메뉴 건너뛰기




Volumn 39, Issue , 2015, Pages 46-74

A bibliography of pixel-based blind image forgery detection techniques

Author keywords

Copy move forgery; Forgery detection methods; Image forensics; Image quality; Image retouching; Image splicing; Image tampering detection

Indexed keywords

GOVERNMENT DATA PROCESSING; IMAGE QUALITY; INFORMATION SERVICES; MULTIMEDIA SYSTEMS; PIXELS; SURVEYS;

EID: 84947744414     PISSN: 09235965     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.image.2015.08.008     Document Type: Article
Times cited : (158)

References (229)
  • 2
    • 84947713141 scopus 로고    scopus 로고
    • Photo tampering throughout history, Accessed: 2015-03-27, 2004
    • Photo tampering throughout history, (http://http://www.fourandsix.com/photo-tampering-history?currentPage=4), Accessed: 2015-03-27, 2004.
  • 3
    • 84888386204 scopus 로고    scopus 로고
    • Information forensics: An overview of the first decade
    • M.C. Stamm, M. Wu, and K. Liu Information forensics: an overview of the first decade IEEE Access 1 2013 167 200
    • (2013) IEEE Access , vol.1 , pp. 167-200
    • Stamm, M.C.1    Wu, M.2    Liu, K.3
  • 4
    • 78651398372 scopus 로고    scopus 로고
    • Digital image forensics: A booklet for beginners
    • J.A. Redi, W. Taktak, and J.-L. Dugelay Digital image forensics: a booklet for beginners Multimed. Tools Appl. 51 1 2011 133 162
    • (2011) Multimed. Tools Appl. , vol.51 , Issue.1 , pp. 133-162
    • Redi, J.A.1    Taktak, W.2    Dugelay, J.-L.3
  • 5
    • 85032768213 scopus 로고    scopus 로고
    • Image forgery detection: A survey
    • H. Farid Image forgery detection: a survey IEEE Signal Process. Mag. 26 2 2009 16 25
    • (2009) IEEE Signal Process. Mag. , vol.26 , Issue.2 , pp. 16-25
    • Farid, H.1
  • 6
    • 77953650817 scopus 로고    scopus 로고
    • A bibliography on blind methods for identifying image forgery
    • B. Mahdian, and S. Saic A bibliography on blind methods for identifying image forgery Signal Process.: Image Commun. 25 6 2010 389 399
    • (2010) Signal Process.: Image Commun. , vol.25 , Issue.6 , pp. 389-399
    • Mahdian, B.1    Saic, S.2
  • 7
    • 84890463165 scopus 로고    scopus 로고
    • An overview on image forensics
    • A. Piva An overview on image forensics ISRN Signal Process. 2013 1 22
    • (2013) ISRN Signal Process. , pp. 1-22
    • Piva, A.1
  • 9
    • 84880306849 scopus 로고    scopus 로고
    • Passive detection of copy-move forgery in digital images: State-of-The-art
    • O.M. Al-Qershi, and B.E. Khoo Passive detection of copy-move forgery in digital images: state-of-the-art Forensic Sci. Int. 231 1-3 2013 284 295
    • (2013) Forensic Sci. Int. , vol.231 , Issue.1-3 , pp. 284-295
    • Al-Qershi, O.M.1    Khoo, B.E.2
  • 10
    • 84884593770 scopus 로고    scopus 로고
    • Digital image forgery detection using passive techniques: A survey
    • G.K. Birajdar, and V.H. Mankar Digital image forgery detection using passive techniques: a survey Digit. Investig. 10 3 2013 226 245
    • (2013) Digit. Investig. , vol.10 , Issue.3 , pp. 226-245
    • Birajdar, G.K.1    Mankar, V.H.2
  • 13
    • 84947744624 scopus 로고    scopus 로고
    • 40 Amazing Before and After Photo Retouching Photos, Accessed: 2015-03-27, March 2013
    • 40 Amazing Before and After Photo Retouching Photos, (http://10steps.sg/inspirations/artworks/40-cool-before-and-after-photo-retouching-photos), Accessed: 2015-03-27, March 2013.
  • 14
    • 84947796113 scopus 로고    scopus 로고
    • Jopseph Casers: Sin Photoshop Y Con Photoshop, Accessed: 2015-03-27, April 2013
    • Jopseph Casers: Sin Photoshop Y Con Photoshop, (http://merengala.blogspot.com/2010/12/sin-photoshop-y-con-photoshop.html), Accessed: 2015-03-27, April 2013.
  • 24
    • 34250355507 scopus 로고    scopus 로고
    • A generalized Benford's law for JPEG coefficients and its applications in image forensics
    • San Jose, CA, USA
    • D. Fu, Y.Q. Shi, W. Su, A generalized Benford's law for JPEG coefficients and its applications in image forensics, in: Electronic Imaging, vol. 6505, International Society for Optics and Photonics, San Jose, CA, USA, 2007, p. 65051L.
    • (2007) Electronic Imaging, International Society for Optics and Photonics , vol.6505 , pp. 65051L
    • Fu, D.1    Shi, Y.Q.2    Su, W.3
  • 25
    • 58049107658 scopus 로고    scopus 로고
    • Detecting doubly compressed JPEG images by using mode based first digit features
    • IEEE, Cairns, QLD, Australia
    • B. Li, Y.Q. Shi, J. Huang, Detecting doubly compressed JPEG images by using mode based first digit features, in: 10th Workshop on Multimedia Signal Processing, IEEE, Cairns, QLD, Australia, 2008, pp. 730-735.
    • (2008) 10th Workshop on Multimedia Signal Processing , pp. 730-735
    • Li, B.1    Shi, Y.Q.2    Huang, J.3
  • 26
    • 84861122288 scopus 로고    scopus 로고
    • Image forgery localization via block-grained analysis of JPEG artifacts
    • T. Bianchi, and A. Piva Image forgery localization via block-grained analysis of JPEG artifacts IEEE Trans. Inf. Forensics Secur. 7 3 2012 1003 1017
    • (2012) IEEE Trans. Inf. Forensics Secur. , vol.7 , Issue.3 , pp. 1003-1017
    • Bianchi, T.1    Piva, A.2
  • 27
    • 84858394859 scopus 로고    scopus 로고
    • Detection of nonaligned double JPEG compression based on integer periodicity maps
    • T. Bianchi, and A. Piva Detection of nonaligned double JPEG compression based on integer periodicity maps IEEE Trans. Inf. Forensics Secur. 7 2 2012 842 848
    • (2012) IEEE Trans. Inf. Forensics Secur. , vol.7 , Issue.2 , pp. 842-848
    • Bianchi, T.1    Piva, A.2
  • 30
    • 0038005383 scopus 로고    scopus 로고
    • Identification of bitmap compression history: JPEG detection and quantizer estimation
    • Z. Fan, and R.L. De Queiroz Identification of bitmap compression history: JPEG detection and quantizer estimation IEEE Trans. Image Process. 12 2 2003 230 235
    • (2003) IEEE Trans. Image Process. , vol.12 , Issue.2 , pp. 230-235
    • Fan, Z.1    De Queiroz, R.L.2
  • 31
    • 33750929814 scopus 로고    scopus 로고
    • Exposing digital forgeries through chromatic aberration
    • ACM, New York, NY, USA
    • M.K. Johnson, H. Farid, Exposing digital forgeries through chromatic aberration, in: 8th Workshop on Multimedia and Security, ACM, New York, NY, USA, 2006, pp. 48-55.
