Multimedia Forensic Analysis via Intrinsic and Extrinsic Fingerprints
暂无分享,去创建一个
[1] Min Wu,et al. Rotation-, scale-, and translation-resilient public watermarking for images , 2000, Electronic Imaging.
[2] Min Wu,et al. Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[3] Shih-Fu Chang,et al. Columbia Photographic Images and Photorealistic Computer Graphics Dataset , 2005 .
[4] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[5] Nasir D. Memon,et al. Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.
[6] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[7] Gonzalo R. Arce,et al. Approximate image message authentication codes , 2001, IEEE Trans. Multim..
[8] K. J. Ray Liu,et al. Component Forensics: Theory, Methodologies, , 2009 .
[9] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[10] H. Matthies,et al. Introduction to Scientific Computing , 2006 .
[11] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[12] Min Wu,et al. Security of feature extraction in image hashing , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[13] On the security of the visual hash function , 2005, J. Electronic Imaging.
[14] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[15] Nasir D. Memon,et al. Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[16] Eric A. Wan,et al. Neural network classification: a Bayesian interpretation , 1990, IEEE Trans. Neural Networks.
[17] Vishal Monga,et al. A clustering based approach to perceptual image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[18] Chai Wah Wu,et al. On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..
[19] Ching-Chih Weng,et al. A novel automatic white balance method for digital still cameras , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[20] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[21] Min Wu,et al. Robust scanner identification based on noise features , 2007, Electronic Imaging.
[22] Ramarathnam Venkatesan,et al. The randlet transform: Applications to universal perceptual hash- ing and image identi¯cation , 2004 .
[23] Deepa Kundur,et al. Blind image deconvolution revisited , 1996 .
[24] Edward Y. Chang,et al. Color filter array recovery using a threshold-based variable number of gradients , 1999, Electronic Imaging.
[25] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.
[26] Dimitrios Hatzinakos,et al. Watermark detection for noisy interpolated images , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.
[27] J. Hiriart-Urruty,et al. Convex analysis and minimization algorithms , 1993 .
[28] K.J.R. Liu,et al. Component Forensics of Digital Cameras: A Non-Intrusive Approach , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[29] Jr. James E. Adams,et al. Interactions between color plane interpolation and other image processing functions in electronic photography , 1995, Electronic Imaging.
[30] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[31] Aaron D. Wyner,et al. The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.
[32] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[33] Mahalingam Ramkumar,et al. A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[34] R. Blahut. Theory and practice of error control codes , 1983 .
[35] B. Frieden. Science from Fisher Information , 2004 .
[36] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[37] Allen Gersho,et al. Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.
[38] Kevin E. Spaulding,et al. Color processing in digital cameras , 1998, IEEE Micro.
[39] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[40] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[41] Min Wu,et al. A pattern classification framework for theoretical analysis of component forensics , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[42] Benoit M. Macq,et al. A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[43] Min-Jen Tsai,et al. Camera/Mobile Phone Source Identification for Digital Forensics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[44] Min Wu,et al. Image acquisition forensics: Forensic analysis to identify imaging source , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[45] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[46] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[47] Siwei Lyu,et al. Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.
[48] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[49] Min Wu,et al. Noise Features for Image Tampering Detection and Steganalysis , 2007, 2007 IEEE International Conference on Image Processing.
[50] Hany Farid,et al. Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.
[51] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[52] Olivier Pironneau,et al. Introduction to Scientific Computing , 1998 .
[53] B. Sankur,et al. Source Cell-phone Identification , 2006, 2006 IEEE 14th Signal Processing and Communications Applications.
[54] Jan Lukás,et al. Determining digital image origin using sensor imperfections , 2005, IS&T/SPIE Electronic Imaging.
[55] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[56] ラシュコフスキー,オレグ,et al. Software correction of the image distortion in a digital camera , 2000 .
[57] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.
[58] Min-Jen Tsai,et al. USING Image Features to Identify Camera Sources , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[59] Deepa Kundur,et al. Blind Image Deconvolution , 2001 .
[60] Michael H. Brill,et al. Color appearance models , 1998 .
[61] Jean-Didier Legat,et al. RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.
[62] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[63] Tiago Rosa Maria Paula Queluz. Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[64] Mohan S. Kankanhalli,et al. A Survey on Digital Camera Image Forensic Methods , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[65] Edmund Y. Lam,et al. Source camera identification using footprints from lens aberration , 2006, Electronic Imaging.
[66] Min Wu,et al. Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..
[67] Deepa Kundur,et al. A novel blind deconvolution scheme for image restoration using recursive filtering , 1998, IEEE Trans. Signal Process..
[68] Chih-Jen Lin,et al. Probability Estimates for Multi-class Classification by Pairwise Coupling , 2003, J. Mach. Learn. Res..
[69] Zeno Geradts,et al. Methods for identification of images acquired with digital cameras , 2001, SPIE Optics East.
[70] Jan Lukás,et al. Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.
