-
1
-
-
80155180685
-
Vision of the unseen: current trends and challenges in digital image and video forensics
-
Rocha, A., Scheirer, W., Boult, T., Goldenstein, S., Vision of the unseen: current trends and challenges in digital image and video forensics. ACM Comput. Surv. 43 (2011), 1–42.
-
(2011)
ACM Comput. Surv.
, vol.43
, pp. 1-42
-
-
Rocha, A.1
Scheirer, W.2
Boult, T.3
Goldenstein, S.4
-
2
-
-
84890463165
-
An overview on image forensics
-
Piva, A., An overview on image forensics. ISRN Signal Process., 2013, 2013, 22.
-
(2013)
ISRN Signal Process.
, vol.2013
, pp. 22
-
-
Piva, A.1
-
5
-
-
44049087452
-
Detection of double-compression in JPEG images for applications in steganography
-
Pevny, T., Fridrich, J., Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forens. Secur. (TIFS) 3 (2008), 247–258.
-
(2008)
IEEE Trans. Inf. Forens. Secur. (TIFS)
, vol.3
, pp. 247-258
-
-
Pevny, T.1
Fridrich, J.2
-
7
-
-
84962773771
-
Multi-scale fusion for improved localization of malicious tampering in digital images
-
Korus, P., Huang, J., Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans. Image Process. 25 (2016), 1312–1326.
-
(2016)
IEEE Trans. Image Process.
, vol.25
, pp. 1312-1326
-
-
Korus, P.1
Huang, J.2
-
8
-
-
84944691354
-
Quantization-unaware double jpeg compression detection
-
Taimori, A., Razzazi, F., Behrad, A., Ahmadi, A., Babaie-Zadeh, M., Quantization-unaware double jpeg compression detection. J. Math. Imag. Vision 54 (2016), 269–286.
-
(2016)
J. Math. Imag. Vision
, vol.54
, pp. 269-286
-
-
Taimori, A.1
Razzazi, F.2
Behrad, A.3
Ahmadi, A.4
Babaie-Zadeh, M.5
-
9
-
-
84929251338
-
Multiple jpeg compression detection by means of benford-fourier coefficients
-
IEEE
-
Pasquini, C., Boato, G., Perez-Gonzalez, F., Multiple jpeg compression detection by means of benford-fourier coefficients. 2014 IEEE International Workshop on Information Forensics and Security (WIFS), 2014, IEEE, 113–118.
-
(2014)
2014 IEEE International Workshop on Information Forensics and Security (WIFS)
, pp. 113-118
-
-
Pasquini, C.1
Boato, G.2
Perez-Gonzalez, F.3
-
10
-
-
84998746468
-
Forensics of high quality and nearly identical jpeg image recompression
-
ACM
-
Pasquini, C., Schöttle, P., Böhme, R., Boato, G., Pèrez-Gonzàlez, F., Forensics of high quality and nearly identical jpeg image recompression. Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016, ACM, 11–21.
-
(2016)
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
, pp. 11-21
-
-
Pasquini, C.1
Schöttle, P.2
Böhme, R.3
Boato, G.4
Pèrez-Gonzàlez, F.5
-
11
-
-
67649410199
-
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
-
Lin, Z., He, J., Tang, X., Tang, C.-K., Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn. (PR) 42 (2009), 2492–2501.
-
(2009)
Pattern Recogn. (PR)
, vol.42
, pp. 2492-2501
-
-
Lin, Z.1
He, J.2
Tang, X.3
Tang, C.-K.4
-
12
-
-
80051606276
-
-
T coefficient analysis for forgery localization in JPEG images, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
-
T. Bianchi, A. De Rosa, A. Piva, Improved DCT coefficient analysis for forgery localization in JPEG images, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011.
-
(2011)
-
-
Bianchi, T.1
De Rosa, A.2
Piva, A.3
Improved, D.C.4
-
13
-
-
85172629240
-
-
Mastio, Splicing forgeries localization through the use of first digit features, in: IEEE International Workshop on Information Forensics and Security (WIFS)
-
I. Amerini, R. Becarelli, R. Caldelli, A. Del Mastio, Splicing forgeries localization through the use of first digit features, in: IEEE International Workshop on Information Forensics and Security (WIFS), 2014.
-
(2014)
-
-
Amerini, I.1
Becarelli, R.2
Caldelli, R.3
Del, A.4
-
14
-
-
84990966225
-
Double JPEG compression forensics based on a convolutional neural network
-
Wang, Q., Zhang, R., Double JPEG compression forensics based on a convolutional neural network. EURASIP J. Inf. Secur., 2016, 2016, 23.
