-
1
-
-
84888386204
-
Information Forensics: An overview of the first decade
-
M. C. Stamm, Min Wu, and K. J. R. Liu, "Information Forensics: An overview of the first decade," IEEE Access, vol. 1, pp. 167-200, (2013). [Online]. Available: http://ieeexplore.ieee.org/document/6515027
-
(2013)
IEEE Access
, vol.1
, pp. 167-200
-
-
Stamm, M.C.1
Wu, M.2
Liu, K.J.R.3
-
2
-
-
84890463165
-
An overview on image forensics
-
A. Piva, "An overview on image forensics," ISRN Signal Process., vol. 2013, 2013, Art. no. 22.
-
(2013)
ISRN Signal Process.
, vol.2013
-
-
Piva, A.1
-
3
-
-
80155180685
-
Vision of the unseen: Current trends and challenges in digital image and video forensics
-
A.Rocha,W. Scheirer, T.Boult, and S.Goldenstein, "Vision of the unseen: Current trends and challenges in digital image and video forensics," ACM Comput. Surveys, vol. 43, pp. 26:1-26:42, 2011.
-
(2011)
ACM Comput. Surveys
, vol.43
, pp. 261-2642
-
-
Rocha, A.1
Scheirer, W.2
Boult, T.3
Goldenstein, S.4
-
5
-
-
84931070072
-
Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques
-
D. Cozzolino, D. Gragnaniello, and L. Verdoliva, "Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques," in Proc. IEEE Int. Conf. Image Process., 2014, pp. 5302-5306.
-
(2014)
Proc. IEEE Int. Conf. Image Process.
, pp. 5302-5306
-
-
Cozzolino, D.1
Gragnaniello, D.2
Verdoliva, L.3
-
6
-
-
84929245888
-
Multi-clue image tampering localization
-
L. Gaborini, P. Bestagini, S. Milani, M. Tagliasacchi, and S. Tubaro, "Multi-clue image tampering localization," in Proc. IEEE Int. Workshop Inf. Forensics Security, 2014, pp. 125-130.
-
(2014)
Proc. IEEE Int. Workshop Inf. Forensics Security
, pp. 125-130
-
-
Gaborini, L.1
Bestagini, P.2
Milani, S.3
Tagliasacchi, M.4
Tubaro, S.5
-
7
-
-
39449103666
-
Digital image forensics via intrinsic fingerprints
-
Mar
-
A. Swaminathan, M. Wu, and K. J. R. Liu, "Digital image forensics via intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101-117, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 101-117
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
8
-
-
69949138613
-
Using sensor pattern noise for camera model identification
-
T. Filler, J. Fridrich, and M. Goljan, "Using sensor pattern noise for camera model identification," in Proc. IEEE Int. Conf. Image Process., 2008, pp. 1296-1299.
-
(2008)
Proc. IEEE Int. Conf. Image Process.
, pp. 1296-1299
-
-
Filler, T.1
Fridrich, J.2
Goljan, M.3
-
9
-
-
33749254274
-
Source camera identification based on CFA interpolation
-
S. Bayram, H. Sencar, N. Memon, and I. Avcibas, "Source camera identification based on CFA interpolation," in Proc. IEEE Int. Conf. Image Process., 2005, pp. 69-72.
-
(2005)
Proc. IEEE Int. Conf. Image Process.
, pp. 69-72
-
-
Bayram, S.1
Sencar, H.2
Memon, N.3
Avcibas, I.4
-
10
-
-
84905283556
-
Demosaicing strategy identification via eigenalgorithms
-
S. Milani, P. Bestagini, M. Tagliasacchi, and S. Tubaro, "Demosaicing strategy identification via eigenalgorithms," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., 2014, pp. 2659-2663.
-
(2014)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, pp. 2659-2663
-
-
Milani, S.1
Bestagini, P.2
Tagliasacchi, M.3
Tubaro, S.4
-
11
-
-
70450271108
-
Accurate detection of demosaicing regularity for digital image forensics
-
Dec
-
H. Cao and A. C. Kot, "Accurate detection of demosaicing regularity for digital image forensics," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 899-910, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 899-910
-
-
Cao, H.1
Kot, A.C.2
-
12
-
-
37849029111
-
Automatic source camera identification using the intrinsic lens radial distortion
-
K. Choi, E. Lam, and K. Wong, "Automatic source camera identification using the intrinsic lens radial distortion," Opt. Express, vol. 14, pp. 11551-11565, 2006.
