-
4
-
-
79957470147
-
Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
-
Y. Chen and C. Hsu. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics and Security, 6, n. 2:396-406, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.2
, pp. 396-406
-
-
Chen, Y.1
Hsu, C.2
-
5
-
-
77954723646
-
The Dresden image database for benchmarking digital image forensics
-
T. Gloe and R. Boehme. The Dresden image database for benchmarking digital image forensics. In ACM Symposium on Applied Computing, volume 2, pages 1585-1591, 2010.
-
(2010)
ACM Symposium on Applied Computing
, vol.2
, pp. 1585-1591
-
-
Gloe, T.1
Boehme, R.2
-
6
-
-
78649396720
-
Detecting double JPEG compression with the same quantization matrix
-
F. Huang, J. Huang, and Y. Shi. Detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security, 5(4):848-856, 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.4
, pp. 848-856
-
-
Huang, F.1
Huang, J.2
Shi, Y.3
-
7
-
-
84890509559
-
Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection
-
S.-Y. Lai and R. Böhme. Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 3028-3032, 2013.
-
(2013)
IEEE International Conference on Acoustics, Speech, and Signal, Processing (ICASSP)
, pp. 3028-3032
-
-
Lai, S.-Y.1
Böhme, R.2
-
9
-
-
84867616246
-
Discriminating multiple JPEG compression using first digit features
-
S. Milani, M. Tagliasacchi, and S. Tubaro. Discriminating multiple JPEG compression using first digit features. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 25-30, 2012.
-
(2012)
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
, pp. 25-30
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
12
-
-
84929234139
-
Application of Benford's law to images
-
S. J. Miller, A. Berger and T. Hill (Eds), Princeton University Press
-
F. Perez-Gonzalez, T. Quach, S. J. Miller, C. Abdallah, and G. Heileman. Application of Benford's law to images. S. J. Miller, A. Berger and T. Hill (Eds), The Theory and Applications of Benford's law, Princeton University Press, 2015.
-
(2015)
The Theory and Applications of Benford's Law
-
-
Perez-Gonzalez, F.1
Quach, T.2
Miller, S.J.3
Abdallah, C.4
Heileman, G.5
-
13
-
-
44049087452
-
Detection of double-compression in JPEG images for applications in steganography
-
T. Pevný and J. Fridrich. Detection of double-compression in JPEG images for applications in steganography. IEEE Transactions on Information Forensics and Security, 3(2):247-258, 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevný, T.1
Fridrich, J.2
-
14
-
-
27844467756
-
Top-down induction of decision trees classiffers -A survey
-
L. Rokach and O. Maimon. Top-down induction of decision trees classiffers -A survey. IEEE Transactions on Systems, Man, and Cybernetics, 35(4):476-487, 2005.
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.35
, Issue.4
, pp. 476-487
-
-
Rokach, L.1
Maimon, O.2
-
16
-
-
84908040919
-
An effective method for detecting double JPEG compression with the same quantization matrix
-
J. Yang, J. Xie, G. Zhu, S. Kwong, and Y. Shi. An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security, 9(11), 2014.
-
(2014)
IEEE Transactions on Information Forensics and Security
, vol.9
, Issue.11
-
-
Yang, J.1
Xie, J.2
Zhu, G.3
Kwong, S.4
Shi, Y.5
|