JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality
暂无分享,去创建一个
Zhang Xiong | Kai Wang | François Cayre | Wei Fan | K. Wang | Z. Xiong | François Cayre | Wei Fan
[1] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[2] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[3] Alessandro Piva,et al. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.
[4] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[5] Joseph W. Goodman,et al. A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..
[6] Hany Farid,et al. Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.
[7] R. Stevenson,et al. DCT quantization noise in compressed images , 2005 .
[8] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[9] Christian Ullerich,et al. Weaknesses of MB2 , 2007, IWDW.
[10] L. Rudin,et al. Nonlinear total variation based noise removal algorithms , 1992 .
[11] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[12] Stefano Tubaro,et al. Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.
[13] K. J. Ray Liu,et al. Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.
[14] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[15] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[16] Jiwu Huang,et al. Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.
[17] H. Farid. A Survey of Image Forgery Detection , 2008 .
[18] Yun Q. Shi,et al. Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.
[19] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[20] Stefano Tubaro,et al. Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.
[21] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[22] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[23] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[24] H. Kuhn. The Hungarian method for the assignment problem , 1955 .
[25] Rainer Böhme,et al. Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.
[26] Zhang Xiong,et al. JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics , 2013, IH&MMSec '13.
[27] King Ngi Ngan,et al. Spatio-Temporal Just Noticeable Distortion Profile for Grey Scale Image/Video in DCT Domain , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[28] Jacques Froment,et al. Adapted Total Variation for Artifact Free Decompression of JPEG Images , 2005, Journal of Mathematical Imaging and Vision.
[29] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[30] Mauro Barni,et al. A universal technique to hide traces of histogram-based image manipulations , 2012, MM&Sec '12.
[31] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[32] Stefano Tubaro,et al. The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[33] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[34] Fernando Pérez-González,et al. Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[35] K. J. Ray Liu,et al. Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[36] Zhang Xiong,et al. A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[37] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[38] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[39] Majid Rabbani,et al. Biased reconstruction for JPEG decoding , 1999, IEEE Signal Processing Letters.