-
1
-
-
84929134231
-
-
New York, NY: Springer New York [Online]. Available
-
R. Böhme and M. Kirchner, Counter-Forensics: Attacking Image Forensics. New York, NY: Springer New York, 2013, pp. 327-366. [Online]. Available: http://dx.doi.org/10.1007/978-1-4614-0757-7 12
-
(2013)
Counter-Forensics: Attacking Image Forensics
, pp. 327-366
-
-
Böhme, R.1
Kirchner, M.2
-
2
-
-
84890463324
-
Coping with the enemy: Advances in adversary-aware signal processing
-
M. Barni and F. Pérez-Gonzàlez, "Coping with the enemy: Advances in adversary-aware signal processing," in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, May 2013, pp. 8682-8686.
-
(2013)
2013 IEEE International Conference on Acoustics, Speech and Signal Processing, May
, pp. 8682-8686
-
-
Barni, M.1
Pérez-Gonzàlez, F.2
-
3
-
-
35048816032
-
Statistical tools for digital forensics
-
[Online]
-
A. C. Popescu and H. Farid, "Statistical tools for digital forensics," in Proceedings of the 6th International Conference on Information Hiding, ser. IH'04. Berlin, Heidelberg: Springer-Verlag, 2004, pp. 128-147. [Online]. Available: http://dx.doi.org/10.1007/ 978-3-540-30114-1 10
-
(2004)
Proceedings of the 6th International Conference on Information Hiding, Ser. IH'04. Berlin, Heidelberg: Springer-Verlag
, pp. 128-147
-
-
Popescu, A.C.1
Farid, H.2
-
4
-
-
84890447451
-
Antiforensics attacks to Benford's law for the detection of double compressed images
-
S. Milani, M. Tagliasacchi, and S. Tubaro, "Antiforensics attacks to Benford's law for the detection of double compressed images," in Proceedings of ICASSP 2013, IEEE International Conference on Acoustics, Speech and Signal Processing, May 2013, pp. 3053-3057.
-
(2013)
Proceedings of ICASSP 2013, IEEE International Conference on Acoustics, Speech and Signal Processing, May
, pp. 3053-3057
-
-
Milani, S.1
Tagliasacchi, M.2
Tubaro, S.3
-
5
-
-
84905222835
-
Transportation-theoretic image counterforensics to first significant digit histogram forensics
-
C. Pasquini, P. Comesaña-Alfaro, F. Pérez-González, and G. Boato, "Transportation-theoretic image counterforensics to first significant digit histogram forensics," in 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2014, pp. 2699-2703.
-
(2014)
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May
, pp. 2699-2703
-
-
Pasquini, C.1
Comesaña-Alfaro, P.2
Pérez-González, F.3
Boato, G.4
-
6
-
-
58049107658
-
Detecting doubly compressed JPEG images by using mode based first digit features
-
B. Li, Y. Q. Shi, and J. Huang, "Detecting doubly compressed JPEG images by using mode based first digit features," in Multimedia Signal Processing, 2008 IEEE 10th Workshop on. IEEE, 2008, pp. 730-735.
-
(2008)
Multimedia Signal Processing, 2008 IEEE 10th Workshop On. IEEE
, pp. 730-735
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
7
-
-
85014990053
-
Universal counterforensics of multiple compressed JPEG images
-
M. Barni, M. Fontani, and B. Tondi, "Universal counterforensics of multiple compressed JPEG images," in International Workshop on Digital Watermarking. Springer, 2014, pp. 31-46.
-
(2014)
International Workshop on Digital Watermarking. Springer
, pp. 31-46
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
8
-
-
84867466942
-
A universal technique to hide traces of histogram-based image manipulations
-
[Online]
-
--, "A universal technique to hide traces of histogram-based image manipulations," in Proceedings of the on Multimedia and Security, ser. MMSec '12. New York, NY, USA: ACM, 2012, pp. 97-104. [Online]. Available: http://doi.acm.org/10.1145/2361407.2361424
-
(2012)
Proceedings of the on Multimedia and Security, Ser. MMSec '12. New York, NY, USA: ACM
, pp. 97-104
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
9
-
-
77955699524
-
A machine learning based scheme for double JPEG compression detection
-
C. Chen, Y. Q. Shi, and W. Su, "A machine learning based scheme for double JPEG compression detection," in 19th International Conference on Pattern Recognition, 2008. ICPR 2008. IEEE, 2008, pp. 1-4.
