Digital Image Forensic - Methoden: Literatur

Literatur zur Digitalen Bildforensik



2019

  1. P.S. Abhijith & P. Simon
    Improved Blurred Image Splicing Localization with KNN Matting
    Integrated Intelligent Computing, Communication and Security
    Springer, 2019
    DOI: 10.1007/978-981-10-8797-4_62
    BibTeX
    @incollection{Abhijith2019,
     author = {Abhijith, P. S. and Simon, Philomina},
     title = {Improved Blurred Image Splicing Localization with KNN Matting},
     booktitle = {Integrated Intelligent Computing, Communication and Security},
     publisher = {Springer},
     year = {2019}}
     
  2. M. Apte, G.K. Palshikar & S. Baskaran
    Frauds in Online Social Networks: A Review
    Social Networks and Surveillance for Society
    Springer, 2019
    DOI: 10.1007/978-3-319-78256-0_1
    BibTeX
    @incollection{Apte2019,
     author = {Apte, Manoj and Palshikar, Girish Keshav and Baskaran, Sriram},
     title = {Frauds in Online Social Networks: A Review},
     booktitle = {Social Networks and Surveillance for Society},
     publisher = {Springer},
     year = {2019}}
     
  3. L. Bondi, P. Bestagini, F. Pérez-González & S. Tubaro
    Improving PRNU Compression Through Preprocessing, Quantization, and Coding
    IEEE Transactions on Information Forensics and Security, 2019, Vol. 14(3), pp. 608-620
    DOI: 10.1109/TIFS.2018.2859587
    BibTeX
    @article{Bondi2019,
     author = {Bondi, L. and Bestagini, P. and Pérez-González, F. and Tubaro, S.},
     title = {Improving PRNU Compression Through Preprocessing, Quantization, and Coding},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2019},
     volume = {14},
     number = {3},
     pages = {608--620}}
     
  4. A.M. Das & S. Aji
    A Fast and Efficient Method for Image Splicing Localization Using BM3D Noise Estimation
    Integrated Intelligent Computing, Communication and Security
    Springer, 2019
    DOI: 10.1007/978-981-10-8797-4_65
    BibTeX
    @incollection{Das2019,
     author = {Das, Aswathy M. and Aji, S.},
     title = {A Fast and Efficient Method for Image Splicing Localization Using BM3D Noise Estimation},
     booktitle = {Integrated Intelligent Computing, Communication and Security},
     publisher = {Springer},
     year = {2019}}
     
  5. A. Doegar, M. Dutta & G. Kumar
    A Review of Passive Image Cloning Detection Approaches
    Proceedings of 2nd International Conference on Communication, Computing and Networking
    Springer, 2019
    DOI: 10.1007/978-981-13-1217-5_46
    BibTeX
    @incollection{Doegar2019,
     author = {Doegar, Amit and Dutta, Maitreyee and Kumar, Gaurav},
     title = {A Review of Passive Image Cloning Detection Approaches},
     booktitle = {Proceedings of 2nd International Conference on Communication, Computing and Networking},
     publisher = {Springer},
     year = {2019}}
     
  6. A.K. Jaiswal & R. Srivastava
    Copy-Move Forgery Detection Using Shift-Invariant SWT and Block Division Mean Features
    Recent Trends in Communication, Computing, and Electronics
    Springer, 2019
    DOI: 10.1007/978-981-13-2685-1_28
    BibTeX
    @incollection{Jaiswal2019,
     author = {Jaiswal, Ankit Kumar and Srivastava, Rajeev},
     title = {Copy-Move Forgery Detection Using Shift-Invariant SWT and Block Division Mean Features},
     booktitle = {Recent Trends in Communication, Computing, and Electronics},
     publisher = {Springer},
     year = {2019}}
     
  7. A. Kumar, C.S. Prakash, S. Maheshkar & V. Maheshkar
    Markov Feature Extraction Using Enhanced Threshold Method for Image Splicing Forgery Detection
    Smart Innovations in Communication and Computational Sciences
    Springer, 2019
    DOI: 10.1007/978-981-10-8971-8_2
    BibTeX
    @incollection{Kumar2019,
     author = {Kumar, Avinash and Prakash, Choudhary Shyam and Maheshkar, Sushila and Maheshkar, Vikas},
     title = {Markov Feature Extraction Using Enhanced Threshold Method for Image Splicing Forgery Detection},
     booktitle = {Smart Innovations in Communication and Computational Sciences},
     publisher = {Springer},
     year = {2019}}
     
  8. M. Mokhtari Ardakan, M. Yerokh & M. Akhavan Saffar
    A New Method to Copy-Move Forgery Detection in Digital Images Using Gabor Filter
    Fundamental Research in Electrical Engineering
    Springer, 2019
    DOI: 10.1007/978-981-10-8672-4_9
    BibTeX
    @incollection{MokhtariArdakan2019,
     author = {Mokhtari Ardakan, Mostafa and Yerokh, Masoud and Akhavan Saffar, Mostafa},
     title = {A New Method to Copy-Move Forgery Detection in Digital Images Using Gabor Filter},
     booktitle = {Fundamental Research in Electrical Engineering},
     publisher = {Springer},
     year = {2019}}
     
  9. T.M. Shashidhar & K.B. Ramesh
    FARIP: Framework for Artifact Removal for Image Processing Using JPEG
    Artificial Intelligence and Algorithms in Intelligent Systems
    Springer, 2019
    DOI: 10.1007/978-3-319-91189-2_2
    BibTeX
    @incollection{Shashidhar2019,
     author = {Shashidhar, T. M. and Ramesh, K. B.},
     title = {FARIP: Framework for Artifact Removal for Image Processing Using JPEG},
     booktitle = {Artificial Intelligence and Algorithms in Intelligent Systems},
     publisher = {Springer},
     year = {2019}}
     
  10. M. Tiwari & B. Gupta
    Enhancing Source Camera Identification Using Weighted Nuclear Norm Minimization De-Noising Filter
    Advances in Computer Communication and Computational Sciences
    Springer, 2019
    DOI: 10.1007/978-981-13-0344-9_24
    BibTeX
    @incollection{Tiwari2019,
     author = {Tiwari, Mayank and Gupta, Bhupendra},
     title = {Enhancing Source Camera Identification Using Weighted Nuclear Norm Minimization De-Noising Filter},
     booktitle = {Advances in Computer Communication and Computational Sciences},
     publisher = {Springer},
     year = {2019}}
     
  11. D. Vaishnavi, G.N. Balaji & D. Mahalakshmi
    KAZE Feature Based Passive Image Forgery Detection
    First International Conference on Artificial Intelligence and Cognitive Computing
    Springer, 2019
    DOI: 10.1007/978-981-13-1580-0_32
    BibTeX
    @incollection{Vaishnavi2019,
     author = {Vaishnavi, D. and Balaji, G. N. and Mahalakshmi, D.},
     title = {KAZE Feature Based Passive Image Forgery Detection},
     booktitle = {First International Conference on Artificial Intelligence and Cognitive Computing},
     publisher = {Springer},
     year = {2019}}
     
  12. D. Vaishnavi & T.S. Subashini
    Application of local invariant symmetry features to detect and localize image copy move forgeries
    Journal of Information Security and Applications, Elsevier BV, 2019, Vol. 44, pp. 23-31
    DOI: 10.1016/j.jisa.2018.11.001
    BibTeX
    @article{Vaishnavi2019a,
     author = {Vaishnavi, D. and Subashini, T. S.},
     title = {Application of local invariant symmetry features to detect and localize image copy move forgeries},
     journal = {Journal of Information Security and Applications},
     publisher = {Elsevier BV},
     year = {2019},
     volume = {44},
     pages = {23--31}}
     
  13. J. Wang, G. Wu, J. Li & S.K. Jha
    A new method estimating linear gaussian filter kernel by image PRNU noise
    Journal of Information Security and Applications, Elsevier BV, 2019, Vol. 44, pp. 1-11
    DOI: 10.1016/j.jisa.2018.11.002
    BibTeX
    @article{Wang2019,
     author = {Wang, Jinwei and Wu, Guojing and Li, Jian and Jha, Sunil Kr.},
     title = {A new method estimating linear gaussian filter kernel by image PRNU noise},
     journal = {Journal of Information Security and Applications},
     publisher = {Elsevier BV},
     year = {2019},
     volume = {44},
     pages = {1--11}}
     
  14. Z. Zhong, L. Zheng, Z. Zheng, S. Li & Y. Yang
    CamStyle: A Novel Data Augmentation Method for Person Re-Identification
    #IEEE_J_IP#, 2019, Vol. 28(3), pp. 1176-1190
    DOI: 10.1109/TIP.2018.2874313
    BibTeX
    @article{Zhong2019,
     author = {Zhong, Z. and Zheng, L. and Zheng, Z. and Li, S. and Yang, Y.},
     title = {CamStyle: A Novel Data Augmentation Method for Person Re-Identification},
     journal = {#IEEE_J_IP#},
     year = {2019},
     volume = {28},
     number = {3},
     pages = {1176--1190}}
     


2018

  1. M. Abdel-Basset, G. Manogaran, A.E. Fakhry & I. El-Henawy
    2-Levels of clustering strategy to detect and locate copy-move forgery in digital images
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6266-0
    BibTeX
    @article{Abdel-Basset2018,
     author = {Abdel-Basset, Mohamed and Manogaran, Gunasekaran and Fakhry, Ahmed E. and El-Henawy, Ibrahim},
     title = {2-Levels of clustering strategy to detect and locate copy-move forgery in digital images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  2. A.Z. Abidin, Z.A. Shah, H. Hasan, A.A. Samah & H.A. Majid
    Histogram of Orientated Gradient (HOG) Approach in Image Forgery : Image Distorted by Brightness
    UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
    BibTeX
    @article{Abidin2018,
     author = {Abidin, Arfa Zainal and Shah, Zuraini Ali and Hasan, Haswadi and Samah, Azurah A. and Majid, Hairudin Abdul},
     title = {Histogram of Orientated Gradient (HOG) Approach in Image Forgery : Image Distorted by Brightness},
     journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications},
     year = {2018},
     volume = {3}}
     
  3. A.R. Abrahim, M.S.M. Rahim & G.B. Sulong
    Splicing image forgery identification based on artificial neural network approach and texture features
    Cluster Computing, Springer, 2018, pp. 1
    DOI: 10.1007/s10586-017-1668-8
    BibTeX
    @article{Abrahim2018,
     author = {Abrahim, Araz Rajab and Rahim, Mohd Shafry Mohd and Sulong, Ghazali Bin},
     title = {Splicing image forgery identification based on artificial neural network approach and texture features},
     journal = {Cluster Computing},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  4. A. Agarwal, R. Keshari, M. Wadhwa, M. Vijh, C. Parmar, R. Singh & M. Vatsa
    Iris Sensor Identification in Multi-camera Environment
    Information Fusion, Elsevier BV, 2018
    DOI: 10.1016/j.inffus.2017.11.004
    BibTeX
    @article{Agarwal2018a,
     author = {Agarwal, Akshay and Keshari, Rohit and Wadhwa, Manya and Vijh, Mansi and Parmar, Chandani and Singh, Richa and Vatsa, Mayank},
     title = {Iris Sensor Identification in Multi-camera Environment},
     journal = {Information Fusion},
     publisher = {Elsevier BV},
     year = {2018}}
     
  5. S. Agarwal & S. Chand
    Image Forgery Detection Using Co-occurrence-Based Texture Operator in Frequency Domain
    Progress in Intelligent Computing Techniques: Theory, Practice, and Applications
    Springer, 2018
    DOI: 10.1007/978-981-10-3373-5_10
    BibTeX
    @incollection{Agarwal2018,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Image Forgery Detection Using Co-occurrence-Based Texture Operator in Frequency Domain},
     booktitle = {Progress in Intelligent Computing Techniques: Theory, Practice, and Applications},
     publisher = {Springer},
     year = {2018}}
     
  6. H.A. Alberry, A. Hegazy & G. i Salama
    A Fast SIFT Based Method for Copy Move Forgery Detection
    Future Computing and Informatics Journal, Elsevier BV, 2018
    DOI: 10.1016/j.fcij.2018.03.001
    BibTeX
    @article{Alberry2018,
     author = {Alberry, Hesham Ahmed and Hegazy, Abdelfatah and i Salama, Gouda},
     title = {A Fast SIFT Based Method for Copy Move Forgery Detection},
     journal = {Future Computing and Informatics Journal},
     publisher = {Elsevier BV},
     year = {2018}}
     
  7. T. Allbeson & S. Allan
    The War of Images in the Age of Trump
    Trump's Media War
    Springer International Publishing, 2018, pp. 69-84
    DOI: 10.1007/978-3-319-94069-4_5
    BibTeX
    @incollection{Allbeson2018,
     author = {Allbeson, Tom and Allan, Stuart},
     title = {The War of Images in the Age of Trump},
     booktitle = {Trump's Media War},
     publisher = {Springer International Publishing},
     year = {2018},
     pages = {69--84}}
     
  8. M.S. Allili, N. Casemajor & A. Talbi
    Multiple image copy detection and evolution visualisation using tree graphs
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6350-5
    BibTeX
    @article{Allili2018,
     author = {Allili, Mohand Said and Casemajor, Nathalie and Talbi, Aymen},
     title = {Multiple image copy detection and evolution visualisation using tree graphs},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  9. O.M. Al-Qershi & B.E. Khoo
    Evaluation of copy-move forgery detection: datasets and evaluation metrics
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6201-4
    BibTeX
    @article{Al-Qershi2018,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Evaluation of copy-move forgery detection: datasets and evaluation metrics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  10. O.M. Al-Qershi & B.E. Khoo
    Enhanced block-based copy-move forgery detection using k-means clustering
    Multidimensional Systems and Signal Processing, Springer, 2018, pp. 1
    DOI: 10.1007/s11045-018-0624-y
    BibTeX
    @article{Al-Qershi2018a,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Enhanced block-based copy-move forgery detection using k-means clustering},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  11. O.I. Al-Sanjary, A.A. Ahmed, A.A.B. Jaharadak, M.A.M. Ali & H.M. Zangana
    Detection clone an object movement using an optical flow approach
    Proc. IEEE Symp. Computer Applications Industrial Electronics (ISCAIE)
    2018, pp. 388-394
    DOI: 10.1109/ISCAIE.2018.8405504
    BibTeX
    @inproceedings{Al-Sanjary2018a,
     author = {Al-Sanjary, O. I. and Ahmed, A. A. and Jaharadak, A. A. B. and Ali, M. A. M. and Zangana, H. M.},
     title = {Detection clone an object movement using an optical flow approach},
     booktitle = {Proc. IEEE Symp. Computer Applications Industrial Electronics (ISCAIE)},
     year = {2018},
     pages = {388--394}}
     
  12. O.I. Al-Sanjary, N. Ghazali, A.A. Ahmed & G. Sulong
    Semi-automatic Methods in Video Forgery Detection Based on Multi-view Dimension
    Recent Trends in Information and Communication Technology
    Springer, 2018
    DOI: 10.1007/978-3-319-59427-9_41
    BibTeX
    @incollection{Al-Sanjary2018,
     author = {Al-Sanjary, Omar Ismael and Ghazali, Nurulhuda and Ahmed, Ahmed Abdullah and Sulong, Ghazali},
     title = {Semi-automatic Methods in Video Forgery Detection Based on Multi-view Dimension},
     booktitle = {Recent Trends in Information and Communication Technology},
     publisher = {Springer},
     year = {2018}}
     
  13. E. Altinisik, K. Tasdemir & H.T. Sencar
    Extracting Prnu Noise from H.264 Coded Videos
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 1367-1371
    DOI: 10.23919/EUSIPCO.2018.8553173
    BibTeX
    @inproceedings{Altinisik2018,
     author = {Altinisik, E. and Tasdemir, K. and Sencar, H. T.},
     title = {Extracting Prnu Noise from H.264 Coded Videos},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {1367--1371}}
     
  14. Y. Annadani & C.V. Jawahar
    Augment and Adapt: A Simple Approach to Image Tampering Detection
    Proc. 24th Int. Conf. Pattern Recognition (ICPR)
    2018, pp. 2983-2988
    DOI: 10.1109/ICPR.2018.8545614
    BibTeX
    @inproceedings{Annadani2018,
     author = {Annadani, Y. and Jawahar, C. V.},
     title = {Augment and Adapt: A Simple Approach to Image Tampering Detection},
     booktitle = {Proc. 24th Int. Conf. Pattern Recognition (ICPR)},
     year = {2018},
     pages = {2983--2988}}
     
  15. M.S.S. Asiq & W.R.S. Emmanuel
    Polyscale gradients residual demosaicking
    Journal of King Saud University - Computer and Information Sciences, Elsevier BV, 2018
    DOI: 10.1016/j.jksuci.2018.02.014
    BibTeX
    @article{Asiq2018,
     author = {Asiq, M. S. Safna and Emmanuel, W. R. Sam},
     title = {Polyscale gradients residual demosaicking},
     journal = {Journal of King Saud University - Computer and Information Sciences},
     publisher = {Elsevier BV},
     year = {2018}}
     
  16. Y. Aydin, G. Muzaffer & G. Ulutaç
    Detection of copy move forgery technique based on SIFT and SURF
    Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
    2018, pp. 1-4
    DOI: 10.1109/SIU.2018.8404609
    BibTeX
    @inproceedings{Aydin2018,
     author = {Aydin, Y. and Muzaffer, G. and Ulutaç, G.},
     title = {Detection of copy move forgery technique based on SIFT and SURF},
     booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2018},
     pages = {1--4}}
     
  17. L. Azzari, L.R. Borges & A. Foi
    Modeling and Estimation of Signal-Dependent and Correlated Noise
    Denoising of Photographic Images and Video
    Springer, 2018
    DOI: 10.1007/978-3-319-96029-6_1
    BibTeX
    @incollection{Azzari2018,
     author = {Azzari, Lucio and Borges, Lucas Rodrigues and Foi, Alessandro},
     title = {Modeling and Estimation of Signal-Dependent and Correlated Noise},
     booktitle = {Denoising of Photographic Images and Video},
     publisher = {Springer},
     year = {2018}}
     
  18. H.H. Badi, B. Sabbri & F. Ajeel
    Rotation Invariant on Harris Interest Points for Exposing Image Region Duplication Forgery
    Evolving BCI Therapy - Engaging Brain State Dynamics
    InTech, 2018
    DOI: 10.5772/intechopen.76332
    BibTeX
    @incollection{Badi2018,
     author = {Badi, Haitham Hasan and Sabbri, Bassam and Ajeel, Fitian},
     title = {Rotation Invariant on Harris Interest Points for Exposing Image Region Duplication Forgery},
     booktitle = {Evolving BCI Therapy - Engaging Brain State Dynamics},
     publisher = {InTech},
     year = {2018}}
     
  19. S. Banerjee & A. Ross
    Impact of photometric transformations on PRNU estimation schemes: A case study using near infrared ocular images
    Proc. Int. Workshop Biometrics and Forensics (IWBF)
    2018, pp. 1-8
    DOI: 10.1109/IWBF.2018.8401560
    BibTeX
    @inproceedings{Banerjee2018,
     author = {Banerjee, S. and Ross, A.},
     title = {Impact of photometric transformations on PRNU estimation schemes: A case study using near infrared ocular images},
     booktitle = {Proc. Int. Workshop Biometrics and Forensics (IWBF)},
     year = {2018},
     pages = {1--8}}
     
  20. M. Barni, H.S. Garcia & B. Tondi
    An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack
    ArXiv, 2018
    arXiv: 1805.02899v1
    BibTeX
    @article{Barni2018,
     author = {Barni, Mauro and Garcia, Hector Santoyo and Tondi, Benedetta},
     title = {An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack},
     journal = {ArXiv},
     year = {2018}}
     
  21. M. Barni, K. Kallas, E. Nowroozi & B. Tondi
    On the Transferability of Adversarial Examples Against CNN-Based Image Forensics
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.01629v1
    BibTeX
    @article{Barni2018b,
     author = {Barni, Mauro and Kallas, Kassem and Nowroozi, Ehsan and Tondi, Benedetta},
     title = {On the Transferability of Adversarial Examples Against CNN-Based Image Forensics},
     journal = {arXiv},
     year = {2018}}
     
  22. M. Barni, H. Santoyo-García & B. Tondi
    An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack
    #IEEE_J_SPL#, 2018, Vol. 25(10), pp. 1435-1439
    DOI: 10.1109/LSP.2018.2863045
    BibTeX
    @article{Barni2018a,
     author = {Barni, M. and Santoyo-García, H. and Tondi, B.},
     title = {An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack},
     journal = {#IEEE_J_SPL#},
     year = {2018},
     volume = {25},
     number = {10},
     pages = {1435--1439}}
     
  23. A.A. Basid, H.A. Majid & A.A. Samah
    Local Phase Quantization (LPQ) Descriptor Approach in Copy-Move Image Forgery: A Study Case of Blurring
    UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
    BibTeX
    @article{Basid2018,
     author = {Basid, Atikah Abd and Majid, Hairudin Abdul and Samah, Azurah A.},
     title = {Local Phase Quantization (LPQ) Descriptor Approach in Copy-Move Image Forgery: A Study Case of Blurring},
     journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications},
     year = {2018},
     volume = {3}}
     
  24. V.R. Basker & S. Chapaneri
    Chrominance based Splicing Image Forgery Localization with Relevance Vector Machine
    Proc. Electronics and Computer Science (SCEECS) 2018 IEEE Int. Students' Conf. Electrical
    2018, pp. 1-6
    DOI: 10.1109/SCEECS.2018.8546959
    BibTeX
    @inproceedings{Basker2018,
     author = {Basker, V. R. and Chapaneri, S.},
     title = {Chrominance based Splicing Image Forgery Localization with Relevance Vector Machine},
     booktitle = {Proc. Electronics and Computer Science (SCEECS) 2018 IEEE Int. Students' Conf. Electrical},
     year = {2018},
     pages = {1--6}}
     
  25. B. Bayar & M.C. Stamm
    Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection
    IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(11), pp. 2691-2706
    DOI: 10.1109/TIFS.2018.2825953
    BibTeX
    @article{Bayar2018,
     author = {Bayar, B. and Stamm, M. C.},
     title = {Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     volume = {13},
     number = {11},
     pages = {2691--2706}}
     
  26. B. Bayar & M.C. Stamm
    Towards Open Set Camera Model Identification Using a Deep Learning Framework
    Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics
    2018, pp. 2007-2011
    DOI: 10.1109/ICASSP.2018.8462383
    BibTeX
    @inproceedings{Bayar2018a,
     author = {Bayar, B. and Stamm, M. C.},
     title = {Towards Open Set Camera Model Identification Using a Deep Learning Framework},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics},
     year = {2018},
     pages = {2007--2011}}
     
  27. C. Ben Rabah, G. Coatrieux & R. Abdelfattah
    Scanner Model Identification of Official Documents Using Noise Parameters Estimation in the Wavelet Domain
    Advanced Concepts for Intelligent Vision Systems, Springer, 2018
    DOI: 10.1007/978-3-030-01449-0_50
    BibTeX
    @article{BenRabah2018,
     author = {Ben Rabah, Chaima and Coatrieux, Gouenou and Abdelfattah, Riadh},
     title = {Scanner Model Identification of Official Documents Using Noise Parameters Estimation in the Wavelet Domain},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2018}}
     
  28. D. Bhardwaj, C. Kumawat & V. Pankajakshan
    A Method for Detecting JPEG Anti-forensics
    Computer Vision, Pattern Recognition, Image Processing, and Graphics
    Springer, 2018
    DOI: 10.1007/978-981-13-0020-2_17
    BibTeX
    @incollection{Bhardwaj2018,
     author = {Bhardwaj, Dinesh and Kumawat, Chothmal and Pankajakshan, Vinod},
     title = {A Method for Detecting JPEG Anti-forensics},
     booktitle = {Computer Vision, Pattern Recognition, Image Processing, and Graphics},
     publisher = {Springer},
     year = {2018}}
     
  29. K. Bhogale, N. Shankar, A. Juvekar & A. Padhi
    Face Verification and Forgery Detection for Ophthalmic Surgery Images
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.06194v1
    BibTeX
    @article{Bhogale2018,
     author = {Bhogale, Kaushal and Shankar, Nishant and Juvekar, Adheesh and Padhi, Asutosh},
     title = {Face Verification and Forgery Detection for Ophthalmic Surgery Images},
     journal = {arXiv},
     year = {2018}}
     
  30. X. Bi & C.-M. Pun
    Fast copy-move forgery detection using local bidirectional coherency error refinement
    Pattern Recognition, Elsevier BV, 2018, Vol. 81, pp. 161-175
    DOI: 10.1016/j.patcog.2018.03.028
    BibTeX
    @article{Bi2018,
     author = {Bi, Xiuli and Pun, Chi-Man},
     title = {Fast copy-move forgery detection using local bidirectional coherency error refinement},
     journal = {Pattern Recognition},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {81},
     pages = {161--175}}
     
  31. N. Bonettini, L. Bondi, `.S. Mandelli, P. Bestagini, S. Tubaro, D. Guera & E.J. Delp
    Fooling PRNU-based detectors through convolutional neural networks
    2018
    BibTeX
    @article{Bonettini2018,
     author = {Bonettini, Nicolo and Bondi, Luca and Mandelli, ` Sara and Bestagini, Paolo and Tubaro, Stefano and Guera, David and Delp, Edward J.},
     title = {Fooling PRNU-based detectors through convolutional neural networks},
     year = {2018}}
     
  32. N. Bonettini, L. Bondi, S. Mandelli, P. Bestagini, S. Tubaro & D. Güera
    Fooling PRNU-Based Detectors Through Convolutional Neural Networks
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 957-961
    DOI: 10.23919/EUSIPCO.2018.8553596
    BibTeX
    @inproceedings{Bonettini2018a,
     author = {Bonettini, N. and Bondi, L. and Mandelli, S. and Bestagini, P. and Tubaro, S. and Güera, D.},
     title = {Fooling PRNU-Based Detectors Through Convolutional Neural Networks},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {957--961}}
     
