 75 85
-
(2015)
J. Visual Commun. Image Represent
, vol.30
, pp. 75-85
-
-
Liang, Z.1
Yang, G.2
Ding, X.3
Li, L.4
-
172
-
-
84879031604
-
Tampered region detection of inpainting JPEG images
-
Y.Q. Zhao, M. Liao, F.Y. Shih, and Y.Q. Shi Tampered region detection of inpainting JPEG images Optik-Int. J. Light Electron Opt. 124 16 2013 2487 2492
-
(2013)
Optik-Int. J. Light Electron Opt.
, vol.124
, Issue.16
, pp. 2487-2492
-
-
Zhao, Y.Q.1
Liao, M.2
Shih, F.Y.3
Shi, Y.Q.4
-
173
-
-
84947749086
-
Blind inpainting forgery detection
-
IEEE, Atlanta, GA, USA
-
D.T. Trung, A. Beghdadi, M.-C. Larabi, Blind inpainting forgery detection, in: Global Conference on Signal and Information Processing (GlobalSIP), IEEE, Atlanta, GA, USA, 2014, pp. 1019-1023.
-
(2014)
Global Conference on Signal and Information Processing (GlobalSIP)
, pp. 1019-1023
-
-
Trung, D.T.1
Beghdadi, A.2
Larabi, M.-C.3
-
174
-
-
33751081288
-
Assessing facial beauty through proportion analysis by image processing and supervised learning
-
H. Gunes, and M. Piccardi Assessing facial beauty through proportion analysis by image processing and supervised learning Int. J. Human-Comput. Stud. 64 12 2006 1184 1199
-
(2006)
Int. J. Human-Comput. Stud.
, vol.64
, Issue.12
, pp. 1184-1199
-
-
Gunes, H.1
Piccardi, M.2
-
175
-
-
84947590457
-
Female facial aesthetics based on soft biometrics and photo-quality
-
IEEE, Barcelona, Spain
-
A. Dantcheva, J. Dugelay, Female facial aesthetics based on soft biometrics and photo-quality, in: International Conference for Multimedia and Expo (ICME), IEEE, Barcelona, Spain, 2011.
-
(2011)
International Conference for Multimedia and Expo (ICME)
-
-
Dantcheva, A.1
Dugelay, J.2
-
176
-
-
84863041542
-
Blind identification algorithm for retouched images based on Bi-Laplacian
-
X.-F. Li, X.-J. Shen, and H.-P. Chen Blind identification algorithm for retouched images based on Bi-Laplacian J. Comput. Appl. 31 1 2011 239 242
-
(2011)
J. Comput. Appl.
, vol.31
, Issue.1
, pp. 239-242
-
-
Li, X.-F.1
Shen, X.-J.2
Chen, H.-P.3
-
177
-
-
84055200892
-
A perceptual metric for photo retouching
-
E. Kee, and H. Farid A perceptual metric for photo retouching Proc. Natl. Acad. Sci. 108 50 2011 19907 19912
-
(2011)
Proc. Natl. Acad. Sci.
, vol.108
, Issue.50
, pp. 19907-19912
-
-
Kee, E.1
Farid, H.2
-
178
-
-
84947790871
-
-
D. Xie, L. Liang, L. Jin, J. Xu, M. Li, Scut-fbp: a benchmark dataset for facial beauty perception (http://www.hcii-lab.net/data/SCUT-FBP/), Accessed: 2015-06-14, 2015.
-
(2015)
Scut-fbp: A Benchmark Dataset for Facial Beauty Perception Accessed: 2015-06-14
-
-
Xie, D.1
Liang, L.2
Jin, L.3
Xu, J.4
Li, M.5
-
179
-
-
77951863205
-
On detection of median filtering in digital images
-
International Society for Optics and Photonics, San Jose, CA, USA
-
M. Kirchner, J. Fridrich, On detection of median filtering in digital images, in: IS&T/SPIE Electronic Imaging, vol. 7541, International Society for Optics and Photonics, San Jose, CA, USA, 2010, pp. 754110-754110-12.