-
(2008)
19th International Conference on Pattern Recognition, 2008. ICPR 2008. IEEE
, pp. 1-4
-
-
Chen, C.1
Shi, Y.Q.2
Su, W.3
-
10
-
-
85015106286
-
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder
-
M. Barni, Z. Chen, and B. Tondi, "Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder," in 2016 IEEE International Workshop on Information Foren-sics and Security (WIFS). IEEE, 2016, pp. 1-6.
-
(2016)
2016 IEEE International Workshop on Information Foren-sics and Security (WIFS). IEEE
, pp. 1-6
-
-
Barni, M.1
Chen, Z.2
Tondi, B.3
-
11
-
-
84860434682
-
Rich models for steganalysis of digital images
-
J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovsky, J.2
-
13
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 432-444, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovsky, J.1
Fridrich, J.2
Holub, V.3
-
14
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
June
-
T. Pevny, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 215-224, June 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
15
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
650503-650
-
T. Pevny and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis," Proc. SPIE, vol. 6505, pp. 650 503-650 503-13, 2007.
-
(2007)
Proc. SPIE
, vol.6505
, pp. 503-513
-
-
Pevny, T.1
Fridrich, J.2
-
16
-
-
0032626656
-
Spatially adaptive statistical modeling of Wavelet image coefficients and its application to denoising
-
IEEE
-
M. K. Mihcak, I. Kozintsev, and K. Ramchandran, "Spatially adaptive statistical modeling of Wavelet image coefficients and its application to denoising," in 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1999., vol. 6. IEEE, 1999, pp. 3253-3256.
-
(1999)
1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1999
, vol.6
, pp. 3253-3256
-
-
Mihcak, M.K.1
Kozintsev, I.2
Ramchandran, K.3
-
17
-
-
78651088596
-
Undetectable image tampering through JPEG compression anti-forensics
-
M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. R. Liu, "Undetectable image tampering through JPEG compression anti-forensics," in 2010 17th IEEE International Conference on Image Processing (ICIP). IEEE, 2010, pp. 2109-2112.
-
(2010)
2010 17th IEEE International Conference on Image Processing (ICIP). IEEE
, pp. 2109-2112
-
-
Stamm, M.C.1
Tjoa, S.K.2
Lin, W.S.3
Liu, K.R.4
-
18
-
-
80051643956
-
The cost of JPEG compression anti-forensics
-
G. Valenzise, M. Tagliasacchi, and S. Tubaro, "The cost of JPEG compression anti-forensics," in 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2011, pp. 1884-1887.
-
(2011)
2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE
, pp. 1884-1887
-
-
Valenzise, G.1
Tagliasacchi, M.2
Tubaro, S.3
-
19
-
-
84942523029
-
Raise: A raw images dataset for digital image forensics
-
[Online]
-
D.-T. Dang-Nguyen, C. Pasquini, V. Conotter, and G. Boato, "Raise: A raw images dataset for digital image forensics," in Proceedings of the 6th ACM Multimedia Systems Conference, ser. MMSys '15. New York, NY, USA: ACM, 2015, pp. 219-224. [Online]. Available: http://doi.acm.org/10.1145/2713168.2713194
-
(2015)
Proceedings of the 6th ACM Multimedia Systems Conference, Ser. MMSys '15. New York, NY, USA: ACM
, pp. 219-224
-
-
Dang-Nguyen, D.-T.1
Pasquini, C.2
Conotter, V.3
Boato, G.4
-
20
-
-
77954723646
-
The 'Dresden Image Database' for benchmarking digital image forensics
-
[Online]
-
T. Gloe and R. Böhme, "The 'Dresden Image Database' for benchmarking digital image forensics," in Proceedings of the 2010 ACM Symposium on Applied Computing, ser. SAC '10. New York, NY, USA: ACM, 2010, pp. 1584-1590. [Online]. Available: http://doi.acm.org/10.1145/1774088.1774427
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing, Ser. SAC '10. New York, NY, USA: ACM
, pp. 1584-1590
-
-
Gloe, T.1
Böhme, R.2
-
21
-
-
84900455270
-
Study of cover source mismatch in steganalysis and ways to mitigate its impact
-
J. Kodovskỳ, V. Sedighi, and J. Fridrich, "Study of cover source mismatch in steganalysis and ways to mitigate its impact," in IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 2014, pp. 90280J-90 280J.
-
(2014)
IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics
, pp. 90280J-90280J
-
-
Kodovskỳ, J.1
Sedighi, V.2
Fridrich, J.3
|