-
1
-
-
84873623957
-
Counter-forensics: Attacking image forensics
-
H. T. Sencar and N. Memon, Eds Springer Berlin /Heidelberg
-
R. Böhme and M. Kirchner, "Counter-forensics: Attacking image forensics, " in Digital Image Forensics, H. T. Sencar and N. Memon, Eds. Springer Berlin /Heidelberg, 2012.
-
(2012)
Digital Image Forensics
-
-
Böhme, R.1
Kirchner, M.2
-
2
-
-
84867466942
-
A universal technique to hide traces of histogram-based image manipulations
-
Coventry, UK 6-7 September
-
M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations, " in Proc. of the ACM Multimedia and Security Workshop, Coventry, UK, 6-7 September 2012, pp. 97-104.
-
(2012)
Proc. of the ACM Multimedia and Security Workshop
, pp. 97-104
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
3
-
-
84890463324
-
Coping with the enemy: Advances in adversary-Aware signal processing
-
Vancouver, Canada, 26-31 May 2013
-
M. Barni and F. Pérez-González, "Coping with the enemy: Advances in adversary-Aware signal processing, " in ICASSP 2013, IEEE Int. Conf. Acoustics, Speech and Signal Processing, Vancouver, Canada, 26-31 May 2013, pp. 8682-8686.
-
ICASSP 2013 IEEE Int. Conf. Acoustics, Speech and Signal Processing
, pp. 8682-8686
-
-
Barni, M.1
Pérez-González, F.2
-
4
-
-
84873669138
-
The source identification game: An informationtheoretic perspective
-
March
-
M. Barni and B. Tondi, "The source identification game: An informationtheoretic perspective, " IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 450-463, March 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.3
, pp. 450-463
-
-
Barni, M.1
Tondi, B.2
-
5
-
-
84864034865
-
Forensics vs anti-forensics: A decision and game theoretic framework
-
Kyoto, Japan, 25-30 March 2012
-
M. C. Stamm, W. S. Lin, and K. J. R. Liu, "Forensics vs anti-forensics: A decision and game theoretic framework, " in Proc. of ICASSP 2012, IEEE Int. Conf. Acoustics, Speech and Signal Processing, Kyoto, Japan, 25-30 March 2012.
-
Proc. of ICASSP 2012, IEEE Int. Conf. Acoustics, Speech and Signal Processing
-
-
Stamm, M.C.1
Lin, W.S.2
Liu, K.J.R.3
-
6
-
-
84897811662
-
Mixed-strategy Nash equilibrium in the camera source identification game
-
H. Zeng, X. Kang, and J. Huang, "Mixed-strategy Nash equilibrium in the camera source identification game, " in Proc. of 20th IEEE International Conference on Image Processing (ICIP), 2013, pp. 4472-4476.
-
(2013)
Proc. of 20th IEEE International Conference on Image Processing (ICIP)
, pp. 4472-4476
-
-
Zeng, H.1
Kang, X.2
Huang, J.3
-
7
-
-
84888338964
-
Anti-forensics and countermeasures of electrical network frequency analysis
-
Dec
-
W. H. Chuang, R. Garg, and M. Wu, "Anti-forensics and countermeasures of electrical network frequency analysis, " IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 2073-2088, Dec 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.12
, pp. 2073-2088
-
-
Chuang, W.H.1
Garg, R.2
Wu, M.3
-
8
-
-
84932112298
-
Counterforensics in machine learning based forgery detection
-
International Society for Optics and Photonics
-
F. Marra, G. Poggi, F. Roli, C. Sansone, and L. Verdoliva, "Counterforensics in machine learning based forgery detection, " in SPIE/IS&T Electronic Imaging. International Society for Optics and Photonics, 2015, pp. 94 090L-94 090L.
-
(2015)
SPIE/ IS&T Electronic Imaging
, pp. 94090L-94090L
-
-
Marra, F.1
Poggi, G.2
Roli, F.3
Sansone, C.4
Verdoliva, L.5
-
9
-
-
85014990053
-
Universal counterforensics of multiple compressed jpeg images
-
Springer
-
M. Barni, M. Fontani, and B. Tondi, "Universal counterforensics of multiple compressed jpeg images, " in Digital-Forensics and Watermarking. Springer, 2014, pp. 31-46.
-
(2014)
Digital-Forensics and Watermarking
, pp. 31-46
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
11
-
-
35248884299
-
Steganalysis of jpeg images: Breaking the f5 algorithm
-
Springer
-
J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of jpeg images: Breaking the f5 algorithm, " in Information Hiding. Springer, 2003, pp. 310-323.
-
(2003)
Information Hiding
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
12
-
-
84867616246
-
Discriminating multiple jpeg compression using first digit features
-
March 2012
-
S. Milani, M. Tagliasacchi, and S. Tubaro, "Discriminating multiple jpeg compression using first digit features, " in 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), March 2012, pp. 2253-2256.