-
(2010)
IS&T/SPIE Electronic Imaging
, vol.7541
, pp. 754110-75411012
-
-
Kirchner, M.1
Fridrich, J.2
-
181
-
-
78349262619
-
Forensic detection of median filtering in digital images
-
IEEE, Suntec City, Singapore
-
G. Cao, Y. Zhao, R. Ni, L. Yu, H. Tian, Forensic detection of median filtering in digital images, in: International Conference on Multimedia and Expo (ICME), IEEE, Suntec City, Singapore, 2010, pp. 89-94.
-
(2010)
International Conference on Multimedia and Expo (ICME)
, pp. 89-94
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Yu, L.4
Tian, H.5
-
182
-
-
82055176931
-
Blind forensics of median filtering in digital images
-
H.-D. Yuan Blind forensics of median filtering in digital images IEEE Trans. Inf. Forensics Secur. 6 4 2011 1335 1345
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, Issue.4
, pp. 1335-1345
-
-
Yuan, H.-D.1
-
183
-
-
84882957962
-
Robust median filtering forensics using an autoregressive model
-
X. Kang, M.C. Stamm, A. Peng, and K.R. Liu Robust median filtering forensics using an autoregressive model IEEE Trans. Inf. Forensics Secur. 8 9 2013 1456 1468
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.9
, pp. 1456-1468
-
-
Kang, X.1
Stamm, M.C.2
Peng, A.3
Liu, K.R.4
-
184
-
-
69949189564
-
Blind forensics of contrast enhancement in digital images
-
IEEE, San Diego, CA, USA
-
M. Stamm, K.R. Liu, Blind forensics of contrast enhancement in digital images, in: 15th International Conference on Image Processing (ICIP), IEEE, San Diego, CA, USA, 2008, pp. 3112-3115.
-
(2008)
15th International Conference on Image Processing (ICIP)
, pp. 3112-3115
-
-
Stamm, M.1
Liu, K.R.2
-
185
-
-
78049407658
-
Forensic estimation and reconstruction of a contrast enhancement mapping
-
IEEE, Dallas, TX, USA
-
M.C. Stamm, K.R. Liu, Forensic estimation and reconstruction of a contrast enhancement mapping, in: International Conference on Acoustics Speech and Signal Processing (ICASSP), IEEE, Dallas, TX, USA, 2010, pp. 1698-1701.
-
(2010)
International Conference on Acoustics Speech and Signal Processing (ICASSP)
, pp. 1698-1701
-
-
Stamm, M.C.1
Liu, K.R.2
-
186
-
-
77955707653
-
Forensic detection of image manipulation using statistical intrinsic fingerprints
-
M.C. Stamm, and K.R. Liu Forensic detection of image manipulation using statistical intrinsic fingerprints IEEE Trans. Inf. Forensics Secur. 5 3 2010 492 506
-
(2010)
IEEE Trans. Inf. Forensics Secur.
, vol.5
, Issue.3
, pp. 492-506
-
-
Stamm, M.C.1
Liu, K.R.2
-
187
-
-
84857919279
-
Digital image forgery detection and estimation by exploring basic image manipulations
-
S.D. Mahalakshmi, K. Vijayalakshmi, and S. Priyadharsini Digital image forgery detection and estimation by exploring basic image manipulations Digit. Investig. 8 3 2012 215 225
-
(2012)
Digit. Investig.
, vol.8
, Issue.3
, pp. 215-225
-
-
Mahalakshmi, S.D.1
Vijayalakshmi, K.2
Priyadharsini, S.3
-
188
-
-
84896690794
-
Contrast enhancement-based forensics in digital images
-
G. Cao, Y. Zhao, R. Ni, and X. Li Contrast enhancement-based forensics in digital images IEEE Trans. Inf. Forensics Secur. 9 3 2014 515 525
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.9
, Issue.3
, pp. 515-525
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Li, X.4
-
189
-
-
84889579252
-
Identification of global histogram equalization by modeling gray-level cumulative distribution
-
IEEE, Beijing, China
-
H.-D. Yuan, Identification of global histogram equalization by modeling gray-level cumulative distribution, in: China Summit & International Conference on Signal and Information Processing (ChinaSIP), IEEE, Beijing, China, 2013, pp. 645-649.
