메뉴 건너뛰기




Volumn , Issue , 2017, Pages

Adversary-Aware, data-driven detection of double JPEG compression: How to make counter-forensics harder

Author keywords

[No Author keywords available]

Indexed keywords

ADVERSARIAL ENVIRONMENTS; COUNTER-FORENSICS; DATA-DRIVEN APPROACH; DOUBLE JPEG COMPRESSIONS; EVALUATION METHODOLOGIES; FIRST-ORDER STATISTICS; FORENSIC DETECTION; UNIVERSAL COUNTER;

EID: 85015106286     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIFS.2016.7823902     Document Type: Conference Paper
Times cited : (25)

References (24)
  • 1
    • 84873623957 scopus 로고    scopus 로고
    • Counter-forensics: Attacking image forensics
    • H. T. Sencar and N. Memon, Eds Springer Berlin /Heidelberg
    • R. Böhme and M. Kirchner, "Counter-forensics: Attacking image forensics, " in Digital Image Forensics, H. T. Sencar and N. Memon, Eds. Springer Berlin /Heidelberg, 2012.
    • (2012) Digital Image Forensics
    • Böhme, R.1    Kirchner, M.2
  • 2
    • 84867466942 scopus 로고    scopus 로고
    • A universal technique to hide traces of histogram-based image manipulations
    • Coventry, UK 6-7 September
    • M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations, " in Proc. of the ACM Multimedia and Security Workshop, Coventry, UK, 6-7 September 2012, pp. 97-104.
    • (2012) Proc. of the ACM Multimedia and Security Workshop , pp. 97-104
    • Barni, M.1    Fontani, M.2    Tondi, B.3
  • 4
    • 84873669138 scopus 로고    scopus 로고
    • The source identification game: An informationtheoretic perspective
    • March
    • M. Barni and B. Tondi, "The source identification game: An informationtheoretic perspective, " IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 450-463, March 2013.
    • (2013) IEEE Transactions on Information Forensics and Security , vol.8 , Issue.3 , pp. 450-463
    • Barni, M.1    Tondi, B.2
  • 7
    • 84888338964 scopus 로고    scopus 로고
    • Anti-forensics and countermeasures of electrical network frequency analysis
    • Dec
    • W. H. Chuang, R. Garg, and M. Wu, "Anti-forensics and countermeasures of electrical network frequency analysis, " IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 2073-2088, Dec 2013.
    • (2013) IEEE Transactions on Information Forensics and Security , vol.8 , Issue.12 , pp. 2073-2088
    • Chuang, W.H.1    Garg, R.2    Wu, M.3
  • 8
    • 84932112298 scopus 로고    scopus 로고
    • Counterforensics in machine learning based forgery detection
    • International Society for Optics and Photonics
    • F. Marra, G. Poggi, F. Roli, C. Sansone, and L. Verdoliva, "Counterforensics in machine learning based forgery detection, " in SPIE/IS&T Electronic Imaging. International Society for Optics and Photonics, 2015, pp. 94 090L-94 090L.
    • (2015) SPIE/ IS&T Electronic Imaging , pp. 94090L-94090L
    • Marra, F.1    Poggi, G.2    Roli, F.3    Sansone, C.4    Verdoliva, L.5
  • 9
    • 85014990053 scopus 로고    scopus 로고
    • Universal counterforensics of multiple compressed jpeg images
    • Springer
    • M. Barni, M. Fontani, and B. Tondi, "Universal counterforensics of multiple compressed jpeg images, " in Digital-Forensics and Watermarking. Springer, 2014, pp. 31-46.
    • (2014) Digital-Forensics and Watermarking , pp. 31-46
    • Barni, M.1    Fontani, M.2    Tondi, B.3
  • 11
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of jpeg images: Breaking the f5 algorithm
    • Springer
    • J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of jpeg images: Breaking the f5 algorithm, " in Information Hiding. Springer, 2003, pp. 310-323.
    • (2003) Information Hiding , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 13
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression in jpeg images for applications in steganography
    • June
    • T. Pevny and J. Fridrich, "Detection of double-compression in jpeg images for applications in steganography, " IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 247-258, June 2008.
    • (2008) IEEE Transactions on Information Forensics and Security , vol.3 , Issue.2 , pp. 247-258
    • Pevny, T.1    Fridrich, J.2
  • 14
    • 84979888094 scopus 로고    scopus 로고
    • Source distinguishability under distortionlimited attack: An optimal transport perspective
    • Oct
    • M. Barni and B. Tondi, "Source distinguishability under distortionlimited attack: An optimal transport perspective, " IEEE Transactions on Information Forensics and Security, vol. 11, no. 10, pp. 2145-2159, Oct 2016.
    • (2016) IEEE Transactions on Information Forensics and Security , vol.11 , Issue.10 , pp. 2145-2159
    • Barni, M.1    Tondi, B.2
  • 17
    • 0034313871 scopus 로고    scopus 로고
    • The earth movers distance as a metric for image retrieval
    • November
    • Y. Rubner, C. Tomasi, and L. J. Guibas, "The earth movers distance as a metric for image retrieval, " Int. J. Comput. Vision, vol. 40, no. 2, pp. 99-121, November 2000.
    • (2000) Int. J. Comput. Vision , vol.40 , Issue.2 , pp. 99-121
    • Rubner, Y.1    Tomasi, C.2    Guibas, L.J.3
  • 18
    • 0001724641 scopus 로고
    • On simple linear programming problems
    • World Scientific
    • A. Hoffman, "On simple linear programming problems, " in Proceedings of Symposia in Pure Mathematics, vol. 7. World Scientific, 1963, pp. 317-327.
    • (1963) Proceedings of Symposia in Pure Mathematics , vol.7 , pp. 317-327
    • Hoffman, A.1
  • 20
    • 85076054853 scopus 로고
    • DCT quantization matrices visually optimized for individual images
    • International Society for Optics and Photonics
    • A. B. Watson, "DCT quantization matrices visually optimized for individual images, " in Proc. of IS&T/SPIEs Symposium on Electronic Imaging: Science and Technology. International Society for Optics and Photonics, 1993, pp. 202-216.
    • (1993) Proc. of IS&T/SPIEs Symposium on Electronic Imaging: Science and Technology , pp. 202-216
    • Watson, A.B.1
  • 21
    • 84942523029 scopus 로고    scopus 로고
    • Raise: A raw images dataset for digital image forensics
    • ser. MMSys 15. New York, NY, USA: ACM. [Online]. Available
    • D.-T. Dang-Nguyen, C. Pasquini, V. Conotter, and G. Boato, "Raise: A raw images dataset for digital image forensics, " in Proceedings of the 6th ACM Multimedia Systems Conference, ser. MMSys 15. New York, NY, USA: ACM, 2015, pp. 219-224. [Online]. Available: http://doi.acm.org/10.1145/2713168.2713194
    • (2015) Proceedings of the 6th ACM Multimedia Systems Conference , pp. 219-224
    • Dang-Nguyen, D.-T.1    Pasquini, C.2    Conotter, V.3    Boato, G.4
  • 22


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.