-
(2016)
EURASIP J. Inf. Secur.
, vol.2016
, pp. 23
-
-
Wang, Q.1
Zhang, R.2
-
15
-
-
34547529764
-
A novel method for detecting cropped and recompressed image block
-
W. Luo, Z. Qu, J. Huang, G. Qiu, A novel method for detecting cropped and recompressed image block, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2007.
-
(2007)
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
-
-
Luo, W.1
Qu, Z.2
Huang, J.3
Qiu, G.4
-
16
-
-
79957470147
-
Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
-
Chen, Y.-L., Hsu, C.-T., Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans. Inf. Forens. Secur. (TIFS) 6 (2011), 396–406.
-
(2011)
IEEE Trans. Inf. Forens. Secur. (TIFS)
, vol.6
, pp. 396-406
-
-
Chen, Y.-L.1
Hsu, C.-T.2
-
17
-
-
51449116747
-
A convolutive mixing model for shifted double JPEG compression with application to passive image authentication
-
Z. Qu, W. Luo, J. Huang, A convolutive mixing model for shifted double JPEG compression with application to passive image authentication, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2008.
-
(2008)
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
-
-
Qu, Z.1
Luo, W.2
Huang, J.3
-
18
-
-
84858394859
-
Detection of nonaligned double JPEG compression based on integer periodicity maps
-
Bianchi, T., Piva, A., Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf. Forens. Secur. (TIFS) 7 (2012), 842–848.
-
(2012)
IEEE Trans. Inf. Forens. Secur. (TIFS)
, vol.7
, pp. 842-848
-
-
Bianchi, T.1
Piva, A.2
-
19
-
-
84866278567
-
Image forgery localization via block-grained analysis of jpeg artifacts
-
Bianchi, T., Piva, A., Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans. Inf. Forens. Secur. (TIFS) 7 (2012), 1003–1017.
-
(2012)
IEEE Trans. Inf. Forens. Secur. (TIFS)
, vol.7
, pp. 1003-1017
-
-
Bianchi, T.1
Piva, A.2
-
20
-
-
69349090197
-
Learning deep architectures for AI
-
Bengio, Y., Learning deep architectures for AI. Found. Trends Mach. Learn. 2 (2009), 1–127.
-
(2009)
Found. Trends Mach. Learn.
, vol.2
, pp. 1-127
-
-
Bengio, Y.1
-
21
-
-
0002263996
-
Convolutional networks for images, speech, and time-series
-
MIT Press
-
LeCun, Y., Bengio, Y., Convolutional networks for images, speech, and time-series. The Handbook of Brain Theory and Neural Networks, 1995, MIT Press.
-
(1995)
The Handbook of Brain Theory and Neural Networks
-
-
LeCun, Y.1
Bengio, Y.2
-
22
-
-
84932146885
-
Deep learning for steganalysis via convolutional neural networks
-
International Society for Optics and Photonics
-
Qian, Y., Dong, J., Wang, W., Tan, T., Deep learning for steganalysis via convolutional neural networks. SPIE/IS&T Electronic Imaging, 2015, International Society for Optics and Photonics.
-
(2015)
SPIE/IS&T Electronic Imaging
-
-
Qian, Y.1
Dong, J.2
Wang, W.3
Tan, T.4
-
23
-
-
85029499852
-
Deep learning for steganalysis is better than a rich model with an ensemble classifier, and is natively robust to the cover source-mismatch
-
L. Pibre, P. Jérôme, D. Ienco, M. Chaumont, Deep learning for steganalysis is better than a rich model with an ensemble classifier, and is natively robust to the cover source-mismatch, in: IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics, 2016.
-
(2016)
IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics
-
-
Pibre, L.1
Jérôme, P.2
Ienco, D.3
Chaumont, M.4
-
24
-
-
84964992861
-
Structural design of convolutional neural networks for steganalysis
-
Xu, G., Wu, H.Z., Shi, Y.Q., Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. (SPL) 23 (2016), 708–712.
-
(2016)
IEEE Signal Process. Lett. (SPL)
, vol.23
, pp. 708-712
-
-
Xu, G.1
Wu, H.Z.2
Shi, Y.Q.3
-
26
-
-
85015084136
-
First steps toward camera model identification with convolutional neural networks
-
Bondi, L., Baroffio, L., Guera, D., Bestagini, P., Delp, E.J., Tubaro, S., First steps toward camera model identification with convolutional neural networks. IEEE Signal Process. Lett. (SPL) 24 (2017), 259–263.