  33. A. Bruno & G. Cattaneo
    Effects of H.265 encoding on PNU and source camera identification
    Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems - RACS '18
    ACM Press, 2018
    DOI: 10.1145/3264746.3264770
    BibTeX
    @inproceedings{Bruno2018,
     author = {Bruno, Andrea and Cattaneo, Giuseppe},
     title = {Effects of H.265 encoding on PNU and source camera identification},
     booktitle = {Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems - RACS '18},
     publisher = {ACM Press},
     year = {2018}}
     
  34. X. Cai & B. Song
    Semantic object removal with convolutional neural network feature-based inpainting approach
    Multimedia Systems, Springer, 2018, pp. 1
    DOI: 10.1007/s00530-018-0585-x
    BibTeX
    @article{Cai2018,
     author = {Cai, Xiuxia and Song, Bin},
     title = {Semantic object removal with convolutional neural network feature-based inpainting approach},
     journal = {Multimedia Systems},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  35. R. Caldelli, I. Amerini & C.T. Li
    PRNU-based Image Classification of Origin Social Network with CNN
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 1357-1361
    DOI: 10.23919/EUSIPCO.2018.8553160
    BibTeX
    @inproceedings{Caldelli2018,
     author = {Caldelli, R. and Amerini, I. and Li, C. T.},
     title = {PRNU-based Image Classification of Origin Social Network with CNN},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {1357--1361}}
     
  36. F. Carrara, F. Falchi, R. Caldelli, G. Amato & R. Becarelli
    Adversarial image detection in deep neural networks
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5853-4
    BibTeX
    @article{Carrara2018,
     author = {Carrara, Fabio and Falchi, Fabrizio and Caldelli, Roberto and Amato, Giuseppe and Becarelli, Rudy},
     title = {Adversarial image detection in deep neural networks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  37. K.K. Çevik, F.S. Berber & E.U. Kucuksille
    Mapping location of a suspect by using forensic images taken with their own mobile phone
    Proc of the International Conference on Engineering Technologies (ICENTE'18)
    2018
    BibTeX
    @conference{Cevik2018,
     author = {Çevik, Kerim Kürşat and Berber, Faruk Süleyman and Kucuksille, Ecir Ugur},
     title = {Mapping location of a suspect by using forensic images taken with their own mobile phone},
     booktitle = {Proc of the International Conference on Engineering Technologies (ICENTE'18)},
     year = {2018}}
     
  38. B. Chen, X. Qi, Y. Wang & H. Shim
    An Improved Splicing Localization Method by Fully Convolutional Networks
    2018
    BibTeX
    @misc{Chen2018d,
     author = {Chen, B. and Qi, X. and Wang, Y. and Shim, Hjae},
     title = {An Improved Splicing Localization Method by Fully Convolutional Networks},
     year = {2018}}
     
  39. B. Chen, X. Qi, Y. Wang, Y. Zheng, H.J. Shim & Y. Shi
    An Improved Splicing Localization Method by Fully Convolutional Networks
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 69472-69480
    DOI: 10.1109/ACCESS.2018.2880433
    BibTeX
    @article{Chen2018g,
     author = {Chen, B. and Qi, X. and Wang, Y. and Zheng, Y. and Shim, H. J. and Shi, Y.},
     title = {An Improved Splicing Localization Method by Fully Convolutional Networks},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {69472--69480}}
     
  40. B. Chen, M. Yu, Q. Su, H.J. Shim & Y. Shi
    Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 56637-56646
    DOI: 10.1109/ACCESS.2018.2871952
    BibTeX
    @article{Chen2018c,
     author = {Chen, B. and Yu, M. and Su, Q. and Shim, H. J. and Shi, Y.},
     title = {Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {56637--56646}}
     
  41. C. Chen, S. McCloskey & J. Yu
    Focus manipulation detection via photometric histogram analysis
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018
    2018
    BibTeX
    @inproceedings{Chen2018a,
     author = {Chen, Can and McCloskey, Scott and Yu, Jingyi},
     title = {Focus manipulation detection via photometric histogram analysis},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018},
     year = {2018}}
     
  42. C. Chen, X. Zhao & M.C. Stamm
    Mislgan: An Anti-Forensic Camera Model Falsification Framework Using A Generative Adversarial Network
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 535-539
    DOI: 10.1109/ICIP.2018.8451503
    BibTeX
    @inproceedings{Chen2018b,
     author = {Chen, C. and Zhao, X. and Stamm, M. C.},
     title = {Mislgan: An Anti-Forensic Camera Model Falsification Framework Using A Generative Adversarial Network},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {535--539}}
     
  43. H. Chen, C. Zhao, Z. Shi & F. Zhu
    An Image Splicing Localization Algorithm Based on SLIC and Image Features
    Advances in Multimedia Information Processing – PCM 2018, Springer, 2018
    DOI: 10.1007/978-3-030-00764-5_56
    BibTeX
    @article{Chen2018f,
     author = {Chen, Haipeng and Zhao, Chaoran and Shi, Zenan and Zhu, Fuxiang},
     title = {An Image Splicing Localization Algorithm Based on SLIC and Image Features},
     journal = {Advances in Multimedia Information Processing – PCM 2018},
     publisher = {Springer},
     year = {2018}}
     
  44. Y. Chen, X. Zhu, W. Zheng & J. Lai
    Person Re-Identification by Camera Correlation Aware Feature Augmentation
    #IEEE_J_PAMI#, 2018, Vol. 40(2), pp. 392-408
    DOI: 10.1109/TPAMI.2017.2666805
    BibTeX
    @article{Chen2018e,
     author = {Chen, Y. and Zhu, X. and Zheng, W. and Lai, J.},
     title = {Person Re-Identification by Camera Correlation Aware Feature Augmentation},
     journal = {#IEEE_J_PAMI#},
     year = {2018},
     volume = {40},
     number = {2},
     pages = {392--408}}
     
  45. Z. Chen, B. Tondi, X. Li, R. Ni, Y. Zhao & M. Barni
    Secure Detection of Image Manipulation by means of Random Feature Selection
    ArXiv, 2018
    arXiv: 1802.00573v1
    BibTeX
    @article{Chen2018,
     author = {Chen, Zhipeng and Tondi, Benedetta and Li, Xiaolong and Ni, Rongrong and Zhao, Yao and Barni, Mauro},
     title = {Secure Detection of Image Manipulation by means of Random Feature Selection},
     journal = {ArXiv},
     year = {2018}}
     
  46. H. Cheng, J. Wei, C. Lin & J. Ye
    Detecting Seam-Carved Image by Extreme Learning Machines Using Patch Analysis Method, Jury Voting, and Combinatorial Fusion
    and Cybernetics: Systems IEEE Transactions on Systems, Man, 2018, pp. 1-15
    DOI: 10.1109/TSMC.2018.2789460
    BibTeX
    @article{Cheng2018a,
     author = {Cheng, H. and Wei, J. and Lin, C. and Ye, J.},
     title = {Detecting Seam-Carved Image by Extreme Learning Machines Using Patch Analysis Method, Jury Voting, and Combinatorial Fusion},
     journal = {and Cybernetics: Systems IEEE Transactions on Systems, Man},
     year = {2018},
     pages = {1--15}}
     
  47. J. Cheng, Y. Wu, W. Abd-Almageed & P. Natarajan
    Image-to-GPS Verification Through A Bottom-Up Pattern Matching Network
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.07288v1
    BibTeX
    @article{Cheng2018,
     author = {Cheng, Jiaxin and Wu, Yue and Abd-Almageed, Wael and Natarajan, Prem},
     title = {Image-to-GPS Verification Through A Bottom-Up Pattern Matching Network},
     journal = {arXiv},
     year = {2018}}
     
  48. C.-L. Chou & J.-C. Lee
    Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns
    Security with Intelligent Computing and Big-data Services
    Springer, 2018
    DOI: 10.1007/978-3-319-76451-1_5
    BibTeX
    @incollection{Chou2018,
     author = {Chou, Chao-Lung and Lee, Jen-Chun},
     title = {Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns},
     booktitle = {Security with Intelligent Computing and Big-data Services},
     publisher = {Springer},
     year = {2018}}
     
  49. M. Cicconet, H. Elliott, D.L. Richmond, D. Wainstock & M. Walsh
    Image Forensics: Detecting duplication of scientific images with manipulation-invariant image similarity
    ArXiv, 2018
    arXiv: 1802.06515v1
    BibTeX
    @article{Cicconet2018,
     author = {Cicconet, M. and Elliott, H. and Richmond, D. L. and Wainstock, D. and Walsh, M.},
     title = {Image Forensics: Detecting duplication of scientific images with manipulation-invariant image similarity},
     journal = {ArXiv},
     year = {2018}}
     
  50. L.F.S. Cieslak, K.A. da Costa & J. PauloPapa
    Seam Carving Detection Using Convolutional Neural Networks
    Proc. IEEE 12th Int. Symp. Applied Computational Intelligence and Informatics (SACI)
    2018, pp. 000195-000200
    DOI: 10.1109/SACI.2018.8441016
    BibTeX
    @inproceedings{Cieslak2018,
     author = {Cieslak, L. Fernandoda Silva and da Costa, K. AugustoPontara and PauloPapa, J.},
     title = {Seam Carving Detection Using Convolutional Neural Networks},
     booktitle = {Proc. IEEE 12th Int. Symp. Applied Computational Intelligence and Informatics (SACI)},
     year = {2018},
     pages = {000195--000200}}
     
  51. R. Cogranne
    Determining JPEG Image Standard Quality Factor from the Quantization Tables
    ArXiv, 2018
    arXiv: 1802.00992v1
    BibTeX
    @article{Cogranne2018,
     author = {Cogranne, Rémi},
     title = {Determining JPEG Image Standard Quality Factor from the Quantization Tables},
     journal = {ArXiv},
     year = {2018}}
     
  52. D. Cozzolino, J. Thies, A. Rössler, C. Riess, M. Nießner & L. Verdoliva
    ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1812.02510v1
    BibTeX
    @article{Cozzolino2018b,
     author = {Cozzolino, Davide and Thies, Justus and Rössler, Andreas and Riess, Christian and Nießner, Matthias and Verdoliva, Luisa},
     title = {ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection},
     journal = {arXiv},
     year = {2018}}
     
  53. D. Cozzolino & L. Verdoliva
    Noiseprint: A CNN-based camera model fingerprint
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1808.08396v1
    BibTeX
    @article{Cozzolino2018,
     author = {Cozzolino, Davide and Verdoliva, Luisa},
     title = {Noiseprint: A CNN-based camera model fingerprint},
     journal = {arXiv},
     year = {2018}}
     
  54. D. Cozzolino & L. Verdoliva
    Camera-based Image Forgery Localization using Convolutional Neural Networks
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 1372-1376
    DOI: 10.23919/EUSIPCO.2018.8553581
    BibTeX
    @inproceedings{Cozzolino2018a,
     author = {Cozzolino, D. and Verdoliva, L.},
     title = {Camera-based Image Forgery Localization using Convolutional Neural Networks},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {1372--1376}}
     
  55. N. Dalmia & M. Okade
    Robust first quantization matrix estimation based on filtering of recompression artifacts for non-aligned double compressed JPEG images
    Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 61, pp. 9-20
    DOI: 10.1016/j.image.2017.10.011
    BibTeX
    @article{Dalmia2018,
     author = {Dalmia, Nandita and Okade, Manish},
     title = {Robust first quantization matrix estimation based on filtering of recompression artifacts for non-aligned double compressed JPEG images},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {61},
     pages = {9--20}}
     
  56. L. D’Amiano, D. Cozzolino, G. Poggi & L. Verdoliva
    A PatchMatch-based Dense-field Algorithm for Video Copy-Move Detection and Localization
    #IEEE_J_CASVT#, 2018, pp. 1
    DOI: 10.1109/TCSVT.2018.2804768
    BibTeX
    @article{DextquoterightAmiano2018,
     author = {D’Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {A PatchMatch-based Dense-field Algorithm for Video Copy-Move Detection and Localization},
     journal = {#IEEE_J_CASVT#},
     year = {2018},
     pages = {1}}
     
  57. T. Das, R. Hasan, M.R. Azam & J. Uddin
    A Robust Method for Detecting Copy-Move Image Forgery Using Stationary Wavelet Transform and Scale Invariant Feature Transform
    Proc. Material and Electronic Engineering (IC4ME2) 2018 Int. Conf. Computer, Communication, Chemical
    2018, pp. 1-4
    DOI: 10.1109/IC4ME2.2018.8465668
    BibTeX
    @inproceedings{Das2018c,
     author = {Das, T. and Hasan, R. and Azam, M. R. and Uddin, J.},
     title = {A Robust Method for Detecting Copy-Move Image Forgery Using Stationary Wavelet Transform and Scale Invariant Feature Transform},
     booktitle = {Proc. Material and Electronic Engineering (IC4ME2) 2018 Int. Conf. Computer, Communication, Chemical},
     year = {2018},
     pages = {1--4}}
     
  58. T.K. Das
    Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6170-7
    BibTeX
    @article{Das2018a,
     author = {Das, Tanmoy Kanti},
     title = {Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  59. T.K. Das
    Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6170-7
    BibTeX
    @article{Das2018b,
     author = {Das, Tanmoy Kanti},
     title = {Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  60. U.K. Das, S.G. Samaddar & P.K. Keserwani
    Digital Forensic Enabled Image Authentication Using Least Significant Bit (LSB) with Tamper Localization Based Hash Function
    Intelligent Communication and Computational Technologies
    Springer, 2018
    DOI: 10.1007/978-981-10-5523-2_14
    BibTeX
    @incollection{Das2018,
     author = {Das, Ujjal Kumar and Samaddar, Shefalika Ghosh and Keserwani, Pankaj Kumar},
     title = {Digital Forensic Enabled Image Authentication Using Least Significant Bit (LSB) with Tamper Localization Based Hash Function},
     booktitle = {Intelligent Communication and Computational Technologies},
     publisher = {Springer},
     year = {2018}}
     
  61. L. Debiasi, C. Rathgeb, U. Scherhag, A. Uhl & C. Busch
    PRNU Variance Analysis for Morphed Face Image Detection
    2018
    BibTeX
    @misc{Debiasi2018a,
     author = {Debiasi, Luca and Rathgeb, Christian and Scherhag, Ulrich and Uhl, Andreas and Busch, Christoph},
     title = {PRNU Variance Analysis for Morphed Face Image Detection},
     year = {2018}}
     
  62. L. Debiasi, U. Scherhag, C. Rathgeb, A. Uhl & C. Busch
    PRNU-based detection of morphed face images
    Proc. Int. Workshop Biometrics and Forensics (IWBF)
    2018, pp. 1-7
    DOI: 10.1109/IWBF.2018.8401555
    BibTeX
    @inproceedings{Debiasi2018,
     author = {Debiasi, L. and Scherhag, U. and Rathgeb, C. and Uhl, A. and Busch, C.},
     title = {PRNU-based detection of morphed face images},
     booktitle = {Proc. Int. Workshop Biometrics and Forensics (IWBF)},
     year = {2018},
     pages = {1--7}}
     
  63. C. Destruel, V. Itier, O. Strauss & W. Puech
    Color Noise-Based Feature for Splicing Detection and Localization
    Proc. IEEE 20th Int. Workshop Multimedia Signal Processing (MMSP)
    2018, pp. 1-6
    DOI: 10.1109/MMSP.2018.8547093
    BibTeX
    @inproceedings{Destruel2018,
     author = {Destruel, C. and Itier, V. and Strauss, O. and Puech, W.},
     title = {Color Noise-Based Feature for Splicing Detection and Localization},
     booktitle = {Proc. IEEE 20th Int. Workshop Multimedia Signal Processing (MMSP)},
     year = {2018},
     pages = {1--6}}
     
  64. F. Ding, Y. Shi, G. Zhu & Y.-Q. Shi
    Smoothing identification for digital image forensics
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6807-6
    BibTeX
    @article{Ding2018b,
     author = {Ding, Feng and Shi, Yuxi and Zhu, Guopu and Shi, Yun-Qing},
     title = {Smoothing identification for digital image forensics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  65. F. Ding, G. Zhu, W. Dong & Y.-Q. Shi
    An efficient weak sharpening detection method for image forensics
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 50, pp. 93-99
    DOI: 10.1016/j.jvcir.2017.11.009
    BibTeX
    @article{Ding2018,
     author = {Ding, Feng and Zhu, Guopu and Dong, Weiqiang and Shi, Yun-Qing},
     title = {An efficient weak sharpening detection method for image forensics},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {50},
     pages = {93--99}}
     
  66. W. Ding, Y. Xie & Y. Wang
    Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value
    Multimedia Tools and Applications, Springer Nature, 2018
    DOI: 10.1007/s11042-018-5732-z
    BibTeX
    @article{Ding2018a,
     author = {Ding, Wenjia and Xie, Yi and Wang, Yulin},
     title = {Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2018}}
     
  67. R. Dixit & R. Naskar
    Region duplication detection in digital images based on Centroid Linkage Clustering of key–points and graph similarity matching
    Multimedia Tools and Applications, Springer Nature America, Inc, 2018
    DOI: 10.1007/s11042-018-6666-1
    BibTeX
    @article{Dixit2018,
     author = {Dixit, Rahul and Naskar, Ruchira},
     title = {Region duplication detection in digital images based on Centroid Linkage Clustering of key–points and graph similarity matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature America, Inc},
     year = {2018}}
     
  68. M.A. Elaskily, H.A. Elnemr, M.M. Dessouky & O.S. Faragallah
    Two stages object recognition based copy-move forgery detection algorithm
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6891-7
    BibTeX
    @article{Elaskily2018,
     author = {Elaskily, Mohamed A. and Elnemr, Heba A. and Dessouky, Mohamed M. and Faragallah, Osama S.},
     title = {Two stages object recognition based copy-move forgery detection algorithm},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  69. A. El-Yamany, H. Fouad & Y. Raffat
    A Generic Approach CNN-Based Camera Identification for Manipulated Images
    Proc. IEEE Int. Conf. Electro/Information Technology (EIT)
    2018, pp. 0165-0169
    DOI: 10.1109/EIT.2018.8500312
    BibTeX
    @inproceedings{El-Yamany2018,
     author = {El-Yamany, A. and Fouad, H. and Raffat, Y.},
     title = {A Generic Approach CNN-Based Camera Identification for Manipulated Images},
     booktitle = {Proc. IEEE Int. Conf. Electro/Information Technology (EIT)},
     year = {2018},
     pages = {0165--0169}}
     
  70. N.I. Evdokimova & V.V. Myasnikov
    Detecting forgery in image time series based on anomaly detection
    Proc. of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)
    2018
    BibTeX
    @inproceedings{Evdokimova2018,
     author = {Evdokimova, N. I. and Myasnikov, V. V.},
     title = {Detecting forgery in image time series based on anomaly detection},
     booktitle = {Proc. of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)},
     year = {2018}}
     
  71. A. Fadlil, I. Riadi & T. Sari
    Measurement of Copy-Move Forensic Image Similarity Using Distance Function
    Advanced Science Letters, American Scientific Publishers, 2018, Vol. 24(12), pp. 9157-9162
    DOI: 10.1166/asl.2018.12116
    BibTeX
    @article{Fadlil2018,
     author = {Fadlil, Abdul and Riadi, Imam and Sari, Titi},
     title = {Measurement of Copy-Move Forensic Image Similarity Using Distance Function},
     journal = {Advanced Science Letters},
     publisher = {American Scientific Publishers},
     year = {2018},
     volume = {24},
     number = {12},
     pages = {9157--9162}}
     
  72. L. Fan, H. Li, M. Li, Y. Zhang, J. Li & C. Zhang
    Photographer trajectory detection from images
    Personal and Ubiquitous Computing, Springer, 2018, pp. 1
    DOI: 10.1007/s00779-018-1150-5
    BibTeX
    @article{Fan2018,
     author = {Fan, Linwei and Li, Huiyu and Li, Mengjun and Zhang, Yan and Li, Jinjiang and Zhang, Caiming},
     title = {Photographer trajectory detection from images},
     journal = {Personal and Ubiquitous Computing},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  73. W. Fan, G. Valenzise, F. Banterle & F. Dufaux
    Fine-grained detection of inverse tone mapping in HDR images
    Signal Processing, Elsevier BV, 2018, Vol. 152, pp. 178-188
    DOI: 10.1016/j.sigpro.2018.05.028
    BibTeX
    @article{Fan2018a,
     author = {Fan, Wei and Valenzise, Giuseppe and Banterle, Francesco and Dufaux, Frédéric},
     title = {Fine-grained detection of inverse tone mapping in HDR images},
     journal = {Signal Processing},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {152},
     pages = {178--188}}
     
  74. E.G. Fernández, A.S. Orozco, L.G. Villalba & J. Hernandez-Castro
    Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts
    Sensors, MDPI AG, 2018, Vol. 18(9), pp. 2804
    DOI: 10.3390/s18092804
    BibTeX
    @article{Fernandez2018,
     author = {Fernández, Edgar González and Orozco, Ana Sandoval and Villalba, Luis Garc\ia and Hernandez-Castro, Julio},
     title = {Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts},
     journal = {Sensors},
     publisher = {MDPI AG},
     year = {2018},
     volume = {18},
     number = {9},
     pages = {2804}}
     
  75. M. Ferrara, A. Franco & D. Maltoni
    Face Demorphing
    IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(4), pp. 1008-1017
    DOI: 10.1109/TIFS.2017.2777340
    BibTeX
    @article{Ferrara2018,
     author = {Ferrara, M. and Franco, A. and Maltoni, D.},
     title = {Face Demorphing},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     volume = {13},
     number = {4},
     pages = {1008--1017}}
     
  76. M. Ferrara, A. Franco & D. Maltoni
    Face demorphing in the presence of facial appearance variations
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 2365-2369
    DOI: 10.23919/EUSIPCO.2018.8553430
    BibTeX
    @inproceedings{Ferrara2018b,
     author = {Ferrara, M. and Franco, A. and Maltoni, D.},
     title = {Face demorphing in the presence of facial appearance variations},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {2365--2369}}
     
  77. A. Ferreira
    Counteracting the contemporaneous proliferation of digital forgeries and fake news
    2018
    BibTeX
    @misc{Ferreira2018,
     author = {Ferreira, Alexandre},
     title = {Counteracting the contemporaneous proliferation of digital forgeries and fake news},
     year = {2018}}
     
  78. N. Fule & V. Mane
    Improved Matching Technique in Digital Image Region Duplication
    Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics
    2018, pp. 427-430
    DOI: 10.1109/ICECA.2018.8474683
    BibTeX
    @inproceedings{Fule2018,
     author = {Fule, N. and Mane, V.},
     title = {Improved Matching Technique in Digital Image Region Duplication},
     booktitle = {Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics},
     year = {2018},
     pages = {427--430}}
     
  79. H. Gao, M. Hu, T. Gao & R. Cheng
    An Effective Image Detection Algorithm for USM Sharpening Based on Pixel-Pair Histogram
    Advances in Multimedia Information Processing – PCM 2018, Springer, 2018
    DOI: 10.1007/978-3-030-00767-6_37
    BibTeX
    @article{Gao2018,
     author = {Gao, Hang and Hu, Mengting and Gao, Tiegang and Cheng, Renhong},
     title = {An Effective Image Detection Algorithm for USM Sharpening Based on Pixel-Pair Histogram},
     journal = {Advances in Multimedia Information Processing – PCM 2018},
     publisher = {Springer},
     year = {2018}}
     
  80. J.D. Gavade & S.R. Chougule
    Passive Blind Forensic Scheme for Copy-Move Temporal Tampering Detection
    Proc. Int. Conf. On Advances in Communication and Computing Technology (ICACCT)
    2018, pp. 155-160
    DOI: 10.1109/ICACCT.2018.8529536
    BibTeX
    @inproceedings{Gavade2018,
     author = {Gavade, J. D. and Chougule, S. R.},
     title = {Passive Blind Forensic Scheme for Copy-Move Temporal Tampering Detection},
     booktitle = {Proc. Int. Conf. On Advances in Communication and Computing Technology (ICACCT)},
     year = {2018},
     pages = {155--160}}
     
  81. M. Geiger
    2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge Honors Theses
    Union College, Union College, 2018
    BibTeX
    @mastersthesis{Geiger2018,
     author = {Geiger, Michael},
     title = {2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge Honors Theses},
     school = {Union College},
     year = {2018}}
     
  82. A. Ghoneim, G. Muhammad, S.U. Amin & B. Gupta
    Medical Image Forgery Detection for Smart Healthcare
    IEEE Communications Magazine, Institute of Electrical and Electronics Engineers (IEEE), 2018, Vol. 56(4), pp. 33-37
    DOI: 10.1109/mcom.2018.1700817
    BibTeX
    @article{Ghoneim2018,
     author = {Ghoneim, Ahmed and Muhammad, Ghulam and Amin, Syed Umar and Gupta, Brij},
     title = {Medical Image Forgery Detection for Smart Healthcare},
     journal = {IEEE Communications Magazine},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2018},
     volume = {56},
     number = {4},
     pages = {33--37}}
     
  83. D. Güera, Y. Wang, L. Bondi, P. Bestagini, S. Tubaro & E.J. Delp
    Reliability Map Estimation For CNN-Based Camera Model Attribution
    Purdue University West Lafayette, Indiana, Purdue University West Lafayette, Indiana, 2018
    BibTeX
    @techreport{Gueera2018,
     author = {Güera, David and Wang, Yu and Bondi, Luca and Bestagini, Paolo and Tubaro, Stefano and Delp, Edward. J.},
     title = {Reliability Map Estimation For CNN-Based Camera Model Attribution},
     school = {Purdue University West Lafayette, Indiana},
     year = {2018}}
     
