Vision of the unseen: Current trends and challenges in digital image and video forensics
暂无分享,去创建一个
Anderson Rocha | Siome Goldenstein | Terrance E. Boult | Walter J. Scheirer | W. Scheirer | T. Boult | S. Goldenstein | A. Rocha
[1] B. Coe. The Birth of Photography: The Story of the Formative Years, 1800-1900 , 1976 .
[2] 共立出版株式会社. コンピュータ・サイエンス : ACM computing surveys , 1978 .
[3] P. Vaidyanathan. Quadrature mirror filter banks, M-band extensions and perfect-reconstruction techniques , 1987, IEEE ASSP Magazine.
[4] C. Morandi,et al. Registration of Translated and Rotated Images Using Finite Fourier Transforms , 1987, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[5] T. Newkirk. Listening In , 1992 .
[6] P. Reeves. Mission impossible? , 1993, Health services management.
[7] Jitendra Malik,et al. Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[8] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[9] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[10] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[11] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[12] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[13] Rafik A. Goubran,et al. Robust voice activity detection using higher-order statistics in the LPC residual domain , 2001, IEEE Trans. Speech Audio Process..
[14] Zeno Geradts,et al. Methods for identification of images acquired with digital cameras , 2001, SPIE Optics East.
[15] Jan-Olof Eklundh,et al. Automatic estimation of the projected light source direction , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[16] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[17] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[18] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[19] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[20] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[21] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[22] Nasir D. Memon,et al. On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.
[23] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[24] Yixian Yang,et al. A LSB steganography detection algorithm , 2003, PIMRC.
[25] S. Cass. Listening in [electronic spying] , 2003 .
[26] J. Kumagai. Mission impossible? [FBI computer network] , 2003 .
[27] Li Zhi,et al. A LSB steganography detection algorithm , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[28] P. Wallich. Getting the message , 2003 .
[29] E. Delp,et al. Security, steganography, and watermarking of multimedia contents , 2004 .
[30] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[31] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[32] Rajarathnam Chandramouli,et al. Current trends in steganalysis: a critical survey , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..
[33] Heung-Yeung Shum,et al. Radiometric calibration from a single image , 2004, CVPR 2004.
[34] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[35] Shih-Fu Chang,et al. Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[36] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[37] Nasir D. Memon,et al. Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[38] Shih-Fu Chang,et al. Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.
[39] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[40] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[41] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[42] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[43] M. Eisenstein. Getting the message , 2005, Nature Methods.
[44] Harry Shum,et al. Image completion with structure propagation , 2005, ACM Trans. Graph..
[45] Chengyun Yang,et al. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[46] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[47] Rongrong Wang,et al. Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[48] Helen Pearson. Image manipulation: CSI: cell biology , 2005, Nature.
[49] Siwei Lyu,et al. How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.
[50] Nasir D. Memon,et al. Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.
[51] Siwei Lyu,et al. How realistic is photorealistic , 2005 .
[52] Tomás Pevný,et al. Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.
[53] Yun Q. Shi,et al. Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in DFT Domain , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.
[54] Sevinc Bayram,et al. IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION , 2005 .
[55] S. Paek,et al. Patient-specific embryonic stem cells derived from human SCNT blastocysts. , 2005, Science.
[56] Nasir D. Memon,et al. Image manipulation detection , 2006, J. Electronic Imaging.
[57] Ying Wang,et al. On Discrimination between Photorealistic and Photographic Images , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[58] Yun Q. Shi,et al. JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[59] Hany Farid,et al. Exposing digital forgeries in scientific images , 2006, MM&Sec '06.
[60] Yun Q. Shi,et al. Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA) , 2006, IWDW.
[61] mary-warner-marien. Photography: A Cultural History , 2006 .
[62] Yizhen Huang,et al. Image Based Source Camera Identification using Demosaicking , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[63] Min-Jen Tsai,et al. USING Image Features to Identify Camera Sources , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[64] B. Sankur,et al. Source Cell-phone Identification , 2006, 2006 IEEE 14th Signal Processing and Communications Applications.
[65] Edmund Y Lam,et al. Automatic source camera identification using the intrinsic lens radial distortion. , 2006, Optics express.
