Determination of Stop-Criterion for Incremental Methods Constructing Camera Sensor Fingerprint
暂无分享,去创建一个
[1] D. M. Hutton,et al. Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia , 2005 .
[2] Mo Chen,et al. Source digital camcorder identification using sensor photo response non-uniformity , 2007, Electronic Imaging.
[3] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[4] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[5] Rongrong Wang,et al. Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[6] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[7] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[8] Vito Cappellini,et al. Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification , 2009, 2009 16th International Conference on Digital Signal Processing.
[9] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[10] Yongjian Hu,et al. Source Camera Identification Using Large Components of Sensor Pattern Noise , 2009, 2009 2nd International Conference on Computer Science and its Applications.
[11] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[12] Nasir D. Memon,et al. New Features to Identify Computer Generated Images , 2007, 2007 IEEE International Conference on Image Processing.
[13] J. Fridrich,et al. Detection of double-compression for applications in steganography , 2007 .
[14] Mo Chen,et al. Digital imaging sensor identification (further study) , 2007, Electronic Imaging.
[15] Zeno J M H Geradts,et al. Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images * , 2009, Journal of forensic sciences.
[16] Jan Lukás,et al. Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.
[17] Chang-Tsun Li,et al. Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis , 2009, e-Forensics.
[18] Stephen D. Wolthusen,et al. Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.
[19] Chang-Tsun Li,et al. Using improved imaging sensor pattern noise for source camera identification , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[20] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[21] Babak Mahdian,et al. A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..
[22] David Williams,et al. Accelerating colonic polyp detection using commodity graphics hardware , 2013, 2013 International Conference on Computer Medical Applications (ICCMA).
[23] E. Delp,et al. Security, steganography, and watermarking of multimedia contents , 2004 .
[24] Xia Zhao,et al. Evaluation of Autoparallelization Toolkits for Commodity GPUs , 2013, PPAM.
[25] Xia Zhao,et al. Evaluation of autoparallelization toolkits for commodity graphics hardware , 2013 .
[26] Ali N. Akansu,et al. Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia , 2004 .
[27] Tian-Tsong Ng,et al. Camera response function signature for digital forensics - Part I: Theory and data selection , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).