  84. D. Guera, F. Zhu, S.K. Yarlagadda, S. Tubaro, P. Bestagini & E.J. Delp
    Reliability Map Estimation for CNN-Based Camera Model Attribution
    Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
    2018, pp. 964-973
    DOI: 10.1109/WACV.2018.00111
    BibTeX
    @inproceedings{Guera2018,
     author = {Guera, D. and Zhu, F. and Yarlagadda, S. K. and Tubaro, S. and Bestagini, P. and Delp, E. J.},
     title = {Reliability Map Estimation for CNN-Based Camera Model Attribution},
     booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)},
     year = {2018},
     pages = {964--973}}
     
  85. D. Güera, F. Zhu, S.K. Yarlagadda, S. Tubaro, P. Bestagini & E.J. Delp
    Reliability Map Estimation for CNN-Based Camera Model Attribution
    Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
    2018, pp. 964-973
    DOI: 10.1109/WACV.2018.00111
    BibTeX
    @inproceedings{Gueera2018a,
     author = {Güera, D. and Zhu, F. and Yarlagadda, S. K. and Tubaro, S. and Bestagini, P. and Delp, E. J.},
     title = {Reliability Map Estimation for CNN-Based Camera Model Attribution},
     booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)},
     year = {2018},
     pages = {964--973}}
     
  86. Y. Guo, X. Cao, W. Zhang & R. Wang
    Fake Colorized Image Detection
    ArXiv, 2018
    arXiv: 1801.02768v2
    BibTeX
    @article{Guo2018,
     author = {Guo, Yuanfang and Cao, Xiaochun and Zhang, Wei and Wang, Rui},
     title = {Fake Colorized Image Detection},
     journal = {ArXiv},
     year = {2018}}
     
  87. Y. Guo, X. Cao, W. Zhang & R. Wang
    Fake Colorized Image Detection
    #IEEE_J_IFS#, 2018, Vol. 13(8), pp. 1932-1944
    DOI: 10.1109/TIFS.2018.2806926
    BibTeX
    @article{Guo2018a,
     author = {Guo, Y. and Cao, X. and Zhang, W. and Wang, R.},
     title = {Fake Colorized Image Detection},
     journal = {#IEEE_J_IFS#},
     year = {2018},
     volume = {13},
     number = {8},
     pages = {1932--1944}}
     
  88. A. Gupta
    A New Copy Move Forgery Detection Technique using Adaptive over-Segementation and Feature Point Matching
    Bulletin of Eletrical Engineering and Informatics, 2018
    BibTeX
    @article{Gupta2018,
     author = {Gupta, Anil},
     title = {A New Copy Move Forgery Detection Technique using Adaptive over-Segementation and Feature Point Matching},
     journal = {Bulletin of Eletrical Engineering and Informatics},
     year = {2018}}
     
  89. B. Gupta & M. Tiwari
    Improving Performance of Source-Camera Identification By Suppressing Peaks and Eliminating Low-Frequency Defects of Reference SPN
    IEEE Signal Processing Letters, 2018, Vol. 25(9), pp. 1340-1343
    DOI: 10.1109/LSP.2018.2857223
    BibTeX
    @article{Gupta2018b,
     author = {Gupta, B. and Tiwari, M.},
     title = {Improving Performance of Source-Camera Identification By Suppressing Peaks and Eliminating Low-Frequency Defects of Reference SPN},
     journal = {IEEE Signal Processing Letters},
     year = {2018},
     volume = {25},
     number = {9},
     pages = {1340--1343}}
     
  90. B. Gupta & M. Tiwari
    An empirical cross-validation of denoising filters for PRNU extraction
    Forensic Science International, Elsevier BV, 2018, Vol. 292, pp. 110-114
    DOI: 10.1016/j.forsciint.2018.09.017
    BibTeX
    @article{Gupta2018c,
     author = {Gupta, Bhupendra and Tiwari, Mayank},
     title = {An empirical cross-validation of denoising filters for PRNU extraction},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {292},
     pages = {110--114}}
     
  91. B. Gupta & M. Tiwari
    Improving source camera identification performance using DCT based image frequency components dependent sensor pattern noise extraction method
    Digital Investigation, Elsevier BV, 2018, Vol. 24, pp. 121-127
    DOI: 10.1016/j.diin.2018.02.003
    BibTeX
    @article{Gupta2018d,
     author = {Gupta, Bhupendra and Tiwari, Mayank},
     title = {Improving source camera identification performance using DCT based image frequency components dependent sensor pattern noise extraction method},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {24},
     pages = {121--127}}
     
  92. S. Gupta & N. Mohan
    Color Channel Characteristics (CCC) for Efficient Digital Image Forensics
    Engineering, Technology & Applied Science Research, 2018, Vol. 8(1)
    BibTeX
    @article{Gupta2018a,
     author = {Gupta, S. and Mohan, N.},
     title = {Color Channel Characteristics (CCC) for Efficient Digital Image Forensics},
     journal = {Engineering, Technology & Applied Science Research},
     year = {2018},
     volume = {8},
     number = {1}}
     
  93. S. Gupta, N. Mohan & P.S. Sandhu
    Energy deviation measure: a technique for digital image forensics
    International Journal of Electronic Security and Digital Forensics, Inderscience Publishers, 2018, Vol. 10(4), pp. 401
    DOI: 10.1504/ijesdf.2018.10015333
    BibTeX
    @article{Gupta2018e,
     author = {Gupta, Surbhi and Mohan, Neeraj and Sandhu, Parvinder Singh},
     title = {Energy deviation measure: a technique for digital image forensics},
     journal = {International Journal of Electronic Security and Digital Forensics},
     publisher = {Inderscience Publishers},
     year = {2018},
     volume = {10},
     number = {4},
     pages = {401}}
     
  94. B. Gurunlu & S. Ozturk
    A Survey on Photo Forgery Detection Methods
    Cattani, C., Atangana, A., Bulut, H., Hammouch, Z., Baskonus, H. M., Mekkaoui, T. & Agoujil, S. (ed.)
    ITM Web of Conferences, EDP Sciences, 2018, Vol. 22, pp. 01055
    DOI: 10.1051/itmconf/20182201055
    BibTeX
    @article{Gurunlu2018,
     author = {Gurunlu, Bilgehan and Ozturk, Serkan},
     title = {A Survey on Photo Forgery Detection Methods},
     journal = {ITM Web of Conferences},
     publisher = {EDP Sciences},
     year = {2018},
     volume = {22},
     pages = {01055}}
     
  95. V. Hajihashemi & A.A. Gharahbagh
    A Fast, Block Based, Copy-Move Forgery Detection Approach Using Image Gradient and Modified K-Means
    Intelligent Systems Technologies and Applications
    Springer, 2018
    DOI: 10.1007/978-3-319-68385-0_25
    BibTeX
    @incollection{Hajihashemi2018,
     author = {Hajihashemi, V. and Gharahbagh, A. Alavi},
     title = {A Fast, Block Based, Copy-Move Forgery Detection Approach Using Image Gradient and Modified K-Means},
     booktitle = {Intelligent Systems Technologies and Applications},
     publisher = {Springer},
     year = {2018}}
     
  96. J.G. Han, T.H. Park, Y.H. Moon & I.K. Eom
    Quantization-based Markov feature extraction method for image splicing detection
    Machine Vision and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s00138-018-0911-5
    BibTeX
    @article{Han2018a,
     author = {Han, Jong Goo and Park, Tae Hee and Moon, Yong Ho and Eom, Il Kyu},
     title = {Quantization-based Markov feature extraction method for image splicing detection},
     journal = {Machine Vision and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  97. R. Han, Y. Ke, L. Du, F. Qin & J. Guo
    Exploring the location of object deleted by seam-carving
    Expert Systems with Applications, Elsevier BV, 2018, Vol. 95, pp. 162-171
    DOI: 10.1016/j.eswa.2017.11.023
    BibTeX
    @article{Han2018,
     author = {Han, Rong and Ke, Yongzhen and Du, Ling and Qin, Fan and Guo, Jing},
     title = {Exploring the location of object deleted by seam-carving},
     journal = {Expert Systems with Applications},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {95},
     pages = {162--171}}
     
  98. M. He
    Distinguish computer generated and digital images: A CNN solution
    Concurrency and Computation: Practice and Experience, Wiley, 2018, pp. e4788
    DOI: 10.1002/cpe.4788
    BibTeX
    @article{He2018,
     author = {He, Ming},
     title = {Distinguish computer generated and digital images: A CNN solution},
     journal = {Concurrency and Computation: Practice and Experience},
     publisher = {Wiley},
     year = {2018},
     pages = {e4788}}
     
  99. S. Heller, L. Rossetto & H. Schuldt
    The PS-Battles Dataset - an Image Collection for Image Manipulation Detection
    arXiv, 2018
    arXiv: 1804.04866v1
    BibTeX
    @article{Heller2018,
     author = {Heller, Silvan and Rossetto, Luca and Schuldt, Heiko},
     title = {The PS-Battles Dataset - an Image Collection for Image Manipulation Detection},
     journal = {arXiv},
     year = {2018}}
     
  100. A. Hilal & S. Chantaf
    Uncovering copy–move traces using principal component analysis, discrete cosine transform and Gabor filter
    Analog Integrated Circuits and Signal Processing, Springer, 2018, pp. 1
    DOI: 10.1007/s10470-018-1139-z
    BibTeX
    @article{Hilal2018,
     author = {Hilal, Alaa and Chantaf, Samer},
     title = {Uncovering copy–move traces using principal component analysis, discrete cosine transform and Gabor filter},
     journal = {Analog Integrated Circuits and Signal Processing},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  101. M.S. Hossain, G. Muhammad & M. AL Qurishi
    Verifying the Images Authenticity in Cognitive Internet of Things (CIoT)-Oriented Cyber Physical System
    Mobile Networks and Applications, Springer, 2018, Vol. 23(2), pp. 239
    DOI: 10.1007/s11036-017-0928-4
    BibTeX
    @article{Hossain2018,
     author = {Hossain, M. Shamim and Muhammad, Ghulam and AL Qurishi, Muhammad},
     title = {Verifying the Images Authenticity in Cognitive Internet of Things (CIoT)-Oriented Cyber Physical System},
     journal = {Mobile Networks and Applications},
     publisher = {Springer},
     year = {2018},
     volume = {23},
     number = {2},
     pages = {239}}
     
  102. J.-U. Hou, H.-U. Jang, J.-S. Park & H.-K. Lee
    Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks
    Information Security Applications, Springer, 2018
    DOI: 10.1007/978-3-319-93563-8_2
    BibTeX
    @article{Hou2018,
     author = {Hou, Jong-Uk and Jang, Han-Ul and Park, Jin-Seok and Lee, Heung-Kyu},
     title = {Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks},
     journal = {Information Security Applications},
     publisher = {Springer},
     year = {2018}}
     
  103. C.-C. Hsu, C.-Y. Lee & Y.-X. Zhuang
    Learning to Detect Fake Face Images in the Wild
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1809.08754v3
    BibTeX
    @article{Hsu2018,
     author = {Hsu, Chih-Chung and Lee, Chia-Yen and Zhuang, Yi-Xiu},
     title = {Learning to Detect Fake Face Images in the Wild},
     journal = {arXiv},
     year = {2018}}
     
  104. Z. Hu, H. Wu, S. Liao, H. Hu, S. Liu & B. Li
    Person Re-Identification with Hybrid Loss and Hard Triplets Mining
    Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)
    2018, pp. 1-5
    DOI: 10.1109/BigMM.2018.8499463
    BibTeX
    @inproceedings{Hu2018,
     author = {Hu, Z. and Wu, H. and Liao, S. and Hu, H. and Liu, S. and Li, B.},
     title = {Person Re-Identification with Hybrid Loss and Hard Triplets Mining},
     booktitle = {Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)},
     year = {2018},
     pages = {1--5}}
     
  105. N. Huang, J. He & N. Zhu
    A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network
    Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)
    2018, pp. 1702-1705
    DOI: 10.1109/TrustCom/BigDataSE.2018.00255
    BibTeX
    @inproceedings{Huang2018a,
     author = {Huang, N. and He, J. and Zhu, N.},
     title = {A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network},
     booktitle = {Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)},
     year = {2018},
     pages = {1702--1705}}
     
  106. N. Huang, J. He, N. Zhu, X. Xuan, G. Liu & C. Chang
    Identification of the source camera of images based on convolutional neural network
    Digital Investigation, Elsevier BV, 2018, Vol. 26, pp. 72-80
    DOI: 10.1016/j.diin.2018.08.001
    BibTeX
    @article{Huang2018b,
     author = {Huang, Na and He, Jingsha and Zhu, Nafei and Xuan, Xinggang and Liu, Gongzheng and Chang, Chengyue},
     title = {Identification of the source camera of images based on convolutional neural network},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {26},
     pages = {72--80}}
     
  107. Y. Huang, L. Cao, J. Zhang, L. Pan & Y. Liu
    Exploring feature coupling and model coupling for image source identification
    IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(12), pp. 3108-3121
    DOI: 10.1109/TIFS.2018.2838079
    BibTeX
    @article{Huang2018,
     author = {Huang, Y. and Cao, L. and Zhang, J. and Pan, L. and Liu, Y.},
     title = {Exploring feature coupling and model coupling for image source identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     volume = {13},
     number = {12},
     pages = {3108--3121}}
     
  108. M. Huh, A. Liu, A. Owens & A.A. Efros
    Fighting Fake News: Image Splice Detection via Learned Self-Consistency
    ArXiv, 2018
    arXiv: 1805.04096v1
    BibTeX
    @article{Huh2018,
     author = {Huh, Minyoung and Liu, Andrew and Owens, Andrew and Efros, Alexei A.},
     title = {Fighting Fake News: Image Splice Detection via Learned Self-Consistency},
     journal = {ArXiv},
     year = {2018}}
     
  109. C. Iakovidou, M. Zampoglou, S. Papadopoulos & Y. Kompatsiaris
    Content-aware detection of JPEG grid inconsistencies for intuitive image forensics
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 54, pp. 155-170
    DOI: 10.1016/j.jvcir.2018.05.011
    BibTeX
    @article{Iakovidou2018,
     author = {Iakovidou, Chryssanthi and Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis},
     title = {Content-aware detection of JPEG grid inconsistencies for intuitive image forensics},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {54},
     pages = {155--170}}
     
  110. M.M. Islam, J. Kamruzzaman, G. Karmakar, M. Murshed & G. Kahandawa
    Passive Detection of Splicing and Copy-Move Attacks in Image Forgery
    Neural Information Processing, Springer, 2018
    DOI: 10.1007/978-3-030-04212-7_49
    BibTeX
    @article{Islam2018,
     author = {Islam, Mohammad Manzurul and Kamruzzaman, Joarder and Karmakar, Gour and Murshed, Manzur and Kahandawa, Gayan},
     title = {Passive Detection of Splicing and Copy-Move Attacks in Image Forgery},
     journal = {Neural Information Processing},
     publisher = {Springer},
     year = {2018}}
     
  111. N.S.A. Izham, A.B.A. Samah & H.B.A. Majid
    Moment Invariant-Based Approach On Distorted Copy-Move Image Forgery By Colored Reduction
    UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
    BibTeX
    @article{Izham2018,
     author = {Izham, Nur Shafiqah Ahmad and Samah, Azurah Binti A. and Majid, H. B. A.},
     title = {Moment Invariant-Based Approach On Distorted Copy-Move Image Forgery By Colored Reduction},
     journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications},
     year = {2018},
     volume = {3}}
     
  112. N.K. Jain, N.K. Rathore & A. Mishra
    An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine
    Wireless Personal Communications, Springer, 2018, pp. 1
    DOI: 10.1007/s11277-018-5802-6
    BibTeX
    @article{Jain2018,
     author = {Jain, Neelesh Kumar and Rathore, Neeraj Kumar and Mishra, Amit},
     title = {An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine},
     journal = {Wireless Personal Communications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  113. H.A. Jalab, A.M. Hasan, Z. Moghaddasi & Z. Wakaf
    Image Splicing Detection Using Electromagnetism-Like Based Descriptor
    Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016
    Springer, 2018
    DOI: 10.1007/978-3-319-56991-8_6
    BibTeX
    @incollection{Jalab2018,
     author = {Jalab, Hamid A. and Hasan, Ali M. and Moghaddasi, Zahra and Wakaf, Zouhir},
     title = {Image Splicing Detection Using Electromagnetism-Like Based Descriptor},
     booktitle = {Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016},
     publisher = {Springer},
     year = {2018}}
     
  114. T.J. Jayan & P.S. Sethu
    Estimation of Spliced Images in Photographs
    Proc. 2nd Int. Conf. Trends in Electronics and Informatics (ICOEI)
    2018, pp. 248-252
    DOI: 10.1109/ICOEI.2018.8553823
    BibTeX
    @inproceedings{Jayan2018,
     author = {Jayan, T. J. and Sethu, P. Sajith},
     title = {Estimation of Spliced Images in Photographs},
     booktitle = {Proc. 2nd Int. Conf. Trends in Electronics and Informatics (ICOEI)},
     year = {2018},
     pages = {248--252}}
     
  115. J.J. Jeon & I.K. Eom
    Wavelet-based color modification detection based on variance ratio
    EURASIP Journal on Image and Video Processing, Springer, 2018, Vol. 2018(1), pp. 1
    DOI: 10.1186/s13640-018-0286-6
    BibTeX
    @article{Jeon2018,
     author = {Jeon, Jong Ju and Eom, Il Kyu},
     title = {Wavelet-based color modification detection based on variance ratio},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2018},
     volume = {2018},
     number = {1},
     pages = {1}}
     
  116. A. Jeyalakshmi & D.D.R. Chitra
    Source Camera Identification using Image Features
    International Journal of Applied Engineering Research, 2018, Vol. 13(1), pp. 490-504
    BibTeX
    @article{Jeyalakshmi12018,
     author = {Jeyalakshmi, A. and Chitra, Dr. D. Ramya},
     title = {Source Camera Identification using Image Features},
     journal = {International Journal of Applied Engineering Research},
     year = {2018},
     volume = {13},
     number = {1},
     pages = {490--504}}
     
  117. A. Jeyalakshmi & D.R. Chitra
    Comparative study of feature extraction using several wavelet transforms for source camera identification
    Proc. 2nd Int. Conf. Inventive Systems and Control (ICISC)
    2018, pp. 1407-1414
    DOI: 10.1109/ICISC.2018.8398923
    BibTeX
    @inproceedings{Jeyalakshmi2018,
     author = {Jeyalakshmi, A. and Chitra, D. R.},
     title = {Comparative study of feature extraction using several wavelet transforms for source camera identification},
     booktitle = {Proc. 2nd Int. Conf. Inventive Systems and Control (ICISC)},
     year = {2018},
     pages = {1407--1414}}
     
  118. S. Jia, Z. Xu, H. Wang, C. Feng & T. Wang
    Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 25323-25335
    DOI: 10.1109/ACCESS.2018.2819624
    BibTeX
    @article{Jia2018,
     author = {Jia, S. and Xu, Z. and Wang, H. and Feng, C. and Wang, T.},
     title = {Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {25323--25335}}
     
  119. X. Jin, Y. Su, L. Zou, C. Zhang, P. Jing & X. Song
    Video logo removal detection based on sparse representation
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5959-8
    BibTeX
    @article{Jin2018,
     author = {Jin, Xiao and Su, Yuting and Zou, Liang and Zhang, Chengqian and Jing, Peiguang and Song, Xuemeng},
     title = {Video logo removal detection based on sparse representation},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  120. S. Joshi, G. Gupta & N. Khanna
    Source Classification Using Document Images from Smartphones and Flatbed Scanners
    Communications in Computer and Information Science
    Springer Singapore, 2018, pp. 281-292
    DOI: 10.1007/978-981-13-0020-2_25
    BibTeX
    @incollection{Joshi2018,
     author = {Joshi, Sharad and Gupta, Gaurav and Khanna, Nitin},
     title = {Source Classification Using Document Images from Smartphones and Flatbed Scanners},
     booktitle = {Communications in Computer and Information Science},
     publisher = {Springer Singapore},
     year = {2018},
     pages = {281--292}}
     
  121. K. Karthik & P. Malik
    Purple Fringing Aberration Detection Based on Content-Adaptable Thresholds
    Proceedings of First International Conference on Smart System, Innovations and Computing
    Springer, 2018
    DOI: 10.1007/978-981-10-5828-8_7
    BibTeX
    @incollection{Karthik2018,
     author = {Karthik, Kannan and Malik, Parveen},
     title = {Purple Fringing Aberration Detection Based on Content-Adaptable Thresholds},
     booktitle = {Proceedings of First International Conference on Smart System, Innovations and Computing},
     publisher = {Springer},
     year = {2018}}
     
  122. A. Kaur, S. Walia & K. Kumar
    Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods
    Proc. Eleventh Int. Conf. Contemporary Computing (IC3)
    2018, pp. 1-5
    DOI: 10.1109/IC3.2018.8530489
    BibTeX
    @inproceedings{Kaur2018,
     author = {Kaur, A. and Walia, S. and Kumar, K.},
     title = {Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods},
     booktitle = {Proc. Eleventh Int. Conf. Contemporary Computing (IC3)},
     year = {2018},
     pages = {1--5}}
     
  123. A. Khan, S. Rehman, M. Waleed, A. Khan, U. Khan, T. Kamal, S.K. Afridi & S.N.K. Marwat
    Forensic Video Analysis: Passive Tracking System for Automated Person of Interest (POI) Localization
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 43392-43403
    DOI: 10.1109/ACCESS.2018.2856936
    BibTeX
    @article{Khan2018d,
     author = {Khan, A. and Rehman, S. and Waleed, M. and Khan, A. and Khan, U. and Kamal, T. and Afridi, S. K. and Marwat, S. N. K.},
     title = {Forensic Video Analysis: Passive Tracking System for Automated Person of Interest (POI) Localization},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {43392--43403}}
     
  124. M.J. Khan, A. Yousaf, K. Khurshid, A. Abbas & F. Shafait
    Automated Forgery Detection in Multispectral Document Images Using Fuzzy Clustering
    Proc. 13th IAPR Int. Workshop Document Analysis Systems (DAS)
    2018, pp. 393-398
    DOI: 10.1109/DAS.2018.26
    BibTeX
    @inproceedings{Khan2018b,
     author = {Khan, M. J. and Yousaf, A. and Khurshid, K. and Abbas, A. and Shafait, F.},
     title = {Automated Forgery Detection in Multispectral Document Images Using Fuzzy Clustering},
     booktitle = {Proc. 13th IAPR Int. Workshop Document Analysis Systems (DAS)},
     year = {2018},
     pages = {393--398}}
     
  125. R.M. Khan, W. Iqbal, M.F. Amjad, H. Abbas, H. Afzal, A. Rauf & M. Pasha
    Forensic investigation to detect forgeries in ASF files of contemporary IP cameras
    The Journal of Supercomputing, Springer, 2018, pp. 1
    DOI: 10.1007/s11227-018-2377-7
    BibTeX
    @article{Khan2018,
     author = {Khan, Rashid Masood and Iqbal, Waseem and Amjad, Muhammad Faisal and Abbas, Haider and Afzal, Hammad and Rauf, Abdul and Pasha, Maruf},
     title = {Forensic investigation to detect forgeries in ASF files of contemporary IP cameras},
     journal = {The Journal of Supercomputing},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  126. U.A. Khan, M.A. Kaloi, Z.A. Shaikh & A.A. Arain
    A Hybrid Technique for Copy-Move Image Forgery Detection
    Proc. 3rd Int. Conf. Computer and Communication Systems (ICCCS)
    2018, pp. 212-216
    DOI: 10.1109/CCOMS.2018.8463337
    BibTeX
    @inproceedings{Khan2018a,
     author = {Khan, U. A. and Kaloi, M. A. and Shaikh, Z. A. and Arain, A. A.},
     title = {A Hybrid Technique for Copy-Move Image Forgery Detection},
     booktitle = {Proc. 3rd Int. Conf. Computer and Communication Systems (ICCCS)},
     year = {2018},
     pages = {212--216}}
     
  127. D. Kim, H.U. Jang, S.M. Mun, S. Choi & H.K. Lee
    Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks
    IEEE Signal Processing Letters, 2018, Vol. 25(2), pp. 278-282
    DOI: 10.1109/LSP.2017.2782363
    BibTeX
    @article{Kim2018,
     author = {Kim, D. and Jang, H. U. and Mun, S. M. and Choi, S. and Lee, H. K.},
     title = {Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks},
     journal = {IEEE Signal Processing Letters},
     year = {2018},
     volume = {25},
     number = {2},
     pages = {278--282}}
     
  128. P. Korus
    Large-Scale and Fine-Grained Evaluation of Popular JPEG Forgery Localization Schemes
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.12915v1
    BibTeX
    @article{Korus2018a,
     author = {Korus, Pawel},
     title = {Large-Scale and Fine-Grained Evaluation of Popular JPEG Forgery Localization Schemes},
     journal = {arXiv},
     year = {2018}}
     
  129. P. Korus & N. Memon
    Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1812.01516v1
    BibTeX
    @article{Korus2018,
     author = {Korus, Pawel and Memon, Nasir},
     title = {Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels},
     journal = {arXiv},
     year = {2018}}
     
  130. M. Kumar & S. Srivastava
    Image Tampering Detection Based on Inherent Lighting Fingerprints
    Computational Vision and Bio Inspired Computing
    Springer, 2018
    DOI: 10.1007/978-3-319-71767-8_97
    BibTeX
    @incollection{Kumar2018,
     author = {Kumar, Manoj and Srivastava, Sangeet},
     title = {Image Tampering Detection Based on Inherent Lighting Fingerprints},
     booktitle = {Computational Vision and Bio Inspired Computing},
     publisher = {Springer},
     year = {2018}}
     
