Camera Obscura: Exploiting in-camera processing for image counter forensics
暂无分享,去创建一个
[1] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[2] Hui Zeng,et al. Countering anti-forensics of image resampling , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[3] Henry G. Dietz,et al. Self-contained, passive, non-contact, photoplethysmography: Real-time extraction of heart rates from live view within a Canon Powershot , 2019, Computational Imaging.
[4] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[5] Mauro Barni,et al. Image counter-forensics based on feature injection , 2014, Electronic Imaging.
[6] Mauro Barni,et al. Universal Counterforensics of Multiple Compressed JPEG Images , 2014, IWDW.
[7] Nickolas J. G. Falkner,et al. Reverse engineering the Raspberry Pi Camera V2: A study of pixel non-uniformity using a scanning electron microscope , 2019, Digit. Investig..
[8] Toby N. Tonkin,et al. Ground-Control Networks for Image Based Surface Reconstruction: An Investigation of Optimum Survey Designs Using UAV Derived Imagery and Structure-from-Motion Photogrammetry , 2016, Remote. Sens..
[9] Kurt Debattista,et al. Context-aware HDR video distribution for mobile devices , 2016, Multimedia Tools and Applications.
[10] Kulbir Singh,et al. Digital image forensic approach based on the second-order statistical analysis of CFA artifacts , 2020, Digit. Investig..
[11] Paolo Bestagini,et al. An overview on video forensics , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[12] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[13] Rainer Böhme,et al. Tamper Hiding: Defeating Image Forensics , 2007, Information Hiding.
[14] Heiko Schuldt,et al. The PS-Battles Dataset - an Image Collection for Image Manipulation Detection , 2018, ArXiv.
[15] Stefano Tubaro,et al. The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[16] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[17] Jeremy Kyejo. Software Enhancement for Creative Video Production and Photography with Digital Cameras , 2016 .
[18] Alessandro Piva,et al. Analysis of non-aligned double JPEG artifacts for the localization of image forgeries , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[19] Andreas Uhl,et al. Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection , 2009, PSIVT.
[20] Andreas Uhl,et al. Watermarking of Raw Digital Images in Camera Firmware , 2010, IPSJ Trans. Comput. Vis. Appl..
[21] A. Piva. An Overview on Image Forensics , 2013 .
[22] Jarrod C Hodgson,et al. Precision wildlife monitoring using unmanned aerial vehicles , 2016, Scientific Reports.
[23] Zhang Xiong,et al. JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.
[24] Eli Shechtman,et al. Patch-based high dynamic range video , 2013, ACM Trans. Graph..
[25] Venkata Udaya Sameer,et al. Universal Wavelet Relative Distortion: A New Counter-Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification , 2018, ISPEC.
[26] Paul J Conroy,et al. Corrigendum: N-terminal domain of Bothrops asper Myotoxin II Enhances the Activity of Endothelin Converting Enzyme-1 and Neprilysin , 2016, Scientific Reports.
[27] Àlex Palomo Domínguez. Depth map estimation using focus and aperture bracketing from a modified Canon 600D camera , 2017 .
[28] Naser El-Sheimy,et al. DESIGN AND IMPLEMENTATION OF A LOW-COST UAV-BASED MULTI-SENSOR PAYLOAD FOR RAPID-RESPONSE MAPPING APPLICATIONS , 2016 .
[29] J. Shavit,et al. Simple and rapid quantification of thrombocytes in zebrafish larvae. , 2015, Zebrafish.
[30] Hany Farid,et al. Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.
[31] P. Enderlein,et al. A protocol for the aerial survey of penguin colonies using UAVs1 , 2015 .
[32] Kulbir Singh,et al. Counter JPEG Anti-Forensic Approach Based on the Second-Order Statistical Analysis , 2019, IEEE Transactions on Information Forensics and Security.
[33] Sotirios A. Tsaftaris,et al. Plant phenotyping with low cost digital cameras and image analytics , 2009, ITEE.