[71] Deepa Kundur,et al. Statistical Invisibility for Collusion-Resistant , 2005 .
[72] Thierry Pun,et al. Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.
[73] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[74] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[75] Shih-Fu Chang,et al. Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.
[76] Shu Lin,et al. An Extendible Hash for Multi-Precision Similarity Querying of Image Databases , 2001, VLDB.
[77] Glenn Healey,et al. Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..
[78] Aarnout Brombacher,et al. Probability... , 2009, Qual. Reliab. Eng. Int..
[79] Andreas Uhl,et al. Analysis of a wavelet-based robust hash algorithm , 2004, IS&T/SPIE Electronic Imaging.
[80] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[81] Min Wu,et al. Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[82] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[83] R. Nosofsky. Tests of an exemplar model for relating perceptual classification and recognition memory. , 1991, Journal of experimental psychology. Human perception and performance.
[84] Chiou-Ting Hsu,et al. Source Camera Identification Based on Camera Gain Histogram , 2007, 2007 IEEE International Conference on Image Processing.
[85] John Platt,et al. Probabilistic Outputs for Support vector Machines and Comparisons to Regularized Likelihood Methods , 1999 .
[86] Ramarathnam Venkatesan,et al. A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding , 2001, Information Hiding.
[87] Siwei Lyu,et al. How realistic is photorealistic , 2005 .
[88] Jessica J. Fridrich. Visual hash for oblivious watermarking , 2000, Electronic Imaging.
[89] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[90] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[91] Bülent Sankur,et al. Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.
[92] Hany Farid,et al. Blind inverse gamma correction , 2001, IEEE Trans. Image Process..
[93] David G. Stork,et al. Pattern classification, 2nd Edition , 2000 .
[94] Yizhen Huang,et al. Image Based Source Camera Identification using Demosaicking , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[95] Ramarathnam Venkatesan,et al. New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.
[96] Jan P. Allebach,et al. A survey of forensic characterization methods for physical devices , 2006, Digit. Investig..
[97] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[98] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[99] Min Wu,et al. Image Tampering Identification using Blind Deconvolution , 2006, 2006 International Conference on Image Processing.
[100] Mark S. Drew,et al. Diagonal transforms suffice for color constancy , 1993, 1993 (4th) International Conference on Computer Vision.
[101] Bo Zhang,et al. An efficient and effective region-based image retrieval framework , 2004, IEEE Transactions on Image Processing.
[102] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[103] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[104] Jan-Olof Eklundh,et al. Automatic estimation of the projected light source direction , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[105] Mark D. Fairchild,et al. Color Appearance Models , 1997, Computer Vision, A Reference Guide.
[106] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[107] Min Wu,et al. A Component Estimation Framework for Information Forensics , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.
[108] Min Wu,et al. Intrinsic fingerprints for image authentication and steganalysis , 2007, Electronic Imaging.
[109] J. C. Dainty,et al. Iterative blind deconvolution method and its applications , 1988 .
[110] A. Murat Tekalp,et al. Robust color histogram descriptors for video segment retrieval and identification , 2002, IEEE Trans. Image Process..
[111] Pierre Moulin,et al. Design and statistical analysis of a hash-aided image watermarking system , 2004, IEEE Transactions on Image Processing.
[112] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[113] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[114] Min Wu,et al. A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing , 2007, 2007 IEEE/SP 14th Workshop on Statistical Signal Processing.
[115] Raimondo Schettini,et al. Color balancing of digital photos using simple image statistics , 2004, Pattern Recognit..
[116] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[117] Kobus Barnard,et al. COMPUTATIONAL COLOR CONSTANCY: TAKING THEORY INTO PRACTICE , 1995 .
[118] Min Wu,et al. Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.
[119] D H Brainard,et al. Analysis of the retinex theory of color vision. , 1986, Journal of the Optical Society of America. A, Optics and image science.
[120] Min Wu,et al. Multimedia Data Hiding , 2003, Springer New York.
[121] Sevinc Bayram,et al. IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION , 2005 .
[122] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[123] Miodrag Potkonjak,et al. Computational forensic techniques for intellectual property protection , 2001, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[124] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[125] Bernhard P. Wrobel,et al. Multiple View Geometry in Computer Vision , 2001 .
[126] Shoji Kawamura. Capturing images with digital still cameras , 1998, IEEE Micro.
[127] D. F. Mcgahn. Copyright infringement of protected computer software: an analytical method to determine substantial similarity , 1995 .
[128] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[129] Vishal Monga,et al. Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[130] H. Farid,et al. Blind Removal of Image Non-Linearities , 2001, ICCV.
[131] Brian A. Wandell,et al. Preferred color spaces for white balancing , 2003, IS&T/SPIE Electronic Imaging.
[132] David G. Stork,et al. Pattern Classification , 1973 .
[133] Hany Farid,et al. Digital Image Ballistics from JPEG Quantization , 2006 .
[134] Kannan Ramchandran,et al. Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[135] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.