Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
暂无分享,去创建一个
[1] Mo Chen,et al. Identifying Common Source Digital Camera from Image Pairs , 2007, 2007 IEEE International Conference on Image Processing.
[2] Stefan Katzenbeisser,et al. Cell phone camera ballistics: attacks and countermeasures , 2010, Electronic Imaging.
[3] Greg J. Bloy. Blind Camera Fingerprinting and Image Clustering , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[4] Miroslav Goljan,et al. Digital Camera Identification from Images - Estimating False Acceptance Probability , 2008, IWDW.
[5] Rainer Böhme,et al. Can we trust digital image forensics? , 2007, ACM Multimedia.
[6] Mo Chen,et al. Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Transactions on Information Forensics and Security.
[7] Mo Chen,et al. Digital imaging sensor identification (further study) , 2007, Electronic Imaging.
[8] Jan Lukás,et al. Determining digital image origin using sensor imperfections , 2005, IS&T/SPIE Electronic Imaging.
[9] Jan Lukás,et al. Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.
[10] Husrev T. Sencar,et al. A study of the robustness of PRNU-based camera identification , 2009, Electronic Imaging.
[11] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[12] Jessica J. Fridrich,et al. Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.
[13] Rainer Böhme,et al. Synthesis of color filter array pattern in digital images , 2009, Electronic Imaging.
[14] Kannan Ramchandran,et al. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[15] Bülent Sankur,et al. Blind Identification of Source Cell-Phone Model , 2008, IEEE Transactions on Information Forensics and Security.