Improved JPEG anti-forensics with better image visual quality and forensic undetectability.
暂无分享,去创建一个
[1] Zhang Xiong,et al. A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[2] Stefano Tubaro,et al. Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.
[3] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[4] K. J. Ray Liu,et al. Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.
[5] Zhang Xiong,et al. JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.
[6] Christian Ullerich,et al. Weaknesses of MB2 , 2007, IWDW.
[7] K. J. Ray Liu,et al. Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[8] Hany Farid,et al. Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.
[9] Giulia Boato,et al. JPEG compression anti-forensics based on first significant digit distribution , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[10] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[11] Sung Yong Shin,et al. On pixel-based texture synthesis by non-parametric sampling , 2006, Comput. Graph..
[12] M. Nikolova. An Algorithm for Total Variation Minimization and Applications , 2004 .
[13] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[14] Alessandro Piva,et al. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.
[15] Zhenxing Qian,et al. Improved anti-forensics of JPEG compression , 2014, J. Syst. Softw..
[16] Fernando Pérez-González,et al. Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[17] Jiwu Huang,et al. Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.
[18] Yun Q. Shi,et al. Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.
[19] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[20] Stefano Tubaro,et al. Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.
[21] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[22] Rainer Böhme,et al. Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.
[23] Di Xiao,et al. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules , 2014, Multimedia Tools and Applications.
[24] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[25] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[26] Stefano Tubaro,et al. The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[27] Junbin Fang,et al. An improved parameter estimation scheme for image modification detection based on DCT coefficient analysis. , 2016, Forensic science international.
[28] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[29] Na Fan,et al. Digital image modification detection using color information and its histograms. , 2016, Forensic science international.
[30] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[31] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[32] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[33] Mauro Barni,et al. Universal Counterforensics of Multiple Compressed JPEG Images , 2014, IWDW.
[34] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[35] Jacques Froment,et al. Adapted Total Variation for Artifact Free Decompression of JPEG Images , 2005, Journal of Mathematical Imaging and Vision.
[36] Kulbir Singh,et al. Forensics for partially double compressed doctored JPEG images , 2016, Multimedia Tools and Applications.