  131. M. Kumar & S. Srivastava
    Image authentication by assessing manipulations using illumination
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6775-x
    BibTeX
    @article{Kumar2018a,
     author = {Kumar, Manoj and Srivastava, Sangeet},
     title = {Image authentication by assessing manipulations using illumination},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  132. A. Kuzin, A. Fattakhov, I. Kibardin, V. Iglovikov & R. Dautov
    Camera Model Identification Using Convolutional Neural Networks
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1810.02981v2
    BibTeX
    @article{Kuzin2018,
     author = {Kuzin, Artur and Fattakhov, Artur and Kibardin, Ilya and Iglovikov, Vladimir and Dautov, Ruslan},
     title = {Camera Model Identification Using Convolutional Neural Networks},
     journal = {arXiv},
     year = {2018}}
     
  133. A. Kuznetsov & V. Myasnikov
    Satellite Image Forgery Detection Based on Buildings Shadows Analysis
    Analysis of Images, Social Networks and Texts, Springer, 2018
    DOI: 10.1007/978-3-319-73013-4_21
    BibTeX
    @article{Kuznetsov2018,
     author = {Kuznetsov, Andrey and Myasnikov, Vladislav},
     title = {Satellite Image Forgery Detection Based on Buildings Shadows Analysis},
     journal = {Analysis of Images, Social Networks and Texts},
     publisher = {Springer},
     year = {2018}}
     
  134. C. Kyrkou, E.G. Christoforou, S. Timotheou, T. Theocharides, C. Panayiotou & M. Polycarpou
    Optimizing the Detection Performance of Smart Camera Networks Through a Probabilistic Image-Based Model
    #IEEE_J_CASVT#, 2018, Vol. 28(5), pp. 1197-1211
    DOI: 10.1109/TCSVT.2017.2651362
    BibTeX
    @article{Kyrkou2018,
     author = {Kyrkou, C. and Christoforou, E. G. and Timotheou, S. and Theocharides, T. and Panayiotou, C. and Polycarpou, M.},
     title = {Optimizing the Detection Performance of Smart Camera Networks Through a Probabilistic Image-Based Model},
     journal = {#IEEE_J_CASVT#},
     year = {2018},
     volume = {28},
     number = {5},
     pages = {1197--1211}}
     
  135. S. Law & N. Law
    PRNU-based source identification for network video surveillance system
    Proc. IEEE Int. Conf. Consumer Electronics (ICCE)
    2018, pp. 1-2
    DOI: 10.1109/ICCE.2018.8326094
    BibTeX
    @inproceedings{Law2018,
     author = {Law, S. and Law, N.},
     title = {PRNU-based source identification for network video surveillance system},
     booktitle = {Proc. IEEE Int. Conf. Consumer Electronics (ICCE)},
     year = {2018},
     pages = {1--2}}
     
  136. J. Li, W. Lu, J. Weng, Y. Mao & G. Li
    Double JPEG compression detection based on block statistics
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6175-2
    BibTeX
    @article{Li2018b,
     author = {Li, Jixian and Lu, Wei and Weng, Jian and Mao, Yijun and Li, Guoqiang},
     title = {Double JPEG compression detection based on block statistics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  137. R. Li, C.-T. Li & Y. Guan
    Inference of a compact representation of sensor fingerprint for source camera identification
    Pattern Recognition, Elsevier BV, 2018, Vol. 74, pp. 556-567
    DOI: 10.1016/j.patcog.2017.09.027
    BibTeX
    @article{Li2018,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {Inference of a compact representation of sensor fingerprint for source camera identification},
     journal = {Pattern Recognition},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {74},
     pages = {556--567}}
     
  138. W. Li, R. Ni, X. Li & Y. Zhao
    Robust median filtering detection based on the difference of frequency residuals
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6831-6
    BibTeX
    @article{Li2018f,
     author = {Li, Wenjie and Ni, Rongrong and Li, Xiaolong and Zhao, Yao},
     title = {Robust median filtering detection based on the difference of frequency residuals},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  139. X. Li, X. Qu, W. Xu, S. Wang, Y. Tong & L. Luo
    Validating the Contextual Information of Outdoor Images for Photo Misuse Detection
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.08951v1
    BibTeX
    @article{Li2018d,
     author = {Li, Xiaopeng and Qu, Xianshan and Xu, Wenyuan and Wang, Song and Tong, Yan and Luo, Lannan},
     title = {Validating the Contextual Information of Outdoor Images for Photo Misuse Detection},
     journal = {arXiv},
     year = {2018}}
     
  140. Y. Li, B. Wang, K. Chong & Y. Guo
    Complexity Based Sample Selection for Camera Source Identification
    Machine Learning and Intelligent Communications, Springer, 2018
    DOI: 10.1007/978-3-319-73564-1_17
    BibTeX
    @article{Li2018a,
     author = {Li, Yabin and Wang, Bo and Chong, Kun and Guo, Yanqing},
     title = {Complexity Based Sample Selection for Camera Source Identification},
     journal = {Machine Learning and Intelligent Communications},
     publisher = {Springer},
     year = {2018}}
     
  141. Y. Li & J. Zhou
    Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching
    #IEEE_J_IFS#, 2018, pp. 1
    DOI: 10.1109/TIFS.2018.2876837
    BibTeX
    @article{Li2018c,
     author = {Li, Y. and Zhou, J.},
     title = {Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching},
     journal = {#IEEE_J_IFS#},
     year = {2018},
     pages = {1}}
     
  142. C. Lin, W. Lu, X. Huang, K. Liu, W. Sun, H. Lin & Z. Tan
    Copy-move forgery detection using combined features and transitive matching
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6922-4
    BibTeX
    @article{Lin2018c,
     author = {Lin, Cong and Lu, Wei and Huang, Xinchao and Liu, Ke and Sun, Wei and Lin, Hanhui and Tan, Zhiyuan},
     title = {Copy-move forgery detection using combined features and transitive matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  143. L. Lin, W. Chen, Y. Wang, S. Reinder, Y. Guan, J. Newman & M. Wu
    The Impact of Exposure Settings in Digital Image Forensics
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 540-544
    DOI: 10.1109/ICIP.2018.8451688
    BibTeX
    @inproceedings{Lin2018b,
     author = {Lin, L. and Chen, W. and Wang, Y. and Reinder, S. and Guan, Y. and Newman, J. and Wu, M.},
     title = {The Impact of Exposure Settings in Digital Image Forensics},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {540--544}}
     
  144. X. Lin
    Image Forgery Detection
    Introductory Computer Forensics
    Springer, 2018
    DOI: 10.1007/978-3-030-00581-8_20
    BibTeX
    @incollection{Lin2018d,
     author = {Lin, Xiaodong},
     title = {Image Forgery Detection},
     booktitle = {Introductory Computer Forensics},
     publisher = {Springer},
     year = {2018}}
     
  145. X. Lin & X. Kang
    Robust Electric Network Frequency Estimation with Rank Reduction and Linear Prediction
    ACM Trans. Multimedia Comput. Commun. Appl., ACM, 2018, Vol. 14(4), pp. 84:1-84:13
    DOI: 10.1145/3241058
    BibTeX
    @article{Lin2018a,
     author = {Lin, Xiaodan and Kang, Xiangui},
     title = {Robust Electric Network Frequency Estimation with Rank Reduction and Linear Prediction},
     journal = {ACM Trans. Multimedia Comput. Commun. Appl.},
     publisher = {ACM},
     year = {2018},
     volume = {14},
     number = {4},
     pages = {84:1--84:13}}
     
  146. X. Lin, J.-H. Li, S.-L. Wang, A.-W.-C. Liew, F. Cheng & X.-S. Huang
    Recent Advances in Passive Digital Image Security Forensics: A Brief Review
    Engineering, Elsevier BV, 2018
    DOI: 10.1016/j.eng.2018.02.008
    BibTeX
    @article{Lin2018,
     author = {Lin, Xiang and Li, Jian-Hua and Wang, Shi-Lin and Liew, Alan-Wee-Chung and Cheng, Feng and Huang, Xiao-Sa},
     title = {Recent Advances in Passive Digital Image Security Forensics: A Brief Review},
     journal = {Engineering},
     publisher = {Elsevier BV},
     year = {2018}}
     
  147. B. Liu & C.-M. Pun
    Locating splicing forgery by fully convolutional networks and conditional random field
    Signal Processing: Image Communication, Elsevier BV, 2018
    DOI: 10.1016/j.image.2018.04.011
    BibTeX
    @article{Liu2018,
     author = {Liu, Bo and Pun, Chi-Man},
     title = {Locating splicing forgery by fully convolutional networks and conditional random field},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018}}
     
  148. Q. Liu
    An Improved Approach to Exposing JPEG Seam Carving under Recompression
    #IEEE_J_CASVT#, 2018, pp. 1
    DOI: 10.1109/TCSVT.2018.2859633
    BibTeX
    @article{Liu2018b,
     author = {Liu, Q.},
     title = {An Improved Approach to Exposing JPEG Seam Carving under Recompression},
     journal = {#IEEE_J_CASVT#},
     year = {2018},
     pages = {1}}
     
  149. X. Liu, W. Lu, T. Huang, H. Liu, Y. Xue & Y. Yeung
    Scaling factor estimation on JPEG compressed images by cyclostationarity analysis
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6411-9
    BibTeX
    @article{Liu2018a,
     author = {Liu, Xianjin and Lu, Wei and Huang, Tao and Liu, Hongmei and Xue, Yingjie and Yeung, Yuileong},
     title = {Scaling factor estimation on JPEG compressed images by cyclostationarity analysis},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  150. C. Long, A. Basharat & A. Hoogs
    A Coarse-to-fine Deep Convolutional Neural Network Framework for Frame Duplication Detection and Localization in Video Forgery
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.10762v1
    BibTeX
    @article{Long2018,
     author = {Long, Chengjiang and Basharat, Arslan and Hoogs, Anthony},
     title = {A Coarse-to-fine Deep Convolutional Neural Network Framework for Frame Duplication Detection and Localization in Video Forgery},
     journal = {arXiv},
     year = {2018}}
     
  151. F. Lopez, L. Valent\in & Í.S.M. Mendivil
    Detecting Image Brush Editing Using the Discarded Coefficients and Intentions
    International Journal of Interactive Multimedia and Artificial Intelligence, IMAI Software - International Journal of Interactive Multimedia and Artificial Intelligence, 2018, Vol. {InPress}({InPress}), pp. 1
    DOI: 10.9781/ijimai.2018.08.003
    BibTeX
    @article{Lopez2018,
     author = {Lopez, Fernando and Valent\in, Luis and Mendivil, Ínigo Sarr\ia Mart\inez},
     title = { Detecting Image Brush Editing Using the Discarded Coefficients and Intentions },
     journal = {International Journal of Interactive Multimedia and Artificial Intelligence},
     publisher = {IMAI Software - International Journal of Interactive Multimedia and Artificial Intelligence},
     year = {2018},
     volume = {InPress},
     number = {InPress},
     pages = {1}}
     
  152. T. Mahmood, Z. Mehmood, M. Shah & T. Saba
    A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 53, pp. 202-214
    DOI: 10.1016/j.jvcir.2018.03.015
    BibTeX
    @article{Mahmood2018,
     author = {Mahmood, Toqeer and Mehmood, Zahid and Shah, Mohsin and Saba, Tanzila},
     title = {A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {53},
     pages = {202--214}}
     
  153. C. Maigrot, V. Claveau & E. Kijak
    Fusion-based multimodal detection of hoaxes in social networks
    WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile.
    WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile., 2018
    BibTeX
    @conference{Maigrot2018,
     author = {Maigrot, Cédric and Claveau, Vincent and Kijak, Ewa},
     title = {Fusion-based multimodal detection of hoaxes in social networks},
     booktitle = {WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile.},
     journal = {WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile.},
     year = {2018}}
     
  154. C. Maigrot, E. Kijak & V. Claveau
    Context-Aware Forgery Localization in Social-Media Images: A Feature-Based Approach Evaluation
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 545-549
    DOI: 10.1109/ICIP.2018.8451726
    BibTeX
    @inproceedings{Maigrot2018a,
     author = {Maigrot, C. and Kijak, E. and Claveau, V.},
     title = {Context-Aware Forgery Localization in Social-Media Images: A Feature-Based Approach Evaluation},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {545--549}}
     
  155. S. Mandelli, P. Bestagini, S. Tubaro, D. Cozzolino & L. Verdoliva
    Blind Detection and Localization of Video Temporal Splicing Exploiting Sensor-Based Footprints
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 1362-1366
    DOI: 10.23919/EUSIPCO.2018.8553511
    BibTeX
    @inproceedings{Mandelli2018a,
     author = {Mandelli, S. and Bestagini, P. and Tubaro, S. and Cozzolino, D. and Verdoliva, L.},
     title = {Blind Detection and Localization of Video Temporal Splicing Exploiting Sensor-Based Footprints},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {1362--1366}}
     
  156. S. Mandelli, P. Bestagini, L. Verdoliva & S. Tubaro
    Facing Device Attribution Problem for Stabilized Video Sequences
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.01820v1
    BibTeX
    @article{Mandelli2018b,
     author = {Mandelli, Sara and Bestagini, Paolo and Verdoliva, Luisa and Tubaro, Stefano},
     title = {Facing Device Attribution Problem for Stabilized Video Sequences},
     journal = {arXiv},
     year = {2018}}
     
  157. S. Mandelli, N. Bonettini, P. Bestagini, V. Lipari & S. Tubaro
    Multiple JPEG Compression Detection Through Task-Driven Non-Negative Matrix Factorization
    Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics
    2018, pp. 2106-2110
    DOI: 10.1109/ICASSP.2018.8461904
    BibTeX
    @inproceedings{Mandelli2018,
     author = {Mandelli, S. and Bonettini, N. and Bestagini, P. and Lipari, V. and Tubaro, S.},
     title = {Multiple JPEG Compression Detection Through Task-Driven Non-Negative Matrix Factorization},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics},
     year = {2018},
     pages = {2106--2110}}
     
  158. V.T. Manu & B.M. Mehtre
    Tamper Detection of Social Media Images using Quality Artifacts and Texture Features
    Forensic Science International, Elsevier BV, 2018
    DOI: 10.1016/j.forsciint.2018.11.025
    BibTeX
    @article{Manu2018,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Tamper Detection of Social Media Images using Quality Artifacts and Texture Features},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2018}}
     
  159. F. Marra, D. Gragnaniello & L. Verdoliva
    On the vulnerability of deep learning to adversarial attacks for camera model identification
    Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 65, pp. 240-248
    DOI: 10.1016/j.image.2018.04.007
    BibTeX
    @article{Marra2018,
     author = {Marra, F. and Gragnaniello, D. and Verdoliva, L.},
     title = {On the vulnerability of deep learning to adversarial attacks for camera model identification},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {65},
     pages = {240--248}}
     
  160. M. Mascicpinto & F. Perez-Gonzalez
    Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 1352-1356
    DOI: 10.23919/EUSIPCO.2018.8553232
    BibTeX
    @inproceedings{Mascicpinto2018,
     author = {Mascicpinto, M. and Perez-Gonzalez, F.},
     title = {Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {1352--1356}}
     
  161. M. Masciopinto & F. Perez-González
    Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals
    -, 2018
    BibTeX
    @article{Masciopinto2018,
     author = {Masciopinto, Miguel and Perez-González, Fernando},
     title = {Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals},
     journal = {-},
     year = {2018}}
     
  162. O. Mayer, B. Bayar & M.C. Stamm
    Learning Unified Deep-Features for Multiple Forensic Tasks
    Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '18, 2018
    BibTeX
    @article{Mayer2018b,
     author = {Mayer, Owen and Bayar, Belhassen and Stamm, Matthew C.},
     title = {Learning Unified Deep-Features for Multiple Forensic Tasks},
     journal = {Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '18},
     year = {2018}}
     
  163. O. Mayer & M.C. Stamm
    Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration
    IEEE Transactions on Information Forensics and Security, 2018, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2018.2799421
    BibTeX
    @article{Mayer2018,
     author = {Mayer, O. and Stamm, M. C.},
     title = {Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     volume = {PP},
     number = {99},
     pages = {1}}
     
  164. O. Mayer & M.C. Stamm
    Learned Forensic Source Similarity for Unknown Camera Models
    Proc of the SIGPORT 2018
    2018
    BibTeX
    @inproceedings{Mayer2018a,
     author = {Mayer, Owen and Stamm, Mathew C.},
     title = {Learned Forensic Source Similarity for Unknown Camera Models},
     booktitle = {Proc of the SIGPORT 2018},
     year = {2018}}
     
  165. O. Mayer & M.C. Stamm
    Learned Forensic Source Similarity for Unknown Camera Models
    Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics
    2018, pp. 2012-2016
    DOI: 10.1109/ICASSP.2018.8462585
    BibTeX
    @inproceedings{Mayer2018c,
     author = {Mayer, O. and Stamm, M. C.},
     title = {Learned Forensic Source Similarity for Unknown Camera Models},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics},
     year = {2018},
     pages = {2012--2016}}
     
  166. A. Mazumdar, J. Singh, Y.S. Tomar & P.K. Bora
    Universal Image Manipulation Detection using Deep Siamese Convolutional Neural Network
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1808.06323v2
    BibTeX
    @article{Mazumdar2018,
     author = {Mazumdar, Aniruddha and Singh, Jaya and Tomar, Yosha Singh and Bora, Prabin Kumar},
     title = {Universal Image Manipulation Detection using Deep Siamese Convolutional Neural Network},
     journal = {arXiv},
     year = {2018}}
     
  167. S. McKeown, G. Russell & P. Leimich
    Fingerprinting JPEGs With Optimised Huffman Tables
    The Journal of Digital Forensics, Security and Law, Embry-Riddle Aeronautical University/Hunt Library, 2018
    DOI: 10.15394/jdfsl.2018.1451
    BibTeX
    @article{McKeown2018,
     author = {McKeown, Sean and Russell, Gordon and Leimich, Petra},
     title = {Fingerprinting JPEGs With Optimised Huffman Tables},
     journal = {The Journal of Digital Forensics, Security and Law},
     publisher = {Embry-Riddle Aeronautical University/Hunt Library},
     year = {2018}}
     
  168. A. Mehrish, A.V. Subramanyam & S. Emmanuel
    Robust PRNU estimation from probabilistic raw measurements
    Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 66, pp. 30-41
    DOI: 10.1016/j.image.2018.04.013
    BibTeX
    @article{Mehrish2018,
     author = {Mehrish, Ambuj and Subramanyam, A. V. and Emmanuel, Sabu},
     title = {Robust PRNU estimation from probabilistic raw measurements},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {66},
     pages = {30--41}}
     
  169. R. Mehta & N. Agarwal
    Splicing Detection for Combined DCT, DWT and Spatial Markov-Features Using Ensemble Classifier
    Procedia Computer Science, Elsevier BV, 2018, Vol. 132, pp. 1695-1705
    DOI: 10.1016/j.procs.2018.05.143
    BibTeX
    @article{Mehta2018,
     author = {Mehta, Rachna and Agarwal, Navneet},
     title = {Splicing Detection for Combined DCT, DWT and Spatial Markov-Features Using Ensemble Classifier},
     journal = {Procedia Computer Science},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {132},
     pages = {1695--1705}}
     
  170. S.E. Middleton, S. Papadopoulos & Y. Kompatsiaris
    Social Computing for Verifying Social Media Content in Breaking News
    IEEE Internet Computing, Institute of Electrical and Electronics Engineers (IEEE), 2018, Vol. 22(2), pp. 83-89
    DOI: 10.1109/mic.2018.112102235
    BibTeX
    @article{Middleton2018,
     author = {Middleton, Stuart E. and Papadopoulos, Symeon and Kompatsiaris, Yiannis},
     title = {Social Computing for Verifying Social Media Content in Breaking News},
     journal = {IEEE Internet Computing},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2018},
     volume = {22},
     number = {2},
     pages = {83--89}}
     
  171. A.V. Mire, S.B. Dhok, N.J. Mistry & P.D. Porey
    Automated approach for splicing detection using first digit probability distribution features
    EURASIP Journal on Image and Video Processing, Springer, 2018, Vol. 2018(1), pp. 1
    DOI: 10.1186/s13640-018-0257-y
    BibTeX
    @article{Mire2018,
     author = {Mire, Archana V. and Dhok, Sanjay B. and Mistry, N. J. and Porey, Prakash D.},
     title = {Automated approach for splicing detection using first digit probability distribution features},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2018},
     volume = {2018},
     number = {1},
     pages = {1}}
     
  172. Z. Moghaddasi, H.A. Jalab & R.M. Noor
    Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients
    Neural Computing and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s00521-018-3586-y
    BibTeX
    @article{Moghaddasi2018,
     author = {Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md.},
     title = {Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients},
     journal = {Neural Computing and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  173. T.M. Mohammed, J. Bunk, L. Nataraj, J.H. Bappy, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury & L. Peterson
    Boosting Image Forgery Detection using Resampling Detection and Copy-move analysis
    ArXiv, 2018
    arXiv: 1802.03154v1
    BibTeX
    @article{Mohammed2018,
     author = {Mohammed, Tajuddin Manhar and Bunk, Jason and Nataraj, Lakshmanan and Bappy, Jawadul H. and Flenner, Arjuna and Manjunath, B. S. and Chandrasekaran, Shivkumar and Roy-Chowdhury, Amit K. and Peterson, Lawrence},
     title = {Boosting Image Forgery Detection using Resampling Detection and Copy-move analysis},
     journal = {ArXiv},
     year = {2018}}
     
  174. M. Mohanty, M. Zhang, M.R. Asghar & G. Russello
    PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution
    Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)
    2018, pp. 1202-1207
    DOI: 10.1109/TrustCom/BigDataSE.2018.00166
    BibTeX
    @inproceedings{Mohanty2018,
     author = {Mohanty, M. and Zhang, M. and Asghar, M. R. and Russello, G.},
     title = {PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution},
     booktitle = {Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)},
     year = {2018},
     pages = {1202--1207}}
     
  175. D. Moreira, A. Bharati, J. Brogan, A. Pinto, M. Parowski, K.W. Bowyer, P.J. Flynn, A. Rocha & W.J. Scheirer
    Image Provenance Analysis at Scale
    ArXiv, 2018
    arXiv: 1801.06510v2
    BibTeX
    @article{Moreira2018,
     author = {Moreira, Daniel and Bharati, Aparna and Brogan, Joel and Pinto, Allan and Parowski, Michael and Bowyer, Kevin W. and Flynn, Patrick J. and Rocha, Anderson and Scheirer, Walter J.},
     title = {Image Provenance Analysis at Scale},
     journal = {ArXiv},
     year = {2018}}
     
  176. D.C. Moreira & J.M. Fechine
    A Machine Learning-based Forensic Discriminator of Pornographic and Bikini Images
    Proc. Int. Joint Conf. Neural Networks (IJCNN)
    2018, pp. 1-8
    DOI: 10.1109/IJCNN.2018.8489100
    BibTeX
    @inproceedings{Moreira2018a,
     author = {Moreira, D. C. and Fechine, J. M.},
     title = {A Machine Learning-based Forensic Discriminator of Pornographic and Bikini Images},
     booktitle = {Proc. Int. Joint Conf. Neural Networks (IJCNN)},
     year = {2018},
     pages = {1--8}}
     
  177. A. Morinaga, K. Hara, K. Inoue & K. Urahama
    Classification between natural and graphics images based on generalized Gaussian distributions
    Information Processing Letters, Elsevier BV, 2018, Vol. 138, pp. 31-34
    DOI: 10.1016/j.ipl.2018.05.010
    BibTeX
    @article{Morinaga2018,
     author = {Morinaga, Atsushi and Hara, Kenji and Inoue, Kohei and Urahama, Kiichi},
     title = {Classification between natural and graphics images based on generalized Gaussian distributions},
     journal = {Information Processing Letters},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {138},
     pages = {31--34}}
     
  178. A. Mumcu & I. Savran
    Copy move forgery detection with using FAST key points and SIFT description vectors
    Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
    2018, pp. 1-4
    DOI: 10.1109/SIU.2018.8404363
    BibTeX
    @inproceedings{Mumcu2018,
     author = {Mumcu, A. and Savran, I.},
     title = {Copy move forgery detection with using FAST key points and SIFT description vectors},
     booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2018},
     pages = {1--4}}
     
  179. S. Mushtaq & A.H. Mir
    Copy-Move Detection Using Gray Level Run Length Matrix Features
    Optical and Wireless Technologies, Springer, 2018
    DOI: 10.1007/978-981-10-7395-3_46
    BibTeX
    @article{Mushtaq2018,
     author = {Mushtaq, Saba and Mir, Ajaz Hussain},
     title = {Copy-Move Detection Using Gray Level Run Length Matrix Features},
     journal = {Optical and Wireless Technologies},
     publisher = {Springer},
     year = {2018}}
     
  180. G. Muzaffer, E.S. Erdöl & G. Ulutaş
    A copy-move forgery detection approach based on local intensity order pattern and patchmatch
    Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
    2018, pp. 1-4
    DOI: 10.1109/SIU.2018.8404602
    BibTeX
    @inproceedings{Muzaffer2018,
     author = {Muzaffer, G. and Erdöl, E. S. and Ulutaş, G.},
     title = {A copy-move forgery detection approach based on local intensity order pattern and patchmatch},
     booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2018},
     pages = {1--4}}
     
  181. M. Nasiri & A. Behrad
    Exposing forgeries in soccer images using geometric clues
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6225-9
    BibTeX
    @article{Nasiri2018,
     author = {Nasiri, Morteza and Behrad, Alireza},
     title = {Exposing forgeries in soccer images using geometric clues},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  182. M. Nasiri & A. Behrad
    Using Expectation-Maximization for Exposing Image Forgeries by Revealing Inconsistencies in Shadow Geometry
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018
    DOI: 10.1016/j.jvcir.2018.12.007
    BibTeX
    @article{Nasiri2018a,
     author = {Nasiri, Morteza and Behrad, Alireza},
     title = {Using Expectation-Maximization for Exposing Image Forgeries by Revealing Inconsistencies in Shadow Geometry},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018}}
     
