Double compressed doctored image anti-forensics with statistical forensics analysis

Visvesvaraya PHD scheme for Electronics and IT, Ministry of Electronics and Information Technology, Government of India under Grant PhDMLA/4(33)/2015-16/01

[1]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[2]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[3]  Sam Kwong,et al.  An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix , 2014, IEEE Transactions on Information Forensics and Security.

[4]  Rainer Böhme,et al.  Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.

[5]  Mauro Barni,et al.  Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics , 2015, IEEE Signal Processing Letters.

[6]  Alessandro Piva,et al.  Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.

[7]  Dino A. Brugioni Photo Fakery: The History and Techniques of Photographic Deception and Manipulation , 1999 .

[8]  Yao Zhao,et al.  Anti-forensics of contrast enhancement in digital images , 2010, MM&Sec '10.

[9]  Sebastiano Battiato,et al.  First Quantization Matrix Estimation From Double Compressed JPEG Images , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Cheng-Hsing Yang,et al.  Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.

[11]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[12]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[13]  Junfeng He,et al.  Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.

[14]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[15]  Wei Su,et al.  A machine learning based scheme for double JPEG compression detection , 2008, 2008 19th International Conference on Pattern Recognition.

[16]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.

[17]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[18]  Yao Zhao,et al.  Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Andreas Westfeld Lessons from the BOWS contest , 2006, MM&Sec '06.

[20]  Zhang Xiong,et al.  A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[21]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[22]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[23]  K. J. Ray Liu,et al.  Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.

[24]  Chi-Keung Tang,et al.  Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..

[25]  Stefano Tubaro,et al.  Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.

[26]  K. J. Ray Liu,et al.  Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.

[27]  Jing Dong,et al.  Exploring DCT Coefficient Quantization Effects for Local Tampering Detection , 2014, IEEE Transactions on Information Forensics and Security.

[28]  Zhang Xiong,et al.  JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.

[29]  Yu Chen,et al.  An Improved Double Compression Detection Method for JPEG Image Forensics , 2012, 2012 IEEE International Symposium on Multimedia.

[30]  Sebastiano Battiato,et al.  Digital forgery estimation into DCT domain: a critical analysis , 2009, MiFor '09.

[31]  K. J. Ray Liu,et al.  Digital image source coder forensics via intrinsic fingerprints , 2009, IEEE Transactions on Information Forensics and Security.

[32]  Qingzhong Liu,et al.  Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery , 2011, MiFor '11.

[33]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[34]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[35]  Jing Dong,et al.  Exploring DCT coefficient quantization effect for image tampering localization , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[36]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[37]  Stefano Tubaro,et al.  The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[38]  Hai-Dong Yuan,et al.  Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.

[39]  Jiwu Huang,et al.  Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.

[40]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[41]  Yun Q. Shi,et al.  Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.

[42]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[43]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[44]  Fenlin Liu,et al.  A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix , 2015, Digit. Investig..

[45]  Jiwu Huang,et al.  JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.

[46]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.