Blind Verification of Digital Image Originality: A Statistical Approach
暂无分享,去创建一个
[1] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[2] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[3] Rongrong Wang,et al. Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[4] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[5] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[6] Jessica J. Fridrich,et al. Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.
[7] Nasir D. Memon,et al. New Features to Identify Computer Generated Images , 2007, 2007 IEEE International Conference on Image Processing.
[8] J. Fridrich,et al. Detection of double-compression for applications in steganography , 2007 .
[9] Jesse D. Kornblum. Using JPEG quantization tables to identify imagery processed by software , 2008, Digit. Investig..
[10] D. M. Hutton,et al. Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia , 2005 .
[11] Nasir D. Memon,et al. Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[12] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[13] Bülent Sankur,et al. Blind Identification of Source Cell-Phone Model , 2008, IEEE Transactions on Information Forensics and Security.
[14] K. J. Ray Liu,et al. Component forensics , 2009, IEEE Signal Processing Magazine.
[15] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[16] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[17] Yizhen Huang,et al. Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[18] Tian-Tsong Ng,et al. Camera response function signature for digital forensics - Part I: Theory and data selection , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[19] Nasir D. Memon,et al. Classification of digital camera-models based on demosaicing artifacts , 2008, Digit. Investig..
[20] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[21] Jiwu Huang,et al. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[22] Babak Mahdian,et al. A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..
[23] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[24] Babak Mahdian,et al. Detecting double compressed JPEG images , 2009, ICDP.
[25] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[26] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[27] Hany Farid,et al. Digital image authentication from thumbnails , 2010, Electronic Imaging.
[28] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[29] Nasir D. Memon,et al. Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.
[30] Kannan Ramchandran,et al. Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[31] Shih-Fu Chang,et al. An online system for classifying computer graphics images from natural photographs , 2006, Electronic Imaging.
[32] Hany Farid,et al. Digital Image Ballistics from JPEG Quantization , 2006 .
[33] Wen-Hsiang Tsai,et al. A new technique for authentication of image/video for multimedia applications , 2001, MM&Sec '01.
[34] Nasir D. Memon,et al. Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust , 2008, IEEE Transactions on Information Forensics and Security.