A Passive-Blind Forgery Detection Scheme Based on Content-Adaptive Quantization Table Estimation
暂无分享,去创建一个
[1] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.
[2] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[3] Chun-Shien Lu,et al. Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..
[4] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.
[5] Jessica J. Fridrich,et al. On detection of median filtering in digital images , 2010, Electronic Imaging.
[6] Rafael C. González,et al. Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[7] Nasir D. Memon,et al. Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.
[8] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[9] Husrev T. Sencar,et al. Overview of State-of-the-Art in Digital Image Forensics , 2007 .
[10] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[11] Ee-Chien Chang,et al. Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[12] Norman Morrison,et al. Introduction to Fourier Analysis , 1994, An Invitation to Modern Number Theory.
[13] Chia-Wen Lin,et al. Video forgery detection using correlation of noise residue , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[14] Nenghai Yu,et al. Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..
[15] Jiangbin Zheng,et al. A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering , 2008, IWDW.
[16] Atam P. Dhawan. Medical Image Analysis , 2003 .
[17] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[18] Jing Dong,et al. A Survey of Passive Image Tampering Detection , 2009, IWDW.
[19] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[20] Rodger E. Ziemer,et al. Elements of Engineering Probability and Statistics , 1996 .
[21] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[22] Soo-Chang Pei,et al. Detecting digital tampering by blur estimation , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).
[23] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[24] Guo-Shiang Lin,et al. Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques , 2006, IEEE Transactions on Information Forensics and Security.
[25] Shih-Fu Chang,et al. Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[26] Mohan S. Kankanhalli,et al. A Survey on Digital Camera Image Forensic Methods , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[27] Chiou-Ting Hsu,et al. Image tampering detection by blocking periodicity analysis in JPEG compressed images , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[28] David G. Stork,et al. Pattern Classification , 1973 .
[29] Jiwu Huang,et al. A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[30] H. Farid. A Survey of Image Forgery Detection , 2008 .
[31] Mahalingam Ramkumar,et al. A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[32] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[33] H. Farid. Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act , 2004 .
[34] Nasir D. Memon,et al. Image manipulation detection , 2006, J. Electronic Imaging.
[35] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[36] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.