    • (2006) 8th Workshop on Multimedia and Security , pp. 48-55
    • Johnson, M.K.1    Farid, H.2
  • 32
    • 33847748167 scopus 로고    scopus 로고
    • Nonintrusive component forensics of visual sensors using output images
    • A. Swaminathan, M. Wu, and K.R. Liu Nonintrusive component forensics of visual sensors using output images IEEE Trans. Inf. Forensics Secur. 2 1 2007 91 106
    • (2007) IEEE Trans. Inf. Forensics Secur. , vol.2 , Issue.1 , pp. 91-106
    • Swaminathan, A.1    Wu, M.2    Liu, K.R.3
  • 34
    • 77951971717 scopus 로고    scopus 로고
    • Image tamper detection based on demosaicing artifacts.
    • IEEE, San Diego, CA, USA
    • A.E. Dirik, N.D. Memon, Image tamper detection based on demosaicing artifacts., in: International Conference on Image Processing (ICIP), IEEE, San Diego, CA, USA, 2009, pp. 1497-1500.
    • (2009) International Conference on Image Processing (ICIP) , pp. 1497-1500
    • Dirik, A.E.1    Memon, N.D.2
  • 37
    • 33748068816 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting inconsistencies in lighting
    • ACM, Geneva, Switzerland
    • M.K. Johnson, H. Farid, Exposing digital forgeries by detecting inconsistencies in lighting, in: 7th Workshop on Multimedia and Security, ACM, Geneva, Switzerland, 2005, pp. 1-10.
    • (2005) 7th Workshop on Multimedia and Security , pp. 1-10
    • Johnson, M.K.1    Farid, H.2
  • 38
    • 34548056428 scopus 로고    scopus 로고
    • Exposing digital forgeries in complex lighting environments
    • M.K. Johnson, and H. Farid Exposing digital forgeries in complex lighting environments IEEE Trans. Inf. Forensics Secur. 2 3 2007 450 461
    • (2007) IEEE Trans. Inf. Forensics Secur. , vol.2 , Issue.3 , pp. 450-461
    • Johnson, M.K.1    Farid, H.2
  • 44
    • 34547689478 scopus 로고    scopus 로고
    • Detection of copy-move forgery using a method based on blur moment invariants
    • B. Mahdian, and S. Saic Detection of copy-move forgery using a method based on blur moment invariants Forensic Sci. Int. 171 2 2007 180 189
    • (2007) Forensic Sci. Int. , vol.171 , Issue.2 , pp. 180-189
    • Mahdian, B.1    Saic, S.2
  • 45
    • 74049111557 scopus 로고    scopus 로고
    • Fast and robust forensics for image region-duplication forgery
    • J.-W. Wang, G.-J. Liu, Z. Zhang, Y. Dai, and Z. Wang Fast and robust forensics for image region-duplication forgery Acta Autom. Sin. 35 12 2009 1488 1495
    • (2009) Acta Autom. Sin. , vol.35 , Issue.12 , pp. 1488-1495
    • Wang, J.-W.1    Liu, G.-J.2    Zhang, Z.3    Dai, Y.4    Wang, Z.5
  • 46
    • 79960906058 scopus 로고    scopus 로고
    • A passive image authentication scheme for detecting region-duplication forgery with rotation
    • G. Liu, J. Wang, S. Lian, and Z. Wang A passive image authentication scheme for detecting region-duplication forgery with rotation J. Netw. Comput. Appl. 34 5 2011 1557 1565
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.5 , pp. 1557-1565
    • Liu, G.1    Wang, J.2    Lian, S.3    Wang, Z.4
  • 47
    • 78549275481 scopus 로고    scopus 로고
    • Detection of copy-rotate-move forgery using Zernike moments
    • Springer, Berlin, Heidelberg
    • S.-J. Ryu, M.-J. Lee, H.-K. Lee, Detection of copy-rotate-move forgery using Zernike moments, in: Information Hiding, Springer, Berlin, Heidelberg, 2010, pp. 51-65.
    • (2010) Information Hiding , pp. 51-65
    • Ryu, S.-J.1    Lee, M.-J.2    Lee, H.-K.3
  • 48
    • 84880672623 scopus 로고    scopus 로고
    • Rotation invariant localization of duplicated image regions based on Zernike moments
    • S.-J. Ryu, M. Kirchner, M.-J. Lee, and H.-K. Lee Rotation invariant localization of duplicated image regions based on Zernike moments IEEE Trans. Inf. Forensics Secur. 8 8 2013 1355 1370
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , Issue.8 , pp. 1355-1370
    • Ryu, S.-J.1    Kirchner, M.2    Lee, M.-J.3    Lee, H.-K.4
  • 52
    • 84880396631 scopus 로고    scopus 로고
    • Fast and efficient region duplication detection in digital images using sub-blocking method
    • V.K. Singh, and R. Tripathi Fast and efficient region duplication detection in digital images using sub-blocking method Int. J. Adv. Sci. Technol. 35 2011 93 102
    • (2011) Int. J. Adv. Sci. Technol. , vol.35 , pp. 93-102
    • Singh, V.K.1    Tripathi, R.2
  • 54
    • 79955478772 scopus 로고    scopus 로고
    • Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics
    • S. Bravo-Solorio, and A.K. Nandi Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics Signal Process. 91 8 2011 1759 1770
    • (2011) Signal Process. , vol.91 , Issue.8 , pp. 1759-1770
    • Bravo-Solorio, S.1    Nandi, A.K.2
  • 56
    • 0033284915 scopus 로고    scopus 로고
    • Object recognition from local scale-invariant features
    • IEEE, Kerkyra, Greece
    • D.G. Lowe, Object recognition from local scale-invariant features, in: 7th International Conference on Computer Vision (ICCV), vol. 2, IEEE, Kerkyra, Greece, 1999, pp. 1150-1157.
