Double compressed doctored image anti-forensics with statistical forensics analysis
暂无分享,去创建一个
[1] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[2] Hany Farid,et al. Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.
[3] Sam Kwong,et al. An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix , 2014, IEEE Transactions on Information Forensics and Security.
[4] Rainer Böhme,et al. Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.
[5] Mauro Barni,et al. Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics , 2015, IEEE Signal Processing Letters.
[6] Alessandro Piva,et al. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.
[7] Dino A. Brugioni. Photo Fakery: The History and Techniques of Photographic Deception and Manipulation , 1999 .
[8] Yao Zhao,et al. Anti-forensics of contrast enhancement in digital images , 2010, MM&Sec '10.
[9] Sebastiano Battiato,et al. First Quantization Matrix Estimation From Double Compressed JPEG Images , 2014, IEEE Transactions on Information Forensics and Security.
[10] Cheng-Hsing Yang,et al. Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.
[11] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[12] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[13] Junfeng He,et al. Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.
[14] K. J. Ray Liu,et al. Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[15] Wei Su,et al. A machine learning based scheme for double JPEG compression detection , 2008, 2008 19th International Conference on Pattern Recognition.
[16] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.
[17] Judith Redi,et al. Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.
[18] Yao Zhao,et al. Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.
[19] Andreas Westfeld. Lessons from the BOWS contest , 2006, MM&Sec '06.
[20] Zhang Xiong,et al. A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[21] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[22] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[23] K. J. Ray Liu,et al. Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.
[24] Chi-Keung Tang,et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..
[25] Stefano Tubaro,et al. Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.
[26] K. J. Ray Liu,et al. Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.
[27] Jing Dong,et al. Exploring DCT Coefficient Quantization Effects for Local Tampering Detection , 2014, IEEE Transactions on Information Forensics and Security.
[28] Zhang Xiong,et al. JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.
[29] Yu Chen,et al. An Improved Double Compression Detection Method for JPEG Image Forensics , 2012, 2012 IEEE International Symposium on Multimedia.
[30] Sebastiano Battiato,et al. Digital forgery estimation into DCT domain: a critical analysis , 2009, MiFor '09.
[31] K. J. Ray Liu,et al. Digital image source coder forensics via intrinsic fingerprints , 2009, IEEE Transactions on Information Forensics and Security.
[32] Qingzhong Liu,et al. Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery , 2011, MiFor '11.
[33] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[34] K. J. Ray Liu,et al. Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.
[35] Jing Dong,et al. Exploring DCT coefficient quantization effect for image tampering localization , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[36] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[37] Stefano Tubaro,et al. The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[38] Hai-Dong Yuan,et al. Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.
[39] Jiwu Huang,et al. Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.
[40] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[41] Yun Q. Shi,et al. Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.
[42] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[43] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[44] Fenlin Liu,et al. A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix , 2015, Digit. Investig..
[45] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[46] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.