-
(2013)
China Summit & International Conference on Signal and Information Processing (ChinaSIP)
, pp. 645-649
-
-
Yuan, H.-D.1
-
190
-
-
78651080888
-
Forensic estimation of gamma correction in digital images
-
IEEE, Hong Kong
-
G. Cao, Y. Zhao, R. Ni, Forensic estimation of gamma correction in digital images, in: 17th International Conference on Image Processing (ICIP), IEEE, Hong Kong, 2010, pp. 2097-2100.
-
(2010)
17th International Conference on Image Processing (ICIP)
, pp. 2097-2100
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
-
191
-
-
70449598250
-
Detection of image sharpening based on histogram aberration and ringing artifacts
-
IEEE, New York, NY, USA
-
G. Cao, Y. Zhao, R. Ni, Detection of image sharpening based on histogram aberration and ringing artifacts, in: International Conference on Multimedia and Expo (ICME), IEEE, New York, NY, USA, 2009, pp. 1026-1029.
-
(2009)
International Conference on Multimedia and Expo (ICME)
, pp. 1026-1029
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
-
192
-
-
80052396955
-
Unsharp masking sharpening detection via overshoot artifacts analysis
-
G. Cao, Y. Zhao, R. Ni, and A.C. Kot Unsharp masking sharpening detection via overshoot artifacts analysis IEEE Signal Process. Lett. 18 10 2011 603 606
-
(2011)
IEEE Signal Process. Lett.
, vol.18
, Issue.10
, pp. 603-606
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Kot, A.C.4
-
193
-
-
84904764591
-
A novel method for detecting image sharpening based on local binary pattern
-
Springer, Auckland, New Zealand
-
F. Ding, G. Zhu, Y.Q. Shi, A novel method for detecting image sharpening based on local binary pattern, in: Digital-Forensics and Watermarking, Springer, Auckland, New Zealand, 2014, pp. 180-191.
-
(2014)
Digital-Forensics and Watermarking
, pp. 180-191
-
-
Ding, F.1
Zhu, G.2
Shi, Y.Q.3
-
194
-
-
84907967551
-
Edge perpendicular binary coding for USM sharpening detection
-
F. Ding, G. Zhu, J. Yang, J. Xie, and Y.-Q. Shi Edge perpendicular binary coding for USM sharpening detection IEEE Signal Process. Lett. 22 2015 327 331
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, pp. 327-331
-
-
Ding, F.1
Zhu, G.2
Yang, J.3
Xie, J.4
Shi, Y.-Q.5
-
195
-
-
84896325249
-
Forensic detection of noise addition in digital images
-
G. Cao, Y. Zhao, R. Ni, B. Ou, and Y. Wang Forensic detection of noise addition in digital images J. Electron. Imaging 23 2 2014 023004
-
(2014)
J. Electron. Imaging
, vol.23
, Issue.2
, pp. 023004
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Ou, B.4
Wang, Y.5
-
196
-
-
84894121414
-
Forensically determining the order of signal processing operations
-
IEEE, Guangzhou, China
-
M.C. Stamm, X. Chu, K.R. Liu, Forensically determining the order of signal processing operations, in: International Workshop on Information Forensics and Security (WIFS), IEEE, Guangzhou, China, 2013, pp. 162-167.
-
(2013)
International Workshop on Information Forensics and Security (WIFS)
, pp. 162-167
-
-
Stamm, M.C.1
Chu, X.2
Liu, K.R.3
-
197
-
-
80051734185
-
A SIFT-based forensic method for copy-move attack detection and transformation recovery
-
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra A SIFT-based forensic method for copy-move attack detection and transformation recovery IEEE Trans. Inf. Forensics Secur. 6 3 PART 2 2011 1099 1110
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, Issue.3
, pp. 1099-1110
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Serra, G.5
-
198
-
-
34247636825
-
Detecting image splicing using geometry invariants and camera characteristics consistency
-
Y.-F. Hsu, S.-F. Chang, Detecting image splicing using geometry invariants and camera characteristics consistency, in: International Conference on Multimedia and Expo (ICME), 2006, pp. 549-552.
-
(2006)
International Conference on Multimedia and Expo (ICME)
, pp. 549-552
-
-
Hsu, Y.-F.1
Chang, S.-F.2
-
199
-
-
84929134231
-
Counter-forensics: Attacking image forensics
-
Springer, New York
-
R. Böhme, M. Kirchner, Counter-forensics: attacking image forensics, in: Digital Image Forensics, Springer, New York, 2013, pp. 327-366.