    • (1999) 7th International Conference on Computer Vision (ICCV) , vol.2 , pp. 1150-1157
    • Lowe, D.G.1
  • 60
    • 78649426066 scopus 로고    scopus 로고
    • Region duplication detection using image feature matching
    • X. Pan, and S. Lyu Region duplication detection using image feature matching IEEE Trans. Inf. Forensics Secur. 5 4 2010 857 867
    • (2010) IEEE Trans. Inf. Forensics Secur. , vol.5 , Issue.4 , pp. 857-867
    • Pan, X.1    Lyu, S.2
  • 62
    • 0019574599 scopus 로고
    • Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography
    • M.A. Fischler, and R.C. Bolles Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography Commun. ACM 24 6 1981 381 395
    • (1981) Commun. ACM , vol.24 , Issue.6 , pp. 381-395
    • Fischler, M.A.1    Bolles, R.C.2
  • 64
    • 84894902017 scopus 로고    scopus 로고
    • Accurate and robust localization of duplicated region in copy-move image forgery
    • M. Jaberi, G. Bebis, M. Hussain, and G. Muhammad Accurate and robust localization of duplicated region in copy-move image forgery Mach. Vis. Appl. 25 2 2014 451 475
    • (2014) Mach. Vis. Appl. , vol.25 , Issue.2 , pp. 451-475
    • Jaberi, M.1    Bebis, G.2    Hussain, M.3    Muhammad, G.4
  • 65
    • 84870281448 scopus 로고    scopus 로고
    • Detection of region duplication forgery in digital images using SURF
    • B. Shivakumar, and S.S. Baboo Detection of region duplication forgery in digital images using SURF Int. J. Comput. Sci. Issues 8 4 2011 199 205
    • (2011) Int. J. Comput. Sci. Issues , vol.8 , Issue.4 , pp. 199-205
    • Shivakumar, B.1    Baboo, S.S.2
  • 66
    • 84880263765 scopus 로고    scopus 로고
    • Automated forensic method for copy-move forgery detection based on Harris Interest Points and SIFT descriptors
    • B. Shivakumar, and S.S. Baboo Automated forensic method for copy-move forgery detection based on Harris Interest Points and SIFT descriptors Int. J. Comput. Appl. 27 3 2011 9 17
    • (2011) Int. J. Comput. Appl. , vol.27 , Issue.3 , pp. 9-17
    • Shivakumar, B.1    Baboo, S.S.2
  • 69
    • 79952443740 scopus 로고    scopus 로고
    • Improved DCT-based detection of copy-move forgery in images
    • Y. Huang, W. Lu, W. Sun, and D. Long Improved DCT-based detection of copy-move forgery in images Forensic Sci. Int. 206 1 2011 178 184
    • (2011) Forensic Sci. Int. , vol.206 , Issue.1 , pp. 178-184
    • Huang, Y.1    Lu, W.2    Sun, W.3    Long, D.4
  • 70
    • 79951638155 scopus 로고    scopus 로고
    • Reduced time complexity for detection of copy-move forgery using discrete wavelet transform
    • S. Khan, and A. Kulkarni Reduced time complexity for detection of copy-move forgery using discrete wavelet transform Int. J. Comput. Appl. 6 7 2010 31 36
    • (2010) Int. J. Comput. Appl. , vol.6 , Issue.7 , pp. 31-36
    • Khan, S.1    Kulkarni, A.2
  • 73
    • 84863325954 scopus 로고    scopus 로고
    • Passive copy move image forgery detection using undecimated dyadic wavelet transform
    • G. Muhammad, M. Hussain, and G. Bebis Passive copy move image forgery detection using undecimated dyadic wavelet transform Digit. Investig. 9 1 2012 49 57
    • (2012) Digit. Investig. , vol.9 , Issue.1 , pp. 49-57
    • Muhammad, G.1    Hussain, M.2    Bebis, G.3
  • 75
    • 84872395718 scopus 로고    scopus 로고
    • Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
    • Y. Li Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching Forensic Sci. Int. 224 1-3 2013 59 67
    • (2013) Forensic Sci. Int. , vol.224 , Issue.1-3 , pp. 59-67
    • Li, Y.1
  • 81
    • 79951544608 scopus 로고    scopus 로고
    • Identifying tampered regions using singular value decomposition in digital image forensics
    • IEEE, Wuhan, China
    • X. Kang, S. Wei, Identifying tampered regions using singular value decomposition in digital image forensics, in: International Conference on Computer Science and Software Engineering, vol. 3, IEEE, Wuhan, China, 2008, pp. 926-930.
    • (2008) International Conference on Computer Science and Software Engineering , vol.3 , pp. 926-930
    • Kang, X.1    Wei, S.2
  • 86
    • 79952781257 scopus 로고    scopus 로고
    • DWT-PCA (EVD) based copy-move image forgery detection
    • M. Zimba, and S. Xingming DWT-PCA (EVD) based copy-move image forgery detection Int. J. Digit. Content Technol. Appl. 5 1 2011 251 258
    • (2011) Int. J. Digit. Content Technol. Appl. , vol.5 , Issue.1 , pp. 251-258
    • Zimba, M.1    Xingming, S.2
  • 87
    • 58149235809 scopus 로고    scopus 로고
    • A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD
    • IEEE, Beijing, China
    • G. Li, Q. Wu, D. Tu, S. Sun, A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD, in: International Conference on Multimedia and Expo (ICME), IEEE, Beijing, China, 2007, pp. 1750-1753.
    • (2007) International Conference on Multimedia and Expo (ICME) , pp. 1750-1753
    • Li, G.1    Wu, Q.2    Tu, D.3    Sun, S.4
  • 90
    • 84927766982 scopus 로고    scopus 로고
    • Image duplication forgery detection using two robust features
    • M. Zahra Image duplication forgery detection using two robust features Res. J. Recent Sci. 1 12 2012 1 6
    • (2012) Res. J. Recent Sci. , vol.1 , Issue.12 , pp. 1-6
    • Zahra, M.1
  • 93
    • 68549088815 scopus 로고    scopus 로고
    • Robust forensics for image regional duplication and forgery based on DWT and Zernike moment
    • J.-W. Wang, G.-J. Liu, Z. Zhang, Y.-W. Dai, and Z.-Q. Wang Robust forensics for image regional duplication and forgery based on DWT and Zernike moment Opt. Precis. Eng. 17 7 2009 1687 1693
    • (2009) Opt. Precis. Eng. , vol.17 , Issue.7 , pp. 1687-1693
    • Wang, J.-W.1    Liu, G.-J.2    Zhang, Z.3    Dai, Y.-W.4    Wang, Z.-Q.5
  • 94
    • 79952517536 scopus 로고    scopus 로고
    • A study on features for the detection of copy-move forgeries
    • V. Christlein, C. Riess, E. Angelopoulou, A study on features for the detection of copy-move forgeries, in: SICHERHEIT, vol. 2010, 2010, pp. 105-116.
    • (2010) SICHERHEIT , vol.2010 , pp. 105-116
    • Christlein, V.1    Riess, C.2    Angelopoulou, E.3
  • 97
    • 70349655522 scopus 로고    scopus 로고
    • Patchmatch: A randomized correspondence algorithm for structural image editing
    • C. Barnes, E. Shechtman, A. Finkelstein, D. Goldman, Patchmatch: a randomized correspondence algorithm for structural image editing, ACM Trans. Graph. 28 (3) (2009) 24:1-24:11.
    • (2009) ACM Trans. Graph. , vol.28 , Issue.3 , pp. 241-2411
    • Barnes, C.1    Shechtman, E.2    Finkelstein, A.3    Goldman, D.4
  • 99
    • 84877841117 scopus 로고    scopus 로고
    • Efficient image duplicated region detection model using sequential block clustering
    • M.A. Sekeh, M.A. Maarof, M.F. Rohani, and B. Mahdian Efficient image duplicated region detection model using sequential block clustering Digit. Investig. 10 1 2013 73 84
    • (2013) Digit. Investig. , vol.10 , Issue.1 , pp. 73-84
    • Sekeh, M.A.1    Maarof, M.A.2    Rohani, M.F.3    Mahdian, B.4
  • 103
    • 4344600402 scopus 로고    scopus 로고
    • Blind detection of photomontage using higher order statistics
    • IEEE, Vancouver, BC, Canada
    • T.-T. Ng, S.-F. Chang, Q. Sun, Blind detection of photomontage using higher order statistics, in: International Symposium on Circuits and Systems (ISCAS), vol. 5, IEEE, Vancouver, BC, Canada, 2004, pp. 688-691.
