An information theoretic framework for order of operations forensics
暂无分享,去创建一个
[1] K. J. Ray Liu,et al. Compressive Sensing Forensics , 2015, IEEE Transactions on Information Forensics and Security.
[2] Matthias Kirchner,et al. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.
[3] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[4] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[5] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[6] Hanghang Tong,et al. Blur detection for digital images using wavelet transform , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[7] ZhaoYao,et al. Contrast Enhancement-Based Forensics in Digital Images , 2014 .
[8] Alessandro Piva,et al. Reverse engineering of double compressed images in the presence of contrast enhancement , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[9] K. J. Ray Liu,et al. Information theoretical limit of compression forensics , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[10] Shijian Lu,et al. Blurred image region detection and classification , 2011, ACM Multimedia.
[11] Yao Zhao,et al. Edge-based Blur Metric for Tamper Detection , 2010, J. Inf. Hiding Multim. Signal Process..
[12] K. J. Ray Liu,et al. Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.
[13] Yao Zhao,et al. Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.
[14] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[15] Bin Li,et al. Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[16] Alessandro Piva,et al. Reverse engineering of double JPEG compression in the presence of image resizing , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[17] Pedro Comesaña. Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[18] K. J. Ray Liu,et al. Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.
[19] Fernando Pérez-González,et al. Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images , 2015, IEEE Transactions on Information Forensics and Security.
[20] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[21] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[22] K. J. Ray Liu,et al. Forensically determining the order of signal processing operations , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).