A second look at first significant digit histogram restoration
暂无分享,去创建一个
[1] Giulia Boato,et al. JPEG compression anti-forensics based on first significant digit distribution , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[2] Fernando Pérez-González,et al. The optimal attack to histogram-based forensic detectors is simple(x) , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[3] Jiwu Huang,et al. Estimating JPEG compression history of bitmaps based on factor histogram , 2015, Digit. Signal Process..
[4] Rainer Böhme,et al. Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.
[5] Rainer Böhme,et al. Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.
[6] Bin Li,et al. Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[7] Zhang Xiong,et al. A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[8] Mauro Barni,et al. The Source Identification Game: An Information-Theoretic Perspective , 2013, IEEE Transactions on Information Forensics and Security.
[9] Giulia Boato,et al. RAISE: a raw images dataset for digital image forensics , 2015, MMSys.
[10] Stefano Tubaro,et al. Antiforensics attacks to Benford's law for the detection of double compressed images , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[11] Arno Berger,et al. A basic theory of Benford's Law ∗ , 2011 .
[12] K. J. Ray Liu,et al. Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.
[13] Fernando Pérez-González,et al. BENFORD ’ S LAW IN IMAGE PROCESSING , 2007 .
[14] Stefano Tubaro,et al. Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.
[15] Fernando Pérez-González,et al. Coping with the enemy: Advances in adversary-aware signal processing , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[16] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[17] Fernando Pérez-González,et al. Benford's Lawin Image Processing , 2007, 2007 IEEE International Conference on Image Processing.
[18] Stefano Tubaro,et al. Discriminating multiple JPEG compression using first digit features , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[19] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[20] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[21] Fernando Pérez-González,et al. Transportation-theoretic image counterforensics to First Significant Digit histogram forensics , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[22] Fernando Pérez-González,et al. Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[23] P. Diaconis. The Distribution of Leading Digits and Uniform Distribution Mod 1 , 1977 .