Digital Image Authentication From JPEG Headers
暂无分享,去创建一个
[1] Rongrong Wang,et al. Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[2] Hany Farid. Digital Image Ballistics from JPEG Quantization: A Followup Study , 2008 .
[3] Yuting Su,et al. Detection of Double-Compression in JPEG2000 Images , 2008, 2008 Second International Symposium on Intelligent Information Technology Application.
[4] H. Farid. A Survey of Image Forgery Detection , 2008 .
[5] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[6] Christian Riess,et al. Scene Illumination as an Indicator of Image Manipulation , 2010, Information Hiding.
[7] Sevinc Bayram,et al. A SURVEY OF COPY-MOVE FORGERY DETECTION TECHNIQUES , 2008 .
[8] Hany Farid,et al. Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.
[9] K. J. Ray Liu,et al. Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.
[10] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[11] Jessica J. Fridrich,et al. Managing a large database of camera fingerprints , 2010, Electronic Imaging.
[12] Matthias Kirchner. Efficient estimation of CFA pattern configuration in digital camera images , 2010, Electronic Imaging.
[13] Jiwu Huang,et al. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[14] Hany Farid,et al. Digital Image Ballistics from JPEG Quantization , 2006 .
[15] Tom E. Bishop,et al. Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[16] Matthias Kirchner,et al. On resampling detection in re-compressed images , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[17] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[18] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[19] Jessica J. Fridrich,et al. Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.
[20] Babak Mahdian,et al. Detecting double compressed JPEG images , 2009, ICDP.
[21] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[22] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[23] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1992 .
[24] Xiaochun Cao,et al. Detecting photographic composites using shadows , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[25] Hany Farid,et al. Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[26] Hany Farid,et al. Digital image authentication from thumbnails , 2010, Electronic Imaging.
[27] Paul Alvarez,et al. Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis , 2004, Int. J. Digit. EVid..
[28] Thomas Gloe,et al. Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics , 2010, Electronic Imaging.
[29] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[30] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[31] Jesse D. Kornblum. Using JPEG quantization tables to identify imagery processed by software , 2008, Digit. Investig..
[32] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[33] Nasir D. Memon,et al. Efficient techniques for sensor fingerprint matching in large image and video databases , 2010, Electronic Imaging.
[34] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[35] Matthew Sorell. Conditions for effective detection and identification of primary quantization of re-quantized JPEG images , 2008, e-Forensics '08.