Information theoretical limit of compression forensics
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. On detection of median filtering in digital images , 2010, Electronic Imaging.
[2] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[3] Babak Mahdian,et al. Detecting double compressed JPEG images , 2009, ICDP.
[4] K. J. Ray Liu,et al. Forensically determining the order of signal processing operations , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[5] K. J. Ray Liu,et al. Digital image source coder forensics via intrinsic fingerprints , 2009, IEEE Transactions on Information Forensics and Security.
[6] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[7] Chiou-Ting Hsu,et al. Detecting doubly compressed images based on quantization noise model and image restoration , 2009, 2009 IEEE International Workshop on Multimedia Signal Processing.
[8] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[9] Mauro Barni,et al. A fuzzy approach to deal with uncertainty in image forensics , 2012, Signal Process. Image Commun..
[10] K. J. Ray Liu,et al. Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.
[11] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[12] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[13] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[14] Min Wu,et al. "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing , 2011, ACM Multimedia.
[15] Joseph W. Goodman,et al. A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..
[16] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[17] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[18] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[19] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[20] K. J. Ray Liu,et al. Forensic identification of compressively sensed images , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[21] Stefano Tubaro,et al. Discriminating multiple JPEG compressions using first digit features , 2012, APSIPA Transactions on Signal and Information Processing.
[22] Min Wu,et al. Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.
[23] James F. O'Brien,et al. Exposing photo manipulation with inconsistent shadows , 2013, TOGS.
[24] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[25] Gwenaël J. Doërr,et al. JPEG recompression detection , 2010, Electronic Imaging.