-
1
-
-
33847714243
-
Estimation of primary quantization matrix in double compressed JPEG images
-
J Lukáš, J Fridrich, Estimation of primary quantization matrix in double compressed JPEG images, in Proc. Digital Forensic Research Workshop, 2003, pp. 5–8
-
(2003)
Proc. Digital Forensic Research Workshop
, pp. 5-8
-
-
Lukáš, J.1
Fridrich, J.2
-
2
-
-
35048816032
-
Farid H. Statistical tools for digital forensics. International Workshop on Information Hiding. (Springer
-
Popescu A C, Farid H. Statistical tools for digital forensics. International Workshop on Information Hiding. (Springer, Berlin Heidelberg 2004),pp. 128-47.
-
(2004)
Berlin Heidelberg
, pp. 128-147
-
-
Popescu, A.C.1
-
3
-
-
79957470147
-
Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
-
YL Chen, CT Hsu, Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics and Security 6(2), 396–406 (2011)
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.2
, pp. 396-406
-
-
Chen, Y.L.1
Hsu, C.T.2
-
4
-
-
84990886466
-
International Society for Optics and Photonics
-
Fu D, Shi Y Q, Su W. A generalized Benford's law for JPEG coefficients and its applications in image forensics.Electronic Imaging 2007. International Society for Optics and Photonics. 65051L-65051L-11(2007)
-
(2007)
65051L-65051L-11(2007)
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.A.3
-
5
-
-
58049107658
-
Detecting doubly compressed JPEG images by using mode based first digit features
-
B Li, YQ Shi, J Huang, Detecting doubly compressed JPEG images by using mode based first digit features, in 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008, pp. 730–735
-
(2008)
2008 IEEE 10th Workshop on Multimedia Signal Processing
, pp. 730-735
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
6
-
-
44049087452
-
Detection of double-compression in JPEG images for applications in steganography
-
J Fridrich et al., Detection of double-compression in JPEG images for applications in steganography. IEEE Transactions on information forensics and security 3(2), 247–258 (2008)
-
(2008)
IEEE Transactions on information forensics and security
, vol.3
, Issue.2
, pp. 247-258
-
-
Fridrich, J.1
-
7
-
-
67649410199
-
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
-
Z Lin, J He, X Tang, CK Tang, Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition 42(11), 2492–2501 (2009)
-
(2009)
Pattern Recognition
, vol.42
, Issue.11
, pp. 2492-2501
-
-
Lin, Z.1
He, J.2
Tang, X.3
Tang, C.K.4
-
8
-
-
84907466175
-
Exploring DCT coefficient quantization effects for local tampering detection
-
W Wang, J Dong, T Tan, Exploring DCT coefficient quantization effects for local tampering detection. IEEE Transactions on Information Forensics and Security 9(10), 1653–1666 (2014)
-
(2014)
IEEE Transactions on Information Forensics and Security
, vol.9
, Issue.10
, pp. 1653-1666
-
-
Wang, W.1
Dong, J.2
Tan, T.3
-
9
-
-
84929254527
-
IEEE International Workshop on Information Forensics and Security (WIFS)
-
Verdoliva L, Cozzolino D, Poggi G. A feature-based approach for image tampering detection and localization. 2014 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE. 149-54(2014)
-
(2014)
IEEE
, vol.149-54
, Issue.2014
-
-
Verdoliva, L.1
Cozzolino, D.2
-
10
-
-
80051606276
-
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
-
Bianchi T, De Rosa A, Piva A. Improved DCT coefficient analysis for forgery localization in JPEG images. 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE. 2444-7(2011)
-
(2011)
IEEE
, vol.2444-7
, Issue.2011
-
-
Bianchi, T.1
De Rosa, A.2
-
13
-
-
84932146885
-
-
Qian Y, Dong J, Wang W, et al. Deep learning for steganalysis via convolutional neural networks. SPIE/IS&T Electronic Imaging. International Society for Optics and Photonics. 94090J-94090J-10(2015)
-
Qian Y, Dong J, Wang W, et al. Deep learning for steganalysis via convolutional neural networks. SPIE/IS&T Electronic Imaging. International Society for Optics and Photonics. 94090J-94090J-10(2015)
-
-
-
-
14
-
-
84991020691
-
-
arXiv preprint arXiv:1511.04855
-
L Pibre, P Jerome, D Ienco, M Chaumont, Deep learning for steganalysis is better than a rich model with an ensemble classifier, and is natively robust to the cover source-mismatch, 2015. arXiv preprint arXiv:1511.04855
-
(2015)
Deep learning for steganalysis is better than a rich model with an ensemble classifier, and is natively robust to the cover source-mismatch
-
-
Pibre, L.1
Jerome, P.2
Ienco, D.3
Chaumont, M.4
-
15
-
-
0000359337
-
Backpropagation applied to handwritten zip code recognition
-
Y Lecun, B Boser, JS Denker, D Henderson, RE Howard, W Hubbard, LD Jackel, Backpropagation applied to handwritten zip code recognition. Neural Computation 1(4), 541–551 (1989)
-
(1989)
Neural Computation
, vol.1
, Issue.4
, pp. 541-551
-
-
Lecun, Y.1
Boser, B.2
Denker, J.S.3
Henderson, D.4
Howard, R.E.5
Hubbard, W.6
Jackel, L.D.7
-
16
-
-
84876231242
-
ImageNet classification with deep convolutional neural networks
-
A Krizhevsky, I Sutskever, GE Hinton, ImageNet classification with deep convolutional neural networks, in Advances in Neural Information Processing Systems, 2012, pp. 1097–1105
-
(2012)
Advances in Neural Information Processing Systems
, pp. 1097-1105
-
-
Krizhevsky, A.1
Sutskever, I.2
Hinton, G.E.3
-
17
-
-
85010054420
-
Improving neural networks by preventing co-adaptation of feature detectors
-
GE Hinton, N Srivastava, A Krizhevsky, I Sutskever, RR Salakhutdinov, Improving neural networks by preventing co-adaptation of feature detectors. ResearchGate 3(4), 212–223 (2012)
-
(2012)
ResearchGate
, vol.3
, Issue.4
, pp. 212-223
-
-
Hinton, G.E.1
Srivastava, N.2
Krizhevsky, A.3
Sutskever, I.4
Salakhutdinov, R.R.5
-
19
-
-
79955401108
-
The Dresden Image Database for benchmarking digital image forensics
-
T Gloe, R Böhme Re, The Dresden Image Database for benchmarking digital image forensics. Journal of Digital Forensic Practice 3(2-4), 150–159 (2010)
-
(2010)
Journal of Digital Forensic Practice
, vol.3
, Issue.2-4
, pp. 150-159
-
-
Gloe, T.1
Böhme Re, R.2
-
20
-
-
84930630277
-
Deep learning
-
Y LeCun, Y Bengio, G Hinton, Deep learning. Nature 521(7553), 436–444 (2015)
-
(2015)
Nature
, vol.521
, Issue.7553
, pp. 436-444
-
-
LeCun, Y.1
Bengio, Y.2
Hinton, G.3
|