-
(2013)
Digital Image Forensics
, pp. 327-366
-
-
Böhme, R.1
Kirchner, M.2
-
201
-
-
78149263012
-
Anti-forensics of contrast enhancement in digital images
-
ACM, New York, NY, USA
-
G. Cao, Y. Zhao, R. Ni, H. Tian, Anti-forensics of contrast enhancement in digital images, in: 12th ACM Workshop on Multimedia and Security, ACM, New York, NY, USA, 2010, pp. 25-34.
-
(2010)
12th ACM Workshop on Multimedia and Security
, pp. 25-34
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Tian, H.4
-
202
-
-
84865701450
-
Alternative anti-forensics method for contrast enhancement
-
Springer, Atlantic City, NY, USA
-
C.-W. Kwok, O.C. Au, S.-H. Chui, Alternative anti-forensics method for contrast enhancement, in: Digital Forensics and Watermarking, vol. 7128, Springer, Atlantic City, NY, USA, 2012, pp. 398-410.
-
(2012)
Digital Forensics and Watermarking
, vol.7128
, pp. 398-410
-
-
Kwok, C.-W.1
Au, O.C.2
Chui, S.-H.3
-
203
-
-
84893485234
-
Anti-forensics for unsharp masking sharpening in digital images
-
L. Laijie, Y. Gaobo, and X. Ming Anti-forensics for unsharp masking sharpening in digital images Int. J. Digit. Crime Forensics 5 3 2013 53 65
-
(2013)
Int. J. Digit. Crime Forensics
, vol.5
, Issue.3
, pp. 53-65
-
-
Laijie, L.1
Gaobo, Y.2
Ming, X.3
-
204
-
-
84890444751
-
Anti-forensics of median filtering
-
IEEE, Vancouver, BC, Canada
-
Z.-H. Wu, M.C. Stamm, K.R. Liu, Anti-forensics of median filtering, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Vancouver, BC, Canada, 2013, pp. 3043-3047.
-
(2013)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 3043-3047
-
-
Wu, Z.-H.1
Stamm, M.C.2
Liu, K.R.3
-
205
-
-
80051605162
-
Anti-forensics of digital image compression
-
M.C. Stamm, and K. Liu Anti-forensics of digital image compression IEEE Trans. Inf. Forensics Secur. 6 3 2011 1050 1065
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.C.1
Liu, K.2
-
206
-
-
78651088596
-
Undetectable image tampering through JPEG compression anti-forensics
-
IEEE, Hong Kong
-
M.C. Stamm, S.K. Tjoa, W.S. Lin, K. Liu, Undetectable image tampering through JPEG compression anti-forensics, in: 17th International Conference on Image Processing (ICIP), IEEE, Hong Kong, 2010, pp. 2109-2112.
-
(2010)
17th International Conference on Image Processing (ICIP)
, pp. 2109-2112
-
-
Stamm, M.C.1
Tjoa, S.K.2
Lin, W.S.3
Liu, K.4
-
207
-
-
84890488801
-
A variational approach to JPEG anti-forensics
-
IEEE, Vancouver, BC, Canada
-
W. Fan, K. Wang, F. Cayre, Z. Xiong, A variational approach to JPEG anti-forensics, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Vancouver, BC, Canada, 2013, pp. 3058-3062.
-
(2013)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 3058-3062
-
-
Fan, W.1
Wang, K.2
Cayre, F.3
Xiong, Z.4
-
208
-
-
84904357353
-
JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality
-
W. Fan, K. Wang, F. Cayre, and Z. Xiong JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality IEEE Trans. Inf. Forensics Secur. 9 8 2014 1211 1226
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.9
, Issue.8
, pp. 1211-1226
-
-
Fan, W.1
Wang, K.2
Cayre, F.3
Xiong, Z.4
-
209
-
-
84875855851
-
Countering anti-JPEG compression forensics
-
IEEE, Orlando, FL, USA
-
H. Li, W. Luo, J. Huang, Countering anti-JPEG compression forensics, in: 19th International Conference on Image Processing (ICIP), IEEE, Orlando, FL, USA, 2012, pp. 241-244.
