Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
暂无分享,去创建一个
[1] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[2] Mauro Barni,et al. A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence , 2013, IEEE Transactions on Information Forensics and Security.
[3] Stefano Tubaro,et al. Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.
[4] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[5] Sanjeeb Dash,et al. JPEG compression history estimation for color images , 2003, IEEE Transactions on Image Processing.
[6] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[7] Avideh Zakhor,et al. An optimization approach for removing blocking effects in transform coding , 1995, IEEE Trans. Circuits Syst. Video Technol..
[8] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[9] A. Piva. An Overview on Image Forensics , 2013 .
[10] A. Sripad,et al. A necessary and sufficient condition for quantization errors to be uniform and white , 1977 .
[11] Teddy Furon,et al. Broken Arrows , 2008, EURASIP J. Inf. Secur..
[12] Jiwu Huang,et al. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[13] Y.-L. Chen,et al. Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.
[14] Qingzhong Liu,et al. Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery , 2011, MiFor '11.
[15] Zhang Xiong,et al. JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.
[16] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[17] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[18] Sebastiano Battiato,et al. First Quantization Matrix Estimation From Double Compressed JPEG Images , 2014, IEEE Transactions on Information Forensics and Security.
[19] Mohammed Ghanbari,et al. Blockiness detection for MPEG2-coded video , 2000, IEEE Signal Processing Letters.
[20] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[21] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[22] Jiwu Huang,et al. A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[23] Rainer Böhme,et al. Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.
[24] Jiwu Huang,et al. Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.
[25] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.
[26] Ee-Chien Chang,et al. Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[27] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[28] Fernando Pérez-González,et al. Near optimal detection of quantized signals and application to JPEG forensics , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[29] Thomas Gloe. Demystifying histograms of multi-quantised DCT coefficients , 2011, 2011 IEEE International Conference on Multimedia and Expo.
[30] Rainer Böhme,et al. Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[31] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[32] Guo-Shiang Lin,et al. A Passive-Blind Forgery Detection Scheme Based on Content-Adaptive Quantization Table Estimation , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[33] Bin Li,et al. JPEG Noises beyond the First Compression Cycle , 2014, ArXiv.
[34] K. J. Ray Liu,et al. Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.
[35] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[36] Stefano Tubaro,et al. The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[37] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[38] Chiou-Ting Hsu,et al. Detecting doubly compressed images based on quantization noise model and image restoration , 2009, 2009 IEEE International Workshop on Multimedia Signal Processing.