Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
暂无分享,去创建一个
[1] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[2] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[3] F. Muller. Distribution shape of two-dimensional DCT coefficients of natural images , 1993 .
[4] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[5] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[6] E. Jaynes. Probability theory : the logic of science , 2003 .
[7] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[8] M. Tribus,et al. Probability theory: the logic of science , 2003 .
[9] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[10] J. Fridrich,et al. Detection of double-compression for applications in steganography , 2007 .
[11] Jiwu Huang,et al. A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[12] Jiwu Huang,et al. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[13] Chiou-Ting Hsu,et al. Image tampering detection by blocking periodicity analysis in JPEG compressed images , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[14] H. Farid. A Survey of Image Forgery Detection , 2008 .
[15] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[16] Bin Li,et al. Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[17] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[18] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[19] Chi-Keung Tang,et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..
[20] Mauro Barni,et al. Identification of cut & paste tampering by means of double-JPEG detection and image segmentation , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[21] Gwenaël J. Doërr,et al. JPEG recompression detection , 2010, Electronic Imaging.
[22] K. J. Ray Liu,et al. Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.
[23] Alessandro Piva,et al. Improved DCT coefficient analysis for forgery localization in JPEG images , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[24] Y.-L. Chen,et al. Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.
[25] Alessandro Piva,et al. Detection of non-aligned double JPEG compression with estimation of primary compression parameters , 2011, 2011 18th IEEE International Conference on Image Processing.
[26] Alessandro Piva,et al. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.