  183. T. Nikoukhah, R.G. von Gioi, M. Colom & J. Morel
    Automatic JPEG Grid Detection with Controlled False Alarms, and Its Image Forensic Applications
    Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)
    2018, pp. 378-383
    DOI: 10.1109/MIPR.2018.00083
    BibTeX
    @inproceedings{Nikoukhah2018a,
     author = {Nikoukhah, T. and von Gioi, R. Grompone and Colom, M. and Morel, J.},
     title = {Automatic JPEG Grid Detection with Controlled False Alarms, and Its Image Forensic Applications},
     booktitle = {Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)},
     year = {2018},
     pages = {378--383}}
     
  184. T. Nikoukhah, R.G. von Gioi, M. Colom & J.-M. Morel
    Automatic JPEG grid detection with controlled false alarms, and its image forensic applications
    2018
    BibTeX
    @electronic{Nikoukhah2018,
     author = {Nikoukhah, Tina and von Gioi, Rafael Grompone and Colom, Miguel and Morel, Jean-Michel},
     title = {Automatic JPEG grid detection with controlled false alarms, and its image forensic applications},
     year = {2018}}
     
  185. K.W. Nixon, J. Mao, J. Shen, H. Yang, H. (H. Li & Y. Chen
    SPN dash
    Proceedings of the International Conference on Computer-Aided Design - ICCAD '18
    ACM Press, 2018
    DOI: 10.1145/3240765.3240851
    BibTeX
    @inproceedings{Nixon2018,
     author = {Nixon, Kent W. and Mao, Jiachen and Shen, Juncheng and Yang, Huanrui and Li, Hai (Helen) and Chen, Yiran},
     title = {SPN dash},
     booktitle = {Proceedings of the International Conference on Computer-Aided Design - ICCAD '18},
     publisher = {ACM Press},
     year = {2018}}
     
  186. P. Niyishaka & C. Bhagvati
    Digital Image Forensics Technique for Copy-Move Forgery Detection Using DoG and ORB
    Computer Vision and Graphics, Springer, 2018
    DOI: 10.1007/978-3-030-00692-1_41
    BibTeX
    @article{Niyishaka2018,
     author = {Niyishaka, Patrick and Bhagvati, Chakravarthy},
     title = {Digital Image Forensics Technique for Copy-Move Forgery Detection Using DoG and ORB},
     journal = {Computer Vision and Graphics},
     publisher = {Springer},
     year = {2018}}
     
  187. A. Novozámský & M. Šorel
    Detection of copy-move image modification using JPEG compression model
    Forensic Science International, Elsevier BV, 2018, Vol. 283, pp. 47-57
    DOI: 10.1016/j.forsciint.2017.11.031
    BibTeX
    @article{Novozamsky2018,
     author = {Novozámský, Adam and Šorel, Michal},
     title = {Detection of copy-move image modification using JPEG compression model},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {283},
     pages = {47--57}}
     
  188. J.A. Ojeniyi, B.O. Adedayo, I. Ismaila & A.M. Shafi'i
    Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques
    International Journal of Image, Graphics and Signal Processing, MECS Publisher, 2018, Vol. 10(4), pp. 22-30
    DOI: 10.5815/ijigsp.2018.04.03
    BibTeX
    @article{Ojeniyi2018,
     author = {Ojeniyi, Joseph A. and Adedayo, Bolaji O. and Ismaila, Idris and Shafi'i, Abdulhamid M.},
     title = {Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques},
     journal = {International Journal of Image, Graphics and Signal Processing},
     publisher = {MECS Publisher},
     year = {2018},
     volume = {10},
     number = {4},
     pages = {22--30}}
     
  189. A.H. Oyiza & M.A. Maarof
    An Improved DCT Block Based Technique for Copy-Move Forgery Detection in Medical Images
    International Journal of Innovative Computing, 2018
    BibTeX
    @article{Oyiza2018,
     author = {Oyiza, Abdulraheem Hassanat and Maarof, Mohd Aizaini},
     title = {An Improved DCT Block Based Technique for Copy-Move Forgery Detection in Medical Images},
     journal = {International Journal of Innovative Computing},
     year = {2018}}
     
  190. S. Panda & M. Mishra
    Passive Techniques of Digital Image Forgery Detection: Developments and Challenges
    Advances in Electronics, Communication and Computing
    Springer, 2018
    DOI: 10.1007/978-981-10-4765-7_29
    BibTeX
    @incollection{Panda2018,
     author = {Panda, Santoshini and Mishra, Minati},
     title = {Passive Techniques of Digital Image Forgery Detection: Developments and Challenges},
     booktitle = {Advances in Electronics, Communication and Computing},
     publisher = {Springer},
     year = {2018}}
     
  191. A. Parashar, A.K. Upadhyay & K. Gupta
    An effectual classification approach to detect copy-move forgery using support vector machines
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6707-9
    BibTeX
    @article{Parashar2018,
     author = {Parashar, Amrita and Upadhyay, Arvind Kumar and Gupta, Kamlesh},
     title = {An effectual classification approach to detect copy-move forgery using support vector machines},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  192. H.M.S. Parvez, S. Sadeghi, H.A. Jalab, A.R. Al-Shamasneh & D.M. Uliyan
    Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering
    Proc. Int. Conf. Smart Computing and Electronic Enterprise (ICSCEE)
    2018, pp. 1-6
    DOI: 10.1109/ICSCEE.2018.8538432
    BibTeX
    @inproceedings{Parvez2018,
     author = {Parvez, H. M. S. and Sadeghi, S. and Jalab, H. A. and Al-Shamasneh, A. R. and Uliyan, D. M.},
     title = {Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering},
     booktitle = {Proc. Int. Conf. Smart Computing and Electronic Enterprise (ICSCEE)},
     year = {2018},
     pages = {1--6}}
     
  193. B. Peng, W. Wang, J. Dong & T. Tan
    Image Forensics Based on Planar Contact Constraints of 3D Objects
    IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(2), pp. 377-392
    DOI: 10.1109/TIFS.2017.2752728
    BibTeX
    @article{Peng2018,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Image Forensics Based on Planar Contact Constraints of 3D Objects},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     volume = {13},
     number = {2},
     pages = {377--392}}
     
  194. F. Peng, L.-b. Zhang & M. Long
    FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.07665v1
    BibTeX
    @article{Peng2018a,
     author = {Peng, Fei and Zhang, Le-bing and Long, Min},
     title = {FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image},
     journal = {arXiv},
     year = {2018}}
     
  195. N.T. Pham, J.-W. Lee, G.-R. Kwon & C.-S. Park
    Efficient image splicing detection algorithm based on markov features
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6792-9
    BibTeX
    @article{Pham2018,
     author = {Pham, Nam Thanh and Lee, Jong-Weon and Kwon, Goo-Rak and Park, Chun-Su},
     title = {Efficient image splicing detection algorithm based on markov features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  196. Q.-T. Phan, G. Boato & F.G.B.D. Natale
    Accurate and Scalable Image Clustering Based On Sparse Representation of Camera Fingerprint
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1810.07945v1
    BibTeX
    @article{Phan2018,
     author = {Phan, Quoc-Tin and Boato, Giulia and Natale, Francesco G. B. De},
     title = {Accurate and Scalable Image Clustering Based On Sparse Representation of Camera Fingerprint},
     journal = {arXiv},
     year = {2018}}
     
  197. T. Pomari, G. Ruppert, E. Rezende, A. Rocha & T. Carvalho
    Image Splicing Detection Through Illumination Inconsistencies and Deep Learning
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 3788-3792
    DOI: 10.1109/ICIP.2018.8451227
    BibTeX
    @inproceedings{Pomari2018,
     author = {Pomari, T. and Ruppert, G. and Rezende, E. and Rocha, A. and Carvalho, T.},
     title = {Image Splicing Detection Through Illumination Inconsistencies and Deep Learning},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {3788--3792}}
     
  198. C.S. Prakash, A. Kumar, S. Maheshkar & V. Maheshkar
    An integrated method of copy-move and splicing for image forgery detection
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5899-3
    BibTeX
    @article{Prakash2018,
     author = {Prakash, Choudhary Shyam and Kumar, Avinash and Maheshkar, Sushila and Maheshkar, Vikas},
     title = {An integrated method of copy-move and splicing for image forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  199. C.S. Prakash, H. Om, S. Maheshkar & V. Maheshkar
    Keypoint-based passive method for image manipulation detection
    Song, T. (ed.)
    Cogent Engineering, Cogent OA, 2018, Vol. 5(1), pp. 1-19
    DOI: 10.1080/23311916.2018.1523346
    BibTeX
    @article{Prakash2018a,
     author = {Prakash, Choudhary Shyam and Om, Hari and Maheshkar, Sushila and Maheshkar, Vikas},
     title = {Keypoint-based passive method for image manipulation detection},
     journal = {Cogent Engineering},
     publisher = {Cogent OA},
     year = {2018},
     volume = {5},
     number = {1},
     pages = {1--19}}
     
  200. N. Privman-Horesh, A. Haider & H. Hel-Or
    Forgery detection in 3D-sensor images
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018
    2018
    BibTeX
    @inproceedings{Privman-Horesh2018,
     author = {Privman-Horesh, Noa and Haider, Azmi and Hel-Or, Hagit},
     title = {Forgery detection in 3D-sensor images},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018},
     year = {2018}}
     
  201. T. Qiao, R. Shi, X. Luo, M. Xu, N. Zheng & Y. Wu
    Statistical Model-based Detector via Texture Weight Map: Application in Re-sampling Authentication
    IEEE Transactions on Multimedia, 2018, pp. 1
    DOI: 10.1109/TMM.2018.2872863
    BibTeX
    @article{Qiao2018,
     author = {Qiao, T. and Shi, R. and Luo, X. and Xu, M. and Zheng, N. and Wu, Y.},
     title = {Statistical Model-based Detector via Texture Weight Map: Application in Re-sampling Authentication},
     journal = {IEEE Transactions on Multimedia},
     year = {2018},
     pages = {1}}
     
  202. W. Quan, K. Wang, D.M. Yan & X. Zhang
    Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks
    #IEEE_J_IFS#, 2018, Vol. 13(11), pp. 2772-2787
    DOI: 10.1109/TIFS.2018.2834147
    BibTeX
    @article{Quan2018,
     author = {Quan, W. and Wang, K. and Yan, D. M. and Zhang, X.},
     title = {Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks},
     journal = {#IEEE_J_IFS#},
     year = {2018},
     volume = {13},
     number = {11},
     pages = {2772--2787}}
     
  203. P. Raja Mani & D. Lalitha Bhaskari
    A Prototype for Image Tamper Detection with Self-generated Verification Code Using Gödelization
    Smart Computing and Informatics
    Springer, 2018
    DOI: 10.1007/978-981-10-5547-8_23
    BibTeX
    @incollection{RajaMani2018,
     author = {Raja Mani, P. and Lalitha Bhaskari, D.},
     title = {A Prototype for Image Tamper Detection with Self-generated Verification Code Using Gödelization},
     booktitle = {Smart Computing and Informatics},
     publisher = {Springer},
     year = {2018}}
     
  204. P.M. Raju & M.S. Nair
    Copy-move forgery detection using binary discriminant features
    Journal of King Saud University - Computer and Information Sciences, Elsevier BV, 2018
    DOI: 10.1016/j.jksuci.2018.11.004
    BibTeX
    @article{Raju2018,
     author = {Raju, Priya Mariam and Nair, Madhu S.},
     title = {Copy-move forgery detection using binary discriminant features},
     journal = {Journal of King Saud University - Computer and Information Sciences},
     publisher = {Elsevier BV},
     year = {2018}}
     
  205. S. Ramakrishnan & S. Nithya
    Two improved extension of local binary pattern descriptors using wavelet transform for texture classification
    IET Image Proc, 2018, Vol. 12(11), pp. 2002-2010
    DOI: 10.1049/iet-ipr.2018.5410
    BibTeX
    @article{Ramakrishnan2018,
     author = {Ramakrishnan, S. and Nithya, S.},
     title = {Two improved extension of local binary pattern descriptors using wavelet transform for texture classification},
     journal = {IET Image Proc},
     year = {2018},
     volume = {12},
     number = {11},
     pages = {2002--2010}}
     
  206. S. Ranjan, P. Garhwal, M. Arora & A. Mehra
    Image Processing based forensic investigation of morphed documents
    Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics
    2018, pp. 1384-1389
    DOI: 10.1109/ICECA.2018.8474811
    BibTeX
    @inproceedings{Ranjan2018,
     author = {Ranjan, S. and Garhwal, P. and Arora, M. and Mehra, A.},
     title = {Image Processing based forensic investigation of morphed documents},
     booktitle = {Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics},
     year = {2018},
     pages = {1384--1389}}
     
  207. A. Rössler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies & M. Nießner
    FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1803.09179v1
    BibTeX
    @article{Roessler2018,
     author = {Rössler, Andreas and Cozzolino, Davide and Verdoliva, Luisa and Riess, Christian and Thies, Justus and Nießner, Matthias},
     title = {FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces},
     journal = {arXiv},
     year = {2018}}
     
  208. A. Roy, D.B. Tariang, R.S. Chakraborty & R. Naskar
    Discrete cosine transform residual feature based filtering forgery and splicing detection in JPEG images
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018
    2018
    BibTeX
    @inproceedings{Roy2018,
     author = {Roy, Aniket and Tariang, Diangarti Bhalang and Chakraborty, Rajat Subhra and Naskar, Ruchira},
     title = {Discrete cosine transform residual feature based filtering forgery and splicing detection in JPEG images},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018},
     year = {2018}}
     
  209. K. Saini & S.P. Kaur
    Examination of digitally manipulated documents using matlab 7.10.0 and adobe photoshop 7.0
    Problems of Forensic Sciences, 2018
    BibTeX
    @article{Saini2018,
     author = {Saini, Komal and Kaur, Shabman Preet},
     title = {Examination of digitally manipulated documents using matlab 7.10.0 and adobe photoshop 7.0},
     journal = {Problems of Forensic Sciences},
     year = {2018}}
     
  210. S.F.M. Salleh, M.F. Rohani & M.A.M. Maarof
    Solving Time Complexity Issue in Copy-Move Forgery Detection Thru Pre-processing Techniques
    International Journal of Innovative Computing, Penerbit UTM Press, 2018, Vol. 8(3)
    DOI: 10.11113/ijic.v8n3.213
    BibTeX
    @article{Salleh2018,
     author = {Salleh, Siti Fadzlun Md and Rohani, Mohd Foad and Maarof, Mohd Aizaini Maarof},
     title = {Solving Time Complexity Issue in Copy-Move Forgery Detection Thru Pre-processing Techniques},
     journal = {International Journal of Innovative Computing},
     publisher = {Penerbit UTM Press},
     year = {2018},
     volume = {8},
     number = {3}}
     
  211. R. Salloum, Y. Ren & C.-C.J. Kuo
    Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN)
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 51, pp. 201-209
    DOI: 10.1016/j.jvcir.2018.01.010
    BibTeX
    @article{Salloum2018,
     author = {Salloum, Ronald and Ren, Yuzhuo and Kuo, C.-C. Jay},
     title = {Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN)},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {51},
     pages = {201--209}}
     
  212. A. Samčović
    A Survey on Blind Digital Photographs Forensics Based on Image Analysis
    Proc of the SIGNAL 2018 : The Third International Conference on Advances in Signal, Image and Video Processing
    2018
    BibTeX
    @inproceedings{Samcovic2018,
     author = {Samčović, Andreja},
     title = {A Survey on Blind Digital Photographs Forensics Based on Image Analysis},
     booktitle = {Proc of the SIGNAL 2018 : The Third International Conference on Advances in Signal, Image and Video Processing},
     year = {2018}}
     
  213. V.U. Sameer, I. Dali & R. Naskar
    A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images
    Information Systems Security, Springer, 2018
    DOI: 10.1007/978-3-030-05171-6_15
    BibTeX
    @article{Sameer2018a,
     author = {Sameer, Venkata Udaya and Dali, Ishaan and Naskar, Ruchira},
     title = {A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images},
     journal = {Information Systems Security},
     publisher = {Springer},
     year = {2018}}
     
  214. V.U. Sameer & R. Naskar
    Universal Wavelet Relative Distortion: A New Counter–Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification
    Information Security Practice and Experience, Springer, 2018
    DOI: 10.1007/978-3-319-99807-7_3
    BibTeX
    @article{Sameer2018,
     author = {Sameer, Venkata Udaya and Naskar, Ruchira},
     title = {Universal Wavelet Relative Distortion: A New Counter–Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification},
     journal = {Information Security Practice and Experience},
     publisher = {Springer},
     year = {2018}}
     
  215. G. Schaefer
    UCID-RAW – A Colour Image Database in Raw Format
    VipIMAGE 2017
    Springer, 2018
    DOI: 10.1007/978-3-319-68195-5_19
    BibTeX
    @incollection{Schaefer2018,
     author = {Schaefer, Gerald},
     title = {UCID-RAW – A Colour Image Database in Raw Format},
     booktitle = {VipIMAGE 2017},
     publisher = {Springer},
     year = {2018}}
     
  216. U. Scherhag, D. Budhrani, M. Gomez-Barrero & C. Busch
    Detecting Morphed Face Images Using Facial Landmarks
    Image and Signal Processing, Springer, 2018
    DOI: 10.1007/978-3-319-94211-7_48
    BibTeX
    @article{Scherhag2018,
     author = {Scherhag, Ulrich and Budhrani, Dhanesh and Gomez-Barrero, Marta and Busch, Christoph},
     title = {Detecting Morphed Face Images Using Facial Landmarks},
     journal = {Image and Signal Processing},
     publisher = {Springer},
     year = {2018}}
     
  217. V.C. Schetinger
    Beyond Digital, Images, and Forensics: Towards a Regulation of Trust in Multimedia Communication
    Universidade Federal Do Rio Grande Do Sul Instituto De Informática Programa De Pós-graduação Em Computação, Universidade Federal Do Rio Grande Do Sul Instituto De Informática Programa De Pós-graduação Em Computação, 2018
    BibTeX
    @phdthesis{Schetinger2018,
     author = {Schetinger, Victor Chitolina},
     title = {Beyond Digital, Images, and Forensics: Towards a Regulation of Trust in Multimedia Communication},
     school = {Universidade Federal Do Rio Grande Do Sul Instituto De Informática Programa De Pós-graduação Em Computação},
     year = {2018}}
     
  218. P. Schöttle, A. Schlögl, C. Pasquini & R. Böhme
    Detecting Adversarial Examples - A Lesson from Multimedia Forensics
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1803.03613v1
    BibTeX
    @article{Schoettle2018,
     author = {Schöttle, Pascal and Schlögl, Alexander and Pasquini, Cecilia and Böhme, Rainer},
     title = {Detecting Adversarial Examples - A Lesson from Multimedia Forensics},
     journal = {arXiv},
     year = {2018}}
     
  219. S. Setumin & S.A. Suandi
    Difference of Gaussian Oriented Gradient Histogram for Face Sketch to Photo Matching
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 39344-39352
    DOI: 10.1109/ACCESS.2018.2855208
    BibTeX
    @article{Setumin2018,
     author = {Setumin, S. and Suandi, S. A.},
     title = {Difference of Gaussian Oriented Gradient Histogram for Face Sketch to Photo Matching},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {39344--39352}}
     
  220. A. Shah & E. El-Alfy
    Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP
    Proc. Int. Conf. Computing Sciences and Engineering (ICCSE)
    2018, pp. 1-6
    DOI: 10.1109/ICCSE1.2018.8374214
    BibTeX
    @inproceedings{Shah2018,
     author = {Shah, A. and El-Alfy, E.},
     title = {Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP},
     booktitle = {Proc. Int. Conf. Computing Sciences and Engineering (ICCSE)},
     year = {2018},
     pages = {1--6}}
     
  221. O. Shaya, P. Yang, R. Ni, Y. Zhao & A. Piva
    A New Dataset for Source Identification of High Dynamic Range Images
    Sensors, MDPI AG, 2018, Vol. 18(11), pp. 3801
    DOI: 10.3390/s18113801
    BibTeX
    @article{Shaya2018,
     author = {Shaya, Omar and Yang, Pengpeng and Ni, Rongrong and Zhao, Yao and Piva, Alessandro},
     title = {A New Dataset for Source Identification of High Dynamic Range Images},
     journal = {Sensors},
     publisher = {MDPI AG},
     year = {2018},
     volume = {18},
     number = {11},
     pages = {3801}}
     
  222. C. Shen, M. Kasra, W. Pan, G.A. Bassett, Y. Malloch & J.F. O'Brien
    Fake images: The effects of source, intermediary, and digital media literacy on contextual assessment of image credibility online
    New Media & Society, SAGE Publications, 2018, pp. 146144481879952
    DOI: 10.1177/1461444818799526
    BibTeX
    @article{Shen2018,
     author = {Shen, Cuihua and Kasra, Mona and Pan, Wenjing and Bassett, Grace A. and Malloch, Yining and O'Brien, James F.},
     title = {Fake images: The effects of source, intermediary, and digital media literacy on contextual assessment of image credibility online},
     journal = {New Media & Society},
     publisher = {SAGE Publications},
     year = {2018},
     pages = {146144481879952}}
     
  223. H. Sheng, X. Shen & Z. Shi
    Image Splicing Detection Based on the Q-Markov Features
    Advances in Multimedia Information Processing – PCM 2018
    Springer International Publishing, 2018, pp. 453-464
    DOI: 10.1007/978-3-030-00767-6_42
    BibTeX
    @incollection{Sheng2018,
     author = {Sheng, Hongda and Shen, Xuanjing and Shi, Zenan},
     title = {Image Splicing Detection Based on the Q-Markov Features},
     booktitle = {Advances in Multimedia Information Processing – PCM 2018},
     publisher = {Springer International Publishing},
     year = {2018},
     pages = {453--464}}
     
  224. Z. Shi, X. Shen, H. Kang & Y. Lv
    Image Manipulation Detection and Localization Based on the Dual-Domain Convolutional Neural Networks
    IEEE Access, 2018, pp. 1
    DOI: 10.1109/ACCESS.2018.2883588
    BibTeX
    @article{Shi2018,
     author = {Shi, Z. and Shen, X. and Kang, H. and Lv, Y.},
     title = {Image Manipulation Detection and Localization Based on the Dual-Domain Convolutional Neural Networks},
     journal = {IEEE Access},
     year = {2018},
     pages = {1}}
     
  225. C. Shyam Prakash, S. Maheshkar & V. Maheshkar
    Image Manipulation Detection Using Harris Corner and ANMS
    Advances in Machine Learning and Data Science
    Springer, 2018
    DOI: 10.1007/978-981-10-8569-7_9
    BibTeX
    @incollection{ShyamPrakash2018,
     author = {Shyam Prakash, Choudhary and Maheshkar, Sushila and Maheshkar, Vikas},
     title = {Image Manipulation Detection Using Harris Corner and ANMS},
     booktitle = {Advances in Machine Learning and Data Science},
     publisher = {Springer},
     year = {2018}}
     
  226. A. Singh, G. Singh & K. Singh
    A Markov based image forgery detection approach by analyzing CFA artifacts
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6075-5
    BibTeX
    @article{Singh2018a,
     author = {Singh, Amneet and Singh, Gurinder and Singh, Kulbir},
     title = {A Markov based image forgery detection approach by analyzing CFA artifacts},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  227. G. Singh & K. Singh
    Counter JPEG anti-forensic approach based on the second-order statistical analysis
    IEEE Transactions on Information Forensics and Security, 2018, pp. 1
    DOI: 10.1109/TIFS.2018.2871751
    BibTeX
    @article{Singh2018c,
     author = {Singh, G. and Singh, K.},
     title = {Counter JPEG anti-forensic approach based on the second-order statistical analysis},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     pages = {1}}
     
  228. N. Singh, A. Gupta & R.C. Jain
    Adaptive Histogram Equalization Based Image Forensics Using Statistics of DC DCT Coefficients
    Advances in Electrical and Electronic Engineering, VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences, 2018, Vol. 16(1)
    DOI: 10.15598/aeee.v16i1.2647
    BibTeX
    @article{Singh2018,
     author = {Singh, Neetu and Gupta, Abhinav and Jain, Roop Chand},
     title = {Adaptive Histogram Equalization Based Image Forensics Using Statistics of DC DCT Coefficients},
     journal = {Advances in Electrical and Electronic Engineering},
     publisher = {VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences},
     year = {2018},
     volume = {16},
     number = {1}}
     
  229. P.K. Singh, B. Jana & S.H. Jana
    Copy Move Forgery Detection through Graph Neighborhood Degree
    International Journal of Applied Engineering Research, 2018
    BibTeX
    @article{Singh2018d,
     author = {Singh, Prabhash Kumar and Jana, Biswapati and Jana, Sharmistha Halder},
     title = {Copy Move Forgery Detection through Graph Neighborhood Degree},
     journal = {International Journal of Applied Engineering Research},
     year = {2018}}
     
  230. R.D. Singh & N. Aggarwal
    Video content authentication techniques: a comprehensive survey
    Multimedia Systems, Springer, 2018, Vol. 24(2), pp. 211
    DOI: 10.1007/s00530-017-0538-9
    BibTeX
    @article{Singh2018b,
     author = {Singh, Raahat Devender and Aggarwal, Naveen},
     title = {Video content authentication techniques: a comprehensive survey},
     journal = {Multimedia Systems},
     publisher = {Springer},
     year = {2018},
     volume = {24},
     number = {2},
     pages = {211}}
     
  231. B. Soni & D. Biswas
    Image Forensic using Block-based Copy-move Forgery Detection
    Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)
    2018, pp. 888-893
    DOI: 10.1109/SPIN.2018.8474287
    BibTeX
    @inproceedings{Soni2018c,
     author = {Soni, B. and Biswas, D.},
     title = {Image Forensic using Block-based Copy-move Forgery Detection},
     booktitle = {Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)},
     year = {2018},
     pages = {888--893}}
     