-
(2012)
19th International Conference on Image Processing (ICIP)
, pp. 241-244
-
-
Li, H.1
Luo, W.2
Huang, J.3
-
210
-
-
80051643956
-
The cost of JPEG compression anti-forensics
-
IEEE, Prague, Czech Republic
-
G. Valenzise, M. Tagliasacchi, S. Tubaro, The cost of JPEG compression anti-forensics, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Prague, Czech Republic, 2011, pp. 1884-1887.
-
(2011)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1884-1887
-
-
Valenzise, G.1
Tagliasacchi, M.2
Tubaro, S.3
-
211
-
-
78651103620
-
Wavelet-based image compression anti-forensics
-
IEEE, Hong Kong
-
M.C. Stamm, K. Liu, Wavelet-based image compression anti-forensics, in: 17th International Conference on Image Processing (ICIP), IEEE, Hong Kong, 2010, pp. 1737-1740.
-
(2010)
17th International Conference on Image Processing (ICIP)
, pp. 1737-1740
-
-
Stamm, M.C.1
Liu, K.2
-
213
-
-
37849032097
-
Can we trust digital image forensics?
-
ACM, Augsburg, Bavaria, Germany
-
T. Gloe, M. Kirchner, A. Winkler, R. Böhme, Can we trust digital image forensics? in: 15th International Conference on Multimedia, ACM, Augsburg, Bavaria, Germany, 2007, pp. 78-86.
-
(2007)
15th International Conference on Multimedia
, pp. 78-86
-
-
Gloe, T.1
Kirchner, M.2
Winkler, A.3
Böhme, R.4
-
214
-
-
70349367592
-
Synthesis of color filter array pattern in digital images
-
R. Böhme, M. Kirchner, Synthesis of color filter array pattern in digital images, Proc. SPIE, Media Forensics Secur. XI, 7254 (2009) 18-22.
-
(2009)
Proc. SPIE, Media Forensics Secur. XI
, vol.7254
, pp. 18-22
-
-
Böhme, R.1
Kirchner, M.2
-
215
-
-
80155180685
-
Vision of the unseen: Current trends and challenges in digital image and video forensics
-
A. Rocha, W. Scheirer, T. Boult, S. Goldenstein, Vision of the unseen: current trends and challenges in digital image and video forensics, ACM Comput. Surv. 43 (4) (2011) 26:1-26:42.
-
(2011)
ACM Comput. Surv.
, vol.43
, Issue.4
, pp. 261-2642
-
-
Rocha, A.1
Scheirer, W.2
Boult, T.3
Goldenstein, S.4
-
216
-
-
78149263012
-
Anti-forensics of contrast enhancement in digital images
-
ACM, New York, NY, USA
-
G. Cao, Y. Zhao, R. Ni, H. Tian, Anti-forensics of contrast enhancement in digital images, in: 12th ACM Workshop on Multimedia and Security, ACM, New York, NY, USA, 2010, pp. 25-34.
-
(2010)
12th ACM Workshop on Multimedia and Security
, pp. 25-34
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Tian, H.4
-
217
-
-
84900444041
-
Countering anti-forensics by means of data fusion
-
International Society for Optics and Photonics, San Francisco, CA, USA
-
M. Fontani, A. Bonchi, A. Piva, M. Barni, Countering anti-forensics by means of data fusion, in: IS&T/SPIE Electronic Imaging, vol. 9028, International Society for Optics and Photonics, San Francisco, CA, USA, 2014, pp. 90280Z-90280Z-15.
-
(2014)
IS&T/SPIE Electronic Imaging
, vol.9028
, pp. 90280Z-90280Z15
-
-
Fontani, M.1
Bonchi, A.2
Piva, A.3
Barni, M.4
-
218
-
-
84856278454
-
Countering JPEG anti-forensics
-
IEEE, Brussels, Belgium
-
G. Valenzise, V. Nobile, M. Tagliasacchi, S. Tubaro, Countering JPEG anti-forensics, in: 18th International Conference on Image Processing (ICIP), IEEE, Brussels, Belgium, 2011, pp. 1949-1952.