    • (2004) International Symposium on Circuits and Systems (ISCAS) , vol.5 , pp. 688-691
    • Ng, T.-T.1    Chang, S.-F.2    Sun, Q.3
  • 104
    • 33845464635 scopus 로고    scopus 로고
    • Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition
    • Springer, Jeju Island, Korea
    • D. Fu, Y.Q. Shi, W. Su, Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition, in: 5th International Workshop on Digital Watermarking, vol. 4283, Springer, Jeju Island, Korea, 2006, pp. 177-187.
    • (2006) 5th International Workshop on Digital Watermarking , vol.4283 , pp. 177-187
    • Fu, D.1    Shi, Y.Q.2    Su, W.3
  • 106
    • 78650323484 scopus 로고    scopus 로고
    • Run-length and edge statistics based approach for image splicing detection
    • Springer, Berlin, Heidelberg
    • J. Dong, W. Wang, T. Tan, Y.Q. Shi, Run-length and edge statistics based approach for image splicing detection, in: 7th International Workshop on Digital Watermarking (IWDW), vol. 5450, Springer, Berlin, Heidelberg, 2009, pp. 76-87.
    • (2009) 7th International Workshop on Digital Watermarking (IWDW) , vol.5450 , pp. 76-87
    • Dong, J.1    Wang, W.2    Tan, T.3    Shi, Y.Q.4
  • 107
    • 79959193080 scopus 로고    scopus 로고
    • Digital image splicing detection based on approximate run length
    • Z. He, W. Sun, W. Lu, and H. Lu Digital image splicing detection based on approximate run length Pattern Recognit. Lett. 32 12 2011 1591 1597
    • (2011) Pattern Recognit. Lett. , vol.32 , Issue.12 , pp. 1591-1597
    • He, Z.1    Sun, W.2    Lu, W.3    Lu, H.4
  • 108
    • 34250373244 scopus 로고    scopus 로고
    • Image splicing detection using 2-d phase congruency and statistical moments of characteristic function
    • Citeseer, San Jose, CA, USA
    • W. Chen, Y.Q. Shi, W. Su, Image splicing detection using 2-d phase congruency and statistical moments of characteristic function, in: Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol. 6505, Citeseer, San Jose, CA, USA, 2007.
    • (2007) Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series , vol.6505
    • Chen, W.1    Shi, Y.Q.2    Su, W.3
  • 110
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • Springer, Alexandria, VA, USA
    • Y.Q. Shi, C. Chen, W. Chen, A Markov process based approach to effective attacking JPEG steganography, in: 8th International Workshop on Information Hiding, vol. 4437, Springer, Alexandria, VA, USA, 2007, pp. 249-264.
    • (2007) 8th International Workshop on Information Hiding , vol.4437 , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 111
    • 33750555925 scopus 로고    scopus 로고
    • Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network
    • IEEE, Amsterdam, Netherlands
    • Y.Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen, C. Chen, Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network, in: International Conference on Multimedia and Expo (ICME), IEEE, Amsterdam, Netherlands, 2005.
    • (2005) International Conference on Multimedia and Expo (ICME)
    • Shi, Y.Q.1    Xuan, G.2    Zou, D.3    Gao, J.4    Yang, C.5    Zhang, Z.6    Chai, P.7    Chen, W.8    Chen, C.9
  • 112
    • 84865693837 scopus 로고    scopus 로고
    • A comprehensive study on third order statistical features for image splicing detection
    • Springer, Atlantic City, NY, USA
    • X. Zhao, S. Wang, S. Li, J. Li, A comprehensive study on third order statistical features for image splicing detection, in: 10th International Workshop on Digital Forensics and Watermarking, vol. 7128, Springer, Atlantic City, NY, USA, 2012, pp. 243-256.
    • (2012) 10th International Workshop on Digital Forensics and Watermarking , vol.7128 , pp. 243-256
    • Zhao, X.1    Wang, S.2    Li, S.3    Li, J.4
  • 113
    • 84874148290 scopus 로고    scopus 로고
    • Revealing image splicing forgery using Local Binary Patterns of DCT coefficients
    • Springer, Gold Coast, Australia
    • Y. Zhang, C. Zhao, Y. Pi, S. Li, Revealing image splicing forgery using Local Binary Patterns of DCT coefficients, in: International Conference on Communications, Signal Processing, and Systems, vol. 202, Springer, Gold Coast, Australia, 2012, pp. 181-189.
    • (2012) International Conference on Communications, Signal Processing, and Systems , vol.202 , pp. 181-189
    • Zhang, Y.1    Zhao, C.2    Pi, Y.3    Li, S.4
  • 114
    • 84864277926 scopus 로고    scopus 로고
    • Digital image splicing detection based on Markov features in DCT and DWT domain
    • Z. He, W. Lu, W. Sun, and J. Huang Digital image splicing detection based on Markov features in DCT and DWT domain Pattern Recognit. 45 12 2012 4292 4299
    • (2012) Pattern Recognit. , vol.45 , Issue.12 , pp. 4292-4299
    • He, Z.1    Lu, W.2    Sun, W.3    Huang, J.4
  • 115
    • 51749089283 scopus 로고    scopus 로고
    • JPEG image steganalysis utilizing both intrablock and interblock correlations
    • IEEE, Seattle, WA, USA
    • C. Chen, Y.Q. Shi, JPEG image steganalysis utilizing both intrablock and interblock correlations, in: International Symposium on Circuits and Systems (ISCAS), IEEE, Seattle, WA, USA, 2008, pp. 3029-3032.
    • (2008) International Symposium on Circuits and Systems (ISCAS) , pp. 3029-3032
    • Chen, C.1    Shi, Y.Q.2
  • 117
    • 0036161259 scopus 로고    scopus 로고
    • Gene selection for cancer classification using support vector machines
    • I. Guyon, J. Weston, S. Barnhill, and V. Vapnik Gene selection for cancer classification using support vector machines Mach. Learn. 46 1-3 2002 389 422
    • (2002) Mach. Learn. , vol.46 , Issue.1-3 , pp. 389-422
    • Guyon, I.1    Weston, J.2    Barnhill, S.3    Vapnik, V.4
  • 118
    • 84937814771 scopus 로고    scopus 로고
    • Combining spatial and DCT based markov features for enhanced blind detection of image splicing
    • E.-S.M. El-Alfy, and M.A. Qureshi Combining spatial and DCT based markov features for enhanced blind detection of image splicing Pattern Anal. Appl. 18 3 2014 713 723
    • (2014) Pattern Anal. Appl. , vol.18 , Issue.3 , pp. 713-723
    • El-Alfy, E.-S.M.1    Qureshi, M.A.2
  • 120
    • 78651098681 scopus 로고    scopus 로고
    • Image tampering detection based on stationary distribution of Markov chain
    • IEEE, Hong Kong
    • W. Wang, J. Dong, T. Tan, Image tampering detection based on stationary distribution of Markov chain, in: 17th International Conference on Image Processing (ICIP), IEEE, Hong Kong, 2010, pp. 2101-2104.