-
(2006)
Opt. Express
, vol.14
, pp. 11551-11565
-
-
Choi, K.1
Lam, E.2
Wong, K.3
-
13
-
-
48149111003
-
Source camera identification based on camera gain histogram
-
S.-H. Chen and C.-T. Hsu, "Source camera identification based on camera gain histogram," in Proc. IEEE Int. Conf. Image Process., 2007, pp. IV-429-IV-432.
-
(2007)
Proc. IEEE Int. Conf. Image Process.
, pp. IV429-IV432
-
-
Chen, S.-H.1
Hsu, C.-T.2
-
14
-
-
49549122403
-
Digital single lens reflex camera identification from traces of sensor dust
-
Sep
-
A. Dirik, H. Sencar, and N. Memon, "Digital single lens reflex camera identification from traces of sensor dust," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 539-552, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 539-552
-
-
Dirik, A.1
Sencar, H.2
Memon, N.3
-
15
-
-
84891296342
-
Camera model identification based on the heteroscedastic noise model
-
Jan
-
T. H. Thai, R. Cogranne, and F. Retraint, "Camera model identification based on the heteroscedastic noise model," IEEE Trans. Image Process., vol. 23, no. 1, pp. 250-263, Jan. 2014.
-
(2014)
IEEE Trans. Image Process.
, vol.23
, Issue.1
, pp. 250-263
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
16
-
-
84868151871
-
Camera model identification using local binary patterns
-
G. Xu and Y. Q. Shi, "Camera model identification using local binary patterns," in Proc. IEEE Int. Conf. Multimedia Expo., 2012, pp. 392-397.
-
(2012)
Proc. IEEE Int. Conf. Multimedia Expo.
, pp. 392-397
-
-
Xu, G.1
Shi, Y.Q.2
-
17
-
-
84964767150
-
Cameramodel identification framework using an ensemble of demosaicing features
-
C. Chen andM. C. Stamm, "Cameramodel identification framework using an ensemble of demosaicing features," in Proc. IEEE Int. Workshop Inf. Forensics Security, 2015, pp. 1-6.
-
(2015)
Proc. IEEE Int. Workshop Inf. Forensics Security
, pp. 1-6
-
-
Chen, C.1
Stamm, M.C.2
-
18
-
-
84944703879
-
-
New York, NY, USA: Springer
-
F. Marra, G. Poggi, C. Sansone, and L. Verdoliva, Evaluation of Residual-Based Local Features for Camera Model Identification. New York, NY, USA: Springer, 2015, pp. 11-18.
-
(2015)
Evaluation of Residual-Based Local Features for Camera Model Identification
, pp. 11-18
-
-
Marra, F.1
Poggi, G.2
Sansone, C.3
Verdoliva, L.4
-
19
-
-
85006066498
-
Camera model identification based on machine learning approach with high order statistics features
-
A. Tuama, F. Comby, and M. Chaumont, "Camera model identification based on machine learning approach with high order statistics features," in Proc. Eur. Signal Process. Conf., 2016, pp. 1183-1187.
-
(2016)
Proc. Eur. Signal Process. Conf.
, pp. 1183-1187
-
-
Tuama, A.1
Comby, F.2
Chaumont, M.3
-
20
-
-
84988240454
-
Unsupervised feature learning for bootleg detection using deep learning architectures
-
M. Buccoli, P. Bestagini, M. Zanoni, A. Sarti, and S. Tubaro, "Unsupervised feature learning for bootleg detection using deep learning architectures," in Proc. IEEE Int. Workshop Inf. Forensics Security, 2014, pp. 131-136.
-
(2014)
Proc. IEEE Int. Workshop Inf. Forensics Security
, pp. 131-136
-
-
Buccoli, M.1
Bestagini, P.2
Zanoni, M.3
Sarti, A.4
Tubaro, S.5
-
21
-
-
84905216543
-
Detecting double compressed AMR audio using deep learning
-
D. Luo, R. Yang, and J. Huang, "Detecting double compressed AMR audio using deep learning," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., 2014, pp. 2669-2673.
