Detectability-quality trade-off in JPEG counter-forensics
暂无分享,去创建一个
Stefano Tubaro | Giuseppe Valenzise | Marco Tagliasacchi | G. Valenzise | S. Tubaro | M. Tagliasacchi
[1] Rainer Böhme,et al. Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.
[2] Zhang Xiong,et al. A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[3] Zhang Xiong,et al. JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics , 2013, IH&MMSec '13.
[4] K. J. Ray Liu,et al. Concealability-rate-distortion tradeoff in image compression anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[5] K. J. Ray Liu,et al. Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.
[6] Mauro Barni,et al. Counter-forensics of SIFT-based copy-move detection by means of keypoint classification , 2013, EURASIP J. Image Video Process..
[7] Stefano Tubaro,et al. Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.
[8] Pier Luigi Dragotti,et al. An investigation into aliasing in images recaptured from an LCD monitor using a digital camera , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[9] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[10] Stefano Tubaro,et al. The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[11] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[12] L. Rudin,et al. Nonlinear total variation based noise removal algorithms , 1992 .
[13] Stefan Winkler,et al. A no-reference perceptual blur metric , 2002, Proceedings. International Conference on Image Processing.
[14] Aria Nosratinia,et al. Enhancement of JPEG-Compressed Images by Re-application of JPEG , 2001, J. VLSI Signal Process..
[15] Stefano Tubaro,et al. Antiforensics attacks to Benford's law for the detection of double compressed images , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[16] Giulia Boato,et al. JPEG compression anti-forensics based on first significant digit distribution , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[17] Rainer Böhme,et al. Can we trust digital image forensics? , 2007, ACM Multimedia.
[18] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[19] Patricia Ladret,et al. The blur effect: perception and estimation with a new no-reference perceptual blur metric , 2007, Electronic Imaging.
[20] Mauro Barni,et al. A universal technique to hide traces of histogram-based image manipulations , 2012, MM&Sec '12.
[21] Rainer Böhme,et al. Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.
[22] Jiwu Huang,et al. Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.
[23] Mauro Barni,et al. The Source Identification Game: An Information-Theoretic Perspective , 2013, IEEE Transactions on Information Forensics and Security.
[24] Stefano Tubaro,et al. Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.
[25] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[26] Hany Farid,et al. Digital Image Ballistics from JPEG Quantization , 2006 .
[27] K. J. Ray Liu,et al. Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.
[28] Brendt Wohlberg,et al. Efficient Minimization Method for a Generalized Total Variation Functional , 2009, IEEE Transactions on Image Processing.
[29] Mauro Barni,et al. Hiding traces of median filtering in digital images , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[30] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[31] Paolo Bestagini,et al. Attacking image classification based on bag-of-visual-words , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[32] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[33] Fernando Pérez-González,et al. Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.