메뉴 건너뛰기




Volumn , Issue , 2016, Pages 11-21

Forensics of high quality and nearly identical JPEG image recompression

Author keywords

Double compression; High quality images; JPEG forensics

Indexed keywords

DECISION THEORY; DECISION TREES; FOURIER ANALYSIS;

EID: 84998746468     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2909827.2930787     Document Type: Conference Paper
Times cited : (15)

References (16)
  • 4
    • 79957470147 scopus 로고    scopus 로고
    • Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
    • Y. Chen and C. Hsu. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics and Security, 6, n. 2:396-406, 2011.
    • (2011) IEEE Transactions on Information Forensics and Security , vol.6 , Issue.2 , pp. 396-406
    • Chen, Y.1    Hsu, C.2
  • 5
    • 77954723646 scopus 로고    scopus 로고
    • The Dresden image database for benchmarking digital image forensics
    • T. Gloe and R. Boehme. The Dresden image database for benchmarking digital image forensics. In ACM Symposium on Applied Computing, volume 2, pages 1585-1591, 2010.
    • (2010) ACM Symposium on Applied Computing , vol.2 , pp. 1585-1591
    • Gloe, T.1    Boehme, R.2
  • 8
    • 58049107658 scopus 로고    scopus 로고
    • Detecting doubly compressed JPEG images by using mode based first digit features
    • B. Li, Y. Shi, and J. Huang. Detecting doubly compressed JPEG images by using mode based first digit features. In IEEE Workshop on Multimedia Signal Processing (MMSP), pages 730-735, 2008.
    • (2008) IEEE Workshop on Multimedia Signal Processing (MMSP) , pp. 730-735
    • Li, B.1    Shi, Y.2    Huang, J.3
  • 13
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression in JPEG images for applications in steganography
    • T. Pevný and J. Fridrich. Detection of double-compression in JPEG images for applications in steganography. IEEE Transactions on Information Forensics and Security, 3(2):247-258, 2008.
    • (2008) IEEE Transactions on Information Forensics and Security , vol.3 , Issue.2 , pp. 247-258
    • Pevný, T.1    Fridrich, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.