Improved anti-forensics of JPEG compression
暂无分享,去创建一个
[1] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[2] Yao Zhao,et al. Anti-forensics of contrast enhancement in digital images , 2010, MM&Sec '10.
[3] Jan Lukás,et al. Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.
[4] K. J. Ray Liu,et al. Wavelet-based image compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.
[5] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[6] Chin-Chen Chang,et al. Adaptive watermark mechanism for rightful ownership protection , 2008, J. Syst. Softw..
[7] Shang-Juh Kao,et al. A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..
[8] K. J. Ray Liu,et al. Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.
[9] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[10] K. J. Ray Liu,et al. Blind forensics of contrast enhancement in digital images , 2008, 2008 15th IEEE International Conference on Image Processing.
[11] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[12] Stefano Tubaro,et al. Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.
[13] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[14] Rainer Böhme,et al. Synthesis of color filter array pattern in digital images , 2009, Electronic Imaging.
[15] Hany Farid,et al. Exposing Digital Forgeries Through Specular Highlights on the Eye , 2007, Information Hiding.
[16] Rainer Böhme,et al. Tamper Hiding: Defeating Image Forensics , 2007, Information Hiding.
[17] Rainer Böhme,et al. Can we trust digital image forensics? , 2007, ACM Multimedia.
[18] K. J. Ray Liu,et al. Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[19] Claudio Soriente,et al. Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..
[20] K. J. Ray Liu,et al. Forensics vs. anti-forensics: A decision and game theoretic framework , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[21] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[22] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[23] K. J. Ray Liu,et al. Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.
[24] Mauro Barni,et al. A universal technique to hide traces of histogram-based image manipulations , 2012, MM&Sec '12.