-
(2014)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, pp. 2669-2673
-
-
Luo, D.1
Yang, R.2
Huang, J.3
-
22
-
-
84933053045
-
Median filtering forensics based on convolutional neural networks
-
Nov
-
C. Jiansheng, K. Xiangui, L. Ye, and Z. J. Wang, "Median filtering forensics based on convolutional neural networks," IEEE Signal Process. Lett., vol. 22, no. 11, pp. 1849-1853, Nov. 2015.
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, Issue.11
, pp. 1849-1853
-
-
Jiansheng, C.1
Xiangui, K.2
Ye, L.3
Wang, Z.J.4
-
23
-
-
85015106454
-
A deep learning approach to universal image manipulation detection using a new convolutional layer
-
B. Bayar and M. C. Stamm, "A deep learning approach to universal image manipulation detection using a new convolutional layer," in Proc. ACM Workshop Inf. Hiding Multimedia Security, 2016, pp. 5-10.
-
(2016)
Proc. ACM Workshop Inf. Hiding Multimedia Security
, pp. 5-10
-
-
Bayar, B.1
Stamm, M.C.2
-
24
-
-
84964992861
-
Structural design of convolutional neural networks for steganalysis
-
G. Xu, H. Z.Wu, and Y. Q. Shi, "Structural design of convolutional neural networks for steganalysis," IEEE Signal Process. Lett. (SPL), vol. 23, pp. 708-712, 2016, pp. 708-712.
-
(2016)
IEEE Signal Process. Lett. (SPL)
, vol.23
, pp. 708-712
-
-
Xu, G.1
Wu, H.Z.2
Shi, Y.Q.3
-
25
-
-
0003477718
-
-
M. A. Arbib, Ed. Cambridge, MA, USA: MIT Press
-
Y. Le Cun and Y. Bengio, The Handbook of Brain Theory and Neural Networks, M. A. Arbib, Ed. Cambridge, MA, USA: MIT Press, 1998.
-
(1998)
The Handbook of Brain Theory and Neural Networks
-
-
Le Cun, Y.1
Bengio, Y.2
-
26
-
-
69349090197
-
Learning deep architectures for ai
-
Y. Bengio, "Learning Deep Architectures for AI," Found. Trends Mach. Learn., vol. 2, pp. 1-127, 2009.
-
(2009)
Found. Trends Mach. Learn.
, vol.2
, pp. 1-127
-
-
Bengio, Y.1
-
27
-
-
79955401108
-
The Dresden image database for benchmarking digital image forensics
-
T. Gloe and R. Böhme, "The Dresden image database for benchmarking digital image forensics," J. Digit. Forensic Practice, vol. 3, pp. 150-159, 2010.
-
(2010)
J. Digit. Forensic Practice
, vol.3
, pp. 150-159
-
-
Gloe, T.1
Böhme, R.2
-
28
-
-
84913580146
-
Caffe: Convolutional architecture for fast feature embedding
-
Y. Jia et al., "Caffe: Convolutional architecture for fast feature embedding," ACM Int. Conf. Multimedia (ACM-MM), pp. 675-678, (2014). [Online]. Available: http://dl.acm.org/citation.cfm?id=2654889.
-
(2014)
ACM Int. Conf. Multimedia (ACM-MM)
, pp. 675-678
-
-
Jia, Y.1
-
29
-
-
84860434682
-
Rich models for steganalysis of digital images
-
Jun
-
J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovsky, J.2
-
30
-
-
49549105094
-
Blind identification of source cell-phone model
-
Sep
-
O. Celiktutan, B. Sankur, and I. Avcibas, "Blind identification of source cell-phone model," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 553-566, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 553-566
-
-
Celiktutan, O.1
Sankur, B.2
Avcibas, I.3
-
31
-
-
84962435646
-
Feature-based forensic camera model identification
-
Berlin, Germany: Springer
-
T. Gloe, "Feature-based forensic camera model identification," in LNCS Transactions on Data Hiding and Multimedia Security VIII. Berlin, Germany: Springer, 2012, vol. 7228, pp. 42-62.
-
(2012)
LNCS Transactions on Data Hiding and Multimedia Security VIII
, vol.7228
, pp. 42-62
-
-
Gloe, T.1
|