Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients
暂无分享,去创建一个
[1] Rainer Böhme,et al. Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.
[2] H. Farid. A Survey of Image Forgery Detection , 2008 .
[3] Subhamoy Maitra,et al. Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme , 2005, IEEE Transactions on Signal Processing.
[4] Mauro Barni,et al. Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics , 2015, IEEE Signal Processing Letters.
[5] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[6] David S. Rosenblum,et al. From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.
[7] Zhang Xiong,et al. A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[8] Subhamoy Maitra,et al. Cryptanalysis of correlation-based watermarking schemes using single watermarked copy , 2004, IEEE Signal Processing Letters.
[9] D. Brillinger,et al. Handbook of methods of applied statistics , 1967 .
[10] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[11] Yun Q. Shi,et al. Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.
[12] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[13] Kim-Kwang Raymond Choo,et al. A novel audio forensic data-set for digital multimedia forensics , 2018 .
[14] Alessandro Piva,et al. Reliability assessment of principal point estimates for forensic applications , 2017, J. Vis. Commun. Image Represent..
[15] Stefano Tubaro,et al. Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.
[16] Zhang Xiong,et al. JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.
[17] Luming Zhang,et al. Fortune Teller: Predicting Your Career Path , 2016, AAAI.
[18] Joseph W. Goodman,et al. A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..
[19] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[20] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[21] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[22] Yu Zheng,et al. Urban Water Quality Prediction Based on Multi-Task Multi-View Learning , 2016, IJCAI.
[23] Muhammad Khurram Khan,et al. Digital multimedia audio forensics: past, present and future , 2016, Multimedia Tools and Applications.
[24] Luming Zhang,et al. Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.
[25] Hongbin Zha,et al. Tracking Generic Human Motion via Fusion of Low- and High-Dimensional Approaches , 2013, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[26] K. J. Ray Liu,et al. Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[27] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.