  232. B. Soni, P.K. Das & D.M. Thounaojam
    CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection
    IET Image Proc, 2018, Vol. 12(2), pp. 167-178
    DOI: 10.1049/iet-ipr.2017.0441
    BibTeX
    @article{Soni2018,
     author = {Soni, B. and Das, P. K. and Thounaojam, D. M.},
     title = {CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection},
     journal = {IET Image Proc},
     year = {2018},
     volume = {12},
     number = {2},
     pages = {167--178}}
     
  233. B. Soni, P.K. Das & D.M. Thounaojam
    multiCMFD: : fast and efficient system for multiple copy-move forgeries detection in image
    Proceedings of the 2018 International Conference on Image and Graphics Processing - ICIGP 2018
    ACM Press, 2018
    DOI: 10.1145/3191442.3191465
    BibTeX
    @inproceedings{Soni2018a,
     author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei},
     title = {multiCMFD: : fast and efficient system for multiple copy-move forgeries detection in image},
     booktitle = {Proceedings of the 2018 International Conference on Image and Graphics Processing - ICIGP 2018},
     publisher = {ACM Press},
     year = {2018}}
     
  234. B. Soni, P.K. Das & D.M. Thounaojam
    An Efficient Block Phase Correlation Approach for CMFD System
    Progress in Computing, Analytics and Networking, Springer, 2018
    DOI: 10.1007/978-981-10-7871-2_5
    BibTeX
    @article{Soni2018b,
     author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei},
     title = {An Efficient Block Phase Correlation Approach for CMFD System},
     journal = {Progress in Computing, Analytics and Networking},
     publisher = {Springer},
     year = {2018}}
     
  235. B. Soni, P.K. Das & D.M. Thounaojam
    Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm
    IET Image Proc, 2018, Vol. 12(11), pp. 2092-2099
    DOI: 10.1049/iet-ipr.2018.5576
    BibTeX
    @article{Soni2018e,
     author = {Soni, B. and Das, P. K. and Thounaojam, D. M.},
     title = {Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm},
     journal = {IET Image Proc},
     year = {2018},
     volume = {12},
     number = {11},
     pages = {2092--2099}}
     
  236. B. Soni, P.K. Das & D.M. Thounaojam
    Improved Block-based Technique using SURF and FAST Keypoints Matching for Copy-Move Attack Detection
    Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)
    2018, pp. 197-202
    DOI: 10.1109/SPIN.2018.8474093
    BibTeX
    @inproceedings{Soni2018f,
     author = {Soni, B. and Das, P. K. and Thounaojam, D. Meitei},
     title = {Improved Block-based Technique using SURF and FAST Keypoints Matching for Copy-Move Attack Detection},
     booktitle = {Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)},
     year = {2018},
     pages = {197--202}}
     
  237. T. Sridevi & B.R. Krishna
    A Novel Approach for Detection of Copy-Move Forgery Detection using Transform Domain
    Proc. Second Int. Conf. Inventive Communication and Computational Technologies (ICICCT)
    2018, pp. 1727-1731
    DOI: 10.1109/ICICCT.2018.8473051
    BibTeX
    @inproceedings{Sridevi2018,
     author = {Sridevi, T. and Krishna, B. R.},
     title = {A Novel Approach for Detection of Copy-Move Forgery Detection using Transform Domain},
     booktitle = {Proc. Second Int. Conf. Inventive Communication and Computational Technologies (ICICCT)},
     year = {2018},
     pages = {1727--1731}}
     
  238. M. Stamm, P. Bestagini, L. Marcenaro & P. Campisi
    Forensic Camera Model Identification: Highlights from the IEEE Signal Processing Cup 2018 Student Competition [SP Competitions]
    IEEE Signal Processing Magazine, 2018, Vol. 35(5), pp. 168-174
    DOI: 10.1109/MSP.2018.2847326
    BibTeX
    @article{Stamm2018,
     author = {Stamm, M. and Bestagini, P. and Marcenaro, L. and Campisi, P.},
     title = {Forensic Camera Model Identification: Highlights from the IEEE Signal Processing Cup 2018 Student Competition [SP Competitions]},
     journal = {IEEE Signal Processing Magazine},
     year = {2018},
     volume = {35},
     number = {5},
     pages = {168--174}}
     
  239. A. Stanislaus, H.A. Majid & A.A. Samah
    Binary Discrete Cosine Transform Approach In Copy-Move Image Forgery: A Case Study Of Colour Contrast Adjustment
    UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
    BibTeX
    @article{Stanislaus2018,
     author = {Stanislaus, Abner and Majid, Hairudin Abdul and Samah, Azurah A.},
     title = {Binary Discrete Cosine Transform Approach In Copy-Move Image Forgery: A Case Study Of Colour Contrast Adjustment},
     journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications},
     year = {2018},
     volume = {3}}
     
  240. J.-Y. Sun, S.-W. Kim, S.-W. Lee & S.-J. Ko
    A novel contrast enhancement forensics based on convolutional neural networks
    Signal Processing: Image Communication, Elsevier BV, 2018
    DOI: 10.1016/j.image.2018.02.001
    BibTeX
    @article{Sun2018a,
     author = {Sun, Jee-Young and Kim, Seung-Wook and Lee, Sang-Won and Ko, Sung-Jea},
     title = {A novel contrast enhancement forensics based on convolutional neural networks},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018}}
     
  241. P. Sun, Y. Lang, S. Fan, Z. Shen, L. Liu, D. Shan & S. Peng
    Exposing splicing forgery based on color temperature estimation
    Forensic Science International, Elsevier BV, 2018, Vol. 289, pp. 1-11
    DOI: 10.1016/j.forsciint.2018.04.049
    BibTeX
    @article{Sun2018b,
     author = {Sun, Peng and Lang, Yubo and Fan, Shu and Shen, Zhe and Liu, Lei and Shan, Daguo and Peng, Silong},
     title = {Exposing splicing forgery based on color temperature estimation},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {289},
     pages = {1--11}}
     
  242. Y. Sun, R. Ni & Y. Zhao
    Nonoverlapping Blocks Based Copy-Move Forgery Detection
    Security and Communication Networks, Hindawi Limited, 2018, Vol. 2018, pp. 1-11
    DOI: 10.1155/2018/1301290
    BibTeX
    @article{Sun2018,
     author = {Sun, Yu and Ni, Rongrong and Zhao, Yao},
     title = {Nonoverlapping Blocks Based Copy-Move Forgery Detection},
     journal = {Security and Communication Networks},
     publisher = {Hindawi Limited},
     year = {2018},
     volume = {2018},
     pages = {1--11}}
     
  243. A. Taimori & F. Marvasti
    Forensic Discrimination between Traditional and Compressive Imaging Systems
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.03157v1
    BibTeX
    @article{Taimori2018,
     author = {Taimori, Ali and Marvasti, Farokh},
     title = {Forensic Discrimination between Traditional and Compressive Imaging Systems},
     journal = {arXiv},
     year = {2018}}
     
  244. H. Tang, R. Ni, Y. Zhao & X. Li
    Median Filtering Detection of Small-Size Image based on CNN
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018
    DOI: 10.1016/j.jvcir.2018.01.011
    BibTeX
    @article{Tang2018,
     author = {Tang, Hongshen and Ni, Rongrong and Zhao, Yao and Li, Xiaolong},
     title = {Median Filtering Detection of Small-Size Image based on CNN},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018}}
     
  245. X. Tang & W. Zhang
    A Novel Decision Fusion Method for Image Forgery Localization
    Proc. 37th Chinese Control Conf. (CCC)
    2018, pp. 9337-9342
    DOI: 10.23919/ChiCC.2018.8482949
    BibTeX
    @inproceedings{Tang2018a,
     author = {Tang, X. and Zhang, W.},
     title = {A Novel Decision Fusion Method for Image Forgery Localization},
     booktitle = {Proc. 37th Chinese Control Conf. (CCC)},
     year = {2018},
     pages = {9337--9342}}
     
  246. S. Tariq, S. Lee, H. Kim, Y. Shin & S.S. Woo
    Detecting Both Machine and Human Created Fake Face Images In the Wild
    Proceedings of the 2nd International Workshop on Multimedia Privacy and Security - MPS '18
    ACM Press, 2018
    DOI: 10.1145/3267357.3267367
    BibTeX
    @inproceedings{Tariq2018,
     author = {Tariq, Shahroz and Lee, Sangyup and Kim, Hoyoung and Shin, Youjin and Woo, Simon S.},
     title = {Detecting Both Machine and Human Created Fake Face Images In the Wild},
     booktitle = {Proceedings of the 2nd International Workshop on Multimedia Privacy and Security - MPS '18},
     publisher = {ACM Press},
     year = {2018}}
     
  247. S. Teerakanok & T. Uehara
    Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research
    Proc. IEEE 42nd Annual Computer Software and Applications Conf. (COMPSAC)
    2018, Vol. 02, pp. 365-369
    DOI: 10.1109/COMPSAC.2018.10259
    BibTeX
    @inproceedings{Teerakanok2018,
     author = {Teerakanok, S. and Uehara, T.},
     title = {Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research},
     booktitle = {Proc. IEEE 42nd Annual Computer Software and Applications Conf. (COMPSAC)},
     year = {2018},
     volume = {02},
     pages = {365--369}}
     
  248. S. Teerakanok & T. Uehara
    Enhancement of Media Splicing Detection: A General Framework
    The Journal of Digital Forensics, Security and Law, Embry-Riddle Aeronautical University/Hunt Library, 2018
    DOI: 10.15394/jdfsl.2018.1481
    BibTeX
    @article{Teerakanok2018a,
     author = {Teerakanok, Songpon and Uehara, Tetsutaro},
     title = {Enhancement of Media Splicing Detection: A General Framework},
     journal = {The Journal of Digital Forensics, Security and Law},
     publisher = {Embry-Riddle Aeronautical University/Hunt Library},
     year = {2018}}
     
  249. K. Tejas, C. Swathi & M. Rajesh Kumar
    Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1806.02907v1
    BibTeX
    @article{Tejas2018,
     author = {Tejas, K. and Swathi, C. and Rajesh Kumar, M.},
     title = {Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations},
     journal = {arXiv},
     year = {2018}}
     
  250. A. Thakur & N. Jindal
    Image forensics using color illumination, block and key point based approach
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5836-5
    BibTeX
    @article{Thakur2018,
     author = {Thakur, Abhishek and Jindal, Neeru},
     title = {Image forensics using color illumination, block and key point based approach},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  251. V.T.K. Thekkekoodathil & P.K. Vijayaragavan
    A Model of Legal and Procedural Framework for Cybercrime Investigation in India Using Digital Image Forensics
    International Conference on Intelligent Computing and Applications
    Springer, 2018
    DOI: 10.1007/978-981-10-5520-1_16
    BibTeX
    @incollection{Thekkekoodathil2018,
     author = {Thekkekoodathil, Vijith T. K. and Vijayaragavan, Pramod K.},
     title = {A Model of Legal and Procedural Framework for Cybercrime Investigation in India Using Digital Image Forensics},
     booktitle = {International Conference on Intelligent Computing and Applications},
     publisher = {Springer},
     year = {2018}}
     
  252. M. Tiwari & B. Gupta
    Image features dependant correlation-weighting function for efficient PRNU based source camera identification
    Forensic Science International, Elsevier BV, 2018, Vol. 285, pp. 111-120
    DOI: 10.1016/j.forsciint.2018.02.005
    BibTeX
    @article{Tiwari2018,
     author = {Tiwari, Mayank and Gupta, Bhupendra},
     title = {Image features dependant correlation-weighting function for efficient PRNU based source camera identification},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {285},
     pages = {111--120}}
     
  253. M.-J. Tsai & I. Yuadi
    Digital forensics of microscopic images for printed source identification
    Multimedia Tools and Applications, Springer, 2018, Vol. 77(7), pp. 8729
    DOI: 10.1007/s11042-017-4771-1
    BibTeX
    @article{Tsai2018,
     author = {Tsai, Min-Jen and Yuadi, Imam},
     title = {Digital forensics of microscopic images for printed source identification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     volume = {77},
     number = {7},
     pages = {8729}}
     
  254. E. Turajlic
    Adaptive SVD Domain Based White Gaussian Noise Level Estimation in Images
    IEEE Access, 2018, pp. 1
    DOI: 10.1109/ACCESS.2018.2882298
    BibTeX
    @article{Turajlic2018,
     author = {Turajlic, E.},
     title = {Adaptive SVD Domain Based White Gaussian Noise Level Estimation in Images},
     journal = {IEEE Access},
     year = {2018},
     pages = {1}}
     
  255. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    ToothPic: camera-based image retrieval on large scales
    #IEEE_M_MM#, 2018, pp. 1
    DOI: 10.1109/MMUL.2018.2873845
    BibTeX
    @article{Valsesia2018,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {ToothPic: camera-based image retrieval on large scales},
     journal = {#IEEE_M_MM#},
     year = {2018},
     pages = {1}}
     
  256. A.A. Varlamova & A.V. Kuznetsov
    CFA Artifacts Analysis for Image Splicing Detection
    Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)
    Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018), 2018
    BibTeX
    @inproceedings{Varlamova2018,
     author = {Varlamova, A. A. and Kuznetsov, A. V.},
     title = {CFA Artifacts Analysis for Image Splicing Detection},
     booktitle = {Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)},
     journal = {Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)},
     year = {2018}}
     
  257. E.A. Vega, A.S. Orozco, L.G. Villalba & J. Hernandez-Castro
    Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns
    Sensors, MDPI AG, 2018, Vol. 18(10), pp. 3372
    DOI: 10.3390/s18103372
    BibTeX
    @article{Vega2018,
     author = {Vega, Esteban Armas and Orozco, Ana Sandoval and Villalba, Luis Garc\ia and Hernandez-Castro, Julio},
     title = {Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns},
     journal = {Sensors},
     publisher = {MDPI AG},
     year = {2018},
     volume = {18},
     number = {10},
     pages = {3372}}
     
  258. U.S. Venkata & R. Naskar
    Eliminating the effects of illumination condition in feature based camera model identification
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 52, pp. 24-32
    DOI: 10.1016/j.jvcir.2018.01.015
    BibTeX
    @article{Venkata2018,
     author = {Venkata, Udaya Sameer and Naskar, Ruchira},
     title = {Eliminating the effects of illumination condition in feature based camera model identification},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {52},
     pages = {24--32}}
     
  259. S. Verde, L. Bondi, P. Bestagini, S. Milani, G. Calvagno & S. Tubaro
    Video Codec Forensics Based on Convolutional Neural Networks
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 530-534
    DOI: 10.1109/ICIP.2018.8451143
    BibTeX
    @inproceedings{Verde2018,
     author = {Verde, S. and Bondi, L. and Bestagini, P. and Milani, S. and Calvagno, G. and Tubaro, S.},
     title = {Video Codec Forensics Based on Convolutional Neural Networks},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {530--534}}
     
  260. H.K. Verma, V. Verma & N. Khanna
    Mathematical Models for Digital Imaging and their Applications in Digital Image Forensics
    Ram, M. (ed.)
    Chapter 4
    Mathematics Applied in Information Systems, Bentham Science Publishers, 2018, Vol. 2, pp. 72-107
    DOI: 10.2174/97816810871391180201
    BibTeX
    @inbook{Verma2018,
     author = {Verma, Hemant K. and Verma, Vinay and Khanna, Nitin},
     title = {Mathematical Models for Digital Imaging and their Applications in Digital Image Forensics},
     journal = {Mathematics Applied in Information Systems},
     publisher = {Bentham Science Publishers},
     year = {2018},
     volume = {2},
     pages = {72--107}}
     
  261. D.S. Vidyadharan & S.M. Thampi
    Illuminant Color Inconsistency as a Powerful Clue for Detecting Digital Image Forgery: A Survey
    Intelligent Systems Technologies and Applications
    Springer, 2018
    DOI: 10.1007/978-3-319-68385-0_24
    BibTeX
    @incollection{Vidyadharan2018,
     author = {Vidyadharan, Divya S. and Thampi, Sabu M.},
     title = {Illuminant Color Inconsistency as a Powerful Clue for Detecting Digital Image Forgery: A Survey},
     booktitle = {Intelligent Systems Technologies and Applications},
     publisher = {Springer},
     year = {2018}}
     
  262. D.S. Vidyadharan & S.M. Thampi
    Evaluating color and texture features for forgery localization from illuminant maps
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-017-5574-0
    BibTeX
    @article{Vidyadharan2018a,
     author = {Vidyadharan, Divya S. and Thampi, Sabu M.},
     title = {Evaluating color and texture features for forgery localization from illuminant maps},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  263. M. Wahid, N. Ahmad, M.H. Zafar & S. Khan
    On combining MD5 for image authentication using LSB substitution in selected pixels
    2018 International Conference on Engineering and Emerging Technologies (ICEET)
    IEEE, 2018
    DOI: 10.1109/iceet1.2018.8338621
    BibTeX
    @inproceedings{Wahid2018,
     author = {Wahid, Muneeza and Ahmad, Nasir and Zafar, Muhammad Haseeb and Khan, Sahib},
     title = {On combining MD5 for image authentication using LSB substitution in selected pixels},
     booktitle = {2018 International Conference on Engineering and Emerging Technologies (ICEET)},
     publisher = {IEEE},
     year = {2018}}
     
  264. J. Waleed, D.A. Abdullah & M.H. Khudhur
    Comprehensive Display of Digital Image Copy-Move Forensics Techniques
    Proc. Int. Conf. Engineering Technology and their Applications (IICETA)
    2018, pp. 155-160
    DOI: 10.1109/IICETA.2018.8458084
    BibTeX
    @inproceedings{Waleed2018,
     author = {Waleed, J. and Abdullah, D. A. and Khudhur, M. H.},
     title = {Comprehensive Display of Digital Image Copy-Move Forensics Techniques},
     booktitle = {Proc. Int. Conf. Engineering Technology and their Applications (IICETA)},
     year = {2018},
     pages = {155--160}}
     
  265. S. Walia & K. Kumar
    An Eagle-Eye View of Recent Digital Image Forgery Detection Methods
    Smart and Innovative Trends in Next Generation Computing Technologies, Springer, 2018
    DOI: 10.1007/978-981-10-8660-1_36
    BibTeX
    @article{Walia2018,
     author = {Walia, Savita and Kumar, Krishan},
     title = {An Eagle-Eye View of Recent Digital Image Forgery Detection Methods},
     journal = {Smart and Innovative Trends in Next Generation Computing Technologies},
     publisher = {Springer},
     year = {2018}}
     
  266. B. Wang, J. Yin, S. Tan, Y. Li & M. Li
    Source camera model identification based on convolutional neural networks with local binary patterns coding
    Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 68, pp. 162-168
    DOI: 10.1016/j.image.2018.08.001
    BibTeX
    @article{Wang2018i,
     author = {Wang, Bo and Yin, Jianfeng and Tan, Shunquan and Li, Yabin and Li, Ming},
     title = {Source camera model identification based on convolutional neural networks with local binary patterns coding},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {68},
     pages = {162--168}}
     
  267. B. Wang, K. Zhong & M. Li
    Ensemble classifier based source camera identification using fusion features
    Multimedia Tools and Applications, Springer Nature America, Inc, 2018
    DOI: 10.1007/s11042-018-6835-2
    BibTeX
    @article{Wang2018h,
     author = {Wang, Bo and Zhong, Kun and Li, Ming},
     title = {Ensemble classifier based source camera identification using fusion features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature America, Inc},
     year = {2018}}
     
  268. C. Wang, Z. Zhang & X. Zhou
    An Image Copy-Move Forgery Detection Scheme Based on A-KAZE and SURF Features
    sysmmetry, 2018
    BibTeX
    @article{Wang2018g,
     author = {Wang, Chengyou and Zhang, Zhi and Zhou, Xiao},
     title = {An Image Copy-Move Forgery Detection Scheme Based on A-KAZE and SURF Features},
     journal = {sysmmetry},
     year = {2018}}
     
  269. D.-p. Wang, T. Gao & F. Yang
    A forensic algorithm against median filtering based on coefficients of image blocks in frequency domain
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5651-z
    BibTeX
    @article{Wang2018,
     author = {Wang, Dong-ping and Gao, Tiegang and Yang, Fusheng},
     title = {A forensic algorithm against median filtering based on coefficients of image blocks in frequency domain},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  270. P. Wang, F. Liu, C. Yang & X. Luo
    Blind forensics of image gamma transformation and its application in splicing detection
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 55, pp. 80-90
    DOI: 10.1016/j.jvcir.2018.05.020
    BibTeX
    @article{Wang2018d,
     author = {Wang, Ping and Liu, Fenlin and Yang, Chunfang and Luo, Xiangyang},
     title = {Blind forensics of image gamma transformation and its application in splicing detection},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {55},
     pages = {80--90}}
     
  271. X. Wang
    Photo-based vendor re-identification on darknet marketplaces using deep neural networks
    Virginia Polytechnic Institute and State University, Virginia Polytechnic Institute and State University, 2018
    BibTeX
    @mastersthesis{Wang2018b,
     author = {Wang, Xiangwen},
     title = {Photo-based vendor re-identification on darknet marketplaces using deep neural networks},
     school = {Virginia Polytechnic Institute and State University},
     year = {2018}}
     
  272. X. Wang, P. Peng, C. Wang & G. Wang
    You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces
    Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS), 2018
    BibTeX
    @article{Wang2018a,
     author = {Wang, Xiangwen and Peng, Peng and Wang, Chun and Wang, Gang},
     title = {You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces},
     journal = {Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS)},
     year = {2018}}
     
  273. X.-Y. Wang, L.-X. Jiao, X.-B. Wang, H.-Y. Yang & P.-P. Niu
    A new keypoint-based copy-move forgery detection for color image
    Applied Intelligence, Springer, 2018, pp. 1
    DOI: 10.1007/s10489-018-1168-4
    BibTeX
    @article{Wang2018c,
     author = {Wang, Xiang-Yang and Jiao, Li-Xian and Wang, Xue-Bing and Yang, Hong-Ying and Niu, Pan-Pan},
     title = {A new keypoint-based copy-move forgery detection for color image},
     journal = {Applied Intelligence},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  274. X.-y. Wang, L.-x. Jiao, X.-b. Wang, H.-y. Yang & P.-p. Niu
    Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6354-1
    BibTeX
    @article{Wang2018f,
     author = {Wang, Xiang-yang and Jiao, Li-xian and Wang, Xue-bing and Yang, Hong-ying and Niu, Pan-pan},
     title = {Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  275. Y. Wang & S.-i. Kamata
    Copy Move Image Forgery Detection Based on Polar Fourier Representation
    International Journal of Machine Learning and Computing, 2018, Vol. 8(2)
    BibTeX
    @article{Wang2018e,
     author = {Wang, Yitian and Kamata, Sei-ichiro},
     title = {Copy Move Image Forgery Detection Based on Polar Fourier Representation},
     journal = {International Journal of Machine Learning and Computing},
     year = {2018},
     volume = {8},
     number = {2}}
     
  276. A. Wary & A. Neelima
    A review on robust video copy detection
    International Journal of Multimedia Information Retrieval, Springer, 2018, pp. 1
    DOI: 10.1007/s13735-018-0159-x
    BibTeX
    @article{Wary2018,
     author = {Wary, Alongbar and Neelima, Arambam},
     title = {A review on robust video copy detection},
     journal = {International Journal of Multimedia Information Retrieval},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  277. J.-D. Wei, H.-J. Cheng & C.-W. Chang
    Hopfield network-based approach to detect seam-carved images and identify tampered regions
    Neural Computing and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s00521-018-3463-8
    BibTeX
    @article{Wei2018,
     author = {Wei, Jyh-Da and Cheng, Hui-Jun and Chang, Che-Wen},
     title = {Hopfield network-based approach to detect seam-carved images and identify tampered regions},
     journal = {Neural Computing and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  278. B. van Werkhoven, P. Hijma, C.J.H. Jacobs, J. Maassen, Z.J.M.H. Geradts & H.E. Bal
    A Jungle Computing approach to common image source identification in large collections of images
    Digital Investigation, Elsevier BV, 2018, Vol. 27, pp. 3-16
    DOI: 10.1016/j.diin.2018.09.002
    BibTeX
    @article{Werkhoven2018,
     author = {van Werkhoven, B. and Hijma, P. and Jacobs, C. J. H. and Maassen, J. and Geradts, Z. J. M. H. and Bal, H. E.},
     title = {A Jungle Computing approach to common image source identification in large collections of images},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {27},
     pages = {3--16}}
     
  279. M. Wu
    Research on optimization of image fast feature point matching algorithm
    EURASIP Journal on Image and Video Processing, Springer Nature America, Inc, 2018, Vol. 2018(1)
    DOI: 10.1186/s13640-018-0354-y
    BibTeX
    @article{Wu2018c,
     author = {Wu, Manyi},
     title = {Research on optimization of image fast feature point matching algorithm},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer Nature America, Inc},
     year = {2018},
     volume = {2018},
     number = {1}}
     
  280. X.-Q. Wu, H.-S. Li, J. Cao & Q. Cai
    Geometry of Motion for Video Shakiness Detection
    Journal of Computer Science and Technology, Springer, 2018, Vol. 33(3), pp. 475
    DOI: 10.1007/s11390-018-1832-5
    BibTeX
    @article{Wu2018,
     author = {Wu, Xiao-Qun and Li, Hai-Sheng and Cao, Jian and Cai, Qiang},
     title = {Geometry of Motion for Video Shakiness Detection},
     journal = {Journal of Computer Science and Technology},
     publisher = {Springer},
     year = {2018},
     volume = {33},
     number = {3},
     pages = {475}}
     