    • (2010) 17th International Conference on Image Processing (ICIP) , pp. 2101-2104
    • Wang, W.1    Dong, J.2    Tan, T.3
  • 122
    • 84899992554 scopus 로고    scopus 로고
    • Image forgery detection using steerable pyramid transform and local binary pattern
    • G. Muhammad, M.H. Al-Hammadi, M. Hussain, and G. Bebis Image forgery detection using steerable pyramid transform and local binary pattern Mach. Vis. Appl. 25 4 2014 985 995
    • (2014) Mach. Vis. Appl. , vol.25 , Issue.4 , pp. 985-995
    • Muhammad, G.1    Al-Hammadi, M.H.2    Hussain, M.3    Bebis, G.4
  • 125
    • 79953662386 scopus 로고    scopus 로고
    • Revealing digital fakery using multiresolution decomposition and higher order statistics
    • W. Lu, W. Sun, F.-L. Chung, and H. Lu Revealing digital fakery using multiresolution decomposition and higher order statistics Eng. Appl. Artif. Intell. 24 4 2011 666 672
    • (2011) Eng. Appl. Artif. Intell. , vol.24 , Issue.4 , pp. 666-672
    • Lu, W.1    Sun, W.2    Chung, F.-L.3    Lu, H.4
  • 128
    • 84931366666 scopus 로고    scopus 로고
    • Improving RLRN image splicing detection with the use of PCA and Kernel PCA
    • Z. Moghaddasi, H.A. Jalab, R. Md Noor, S. Aghabozorgi, Improving RLRN image splicing detection with the use of PCA and Kernel PCA, Sci. World J. (2014), 10.1155/2014/606570.
    • (2014) Sci. World J.
    • Moghaddasi, Z.1    Jalab, H.A.2    Md Noor, R.3    Aghabozorgi, S.4
  • 131
    • 33645671569 scopus 로고    scopus 로고
    • Detecting digital image forgeries using sensor pattern noise
    • J. Lukáš, J. Fridrich, and M. Goljan Detecting digital image forgeries using sensor pattern noise Proc. SPIE 6072 2006 362 372
    • (2006) Proc. SPIE , vol.6072 , pp. 362-372
    • Lukáš, J.1    Fridrich, J.2    Goljan, M.3
  • 134
    • 79957502155 scopus 로고    scopus 로고
    • Exposing digital image forgeries by detecting discrepancies in motion blur
    • P. Kakar, N. Sudha, and W. Ser Exposing digital image forgeries by detecting discrepancies in motion blur IEEE Trans. Multimed. 13 3 2011 443 452
    • (2011) IEEE Trans. Multimed. , vol.13 , Issue.3 , pp. 443-452
    • Kakar, P.1    Sudha, N.2    Ser, W.3
  • 136
    • 84947743091 scopus 로고    scopus 로고
    • IEEE Information Forensics and Security Technical Committee (IFS-TC) 2013
    • IEEE Information Forensics and Security Technical Committee (IFS-TC) (http://ifc.recod.ic.unicamp.br/fc.website/index.py?sec=0), 2013.
  • 138
    • 84931070072 scopus 로고    scopus 로고
    • Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques
    • IEEE, Paris, France
    • D. Cozzolino, D. Gragnaniello, L. Verdoliva, Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques, in: International Conference on Image Processing (ICIP), IEEE, Paris, France, 2014, pp. 5302-5306.
    • (2014) International Conference on Image Processing (ICIP) , pp. 5302-5306
    • Cozzolino, D.1    Gragnaniello, D.2    Verdoliva, L.3
  • 141
    • 13244251141 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting traces of resampling
    • A.C. Popescu, and H. Farid Exposing digital forgeries by detecting traces of resampling IEEE Trans. Signal Process. 53 2 2005 758 767
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.2 , pp. 758-767
    • Popescu, A.C.1    Farid, H.2
  • 142
    • 84938576712 scopus 로고    scopus 로고
    • Detection of linear and cubic interpolation in JPEG compressed images
    • IEEE, Victoria, BC, Canada
    • A.C. Gallagher, Detection of linear and cubic interpolation in JPEG compressed images, in: 2nd Canadian Conference on Computer and Robot Vision, IEEE, Victoria, BC, Canada, 2005, pp. 65-72.
    • (2005) 2nd Canadian Conference on Computer and Robot Vision , pp. 65-72
    • Gallagher, A.C.1
  • 143
    • 34247609854 scopus 로고    scopus 로고
    • On resampling detection and its application to detect image tampering
    • IEEE, Toronto, Canada
    • S. Prasad, K. Ramakrishnan, On resampling detection and its application to detect image tampering, in: International Conference on Multimedia and Expo (ICME), IEEE, Toronto, Canada, 2006, pp. 1325-1328.
    • (2006) International Conference on Multimedia and Expo (ICME) , pp. 1325-1328
    • Prasad, S.1    Ramakrishnan, K.2
  • 144
    • 56749171108 scopus 로고    scopus 로고
    • Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue
    • ACM, New York, NY, USA
    • M. Kirchner, Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue, in: 10th ACM Workshop on Multimedia and Security, ACM, New York, NY, USA, 2008, pp. 11-20.
    • (2008) 10th ACM Workshop on Multimedia and Security , pp. 11-20
    • Kirchner, M.1
  • 146
    • 78149274271 scopus 로고    scopus 로고
    • Linear row and column predictors for the analysis of resized images
    • ACM, New York, NY, USA
    • M. Kirchner, Linear row and column predictors for the analysis of resized images, in: 12th ACM Workshop on Multimedia and Security, ACM, New York, NY, USA, 2010, pp. 13-18.
    • (2010) 12th ACM Workshop on Multimedia and Security , pp. 13-18
    • Kirchner, M.1
  • 147
    • 42949105061 scopus 로고    scopus 로고
    • On the detectability of local resampling in digital images
    • International Society for Optics and Photonics, San Jose, CA, USA
    • M. Kirchner, On the detectability of local resampling in digital images, in: Electronic Imaging, vol. 6819, International Society for Optics and Photonics, San Jose, CA, USA, 2008, pp. 68190F-7.
    • (2008) Electronic Imaging , vol.6819 , pp. 68190F-681907F
    • Kirchner, M.1
  • 148
    • 42949104387 scopus 로고    scopus 로고
    • On periodic properties of interpolation and their application to image authentication
    • IEEE, Manchester, UK
    • B. Mahdian, S. Saic, On periodic properties of interpolation and their application to image authentication, in: 3rd International Symposium on Information Assurance and Security (IAS), IEEE, Manchester, UK, 2007, pp. 439-446.
    • (2007) 3rd International Symposium on Information Assurance and Security (IAS) , pp. 439-446
    • Mahdian, B.1    Saic, S.2
  • 151
    • 79952974193 scopus 로고    scopus 로고
    • A new estimation approach of resampling factors using threshold-based peak detection
    • IEEE, Berlin, Germany
    • G.-S. Song, Y.-I. Yun, W.-H. Lee, A new estimation approach of resampling factors using threshold-based peak detection, in: International Conference on Consumer Electronics (ICCE), IEEE, Berlin, Germany, 2011, pp. 731-732.
    • (2011) International Conference on Consumer Electronics (ICCE) , pp. 731-732
    • Song, G.-S.1    Yun, Y.-I.2    Lee, W.-H.3
  • 152
    • 49549116860 scopus 로고    scopus 로고
    • Blind authentication using periodic properties of interpolation
    • B. Mahdian, and S. Saic Blind authentication using periodic properties of interpolation IEEE Trans. Inf. Forensics Secur. 3 3 2008 529 538
    • (2008) IEEE Trans. Inf. Forensics Secur. , vol.3 , Issue.3 , pp. 529-538
    • Mahdian, B.1    Saic, S.2
  • 153
    • 70350531478 scopus 로고    scopus 로고
    • Detection and description of geometrically transformed digital images
    • International Society for Optics and Photonics, San Jose, CA, USA
    • B. Mahdian, S. Saic, Detection and description of geometrically transformed digital images, in: Media Forensics and Security, Proceedings of SPIE Electronic Imaging, vol. 7254, International Society for Optics and Photonics, San Jose, CA, USA, 2009, pp. 1-10.
