Digital image forensics via intrinsic fingerprints
暂无分享,去创建一个
[1] J. Hiriart-Urruty,et al. Convex analysis and minimization algorithms , 1993 .
[2] K.J.R. Liu,et al. Component Forensics of Digital Cameras: A Non-Intrusive Approach , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[3] Jr. James E. Adams,et al. Interactions between color plane interpolation and other image processing functions in electronic photography , 1995, Electronic Imaging.
[4] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[5] Jan Lukás,et al. Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.
[6] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[7] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[8] Min Wu,et al. Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.
[9] Min Wu,et al. Multimedia Data Hiding , 2003, Springer New York.
[10] Dimitrios Hatzinakos,et al. Watermark detection for noisy interpolated images , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.
[11] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[12] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[13] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[14] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[15] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[16] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[17] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[18] Hany Farid,et al. Blind Removal of Image Non-Linearities , 2001, ICCV.
[19] H. Farid,et al. Blind Removal of Image Non-Linearities , 2001, ICCV.
[20] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[21] Hany Farid,et al. Digital Image Ballistics from JPEG Quantization , 2006 .
[22] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[23] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[24] Mahalingam Ramkumar,et al. A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[25] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[26] Siwei Lyu,et al. How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.
[27] Deepa Kundur,et al. A novel blind deconvolution scheme for image restoration using recursive filtering , 1998, IEEE Trans. Signal Process..
[28] Min Wu,et al. Intrinsic fingerprints for image authentication and steganalysis , 2007, Electronic Imaging.
[29] J. C. Dainty,et al. Iterative blind deconvolution method and its applications , 1988 .
[30] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[31] Hany Farid,et al. Blind inverse gamma correction , 2001, IEEE Trans. Image Process..
[32] David G. Stork,et al. Pattern classification, 2nd Edition , 2000 .
[33] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[34] Hany Farid,et al. Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.
[35] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[36] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[37] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[38] Shih-Fu Chang,et al. Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.
[39] Glenn Healey,et al. Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..
[40] Kevin E. Spaulding,et al. Color processing in digital cameras , 1998, IEEE Micro.
[41] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[42] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[43] Shih-Fu Chang,et al. Columbia Photographic Images and Photorealistic Computer Graphics Dataset , 2005 .
[44] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[45] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[46] Siwei Lyu,et al. Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.
[47] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[48] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[49] Min Wu,et al. Image Tampering Identification using Blind Deconvolution , 2006, 2006 International Conference on Image Processing.