Revealing Traces of Image Resampling and Resampling Antiforensics
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Normalized Energy Density-Based Forensic Detection of Resampled Images , 2012, IEEE Transactions on Multimedia.
[2] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[3] Jiwu Huang,et al. A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.
[4] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[5] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[6] Jiwu Huang,et al. Identification of Image Operations Based on Steganalytic Features , 2015, ArXiv.
[7] Matthias Kirchner,et al. On resampling detection in re-compressed images , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[8] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[9] Rainer Böhme,et al. The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.
[10] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[11] Nanning Zheng,et al. Moment feature based forensic detection of resampled digital images , 2013, ACM Multimedia.
[12] David Vazquez-Padin,et al. Set-membership identification of resampled signals , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[13] Hui Zeng,et al. Countering anti-forensics of image resampling , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[14] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[15] Andrew C. Gallagher. Detection of linear and cubic interpolation in JPEG compressed images , 2005, The 2nd Canadian Conference on Computer and Robot Vision (CRV'05).
[16] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[17] Matthias Kirchner,et al. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.
[18] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[19] Jessica J. Fridrich,et al. Effect of Image Downsampling on Steganographic Security , 2014, IEEE Transactions on Information Forensics and Security.
[20] Xinpeng Zhang,et al. Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery , 2010, IEEE Transactions on Information Forensics and Security.
[21] Rongrong Ni,et al. Forensic identification of resampling operators: A semi non-intrusive approach. , 2012, Forensic science international.
[22] David Vazquez-Padin,et al. ML estimation of the resampling factor , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[23] David Vazquez-Padin,et al. Two-dimensional statistical test for the presence of almost cyclostationarity on images , 2010, 2010 IEEE International Conference on Image Processing.
[24] David Vazquez-Padin,et al. Prefilter design for forensic resampling estimation , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[25] Rainer Böhme,et al. Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.
[26] Gang Xiong,et al. Image resampling detection based on texture classification , 2013, Multimedia Tools and Applications.
[27] Jiwu Huang,et al. Identification of Various Image Operations Using Residual-Based Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.