[66] Anderson Rocha,et al. Progressive Randomization for Steganalysis , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[67] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[68] Junfeng He,et al. Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.
[69] Min Wu,et al. Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[70] Hany Farid,et al. Digital doctoring: how to tell the real from the fake , 2006 .
[71] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[72] Lei Guo,et al. Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[73] Wenjun Zeng,et al. Multimedia Security Technologies for Digital Rights Management , 2006 .
[74] Nasir D. Memon,et al. Improvements on Sensor Noise Based Source Camera Identification , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[75] Sos S. Agaian,et al. Steganography anomaly detection using simple one-class classification , 2007, SPIE Defense + Commercial Sensing.
[76] Hany Farid,et al. Exposing Digital Forgeries Through Specular Highlights on the Eye , 2007, Information Hiding.
[77] Yun Q. Shi,et al. A natural image model approach to splicing detection , 2007, MM&Sec.
[78] Rainer Böhme,et al. Can we trust digital image forensics? , 2007, ACM Multimedia.
[79] Weihong Wang,et al. Exposing digital forgeries in video by detecting duplication , 2007, MM&Sec.
[80] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[81] Anderson Rocha,et al. PR: More than Meets the Eye , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[82] E. Loftus,et al. Changing history: doctored photographs affect memory for past public events , 2007 .
[83] Andrew D. Ker. Optimally weighted least-squares steganalysis , 2007, Electronic Imaging.
[84] Mo Chen,et al. Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries , 2007, Information Hiding.
[85] Andrew D. Ker. The ultimate steganalysis benchmark? , 2007, MM&Sec.
[86] Nasir D. Memon,et al. New Features to Identify Computer Generated Images , 2007, 2007 IEEE International Conference on Image Processing.
[87] Weihong Wang,et al. Exposing Digital Forgeries in Interlaced and Deinterlaced Video , 2007, IEEE Transactions on Information Forensics and Security.
[88] Husrev T. Sencar,et al. Overview of State-of-the-Art in Digital Image Forensics , 2007 .
[89] Mo Chen,et al. Source digital camcorder identification using sensor photo response non-uniformity , 2007, Electronic Imaging.
[90] Tian-Tsong Ng,et al. Recaptured photo detection using specularity distribution , 2008, 2008 15th IEEE International Conference on Image Processing.
[91] Rainer Böhme,et al. Weighted Stego-Image Steganalysis for JPEG Covers , 2008, Information Hiding.
[92] Paul Debevec. Rendering synthetic objects into real scenes: bridging traditional and image-based graphics with global illumination and high dynamic range photography , 2008, SIGGRAPH Classes.
[93] Tsuhan Chen,et al. Image authentication by detecting traces of demosaicing , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[94] Jan Lukás,et al. Camera identification from printed images , 2008, Electronic Imaging.
[95] Nasir D. Memon,et al. Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust , 2008, IEEE Transactions on Information Forensics and Security.
[96] Anderson Rocha,et al. The Unseen Challenge data sets , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[97] Anderson Rocha,et al. Steganography and Steganalysis in Digital Multimedia: Hype or Hallelujah? , 2008, RITA.
[98] Ton Kalker,et al. Chapter 12 – Steganography , 2008 .
[99] Shih-Fu Chang,et al. Identifying and prefiltering images , 2009, IEEE Signal Processing Magazine.
[100] Anderson Rocha,et al. High-profile forensic analysis of images , 2009, ICDP.
[101] K. J. Ray Liu,et al. Component forensics , 2009, IEEE Signal Processing Magazine.
[102] Weihong Wang,et al. Digital video forensics , 2009 .
[103] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[104] Anderson Rocha,et al. Progressive randomization: Seeing the unseen , 2010, Comput. Vis. Image Underst..
[105] S. Peters. Listening In , 2010, PACLIC.
[106] B. Alberts. Editorial expression of concern. , 2011, Science.
[107] B. Alberts. Editorial Expression of Concern , 2011, Science.
[108] Rafael C. Gonzales,et al. Digital Image Processing -3/E. , 2012 .
[109] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[110] Alin C. Popescu,et al. Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .