Counter JPEG Anti-Forensic Approach Based on the Second-Order Statistical Analysis
暂无分享,去创建一个
[1] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[2] Hany Farid,et al. Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.
[3] Zhang Xiong,et al. Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution , 2015, IEEE Transactions on Information Forensics and Security.
[4] Hui Zeng,et al. A Multi-purpose countermeasure against image anti-forensics using autoregressive model , 2016, Neurocomputing.
[5] Stefano Tubaro,et al. The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Jiwu Huang,et al. Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach , 2013, IEEE Transactions on Image Processing.
[7] Fernando Pérez-González,et al. Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[8] Jiwu Huang,et al. Identification of Various Image Operations Using Residual-Based Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[9] Kulbir Singh,et al. Improved JPEG anti-forensics with better image visual quality and forensic undetectability. , 2017, Forensic science international.
[10] K. J. Ray Liu,et al. Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.
[11] Yun Q. Shi,et al. Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.
[12] Alessandro Piva,et al. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.
[13] Stefano Tubaro,et al. Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.
[14] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[15] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[16] Francesco G. B. De Natale,et al. Counter-forensics of median filtering , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[17] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[18] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[19] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[20] Stefano Tubaro,et al. Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.
[21] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[22] Sabu Emmanuel,et al. ACE–An Effective Anti-forensic Contrast Enhancement Technique , 2016, IEEE Signal Processing Letters.
[23] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[24] Jiwu Huang,et al. Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.
[25] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[26] K. J. Ray Liu,et al. Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[27] Yun Q. Shi,et al. Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns , 2014, IEEE Signal Processing Letters.
[28] Zhang Xiong,et al. A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[29] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[30] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[31] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[32] K. J. Ray Liu,et al. Anti-forensics of median filtering , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[33] K. J. Ray Liu,et al. Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.
[34] Zhang Xiong,et al. JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.
[35] K. J. Ray Liu,et al. Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.
[36] Yao Zhao,et al. Attacking contrast enhancement forensics in digital images , 2013, Science China Information Sciences.
[37] Rainer Böhme,et al. Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.
[38] Kulbir Singh,et al. Forensics for partially double compressed doctored JPEG images , 2016, Multimedia Tools and Applications.
[39] Fenlin Liu,et al. Blind image steganalysis based on wavelet coefficient correlation , 2012, Digit. Investig..
[40] Robert M. Haralick,et al. Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..
[41] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[42] Jessica J. Fridrich,et al. Steganalysis of Content-Adaptive Steganography in Spatial Domain , 2011, Information Hiding.
[43] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..