Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
暂无分享,去创建一个
[1] James F. O'Brien,et al. Exposing photo manipulation with inconsistent reflections , 2012, TOGS.
[2] Fernando Pérez-González,et al. The optimal attack to histogram-based forensic detectors is simple(x) , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[3] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[4] A. Piva. An Overview on Image Forensics , 2013 .
[5] Fernando Pérez-González,et al. Joint detection of full-frame linear filtering and JPEG compression in digital images , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[6] Pierre Moulin,et al. A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..
[7] Nasir D. Memon,et al. Digital Forensics , 2009, IEEE Secur. Priv..
[8] Fernando Pérez-González,et al. Forensic analysis of full-frame linearly filtered JPEG images , 2013, 2013 IEEE International Conference on Image Processing.
[9] Rainer Böhme,et al. Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.
[10] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[11] Hyun Wook Park,et al. A rate control algorithm for DCT-based video coding using simple rate estimation and linear source model , 2005, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Alessandro Piva,et al. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.
[13] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[14] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[15] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[16] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[17] Mauro Barni,et al. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .
[18] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[19] Zhang Xiong,et al. JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.
[20] Alessandro Piva,et al. Reverse engineering of double JPEG compression in the presence of image resizing , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[21] Giulia Boato,et al. Detecting photo manipulation on signs and billboards , 2010, 2010 IEEE International Conference on Image Processing.
[22] Stefano Tubaro,et al. Discriminating multiple JPEG compression using first digit features , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[23] Sanjeeb Dash,et al. JPEG compression history estimation for color images , 2003, IEEE Transactions on Image Processing.
[24] Giulia Boato,et al. Analysis of sensor fingerprint for source camera identification , 2011 .
[25] Min Wu,et al. Digital forensics [From the Guest Editors] , 2009 .