Exposing Image Tampering with the Same Quantization Matrix
暂无分享,去创建一个
[1] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[2] Qingzhong Liu,et al. Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[3] Y.-L. Chen,et al. Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.
[4] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[5] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[6] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[7] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[8] Gaurav Sharma,et al. Detecting content adaptive scaling of images for forensic applications , 2010, Electronic Imaging.
[9] Wei Su,et al. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.
[10] S. Prasad,et al. On Resampling Detection and its Application to Detect Image Tampering , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[11] Qingzhong Liu,et al. Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery , 2011, MiFor '11.
[12] Nasir D. Memon,et al. Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[13] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[14] Jessica J. Fridrich,et al. Steganalysis in high dimensions: fusing classifiers built on random subspaces , 2011, Electronic Imaging.
[15] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[16] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[17] Anindya Sarkar,et al. Detection of seam carving and localization of seam insertions in digital images , 2009, MM&Sec '09.
[18] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[19] Hany Farid,et al. Detecting Digital Forgeries Using Bispectral Analysis , 1999 .
[20] J. Hilbe. Logistic Regression Models , 2009 .
[21] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[22] Qingzhong Liu,et al. Improved detection and evaluation for JPEG steganalysis , 2009, ACM Multimedia.
[23] Jiwu Huang,et al. A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[24] Qingzhong Liu,et al. A Method to Detect JPEG-Based Double Compression , 2011, ISNN.
[25] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[26] Qingzhong Liu,et al. Neighboring joint density-based JPEG steganalysis , 2011, TIST.
[27] Qingzhong Liu,et al. Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images , 2014, ACM Trans. Intell. Syst. Technol..
[28] Qingzhong Liu,et al. Novel stream mining for audio steganalysis , 2009, MM '09.
[29] Lawrence Carin,et al. Sparse multinomial logistic regression: fast algorithms and generalization bounds , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[30] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[31] Thorsten Joachims,et al. Estimating the Generalization Performance of an SVM Efficiently , 2000, ICML.
[32] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[33] Hany Farid,et al. Digital Image Ballistics from JPEG Quantization , 2006 .
[34] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[35] Qingzhong Liu,et al. Derivative-based audio steganalysis , 2011, TOMCCAP.
[36] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[37] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[38] S. Avidan,et al. Seam carving for content-aware image resizing , 2007, SIGGRAPH 2007.
[39] Qingzhong Liu,et al. Steganalysis of DCT-embedding based adaptive steganography and YASS , 2011, MM&Sec '11.