    • (2009) Media Forensics and Security, Proceedings of SPIE Electronic Imaging , vol.7254 , pp. 1-10
    • Mahdian, B.1    Saic, S.2
  • 154
  • 157
    • 52249101583 scopus 로고    scopus 로고
    • Detection of resampling supplemented with noise inconsistencies analysis for image forensics
    • IEEE, Perugia, Umbria, Italy
    • B. Mahdian, S. Saic, Detection of resampling supplemented with noise inconsistencies analysis for image forensics, in: International Conference on Computational Sciences and Its Applications (ICCSA), IEEE, Perugia, Umbria, Italy, 2008, pp. 546-556.
    • (2008) International Conference on Computational Sciences and Its Applications (ICCSA) , pp. 546-556
    • Mahdian, B.1    Saic, S.2
  • 158
    • 84861167540 scopus 로고    scopus 로고
    • Normalized energy density-based forensic detection of resampled images
    • X. Feng, I.J. Cox, and G. Doërr Normalized energy density-based forensic detection of resampled images IEEE Trans. Multimed. 14 3 2012 536 545
    • (2012) IEEE Trans. Multimed. , vol.14 , Issue.3 , pp. 536-545
    • Feng, X.1    Cox, I.J.2    Doërr, G.3
  • 160
    • 69749111736 scopus 로고    scopus 로고
    • Intrinsic sensor noise features for forensic analysis on scanners and scanned images
    • H. Gou, A. Swaminathan, and M. Wu Intrinsic sensor noise features for forensic analysis on scanners and scanned images IEEE Trans. Inf. Forensics Secur. 4 3 2009 476 491
    • (2009) IEEE Trans. Inf. Forensics Secur. , vol.4 , Issue.3 , pp. 476-491
    • Gou, H.1    Swaminathan, A.2    Wu, M.3
  • 162
    • 84890510326 scopus 로고    scopus 로고
    • An investigation into aliasing in images recaptured from an lcd monitor using a digital camera
    • IEEE, Vancouver, BC, Canada
    • H. Muammar, P.L. Dragotti, An investigation into aliasing in images recaptured from an lcd monitor using a digital camera, in: International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Vancouver, BC, Canada, 2013, pp. 2242-2246.
    • (2013) International Conference on Acoustics, Speech and Signal Processing (ICASSP) , pp. 2242-2246
    • Muammar, H.1    Dragotti, P.L.2
  • 163
    • 84927154627 scopus 로고    scopus 로고
    • An image recapture detection algorithm based on learning dictionaries of edge profiles
    • T. Thongkamwitoon, H. Muammar, and P.-L. Dragotti An image recapture detection algorithm based on learning dictionaries of edge profiles IEEE Trans. Inf. Forensics Secur. 10 5 2015 953 968
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.5 , pp. 953-968
    • Thongkamwitoon, T.1    Muammar, H.2    Dragotti, P.-L.3
  • 166
    • 84869835192 scopus 로고    scopus 로고
    • Discrimination between computer generated and natural human faces based on asymmetry information
    • IEEE, Bucharest, Romania
    • D.-T. Dang-Nguyen, G. Boato, F.G. De Natale, Discrimination between computer generated and natural human faces based on asymmetry information, in: 20th European Signal Processing Conference (EUSIPCO), IEEE, Bucharest, Romania, 2012, pp. 1234-1238.
    • (2012) 20th European Signal Processing Conference (EUSIPCO) , pp. 1234-1238
    • Dang-Nguyen, D.-T.1    Boato, G.2    De Natale, F.G.3
  • 167
    • 84924094828 scopus 로고    scopus 로고
    • Identification of natural images and computer-generated graphics based on statistical and textural features
    • F. Peng, J.-t. Li, and M. Long Identification of natural images and computer-generated graphics based on statistical and textural features J. Forensic Sci. 60 2 2015 435 443
    • (2015) J. Forensic Sci. , vol.60 , Issue.2 , pp. 435-443
    • Peng, F.1    Li, J.-T.2    Long, M.3
  • 168
    • 4344675264 scopus 로고    scopus 로고
    • Region filling and object removal by exemplar-based image inpainting
    • A. Criminisi, P. Pérez, and K. Toyama Region filling and object removal by exemplar-based image inpainting IEEE Trans. Image Process. 13 9 2004 1200 1212
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.9 , pp. 1200-1212
    • Criminisi, A.1    Pérez, P.2    Toyama, K.3
  • 169
    • 84936160417 scopus 로고    scopus 로고
    • Blind detection method for video inpainting forgery
    • S. Das, G.D. Shreyas, and L.D. Devan Blind detection method for video inpainting forgery Int. J. Comput. Appl. 60 11 2012 33 37
    • (2012) Int. J. Comput. Appl. , vol.60 , Issue.11 , pp. 33-37
    • Das, S.1    Shreyas, G.D.2    Devan, L.D.3
  • 170
    • 84886431657 scopus 로고    scopus 로고
    • A forgery detection algorithm for exemplar-based inpainting images using multi-region relation
    • I.-C. Chang, J.C. Yu, and C.-C. Chang A forgery detection algorithm for exemplar-based inpainting images using multi-region relation Image Vis. Comput. 31 1 2013 57 71
    • (2013) Image Vis. Comput. , vol.31 , Issue.1 , pp. 57-71
    • Chang, I.-C.1    Yu, J.C.2    Chang, C.-C.3
  • 171
    • 84926668823 scopus 로고    scopus 로고
    • An efficient forgery detection algorithm for object removal by exemplar-based image inpainting
    • Z. Liang, G. Yang, X. Ding, and L. Li An efficient forgery detection algorithm for object removal by exemplar-based image inpainting J. Visual Commun. Image Represent 30 2015 75 85
    • (2015) J. Visual Commun. Image Represent , vol.30 , pp. 75-85
    • Liang, Z.1    Yang, G.2    Ding, X.3    Li, L.4
  • 174
    • 33751081288 scopus 로고    scopus 로고
    • Assessing facial beauty through proportion analysis by image processing and supervised learning
    • H. Gunes, and M. Piccardi Assessing facial beauty through proportion analysis by image processing and supervised learning Int. J. Human-Comput. Stud. 64 12 2006 1184 1199
    • (2006) Int. J. Human-Comput. Stud. , vol.64 , Issue.12 , pp. 1184-1199
    • Gunes, H.1    Piccardi, M.2
  • 176
    • 84863041542 scopus 로고    scopus 로고
    • Blind identification algorithm for retouched images based on Bi-Laplacian
    • X.-F. Li, X.-J. Shen, and H.-P. Chen Blind identification algorithm for retouched images based on Bi-Laplacian J. Comput. Appl. 31 1 2011 239 242
    • (2011) J. Comput. Appl. , vol.31 , Issue.1 , pp. 239-242
    • Li, X.-F.1    Shen, X.-J.2    Chen, H.-P.3
  • 177
    • 84055200892 scopus 로고    scopus 로고
    • A perceptual metric for photo retouching
    • E. Kee, and H. Farid A perceptual metric for photo retouching Proc. Natl. Acad. Sci. 108 50 2011 19907 19912
    • (2011) Proc. Natl. Acad. Sci. , vol.108 , Issue.50 , pp. 19907-19912
    • Kee, E.1    Farid, H.2
  • 179
    • 77951863205 scopus 로고    scopus 로고
    • On detection of median filtering in digital images
    • International Society for Optics and Photonics, San Jose, CA, USA
    • M. Kirchner, J. Fridrich, On detection of median filtering in digital images, in: IS&T/SPIE Electronic Imaging, vol. 7541, International Society for Optics and Photonics, San Jose, CA, USA, 2010, pp. 754110-754110-12.