-
(2017)
IEEE Signal Process. Lett. (SPL)
, vol.24
, pp. 259-263
-
-
Bondi, L.1
Baroffio, L.2
Guera, D.3
Bestagini, P.4
Delp, E.J.5
Tubaro, S.6
-
27
-
-
84933053045
-
Median filtering forensics based on convolutional neural networks
-
Jiansheng, C., Xiangui, K., Ye, L., Wang, Z.J., Median filtering forensics based on convolutional neural networks. IEEE Signal Process. Lett. (SPL) 22 (2015), 1849–1853.
-
(2015)
IEEE Signal Process. Lett. (SPL)
, vol.22
, pp. 1849-1853
-
-
Jiansheng, C.1
Xiangui, K.2
Ye, L.3
Wang, Z.J.4
-
29
-
-
85029472603
-
Histogram layer, moving convolutional neural networks towards feature-based steganalysis
-
V. Sedighi, J. Fridrich, Histogram layer, moving convolutional neural networks towards feature-based steganalysis, in: IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics, 2017.
-
(2017)
IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics
-
-
Sedighi, V.1
Fridrich, J.2
-
31
-
-
85030224417
-
A preliminary study on convolutional neural networks for camera model identification
-
L. Bondi, D. Guera, L. Baroffio, P. Bestagini, E.J. Delp, S. Tubaro, A preliminary study on convolutional neural networks for camera model identification, in: IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics, 2017.
-
(2017)
IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics
-
-
Bondi, L.1
Guera, D.2
Baroffio, L.3
Bestagini, P.4
Delp, E.J.5
Tubaro, S.6
-
32
-
-
0032203257
-
Gradient-based learning applied to document recognition
-
LeCun, Y., Bottou, L., Bengio, Y., Haffner, P., Gradient-based learning applied to document recognition. Proc. IEEE 86 (1998), 2278–2324.
-
(1998)
Proc. IEEE
, vol.86
, pp. 2278-2324
-
-
LeCun, Y.1
Bottou, L.2
Bengio, Y.3
Haffner, P.4
-
33
-
-
0032626656
-
Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising
-
M.K. Mihcak, I. Kozintsev, K. Ramchandran, Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising, in: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 1999.
-
(1999)
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Mihcak, M.K.1
Kozintsev, I.2
Ramchandran, K.3
-
34
-
-
33744736314
-
Digital camera identification from sensor pattern noise
-
Lukáš, J., Fridrich, J., Goljan, M., Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forens. Secur. (TIFS) 1 (2006), 205–214.
-
(2006)
IEEE Trans. Inf. Forens. Secur. (TIFS)
, vol.1
, pp. 205-214
-
-
Lukáš, J.1
Fridrich, J.2
Goljan, M.3
-
35
-
-
84942523029
-
RAISE: a raw images dataset for digital image forensics
-
D.-T. Dang-Nguyen, C. Pasquini, V. Conotter, G. Boato, RAISE: a raw images dataset for digital image forensics, in: ACM Multimedia Systems Conference, 2015.
-
(2015)
ACM Multimedia Systems Conference
-
-
Dang-Nguyen, D.-T.1
Pasquini, C.2
Conotter, V.3
Boato, G.4
-
36
-
-
84908040919
-
An effective method for detecting double JPEG compression with the same quantization matrix
-
Yang, J., Xie, J., Zhu, G., Kwong, S., Shi, Y.-Q., An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Forens. Secur. 9 (2014), 1933–1942.
-
(2014)
IEEE Trans. Inf. Forens. Secur.
, vol.9
, pp. 1933-1942
-
-
Yang, J.1
Xie, J.2
Zhu, G.3
Kwong, S.4
Shi, Y.-Q.5
-
37
-
-
85029535922
-
Higher-order, adversary-aware, double jpeg-detection via selected training on attacked samples
-
IEEE
-
Barni, M., Nowroozi, E., Tondi, B., Higher-order, adversary-aware, double jpeg-detection via selected training on attacked samples. European Signal Processing Conference (EUSIPCO), to be presented at, 2017, IEEE, 113–118.
-
(2017)
European Signal Processing Conference (EUSIPCO), to be presented at
, pp. 113-118
-
-
Barni, M.1
Nowroozi, E.2
Tondi, B.3
|