  281. Y. Wu, W. Abd-Almageed & P. Natarajan
    Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network
    Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
    2018, pp. 1907-1915
    DOI: 10.1109/WACV.2018.00211
    BibTeX
    @inproceedings{Wu2018a,
     author = {Wu, Y. and Abd-Almageed, W. and Natarajan, P.},
     title = {Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network},
     booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)},
     year = {2018},
     pages = {1907--1915}}
     
  282. Y. Wu, W. Abd-Almageed & P. Natarajan
    BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization
    Computer Vision – ECCV 2018, Springer, 2018
    DOI: 10.1007/978-3-030-01231-1_11
    BibTeX
    @article{Wu2018b,
     author = {Wu, Yue and Abd-Almageed, Wael and Natarajan, Prem},
     title = {BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization},
     journal = {Computer Vision – ECCV 2018},
     publisher = {Springer},
     year = {2018}}
     
  283. C. Xiong, J. Zhu, Y. Li & R. Xiang
    Image-based forgery detection using big data clustering
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-017-5555-3
    BibTeX
    @article{Xiong2018,
     author = {Xiong, Chao and Zhu, Ju and Li, Yuan and Xiang, Ruxi},
     title = {Image-based forgery detection using big data clustering},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  284. F. Xue, W. Lu, Z. Ye & H. Liu
    JPEG image tampering localization based on normalized gray level co-occurrence matrix
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6611-3
    BibTeX
    @article{Xue2018,
     author = {Xue, Fei and Lu, Wei and Ye, Ziyi and Liu, Hongmei},
     title = {JPEG image tampering localization based on normalized gray level co-occurrence matrix},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  285. Y. Yan, W. Ren & X. Cao
    Recolored Image Detection via a Deep Discriminative Model
    IEEE Transactions on Information Forensics and Security, 2018, pp. 1
    DOI: 10.1109/TIFS.2018.2834155
    BibTeX
    @article{Yan2018,
     author = {Yan, Y. and Ren, W. and Cao, X.},
     title = {Recolored Image Detection via a Deep Discriminative Model},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     pages = {1}}
     
  286. F. Yang, Y. Li, K. Chong & B. Wang
    Double JPEG Compression Detection Based on Fusion Features
    Machine Learning and Intelligent Communications, Springer, 2018
    DOI: 10.1007/978-3-319-73564-1_16
    BibTeX
    @article{Yang2018,
     author = {Yang, Fulong and Li, Yabin and Chong, Kun and Wang, Bo},
     title = {Double JPEG Compression Detection Based on Fusion Features},
     journal = {Machine Learning and Intelligent Communications},
     publisher = {Springer},
     year = {2018}}
     
  287. P. Yang, R. Ni & Y. Zhao
    Double JPEG compression detection by exploring the correlations in DCT domain
    ArXiv, 2018
    arXiv: http://arxiv.org/abs/1806.01571v1
    BibTeX
    @article{Yang2018a,
     author = {Yang, Pengpeng and Ni, Rongrong and Zhao, Yao},
     title = {Double JPEG compression detection by exploring the correlations in DCT domain},
     journal = {ArXiv},
     year = {2018}}
     
  288. P. Yang, R. Ni, Y. Zhao, G. Cao, H. Wu & W. Zhao
    Robust Contrast Enhancement Forensics Using Convolutional Neural Networks
    ArXiv, 2018
    arXiv: http://arxiv.org/abs/1803.04749v2
    BibTeX
    @article{Yang2018b,
     author = {Yang, Pengpeng and Ni, Rongrong and Zhao, Yao and Cao, Gang and Wu, Haorui and Zhao, Wei},
     title = {Robust Contrast Enhancement Forensics Using Convolutional Neural Networks},
     journal = {ArXiv},
     year = {2018}}
     
  289. H. Yao, T. Qiao, M. Xu & N. Zheng
    Robust multi-classifier for camera model identification based on convolution neural network
    IEEE Access, 2018, Vol. 6, pp. 24973-24982
    DOI: 10.1109/ACCESS.2018.2832066
    BibTeX
    @article{Yao2018,
     author = {Yao, H. and Qiao, T. and Xu, M. and Zheng, N.},
     title = {Robust multi-classifier for camera model identification based on convolution neural network},
     journal = {IEEE Access},
     year = {2018},
     volume = {6},
     pages = {24973--24982}}
     
  290. W. Yaqub, M. Mohanty & N. Memon
    Towards Camera Identification from Cropped Query Images
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 3798-3802
    DOI: 10.1109/ICIP.2018.8451749
    BibTeX
    @inproceedings{Yaqub2018,
     author = {Yaqub, W. and Mohanty, M. and Memon, N.},
     title = {Towards Camera Identification from Cropped Query Images},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {3798--3802}}
     
  291. S.K. Yarlagadda, D. Güera, P. Bestagini, F.M. Zhu, S. Tubaro & E.J. Delp
    Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier
    ArXiv, 2018
    arXiv: 1802.04881v1
    BibTeX
    @article{Yarlagadda2018,
     author = {Yarlagadda, Sri Kalyan and Güera, David and Bestagini, Paolo and Zhu, Fengqing Maggie and Tubaro, Stefano and Delp, Edward J.},
     title = {Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier},
     journal = {ArXiv},
     year = {2018}}
     
  292. A. Ye, I. Mt & M. Shehata
    Fusion Approaches System of Copy-Move Forgery Detection
    American Journal of Computer Science and Engineering Survey, 2018
    BibTeX
    @article{Ye2018,
     author = {Ye, Abdalla and Mt, Iqbal and Shehata, M.},
     title = {Fusion Approaches System of Copy-Move Forgery Detection},
     journal = {American Journal of Computer Science and Engineering Survey},
     year = {2018}}
     
  293. Y.Y. Yeap, U.U. Sheikh & A.A.A. Rahman
    Image forensic for digital image copy move forgery detection
    Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)
    2018, pp. 239-244
    DOI: 10.1109/CSPA.2018.8368719
    BibTeX
    @inproceedings{Yeap2018a,
     author = {Yeap, Y. Y. and Sheikh, U. U. and Rahman, A. A. A.},
     title = {Image forensic for digital image copy move forgery detection},
     booktitle = {Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)},
     year = {2018},
     pages = {239--244}}
     
  294. Y.Y. Yeap, U.U. Sheikh & A.A.H.A. Rahman
    Image forensic for digital image copy move forgery detection
    Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)
    2018, pp. 239-244
    DOI: 10.1109/CSPA.2018.8368719
    BibTeX
    @inproceedings{Yeap2018,
     author = {Yeap, Y. Y. and Sheikh, U. U. and Rahman, A. A. H. A.},
     title = {Image forensic for digital image copy move forgery detection},
     booktitle = {Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)},
     year = {2018},
     pages = {239--244}}
     
  295. E.O. Yildirim & G. Ulutaş
    Image splicing detection with dwt domain extended Markov features
    Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
    2018, pp. 1-4
    DOI: 10.1109/SIU.2018.8404325
    BibTeX
    @inproceedings{Yildirim2018,
     author = {Yildirim, E. O. and Ulutaş, G.},
     title = {Image splicing detection with dwt domain extended Markov features},
     booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2018},
     pages = {1--4}}
     
  296. S. Yuting, G. Jing, D. Ling & K. Yongzhen
    Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation
    International Journal of Digital Crime and Forensics, IGI Global, 2018, Vol. 10(3), pp. 1-14
    DOI: 10.4018/ijdcf.2018070101
    BibTeX
    @article{Yuting2018,
     author = {Yuting, Sun and Jing, Guo and Ling, Du and Yongzhen, Ke},
     title = {Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation},
     journal = {International Journal of Digital Crime and Forensics},
     publisher = {IGI Global},
     year = {2018},
     volume = {10},
     number = {3},
     pages = {1--14}}
     
  297. X. Zeng, G. Feng & X. Zhang
    Detection of double JPEG compression using modified DenseNet model
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6737-3
    BibTeX
    @article{Zeng2018,
     author = {Zeng, Ximei and Feng, Guorui and Zhang, Xinpeng},
     title = {Detection of double JPEG compression using modified DenseNet model},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  298. D. Zhang, G. Yang, F. Li, J. Wang & A.K. Sangaiah
    Detecting seam carved images using uniform local binary patterns
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6470-y
    BibTeX
    @article{Zhang2018g,
     author = {Zhang, Dengyong and Yang, Gaobo and Li, Feng and Wang, Jin and Sangaiah, Arun Kumar},
     title = {Detecting seam carved images using uniform local binary patterns},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  299. J. Zhang, S. Niu, Y. Li & Y. Liu
    An Algorithm for Asymmetric Clipping Detection Based on Parameter Optimization
    Advances in Intelligent Information Hiding and Multimedia Signal Processing
    Springer, 2018
    DOI: 10.1007/978-3-319-63859-1_2
    BibTeX
    @incollection{Zhang2018,
     author = {Zhang, Jiwei and Niu, Shaozhang and Li, Yueying and Liu, Yuhan},
     title = {An Algorithm for Asymmetric Clipping Detection Based on Parameter Optimization},
     booktitle = {Advances in Intelligent Information Hiding and Multimedia Signal Processing},
     publisher = {Springer},
     year = {2018}}
     
  300. J. Zhang, Q. Ruan, Y. Jin & J. Ge
    Image Deeper Passive Forgery Detection Based on SIFT and Higher-Order Statistics Features
    Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)
    2018, pp. 1-6
    DOI: 10.1109/BigMM.2018.8499459
    BibTeX
    @inproceedings{Zhang2018e,
     author = {Zhang, J. and Ruan, Q. and Jin, Y. and Ge, J.},
     title = {Image Deeper Passive Forgery Detection Based on SIFT and Higher-Order Statistics Features},
     booktitle = {Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)},
     year = {2018},
     pages = {1--6}}
     
  301. L. Zhang, F. Peng & M. Long
    Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise
    Proc. IEEE Int. Conf. Multimedia and Expo (ICME)
    2018, pp. 1-6
    DOI: 10.1109/ICME.2018.8486607
    BibTeX
    @inproceedings{Zhang2018f,
     author = {Zhang, L. and Peng, F. and Long, M.},
     title = {Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise},
     booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo (ICME)},
     year = {2018},
     pages = {1--6}}
     
  302. Q. Zhang, W. Lu, R. Wang & G. Li
    Digital image splicing detection based on Markov features in block DWT domain
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6230-z
    BibTeX
    @article{Zhang2018c,
     author = {Zhang, Qingbo and Lu, Wei and Wang, Ruxin and Li, Guoqiang},
     title = {Digital image splicing detection based on Markov features in block DWT domain},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  303. X. Zhang, X. Liu, H. Shu & C. Yang
    Medical image blind integrity verification with Krawtchouk moments
    International Journal of Biomedical Imaging, 2018
    BibTeX
    @article{Zhang2018d,
     author = {Zhang, Xu and Liu, Xilin and Shu, Huazhong and Yang, Chen},
     title = {Medical image blind integrity verification with Krawtchouk moments},
     journal = {International Journal of Biomedical Imaging},
     year = {2018}}
     
  304. Y. Zhang & V.L.L. Thing
    A semi-feature learning approach for tampered region localization across multi-format images
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5756-4
    BibTeX
    @article{Zhang2018b,
     author = {Zhang, Ying and Thing, Vrizlynn L. L.},
     title = {A semi-feature learning approach for tampered region localization across multi-format images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  305. Z. Zhang, Y. Zhang, Z. Zhou & J. Luo
    Boundary-based Image Forgery Detection by Fast Shallow CNN
    ArXiv, 2018
    arXiv: 1801.06732v1
    BibTeX
    @article{Zhang2018a,
     author = {Zhang, Zhongping and Zhang, Yixuan and Zhou, Zheng and Luo, Jiebo},
     title = {Boundary-based Image Forgery Detection by Fast Shallow CNN},
     journal = {ArXiv},
     year = {2018}}
     
  306. Y. Zhao, N. Zheng, T. Qiao & M. Xu
    Source camera identification via low dimensional PRNU features
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6809-4
    BibTeX
    @article{Zhao2018a,
     author = {Zhao, Yihua and Zheng, Ning and Qiao, Tong and Xu, Ming},
     title = {Source camera identification via low dimensional PRNU features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  307. Y. Zheng, H. Sheng, Y. Liu, K. Lv, W. Ke & Z. Xiong
    Learning Irregular Space Transformation for Person Re-Identification
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 53214-53225
    DOI: 10.1109/ACCESS.2018.2871149
    BibTeX
    @article{Zheng2018,
     author = {Zheng, Y. and Sheng, H. and Liu, Y. and Lv, K. and Ke, W. and Xiong, Z.},
     title = {Learning Irregular Space Transformation for Person Re-Identification},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {53214--53225}}
     
  308. P. Zhou, X. Han, V.I. Morariu & L.S. Davis
    Learning Rich Features for Image Manipulation Detection
    ArXiv, 2018
    arXiv: 1805.04953v1
    BibTeX
    @article{Zhou2018a,
     author = {Zhou, Peng and Han, Xintong and Morariu, Vlad I. and Davis, Larry S.},
     title = {Learning Rich Features for Image Manipulation Detection},
     journal = {ArXiv},
     year = {2018}}
     
  309. R. Zhou, R. Achanta & S. Süsstrunk
    Deep Residual Network for Joint Demosaicing and Super-Resolution
    ArXiv, 2018
    arXiv: 1802.06573v1
    BibTeX
    @article{Zhou2018,
     author = {Zhou, Ruofan and Achanta, Radhakrishna and Süsstrunk, Sabine},
     title = {Deep Residual Network for Joint Demosaicing and Super-Resolution},
     journal = {ArXiv},
     year = {2018}}
     
  310. N. Zhu & Z. Li
    Blind image splicing detection via noise level function
    Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 68, pp. 181-192
    DOI: 10.1016/j.image.2018.07.012
    BibTeX
    @article{Zhu2018,
     author = {Zhu, Nan and Li, Zhao},
     title = {Blind image splicing detection via noise level function},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {68},
     pages = {181--192}}
     


2017

  1. I. Aamo & S.F. Caleb
    On the Use of Benford's Law to Detect JPEG Biometric Data Tampering
    Journal of Information Security, Scientific Research Publishing, Inc,, 2017, Vol. 08(03), pp. 240-256
    DOI: 10.4236/jis.2017.83016
    BibTeX
    @article{Aamo2017,
     author = {Aamo, Iorliam and Caleb, Shangbum F.},
     title = {On the Use of Benford's Law to Detect JPEG Biometric Data Tampering},
     journal = {Journal of Information Security},
     publisher = {Scientific Research Publishing, Inc,},
     year = {2017},
     volume = {08},
     number = {03},
     pages = {240--256}}
    
  2. J. Abdessamad, A. ElAdel & M. Zaied
    A sparse representation-based approach for copy-move image forgery detection in smooth regions
    Verikas, A., Radeva, P., Nikolaev, D. P., Zhang, W. & Zhou, J. (ed.)
    Ninth International Conference on Machine Vision (ICMV 2016)
    SPIE-Intl Soc Optical Eng, 2017
    DOI: 10.1117/12.2268766
    BibTeX
    @inproceedings{Abdessamad2017,
     author = {Abdessamad, Jalila and ElAdel, Asma and Zaied, Mourad},
     title = {A sparse representation-based approach for copy-move image forgery detection in smooth regions},
     booktitle = {Ninth International Conference on Machine Vision (ICMV 2016)},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2017}}
    
  3. S. Agarwal & H. Farid
    Photo forensics from JPEG dimples
    Proc. IEEE Workshop Information Forensics and Security (WIFS)
    2017, pp. 1-6
    DOI: 10.1109/WIFS.2017.8267641
    BibTeX
    @inproceedings{Agarwal2017,
     author = {Agarwal, S. and Farid, H.},
     title = {Photo forensics from JPEG dimples},
     booktitle = {Proc. IEEE Workshop Information Forensics and Security (WIFS)},
     year = {2017},
     pages = {1--6}}
    
  4. J. Alakuijala, R. Obryk, O. Stoliarchuk, Z. Szabadka, L. Vandevenne & J. Wassenberg
    Guetzli: Perceptually Guided JPEG Encoder
    arXiv, 2017
    BibTeX
    @article{Alakuijala2017,
     author = {Alakuijala, Jyrki and Obryk, Robert and Stoliarchuk, Ostap and Szabadka, Zoltan and Vandevenne, Lode and Wassenberg, Jan},
     title = {Guetzli: Perceptually Guided JPEG Encoder},
     journal = {arXiv},
     year = {2017}}
    
  5. Z. Al-Ameen & C. Al-Atroshi
    Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: A Laconic Review
    TechArt: Journal of Arts and Imaging Science, 2017, Vol. 4(1)
    DOI: 10.15323/techart.2017.2.4.1.32
    BibTeX
    @article{Al-Ameen2017,
     author = {Al-Ameen, Zohair and Al-Atroshi, Chiai},
     title = {Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: A Laconic Review},
     journal = {TechArt: Journal of Arts and Imaging Science},
     year = {2017},
     volume = {4},
     number = {1}}
    
  6. L. Alamro & N. Yusoffthe
    Copy-Move Forgery Detection using Integrated DWT and SURF
    Journal of Telecommunication, Electronic and Computer Engineering, 2017, Vol. 9(1-2)
    BibTeX
    @article{Alamro2017,
     author = {Alamro, Loai and Yusoffthe, Nooraini},
     title = {Copy-Move Forgery Detection using Integrated DWT and SURF},
     journal = {Journal of Telecommunication, Electronic and Computer Engineering},
     year = {2017},
     volume = {9},
     number = {1-2}}
    
  7. M. Al-Ani & F. Khelifi
    On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(5), pp. 1067-1081
    DOI: 10.1109/TIFS.2016.2640938
    BibTeX
    @article{Al-Ani2017,
     author = {Al-Ani, M. and Khelifi, F.},
     title = {On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {5},
     pages = {1067--1081}}
    
  8. N. Alherbawi, Z. Shukur & R. Sulaiman
    Current techniques in JPEG image authentication and forgery detection
    Journal of Engineering and Applied Sciences, Medwell Journals, 2017, Vol. 12(1), pp. 104-112
    DOI: 10.3923/jeasci.2017.104.112
    BibTeX
    @article{Alherbawi2017,
     author = {Alherbawi, Nadeem and Shukur, Zarina and Sulaiman, Rossilawati},
     title = {Current techniques in JPEG image authentication and forgery detection},
     journal = {Journal of Engineering and Applied Sciences},
     publisher = {Medwell Journals},
     year = {2017},
     volume = {12},
     number = {1},
     pages = {104--112}}
    
  9. N. Alherbawi, Z. Shukur & R. Sulaiman
    JPEG image classification in digital forensic via DCT coefficient analysis
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4915-3
    BibTeX
    @article{Alherbawi2017a,
     author = {Alherbawi, Nadeem and Shukur, Zarina and Sulaiman, Rossilawati},
     title = {JPEG image classification in digital forensic via DCT coefficient analysis},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  10. L. Ali, T. Kasetkasem, F.G. Khan, T. Chanwimaluang & H. Nakahara
    Identification of inpainted satellite images using evalutionary artificial neural network (EANN) and k-nearest neighbor(KNN) algorithm
    Proc. 8th Int. Conf. of Information and Communication Technology for Embedded Systems (IC-ICTES)
    2017, pp. 1-6
    DOI: 10.1109/ICTEmSys.2017.7958765
    BibTeX
    @inproceedings{Ali2017,
     author = {Ali, L. and Kasetkasem, T. and Khan, F. G. and Chanwimaluang, T. and Nakahara, H.},
     title = {Identification of inpainted satellite images using evalutionary artificial neural network (EANN) and k-nearest neighbor(KNN) algorithm},
     booktitle = {Proc. 8th Int. Conf. of Information and Communication Technology for Embedded Systems (IC-ICTES)},
     year = {2017},
     pages = {1--6}}
    
  11. G. Alikhajeh, A. Mirzaei, M. Safayani & M. Ghaffari
    Duplicate matching and estimating features for detection of copy-move images forgery
    arXiv, 2017
    BibTeX
    @article{Alikhajeh2017,
     author = {Alikhajeh, Ghassem and Mirzaei, Abdolreza and Safayani, Mehran and Ghaffari, Meysam},
     title = {Duplicate matching and estimating features for detection of copy-move images forgery},
     journal = {arXiv},
     year = {2017}}
    
  12. O.M. Al-Qershi & B.E. Khoo
    Comparison of Matching Methods for Copy-move Image Forgery Detection
    9th International Conference on Robotic, Vision, Signal Processing and Power Applications
    Springer, 2017
    DOI: 10.1007/978-981-10-1721-6_23
    BibTeX
    @incollection{Al-Qershi2017,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Comparison of Matching Methods for Copy-move Image Forgery Detection},
     booktitle = {9th International Conference on Robotic, Vision, Signal Processing and Power Applications},
     publisher = {Springer},
     year = {2017}}
    
  13. S. AlZahir & R. Hammad
    Blind copula based copy-move forgery detection algorithm
    Proc. IEEE Int. Conf. Consumer Electronics (ICCE)
    2017, pp. 436-437
    DOI: 10.1109/ICCE.2017.7889387
    BibTeX
    @inproceedings{AlZahir2017,
     author = {AlZahir, S. and Hammad, R.},
     title = {Blind copula based copy-move forgery detection algorithm},
     booktitle = {Proc. IEEE Int. Conf. Consumer Electronics (ICCE)},
     year = {2017},
     pages = {436--437}}
    
  14. I. Amerini, R. Caldelli, A.D. Mastio, A.D. Fuccia, C. Molinari & A.P. Rizzo
    Dealing with video source identification in social networks
    Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 57, pp. 1-7
    DOI: 10.1016/j.image.2017.04.009
    BibTeX
    @article{Amerini2017,
     author = {Amerini, Irene and Caldelli, Roberto and Mastio, Andrea Del and Fuccia, Andrea Di and Molinari, Cristiano and Rizzo, Anna Paola},
     title = {Dealing with video source identification in social networks},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     pages = {1--7}}
    
  15. I. Amerini, T. Uricchio, L. Ballan & R. Caldelli
    Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1865-1871
    DOI: 10.1109/CVPRW.2017.233
    BibTeX
    @inproceedings{Amerini2017a,
     author = {Amerini, I. and Uricchio, T. and Ballan, L. and Caldelli, R.},
     title = {Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1865--1871}}
    
  16. I. Amerini, T. Uricchio, L. Ballan & R. Caldelli
    Localization of JPEG double compression through multi-domain convolutional neural networks
    ArXiv, 2017
    BibTeX
    @article{Amerini2017b,
     author = {Amerini, Irene and Uricchio, Tiberio and Ballan, Lamberto and Caldelli, Roberto},
     title = {Localization of JPEG double compression through multi-domain convolutional neural networks},
     journal = {ArXiv},
     year = {2017}}
    
  17. I. Amerini, T. Uricchio & R. Caldelli
    Tracing images back to their social network of origin: A CNN-based approach
    Proc. IEEE Workshop Information Forensics and Security (WIFS)
    2017, pp. 1-6
    DOI: 10.1109/WIFS.2017.8267660
    BibTeX
    @inproceedings{Amerini2017c,
     author = {Amerini, I. and Uricchio, T. and Caldelli, R.},
     title = {Tracing images back to their social network of origin: A CNN-based approach},
     booktitle = {Proc. IEEE Workshop Information Forensics and Security (WIFS)},
     year = {2017},
     pages = {1--6}}
    
  18. U. Arya, G. Singh, R. Singhal, S. Kumar & H. Usmaan
    Image authentication based on salient regions of image
    Proc. Int. Electrical Engineering Congress (iEECON)
    2017, pp. 1-4
    DOI: 10.1109/IEECON.2017.8075882
    BibTeX
    @inproceedings{Arya2017,
     author = {Arya, U. and Singh, G. and Singhal, R. and Kumar, S. and Usmaan, H.},
     title = {Image authentication based on salient regions of image},
     booktitle = {Proc. Int. Electrical Engineering Congress (iEECON)},
     year = {2017},
     pages = {1--4}}
    
  19. A.S. Ashour & N. Dey
    Security of Multimedia Contents: A Brief
    Intelligent Techniques in Signal Processing for Multimedia Security, Springer, 2017
    DOI: 10.1007/978-3-319-44790-2_1
    BibTeX
    @article{Ashour2017,
     author = {Ashour, Amira S. and Dey, Nilanjan},
     title = {Security of Multimedia Contents: A Brief},
     journal = {Intelligent Techniques in Signal Processing for Multimedia Security},
     publisher = {Springer},
     year = {2017}}
    
  20. R.S. Ayyalasomayajula & V. Pankajakshan
    Differentiating Photographic and PRCG Images Using Tampering Localization Features
    Proceedings of International Conference on Computer Vision and Image Processing
    Springer, 2017
    DOI: 10.1007/978-981-10-2107-7_39
    BibTeX
    @incollection{Ayyalasomayajula2017,
     author = {Ayyalasomayajula, Roshan Sai and Pankajakshan, Vinod},
     title = {Differentiating Photographic and PRCG Images Using Tampering Localization Features},
     booktitle = {Proceedings of International Conference on Computer Vision and Image Processing},
     publisher = {Springer},
     year = {2017}}
    
  21. S. Banerjee & A. Ross
    From image to sensor: Comparative evaluation of multiple PRNU estimation schemes for identifying sensors from NIR iris images
    Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)
    2017, pp. 1-6
    DOI: 10.1109/IWBF.2017.7935081
    BibTeX
    @inproceedings{Banerjee2017,
     author = {Banerjee, S. and Ross, A.},
     title = {From image to sensor: Comparative evaluation of multiple PRNU estimation schemes for identifying sensors from NIR iris images},
     booktitle = {Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)},
     year = {2017},
     pages = {1--6}}
    