    • (2010) IS&T/SPIE Electronic Imaging , vol.7541 , pp. 754110-75411012
    • Kirchner, M.1    Fridrich, J.2
  • 182
    • 82055176931 scopus 로고    scopus 로고
    • Blind forensics of median filtering in digital images
    • H.-D. Yuan Blind forensics of median filtering in digital images IEEE Trans. Inf. Forensics Secur. 6 4 2011 1335 1345
    • (2011) IEEE Trans. Inf. Forensics Secur. , vol.6 , Issue.4 , pp. 1335-1345
    • Yuan, H.-D.1
  • 183
    • 84882957962 scopus 로고    scopus 로고
    • Robust median filtering forensics using an autoregressive model
    • X. Kang, M.C. Stamm, A. Peng, and K.R. Liu Robust median filtering forensics using an autoregressive model IEEE Trans. Inf. Forensics Secur. 8 9 2013 1456 1468
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , Issue.9 , pp. 1456-1468
    • Kang, X.1    Stamm, M.C.2    Peng, A.3    Liu, K.R.4
  • 184
    • 69949189564 scopus 로고    scopus 로고
    • Blind forensics of contrast enhancement in digital images
    • IEEE, San Diego, CA, USA
    • M. Stamm, K.R. Liu, Blind forensics of contrast enhancement in digital images, in: 15th International Conference on Image Processing (ICIP), IEEE, San Diego, CA, USA, 2008, pp. 3112-3115.
    • (2008) 15th International Conference on Image Processing (ICIP) , pp. 3112-3115
    • Stamm, M.1    Liu, K.R.2
  • 186
    • 77955707653 scopus 로고    scopus 로고
    • Forensic detection of image manipulation using statistical intrinsic fingerprints
    • M.C. Stamm, and K.R. Liu Forensic detection of image manipulation using statistical intrinsic fingerprints IEEE Trans. Inf. Forensics Secur. 5 3 2010 492 506
    • (2010) IEEE Trans. Inf. Forensics Secur. , vol.5 , Issue.3 , pp. 492-506
    • Stamm, M.C.1    Liu, K.R.2
  • 187
    • 84857919279 scopus 로고    scopus 로고
    • Digital image forgery detection and estimation by exploring basic image manipulations
    • S.D. Mahalakshmi, K. Vijayalakshmi, and S. Priyadharsini Digital image forgery detection and estimation by exploring basic image manipulations Digit. Investig. 8 3 2012 215 225
    • (2012) Digit. Investig. , vol.8 , Issue.3 , pp. 215-225
    • Mahalakshmi, S.D.1    Vijayalakshmi, K.2    Priyadharsini, S.3
  • 188
    • 84896690794 scopus 로고    scopus 로고
    • Contrast enhancement-based forensics in digital images
    • G. Cao, Y. Zhao, R. Ni, and X. Li Contrast enhancement-based forensics in digital images IEEE Trans. Inf. Forensics Secur. 9 3 2014 515 525
    • (2014) IEEE Trans. Inf. Forensics Secur. , vol.9 , Issue.3 , pp. 515-525
    • Cao, G.1    Zhao, Y.2    Ni, R.3    Li, X.4
  • 191
    • 70449598250 scopus 로고    scopus 로고
    • Detection of image sharpening based on histogram aberration and ringing artifacts
    • IEEE, New York, NY, USA
    • G. Cao, Y. Zhao, R. Ni, Detection of image sharpening based on histogram aberration and ringing artifacts, in: International Conference on Multimedia and Expo (ICME), IEEE, New York, NY, USA, 2009, pp. 1026-1029.
    • (2009) International Conference on Multimedia and Expo (ICME) , pp. 1026-1029
    • Cao, G.1    Zhao, Y.2    Ni, R.3
  • 192
    • 80052396955 scopus 로고    scopus 로고
    • Unsharp masking sharpening detection via overshoot artifacts analysis
    • G. Cao, Y. Zhao, R. Ni, and A.C. Kot Unsharp masking sharpening detection via overshoot artifacts analysis IEEE Signal Process. Lett. 18 10 2011 603 606
    • (2011) IEEE Signal Process. Lett. , vol.18 , Issue.10 , pp. 603-606
    • Cao, G.1    Zhao, Y.2    Ni, R.3    Kot, A.C.4
  • 193
    • 84904764591 scopus 로고    scopus 로고
    • A novel method for detecting image sharpening based on local binary pattern
    • Springer, Auckland, New Zealand
    • F. Ding, G. Zhu, Y.Q. Shi, A novel method for detecting image sharpening based on local binary pattern, in: Digital-Forensics and Watermarking, Springer, Auckland, New Zealand, 2014, pp. 180-191.
    • (2014) Digital-Forensics and Watermarking , pp. 180-191
    • Ding, F.1    Zhu, G.2    Shi, Y.Q.3
  • 194
  • 195
    • 84896325249 scopus 로고    scopus 로고
    • Forensic detection of noise addition in digital images
    • G. Cao, Y. Zhao, R. Ni, B. Ou, and Y. Wang Forensic detection of noise addition in digital images J. Electron. Imaging 23 2 2014 023004
    • (2014) J. Electron. Imaging , vol.23 , Issue.2 , pp. 023004
    • Cao, G.1    Zhao, Y.2    Ni, R.3    Ou, B.4    Wang, Y.5
  • 197
    • 80051734185 scopus 로고    scopus 로고
    • A SIFT-based forensic method for copy-move attack detection and transformation recovery
    • I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra A SIFT-based forensic method for copy-move attack detection and transformation recovery IEEE Trans. Inf. Forensics Secur. 6 3 PART 2 2011 1099 1110
    • (2011) IEEE Trans. Inf. Forensics Secur. , vol.6 , Issue.3 , pp. 1099-1110
    • Amerini, I.1    Ballan, L.2    Caldelli, R.3    Del Bimbo, A.4    Serra, G.5
  • 198
    • 34247636825 scopus 로고    scopus 로고
    • Detecting image splicing using geometry invariants and camera characteristics consistency
    • Y.-F. Hsu, S.-F. Chang, Detecting image splicing using geometry invariants and camera characteristics consistency, in: International Conference on Multimedia and Expo (ICME), 2006, pp. 549-552.
    • (2006) International Conference on Multimedia and Expo (ICME) , pp. 549-552
    • Hsu, Y.-F.1    Chang, S.-F.2
  • 199
    • 84929134231 scopus 로고    scopus 로고
    • Counter-forensics: Attacking image forensics
    • Springer, New York
    • R. Böhme, M. Kirchner, Counter-forensics: attacking image forensics, in: Digital Image Forensics, Springer, New York, 2013, pp. 327-366.