-
(2011)
18th International Conference on Image Processing (ICIP)
, pp. 1949-1952
-
-
Valenzise, G.1
Nobile, V.2
Tagliasacchi, M.3
Tubaro, S.4
-
220
-
-
80053033238
-
Countering counter-forensics: The case of JPEG compression
-
Springer, Prague, Czech Republic
-
S. Lai, R. Böhme, Countering counter-forensics: the case of JPEG compression, in: 13th International Conference on Information Hiding, vol. 6958, Springer, Prague, Czech Republic, 2011, pp. 285-298.
-
(2011)
13th International Conference on Information Hiding
, vol.6958
, pp. 285-298
-
-
Lai, S.1
Böhme, R.2
-
221
-
-
84857504569
-
Forensic identification of resampling operators: A semi non-intrusive approach
-
G. Cao, Y. Zhao, and R. Ni Forensic identification of resampling operators: a semi non-intrusive approach Forensic Sci. Int. 216 1 2012 29 36
-
(2012)
Forensic Sci. Int.
, vol.216
, Issue.1
, pp. 29-36
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
-
222
-
-
84905234671
-
Countering anti-forensics of median filtering
-
IEEE, Florence, Italy
-
H. Zeng, T. Qin, X. Kang, L. Liu, Countering anti-forensics of median filtering, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Florence, Italy, 2014, pp. 2704-2708.
-
(2014)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 2704-2708
-
-
Zeng, H.1
Qin, T.2
Kang, X.3
Liu, L.4
-
223
-
-
84921445644
-
Second-order statistics analysis to cope with contrast enhancement counter-forensics
-
A. De Rosa, M. Fontani, M. Massai, A. Piva, and M. Barni Second-order statistics analysis to cope with contrast enhancement counter-forensics IEEE Signal Process. Lett. 22 8 2015 1132 1136
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, Issue.8
, pp. 1132-1136
-
-
De Rosa, A.1
Fontani, M.2
Massai, M.3
Piva, A.4
Barni, M.5
-
224
-
-
84905716120
-
Forensic analysis of SIFT keypoint removal and injection
-
A. Costanzo, I. Amerini, R. Caldelli, and M. Barni Forensic analysis of SIFT keypoint removal and injection IEEE Trans. Inf. Forensics Secur. 9 9 2014 1450 1464
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.9
, Issue.9
, pp. 1450-1464
-
-
Costanzo, A.1
Amerini, I.2
Caldelli, R.3
Barni, M.4
-
225
-
-
84905216151
-
Exploiting perceptual quality issues in countering sift-based forensic methods
-
IEEE, Florence, Italy
-
I. Amerini, F. Battisti, R. Caldelli, M. Carli, A. Costanzo, Exploiting perceptual quality issues in countering sift-based forensic methods, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Florence, Italy, 2014, pp. 2664-2668.
-
(2014)
International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 2664-2668
-
-
Amerini, I.1
Battisti, F.2
Caldelli, R.3
Carli, M.4
Costanzo, A.5
-
226
-
-
84858258537
-
Image forgery detection by means of no-reference quality metrics
-
Burlingame, CA, USA
-
F. Battisti, M. Carli, A. Neri, Image forgery detection by means of no-reference quality metrics, in: IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics, Burlingame, CA, USA, 2012, p. 83030K.
-
(2012)
IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics
, pp. 83030K
-
-
Battisti, F.1
Carli, M.2
Neri, A.3
-
227
-
-
84901192541
-
A perceptual image completion approach based on a hierarchical optimization scheme
-
Trung Thanh Dang, Azeddine Beghdadi, and M-C Larabi A perceptual image completion approach based on a hierarchical optimization scheme Signal Processing 103 2014 127 141
-
(2014)
Signal Processing
, vol.103
, pp. 127-141
-
-
Dang, T.T.1
Beghdadi, A.2
Larabi, M.-C.3
-
229
-
-
84936951012
-
An Image Quality Index Based on Mutual Information and Neural Networks
-
Mohamed Deriche An Image Quality Index Based on Mutual Information and Neural Networks Arabian Journal for Science and Engineering 39 3 2014 1983 1993
-
(2014)
Arabian Journal for Science and Engineering
, vol.39
, Issue.3
, pp. 1983-1993
-
-
Deriche, M.1
|