-
2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 2253-2256
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
13
-
-
44049087452
-
Detection of double-compression in jpeg images for applications in steganography
-
June
-
T. Pevny and J. Fridrich, "Detection of double-compression in jpeg images for applications in steganography, " IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 247-258, June 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevny, T.1
Fridrich, J.2
-
14
-
-
84979888094
-
Source distinguishability under distortionlimited attack: An optimal transport perspective
-
Oct
-
M. Barni and B. Tondi, "Source distinguishability under distortionlimited attack: An optimal transport perspective, " IEEE Transactions on Information Forensics and Security, vol. 11, no. 10, pp. 2145-2159, Oct 2016.
-
(2016)
IEEE Transactions on Information Forensics and Security
, vol.11
, Issue.10
, pp. 2145-2159
-
-
Barni, M.1
Tondi, B.2
-
16
-
-
84905222835
-
Transportation-Theoretic image counterforensics to first significant digit histogram forensics
-
May
-
C. Pasquini, P. Comesaa-Alfaro, F. Prez-Gonzlez, and G. Boato, "Transportation-Theoretic image counterforensics to first significant digit histogram forensics, " in 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2014, pp. 2699-2703.
-
(2014)
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 2699-2703
-
-
Pasquini, C.1
Comesaa-Alfaro, P.2
Prez-Gonzlez, F.3
Boato, G.4
-
17
-
-
0034313871
-
The earth movers distance as a metric for image retrieval
-
November
-
Y. Rubner, C. Tomasi, and L. J. Guibas, "The earth movers distance as a metric for image retrieval, " Int. J. Comput. Vision, vol. 40, no. 2, pp. 99-121, November 2000.
-
(2000)
Int. J. Comput. Vision
, vol.40
, Issue.2
, pp. 99-121
-
-
Rubner, Y.1
Tomasi, C.2
Guibas, L.J.3
-
18
-
-
0001724641
-
On simple linear programming problems
-
World Scientific
-
A. Hoffman, "On simple linear programming problems, " in Proceedings of Symposia in Pure Mathematics, vol. 7. World Scientific, 1963, pp. 317-327.
-
(1963)
Proceedings of Symposia in Pure Mathematics
, vol.7
, pp. 317-327
-
-
Hoffman, A.1
-
20
-
-
85076054853
-
DCT quantization matrices visually optimized for individual images
-
International Society for Optics and Photonics
-
A. B. Watson, "DCT quantization matrices visually optimized for individual images, " in Proc. of IS&T/SPIEs Symposium on Electronic Imaging: Science and Technology. International Society for Optics and Photonics, 1993, pp. 202-216.
-
(1993)
Proc. of IS&T/SPIEs Symposium on Electronic Imaging: Science and Technology
, pp. 202-216
-
-
Watson, A.B.1
-
21
-
-
84942523029
-
Raise: A raw images dataset for digital image forensics
-
ser. MMSys 15. New York, NY, USA: ACM. [Online]. Available
-
D.-T. Dang-Nguyen, C. Pasquini, V. Conotter, and G. Boato, "Raise: A raw images dataset for digital image forensics, " in Proceedings of the 6th ACM Multimedia Systems Conference, ser. MMSys 15. New York, NY, USA: ACM, 2015, pp. 219-224. [Online]. Available: http://doi.acm.org/10.1145/2713168.2713194
-
(2015)
Proceedings of the 6th ACM Multimedia Systems Conference
, pp. 219-224
-
-
Dang-Nguyen, D.-T.1
Pasquini, C.2
Conotter, V.3
Boato, G.4
-
22
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity, " IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
-
23
-
-
84890447451
-
Antiforensics attacks to benfords law for the detection of double compressed images
-
May
-
S. Milani, M. Tagliasacchi, and S. Tubaro, "Antiforensics attacks to benfords law for the detection of double compressed images, " in Proc. of ICASSP 2013, IEEE International Conference on Acoustics, Speech and Signal Processing, May 2013, pp. 3053-3057.
-
(2013)
Proc. of ICASSP 2013 IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 3053-3057
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
24
-
-
84884967629
-
Anti-spoofing in action: Joint operation with a verification system
-
June
-
I. Chingovska, A. Anjos, and S. Marcel, "Anti-spoofing in action: Joint operation with a verification system, " in Computer Vision and Pattern Recognition Workshops (CVPRW), 2013 IEEE Conference on, June 2013, pp. 98-104.
-
(2013)
Computer Vision and Pattern Recognition Workshops (CVPRW) 2013 IEEE Conference on
, pp. 98-104
-
-
Chingovska, I.1
Anjos, A.2
Marcel, S.3
|