    • (2013) Digital Image Forensics , pp. 327-366
    • Böhme, R.1    Kirchner, M.2
  • 201
    • 78149263012 scopus 로고    scopus 로고
    • Anti-forensics of contrast enhancement in digital images
    • ACM, New York, NY, USA
    • G. Cao, Y. Zhao, R. Ni, H. Tian, Anti-forensics of contrast enhancement in digital images, in: 12th ACM Workshop on Multimedia and Security, ACM, New York, NY, USA, 2010, pp. 25-34.
    • (2010) 12th ACM Workshop on Multimedia and Security , pp. 25-34
    • Cao, G.1    Zhao, Y.2    Ni, R.3    Tian, H.4
  • 202
    • 84865701450 scopus 로고    scopus 로고
    • Alternative anti-forensics method for contrast enhancement
    • Springer, Atlantic City, NY, USA
    • C.-W. Kwok, O.C. Au, S.-H. Chui, Alternative anti-forensics method for contrast enhancement, in: Digital Forensics and Watermarking, vol. 7128, Springer, Atlantic City, NY, USA, 2012, pp. 398-410.
    • (2012) Digital Forensics and Watermarking , vol.7128 , pp. 398-410
    • Kwok, C.-W.1    Au, O.C.2    Chui, S.-H.3
  • 203
    • 84893485234 scopus 로고    scopus 로고
    • Anti-forensics for unsharp masking sharpening in digital images
    • L. Laijie, Y. Gaobo, and X. Ming Anti-forensics for unsharp masking sharpening in digital images Int. J. Digit. Crime Forensics 5 3 2013 53 65
    • (2013) Int. J. Digit. Crime Forensics , vol.5 , Issue.3 , pp. 53-65
    • Laijie, L.1    Gaobo, Y.2    Ming, X.3
  • 205
    • 80051605162 scopus 로고    scopus 로고
    • Anti-forensics of digital image compression
    • M.C. Stamm, and K. Liu Anti-forensics of digital image compression IEEE Trans. Inf. Forensics Secur. 6 3 2011 1050 1065
    • (2011) IEEE Trans. Inf. Forensics Secur. , vol.6 , Issue.3 , pp. 1050-1065
    • Stamm, M.C.1    Liu, K.2
  • 208
    • 84904357353 scopus 로고    scopus 로고
    • JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality
    • W. Fan, K. Wang, F. Cayre, and Z. Xiong JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality IEEE Trans. Inf. Forensics Secur. 9 8 2014 1211 1226
    • (2014) IEEE Trans. Inf. Forensics Secur. , vol.9 , Issue.8 , pp. 1211-1226
    • Fan, W.1    Wang, K.2    Cayre, F.3    Xiong, Z.4
  • 212
  • 214
    • 70349367592 scopus 로고    scopus 로고
    • Synthesis of color filter array pattern in digital images
    • R. Böhme, M. Kirchner, Synthesis of color filter array pattern in digital images, Proc. SPIE, Media Forensics Secur. XI, 7254 (2009) 18-22.
    • (2009) Proc. SPIE, Media Forensics Secur. XI , vol.7254 , pp. 18-22
    • Böhme, R.1    Kirchner, M.2
  • 215
    • 80155180685 scopus 로고    scopus 로고
    • Vision of the unseen: Current trends and challenges in digital image and video forensics
    • A. Rocha, W. Scheirer, T. Boult, S. Goldenstein, Vision of the unseen: current trends and challenges in digital image and video forensics, ACM Comput. Surv. 43 (4) (2011) 26:1-26:42.
    • (2011) ACM Comput. Surv. , vol.43 , Issue.4 , pp. 261-2642
    • Rocha, A.1    Scheirer, W.2    Boult, T.3    Goldenstein, S.4
  • 216
    • 78149263012 scopus 로고    scopus 로고
    • Anti-forensics of contrast enhancement in digital images
    • ACM, New York, NY, USA
    • G. Cao, Y. Zhao, R. Ni, H. Tian, Anti-forensics of contrast enhancement in digital images, in: 12th ACM Workshop on Multimedia and Security, ACM, New York, NY, USA, 2010, pp. 25-34.
    • (2010) 12th ACM Workshop on Multimedia and Security , pp. 25-34
    • Cao, G.1    Zhao, Y.2    Ni, R.3    Tian, H.4
  • 217
    • 84900444041 scopus 로고    scopus 로고
    • Countering anti-forensics by means of data fusion
    • International Society for Optics and Photonics, San Francisco, CA, USA
    • M. Fontani, A. Bonchi, A. Piva, M. Barni, Countering anti-forensics by means of data fusion, in: IS&T/SPIE Electronic Imaging, vol. 9028, International Society for Optics and Photonics, San Francisco, CA, USA, 2014, pp. 90280Z-90280Z-15.
    • (2014) IS&T/SPIE Electronic Imaging , vol.9028 , pp. 90280Z-90280Z15
    • Fontani, M.1    Bonchi, A.2    Piva, A.3    Barni, M.4
  • 220
    • 80053033238 scopus 로고    scopus 로고
    • Countering counter-forensics: The case of JPEG compression
    • Springer, Prague, Czech Republic
    • S. Lai, R. Böhme, Countering counter-forensics: the case of JPEG compression, in: 13th International Conference on Information Hiding, vol. 6958, Springer, Prague, Czech Republic, 2011, pp. 285-298.
    • (2011) 13th International Conference on Information Hiding , vol.6958 , pp. 285-298
    • Lai, S.1    Böhme, R.2
  • 221
    • 84857504569 scopus 로고    scopus 로고
    • Forensic identification of resampling operators: A semi non-intrusive approach
    • G. Cao, Y. Zhao, and R. Ni Forensic identification of resampling operators: a semi non-intrusive approach Forensic Sci. Int. 216 1 2012 29 36
    • (2012) Forensic Sci. Int. , vol.216 , Issue.1 , pp. 29-36
    • Cao, G.1    Zhao, Y.2    Ni, R.3
  • 223
    • 84921445644 scopus 로고    scopus 로고
    • Second-order statistics analysis to cope with contrast enhancement counter-forensics
    • A. De Rosa, M. Fontani, M. Massai, A. Piva, and M. Barni Second-order statistics analysis to cope with contrast enhancement counter-forensics IEEE Signal Process. Lett. 22 8 2015 1132 1136
    • (2015) IEEE Signal Process. Lett. , vol.22 , Issue.8 , pp. 1132-1136
    • De Rosa, A.1    Fontani, M.2    Massai, M.3    Piva, A.4    Barni, M.5
  • 227
    • 84901192541 scopus 로고    scopus 로고
    • A perceptual image completion approach based on a hierarchical optimization scheme
    • Trung Thanh Dang, Azeddine Beghdadi, and M-C Larabi A perceptual image completion approach based on a hierarchical optimization scheme Signal Processing 103 2014 127 141
    • (2014) Signal Processing , vol.103 , pp. 127-141
    • Dang, T.T.1    Beghdadi, A.2    Larabi, M.-C.3
  • 229
    • 84936951012 scopus 로고    scopus 로고
    • An Image Quality Index Based on Mutual Information and Neural Networks
    • Mohamed Deriche An Image Quality Index Based on Mutual Information and Neural Networks Arabian Journal for Science and Engineering 39 3 2014 1983 1993
    • (2014) Arabian Journal for Science and Engineering , vol.39 , Issue.3 , pp. 1983-1993
    • Deriche, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.