  22. J.H. Bappy, A.K. Roy-Chowdhury, J. Bunk, L. Nataraj & B.S. Manjunath
    Exploiting Spatial Structure for Localizing Manipulated Image Regions
    Proc. of the ICCV 2017
    2017
    BibTeX
    @conference{Bappy2017,
     author = {Bappy, Jawadul H. and Roy-Chowdhury, Amit K. and Bunk, Jason and Nataraj, Lakshmanan and Manjunath, B. S.},
     title = {Exploiting Spatial Structure for Localizing Manipulated Image Regions},
     booktitle = {Proc. of the ICCV 2017},
     year = {2017}}
    
  23. M. Barni, L. Bondi, N. Bonettini, P. Bestagini, A. Costanzo, M. Maggini, B. Tondi & S. Tubaro
    Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks
    arXiv, 2017
    BibTeX
    @article{Barni2017a,
     author = {Barni, Mauro and Bondi, Luca and Bonettini, Nicolò and Bestagini, Paolo and Costanzo, Andrea and Maggini, Marco and Tondi, Benedetta and Tubaro, Stefano},
     title = {Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks},
     journal = {arXiv},
     year = {2017}}
    
  24. M. Barni, E. Nowroozi & B. Tondi
    Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples.
    Proc. of the 25th European Signal Processing Conference (EUSIPCO), 2017
    BibTeX
    @article{Barni2017,
     author = {Barni, Mauro and Nowroozi, Ehsan and Tondi, Benedetta},
     title = {Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples.},
     journal = {Proc. of the 25th European Signal Processing Conference (EUSIPCO)},
     year = {2017}}
    
  25. B. Bayar & M.C. Stamm
    On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection
    Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics
    2017, pp. 2152-2156
    DOI: 10.1109/ICASSP.2017.7952537
    BibTeX
    @inproceedings{Bayar2017,
     author = {Bayar, B. and Stamm, M. C.},
     title = {On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics},
     year = {2017},
     pages = {2152--2156}}
    
  26. B. Bayar & M.C. Stamm
    A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural Networks
    Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17
    ACM Press, 2017
    DOI: 10.1145/3082031.3083249
    BibTeX
    @inproceedings{Bayar2017a,
     author = {Bayar, Belhassen and Stamm, Matthew C.},
     title = {A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural Networks},
     booktitle = {Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17},
     publisher = {ACM Press},
     year = {2017}}
    
  27. P. Bhavya Bhanu M & N. Arun Kumar M
    Copy-move forgery detection using segmentation
    Proc. 11th Int. Conf. Intelligent Systems and Control (ISCO)
    2017, pp. 224-228
    DOI: 10.1109/ISCO.2017.7855986
    BibTeX
    @inproceedings{BhavyaBhanuM2017,
     author = {Bhavya Bhanu M, P. and Arun Kumar M, N.},
     title = {Copy-move forgery detection using segmentation},
     booktitle = {Proc. 11th Int. Conf. Intelligent Systems and Control (ISCO)},
     year = {2017},
     pages = {224--228}}
    
  28. X. Bi & C.-M. Pun
    Fast Reflective Offset-Guided Searching Method for Copy-Move Forgery Detection
    Information Sciences, Elsevier BV, 2017
    DOI: 10.1016/j.ins.2017.08.044
    BibTeX
    @article{Bi2017,
     author = {Bi, Xiuli and Pun, Chi-Man},
     title = {Fast Reflective Offset-Guided Searching Method for Copy-Move Forgery Detection},
     journal = {Information Sciences},
     publisher = {Elsevier BV},
     year = {2017}}
    
  29. A. Biedermann, S. Bozza, F. Taroni & C. Aitken
    The consequences of understanding expert probability reporting as a decision
    Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 80-85
    DOI: 10.1016/j.scijus.2016.10.005
    BibTeX
    @article{Biedermann2017,
     author = {Biedermann, A. and Bozza, S. and Taroni, F. and Aitken, C.},
     title = {The consequences of understanding expert probability reporting as a decision},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     number = {1},
     pages = {80--85}}
    
  30. G.K. Birajdar & V.H. Mankar
    Blind image forensics using reciprocal singular value curve based local statistical features
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5021-2
    BibTeX
    @article{Birajdar2017,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Blind image forensics using reciprocal singular value curve based local statistical features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  31. G.K. Birajdar & V.H. Mankar
    Subsampling-Based Blind Image Forgery Detection Using Support Vector Machine and Artificial Neural Network Classifiers
    Arabian Journal for Science and Engineering, Springer, 2017, pp. 1
    DOI: 10.1007/s13369-017-2671-3
    BibTeX
    @article{Birajdar2017b,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Subsampling-Based Blind Image Forgery Detection Using Support Vector Machine and Artificial Neural Network Classifiers},
     journal = {Arabian Journal for Science and Engineering},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  32. C. Boididou, S.E. Middleton, Z. Jin, S. Papadopoulos, D.-T. Dang-Nguyen, G. Boato & Y. Kompatsiaris
    Verifying information with multimedia content on twitter
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5132-9
    BibTeX
    @article{Boididou2017,
     author = {Boididou, Christina and Middleton, Stuart E. and Jin, Zhiwei and Papadopoulos, Symeon and Dang-Nguyen, Duc-Tien and Boato, Giulia and Kompatsiaris, Yiannis},
     title = {Verifying information with multimedia content on twitter},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  33. C. Boididou, S. Papadopoulos, M. Zampoglou, L. Apostolidis, O. Papadopoulou & Y. Kompatsiaris
    Detection and visualization of misleading content on Twitter
    International Journal of Multimedia Information Retrieval, Springer, 2017, pp. 1
    DOI: 10.1007/s13735-017-0143-x
    BibTeX
    @article{Boididou2017a,
     author = {Boididou, Christina and Papadopoulos, Symeon and Zampoglou, Markos and Apostolidis, Lazaros and Papadopoulou, Olga and Kompatsiaris, Yiannis},
     title = {Detection and visualization of misleading content on Twitter},
     journal = {International Journal of Multimedia Information Retrieval},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  34. L. Bondi, L. Baroffio, D. Güera, P. Bestagini, E.J. Delp & S. Tubaro
    First Steps Toward Camera Model Identification With Convolutional Neural Networks
    IEEE Signal Processing Letters, 2017, Vol. 24(3), pp. 259-263
    DOI: 10.1109/LSP.2016.2641006
    BibTeX
    @article{Bondi2017b,
     author = {Bondi, L. and Baroffio, L. and Güera, D. and Bestagini, P. and Delp, E. J. and Tubaro, S.},
     title = {First Steps Toward Camera Model Identification With Convolutional Neural Networks},
     journal = {IEEE Signal Processing Letters},
     year = {2017},
     volume = {24},
     number = {3},
     pages = {259--263}}
    
  35. L. Bondi, S. Lameri, D. Güera, P. Bestagini, E.J. Delp & S. Tubaro
    Tampering Detection and Localization Through Clustering of Camera-Based CNN Features
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1855-1864
    DOI: 10.1109/CVPRW.2017.232
    BibTeX
    @inproceedings{Bondi2017,
     author = {Bondi, L. and Lameri, S. and Güera, D. and Bestagini, P. and Delp, E. J. and Tubaro, S.},
     title = {Tampering Detection and Localization Through Clustering of Camera-Based CNN Features},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1855--1864}}
    
  36. N. Bonettini
    JPEG-based Forensics through Convolutional Neural Networks
    Politecnico Di Milano, Politecnico Di Milano, 2017
    BibTeX
    @mastersthesis{Bonettini2017,
     author = {Bonettini, Nicol`o},
     title = {JPEG-based Forensics through Convolutional Neural Networks},
     school = {Politecnico Di Milano},
     year = {2017}}
    
  37. J. Brogan, P. Bestagini, A. Bharati, A. Pinto, D. Moreira, K. Bowyer, P. Flynn, A. Rocha & W. Scheirer
    Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization
    arxiv, 2017
    BibTeX
    @article{Brogan2017,
     author = {Brogan, Joel and Bestagini, Paolo and Bharati, Aparna and Pinto, Allan and Moreira, Daniel and Bowyer, Kevin and Flynn, Patrick and Rocha, Anderson and Scheirer, Walter},
     title = {Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization},
     journal = {arxiv},
     year = {2017}}
    
  38. M. Brouwers & R. Mousa
    Automatic comparison of photo response non uniformity (PRNU) on Youtube
    System and Network Engineering • January 2017, 2017
    BibTeX
    @article{Brouwers2017,
     author = {Brouwers, Marcel and Mousa, Rahaf},
     title = {Automatic comparison of photo response non uniformity (PRNU) on Youtube},
     journal = {System and Network Engineering • January 2017},
     year = {2017}}
    
  39. J. Bunk, J.H. Bappy, T.M. Mohammed, L. Nataraj, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury & L. Peterson
    Detection and Localization of Image Forgeries using Resampling Features and Deep Learning
    arXiv, 2017
    BibTeX
    @article{Bunk2017,
     author = {Bunk, Jason and Bappy, Jawadul H. and Mohammed, Tajuddin Manhar and Nataraj, Lakshmanan and Flenner, Arjuna and Manjunath, B. S. and Chandrasekaran, Shivkumar and Roy-Chowdhury, Amit K. and Peterson, Lawrence},
     title = {Detection and Localization of Image Forgeries using Resampling Features and Deep Learning},
     journal = {arXiv},
     year = {2017}}
    
  40. J. Bunk, J.H. Bappy, T.M. Mohammed, L. Nataraj, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury & L. Peterson
    Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1881-1889
    DOI: 10.1109/CVPRW.2017.235
    BibTeX
    @inproceedings{Bunk2017a,
     author = {Bunk, J. and Bappy, J. H. and Mohammed, T. M. and Nataraj, L. and Flenner, A. and Manjunath, B. S. and Chandrasekaran, S. and Roy-Chowdhury, A. K. and Peterson, L.},
     title = {Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1881--1889}}
    
  41. R. Caldelli, R. Becarelli & I. Amerini
    Image Origin Classification based on Social Network Provenance
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2656842
    BibTeX
    @article{Caldelli2017,
     author = {Caldelli, R. and Becarelli, R. and Amerini, I.},
     title = {Image Origin Classification based on Social Network Provenance},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  42. G. Cattaneo, U. Ferraro Petrillo, M. Nappi, F. Narducci & G. Roscigno
    An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop
    Green, Pervasive, and Cloud Computing, Springer, 2017
    DOI: 10.1007/978-3-319-57186-7_35
    BibTeX
    @article{Cattaneo2017a,
     author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Nappi, Michele and Narducci, Fabio and Roscigno, Gianluca},
     title = {An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop},
     journal = {Green, Pervasive, and Cloud Computing},
     publisher = {Springer},
     year = {2017}}
    
  43. G. Cattaneo, G. Roscigno & U.F. Petrillo
    Improving the experimental analysis of tampered image detection algorithms for biometric systems
    Pattern Recognition Letters, Elsevier BV, 2017
    DOI: 10.1016/j.patrec.2017.01.006
    BibTeX
    @article{Cattaneo2017,
     author = {Cattaneo, Giuseppe and Roscigno, Gianluca and Petrillo, Umberto Ferraro},
     title = {Improving the experimental analysis of tampered image detection algorithms for biometric systems},
     journal = {Pattern Recognition Letters},
     publisher = {Elsevier BV},
     year = {2017}}
    
  44. S. Chakraborty & M. Kirchner
    PRNU-based Image Manipulation Localization with Discriminative Random Fields
    2017
    BibTeX
    @unpublished{Chakraborty2017,
     author = {Chakraborty, S. and Kirchner, M.},
     title = {PRNU-based Image Manipulation Localization with Discriminative Random Fields},
     year = {2017}}
    
  45. P.S. Chandakkar & B. Li
    Capturing Localized Image Artifacts through a CNN-based Hyper-image Representation
    ArXiv, 2017
    BibTeX
    @article{Chandakkar2017,
     author = {Chandakkar, Parag Shridhar and Li, Baoxin},
     title = {Capturing Localized Image Artifacts through a CNN-based Hyper-image Representation},
     journal = {ArXiv},
     year = {2017}}
    
  46. P.S. Chandakkar & B. Li
    Investigating Human Factors in Image Forgery Detection
    ArXiv, 2017
    BibTeX
    @article{Chandakkar2017a,
     author = {Chandakkar, Parag S. and Li, Baoxin},
     title = {Investigating Human Factors in Image Forgery Detection},
     journal = {ArXiv},
     year = {2017}}
    
  47. B. Chen, H. Li & W. Luo
    Image Processing Operations Identification via Convolutional Neural Network
    arXiv, 2017
    BibTeX
    @article{Chen2017d,
     author = {Chen, Bolin and Li, Haodong and Luo, Weiqi},
     title = {Image Processing Operations Identification via Convolutional Neural Network},
     journal = {arXiv},
     year = {2017}}
    
  48. B. Chen, X. Qi, X. Sun & Y.-Q. Shi
    Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection
    Journal of Visual Communication and Image Representation, Elsevier BV, 2017
    DOI: 10.1016/j.jvcir.2017.08.011
    BibTeX
    @article{Chen2017b,
     author = {Chen, Beijing and Qi, Xiaoming and Sun, Xingming and Shi, Yun-Qing},
     title = {Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2017}}
    
  49. C. Chen, S. McCloskey & J. Yu
    Image Splicing Detection via Camera Response Function Analysis
    Computer Vision Foundation (CVF), 2017
    BibTeX
    @article{Chen2017a,
     author = {Chen, Can and McCloskey, Scott and Yu, Jingyi},
     title = {Image Splicing Detection via Camera Response Function Analysis},
     journal = {Computer Vision Foundation (CVF)},
     year = {2017}}
    
  50. C. Chen, J. Ni, Z. Shen & Y.Q. Shi
    Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications
    IEEE Transactions on Image Processing, 2017, Vol. 26(6), pp. 2811-2824
    DOI: 10.1109/TIP.2017.2682963
    BibTeX
    @article{Chen2017e,
     author = {Chen, C. and Ni, J. and Shen, Z. and Shi, Y. Q.},
     title = {Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications},
     journal = {IEEE Transactions on Image Processing},
     year = {2017},
     volume = {26},
     number = {6},
     pages = {2811--2824}}
    
  51. C.-C. Chen, L.-Y. Chen & Y.-J. Lin
    Block Sampled Matching with Region Growing for Detecting Copy-Move Forgery Duplicated Regions
    Journal of Information Hiding and Multimedia Signal Processing, 2017
    BibTeX
    @article{Chen2017c,
     author = {Chen, Chien-Chang and Chen, Ling-Ying and Lin, Yu-Jing},
     title = {Block Sampled Matching with Region Growing for Detecting Copy-Move Forgery Duplicated Regions},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2017}}
    
  52. Z. Chen, Y. Zhao & R. Ni
    Detection of operation chain: JPEG-Resampling-JPEG
    Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 57, pp. 8-20
    DOI: 10.1016/j.image.2017.04.008
    BibTeX
    @article{Chen2017,
     author = {Chen, Zhipeng and Zhao, Yao and Ni, Rongrong},
     title = {Detection of operation chain: JPEG-Resampling-JPEG},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     pages = {8--20}}
    
  53. R. Chitra R & C. Minnu Jayan
    HUE Modification Detection and Estimation using Photo Response Non-Uniformity
    IJSTE - International Journal of Science Technology & Engineering, 2017
    BibTeX
    @article{ChitraR2017,
     author = {Chitra R, R. and Minnu Jayan, C.},
     title = {HUE Modification Detection and Estimation using Photo Response Non-Uniformity},
     journal = {IJSTE - International Journal of Science Technology & Engineering},
     year = {2017}}
    
  54. H.Y. Choi, H.U. Jang, D. Kim, J. Son, S.M. Mun, S. Choi & H.K. Lee
    Detecting composite image manipulation based on deep neural networks
    Proc. Signals and Image Processing (IWSSIP) 2017 Int. Conf. Systems
    2017, pp. 1-5
    DOI: 10.1109/IWSSIP.2017.7965621
    BibTeX
    @inproceedings{Choi2017b,
     author = {Choi, H. Y. and Jang, H. U. and Kim, D. and Son, J. and Mun, S. M. and Choi, S. and Lee, H. K.},
     title = {Detecting composite image manipulation based on deep neural networks},
     booktitle = {Proc. Signals and Image Processing (IWSSIP) 2017 Int. Conf. Systems},
     year = {2017},
     pages = {1--5}}
    
  55. H.-Y. Choi, D.-K. Hyun, S. Choi & H.-K. Lee
    Enhanced resampling detection based on image correlation of 3D stereoscopic images
    EURASIP Journal on Image and Video Processing, Springer, 2017, Vol. 2017(1), pp. 1
    DOI: 10.1186/s13640-017-0170-9
    BibTeX
    @article{Choi2017a,
     author = {Choi, Hak-Yeol and Hyun, Dai-Kyung and Choi, Sunghee and Lee, Heung-Kyu},
     title = {Enhanced resampling detection based on image correlation of 3D stereoscopic images},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2017},
     volume = {2017},
     number = {1},
     pages = {1}}
    
  56. H.-Y. Choi, H.-U. Jang, J. Son, D. Kim & H.-K. Lee
    Content Recapture Detection Based on Convolutional Neural Networks
    Information Science and Applications 2017
    Springer Nature, 2017, pp. 339-346
    DOI: 10.1007/978-981-10-4154-9_40
    BibTeX
    @incollection{Choi2017,
     author = {Choi, Hak-Yeol and Jang, Han-Ul and Son, Jeongho and Kim, Dongkyu and Lee, Heung-Kyu},
     title = {Content Recapture Detection Based on Convolutional Neural Networks},
     booktitle = {Information Science and Applications 2017},
     publisher = {Springer Nature},
     year = {2017},
     pages = {339--346}}
    
  57. F. Costa, A. Oliveira, P. Ferrara, Z. Dias, S. Goldenstein & A. Rocha
    New dissimilarity measures for image phylogeny reconstruction
    Pattern Analysis and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s10044-017-0616-9
    BibTeX
    @article{Costa2017,
     author = {Costa, Filipe and Oliveira, Alberto and Ferrara, Pasquale and Dias, Zanoni and Goldenstein, Siome and Rocha, Anderson},
     title = {New dissimilarity measures for image phylogeny reconstruction},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  58. D. Cozzolino, F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    PRNU-Based Forgery Localization in a Blind Scenario
    Image Analysis and Processing - ICIAP 2017, Springer, 2017
    DOI: 10.1007/978-3-319-68548-9_52
    BibTeX
    @article{Cozzolino2017a,
     author = {Cozzolino, Davide and Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {PRNU-Based Forgery Localization in a Blind Scenario},
     journal = {Image Analysis and Processing - ICIAP 2017},
     publisher = {Springer},
     year = {2017}}
    
  59. D. Cozzolino, G. Poggi & L. Verdoliva
    Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection
    arX, 2017
    BibTeX
    @article{Cozzolino2017,
     author = {Cozzolino, Davide and Poggi, Giovanni and Verdoliva, Luisa},
     title = {Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection},
     journal = {arX},
     year = {2017}}
    
  60. R. Cristin & V. Cyril Raj
    Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery
    Science China Information Sciences, Springer, 2017, Vol. 60(8), pp. 1
    DOI: 10.1007/s11432-016-0478-y
    BibTeX
    @article{Cristin2017,
     author = {Cristin, Rajan and Cyril Raj, Velankanni},
     title = {Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery},
     journal = {Science China Information Sciences},
     publisher = {Springer},
     year = {2017},
     volume = {60},
     number = {8},
     pages = {1}}
    
  61. F. Cruz, N. Sidère, M. Coustaty, V.P. D'Andecy & J.M. Ogier
    Local Binary Patterns for Document Forgery Detection
    Proc. 14th IAPR Int. Conf. Document Analysis and Recognition (ICDAR)
    2017, Vol. 01, pp. 1223-1228
    DOI: 10.1109/ICDAR.2017.202
    BibTeX
    @inproceedings{Cruz2017,
     author = {Cruz, F. and Sidère, N. and Coustaty, M. and D'Andecy, V. P. and Ogier, J. M.},
     title = {Local Binary Patterns for Document Forgery Detection},
     booktitle = {Proc. 14th IAPR Int. Conf. Document Analysis and Recognition (ICDAR)},
     year = {2017},
     volume = {01},
     pages = {1223--1228}}
    
  62. S. Dadkhah, M. Köppen, H.A. Jalab, S. Sadeghi, A.A. Manaf & D. Uliyan
    Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics
    Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods
    SCITEPRESS - Science and Technology Publications, 2017
    DOI: 10.5220/0006232206120619
    BibTeX
    @inproceedings{Dadkhah2017,
     author = {Dadkhah, Sajjad and Köppen, Mario and Jalab, Hamid A. and Sadeghi, Somayeh and Manaf, Azizah Abdul and Uliyan, Diaa},
     title = {Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics},
     booktitle = {Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods},
     publisher = {SCITEPRESS - Science and Technology Publications},
     year = {2017}}
    
  63. N.N. Dafale & R. Naskar
    Sensor pattern noise based source anonymization
    Proc. Signal Processing and Security (ICSSS) 2017 Third Int. Conf. Sensing
    2017, pp. 93-98
    DOI: 10.1109/SSPS.2017.8071572
    BibTeX
    @inproceedings{Dafale2017,
     author = {Dafale, N. N. and Naskar, R.},
     title = {Sensor pattern noise based source anonymization},
     booktitle = {Proc. Signal Processing and Security (ICSSS) 2017 Third Int. Conf. Sensing},
     year = {2017},
     pages = {93--98}}
    
  64. A.P. Dawid
    Forensic likelihood ratio: Statistical problems and pitfalls
    Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 73-75
    DOI: 10.1016/j.scijus.2016.09.002
    BibTeX
    @article{Dawid2017,
     author = {Dawid, A. Philip},
     title = {Forensic likelihood ratio: Statistical problems and pitfalls},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     number = {1},
     pages = {73--75}}
    
  65. T. Dekel, M. Rubinstein, C. Liu & T. Freeman, William
    On the Effectiveness of Visible Watermarks
    CVPR ´17: Proceedings of the 2017 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´17)
    2017
    BibTeX
    @inproceedings{Dekel2017,
     author = {Dekel, Tali and Rubinstein, Michael and Liu, Ce and Freeman, William, T.},
     title = {On the Effectiveness of Visible Watermarks},
     booktitle = {CVPR ´17: Proceedings of the 2017 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´17)},
     year = {2017}}
    
  66. V.M. Devagiri
    Splicing Forgery Detection and the Impact of Image Resolution
    Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden, Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden, 2017
    BibTeX
    @mastersthesis{Devagiri2017,
     author = {Devagiri, Vishnu Manasa},
     title = {Splicing Forgery Detection and the Impact of Image Resolution},
     school = {Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden},
     year = {2017}}
    
  67. N. Dey, A.S. Ashour, S. Chakraborty, S. Banerjee, E. Gospodinova, M. Gospodinov & A.E. Hassanien
    Watermarking in Biomedical Signal Processing
    Intelligent Techniques in Signal Processing for Multimedia Security, Springer, 2017
    DOI: 10.1007/978-3-319-44790-2_16
    BibTeX
    @article{Dey2017,
     author = {Dey, Nilanjan and Ashour, Amira S. and Chakraborty, Sayan and Banerjee, Sukanya and Gospodinova, Evgeniya and Gospodinov, Mitko and Hassanien, Aboul Ella},
     title = {Watermarking in Biomedical Signal Processing},
     journal = {Intelligent Techniques in Signal Processing for Multimedia Security},
     publisher = {Springer},
     year = {2017}}
    
  68. R. Dixit, R. Naskar & S. Mishra
    Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD
    IET Image Proc, 2017, Vol. 11(5), pp. 301-309
    DOI: 10.1049/iet-ipr.2016.0537
    BibTeX
    @article{Dixit2017,
     author = {Dixit, R. and Naskar, R. and Mishra, S.},
     title = {Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD},
     journal = {IET Image Proc},
     year = {2017},
     volume = {11},
     number = {5},
     pages = {301--309}}
    
  69. M. Emam, Q. Han, Q. Li, H. Zhang & M. Emam
    A robust detection algorithm for image Copy-Move forgery in smooth regions
    Proc. System and Simulation (ICCSS) 2017 Int. Conf. Circuits
    2017, pp. 119-123
    DOI: 10.1109/CIRSYSSIM.2017.8023194
    BibTeX
    @inproceedings{Emam2017a,
     author = {Emam, M. and Han, Q. and Li, Q. and Zhang, H. and Emam, M.},
     title = {A robust detection algorithm for image Copy-Move forgery in smooth regions},
     booktitle = {Proc. System and Simulation (ICCSS) 2017 Int. Conf. Circuits},
     year = {2017},
     pages = {119--123}}
    
  70. M. Emam, Q. Han & H. Zhang
    Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images
    Journal of Forensic Sciences, Wiley-Blackwell, 2017
    DOI: 10.1111/1556-4029.13456
    BibTeX
    @article{Emam2017,
     author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli},
     title = {Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images},
     journal = {Journal of Forensic Sciences},
     publisher = {Wiley-Blackwell},
     year = {2017}}
    
  71. M. Faiz, N.B. Anuar, A.W.A. Wahab, S. Shamshirband & A.T. Chronopoulos
    Source camera identification: a distributed computing approach using Hadoop
    Journal of Cloud Computing, Springer, 2017, Vol. 6(1), pp. 1
    DOI: 10.1186/s13677-017-0088-x
    BibTeX
    @article{Faiz2017,
     author = {Faiz, Muhammad and Anuar, Nor Badrul and Wahab, Ainuddin Wahid Abdul and Shamshirband, Shahaboddin and Chronopoulos, Anthony T.},
     title = {Source camera identification: a distributed computing approach using Hadoop},
     journal = {Journal of Cloud Computing},
     publisher = {Springer},
     year = {2017},
     volume = {6},
     number = {1},
     pages = {1}}
    
  72. H. Farid
    How to Detect Faked Photos
    American Scientist, 2017
    BibTeX
    @article{Farid2017,
     author = {Farid, Hany},
     title = {How to Detect Faked Photos},
     journal = {American Scientist},
     year = {2017}}
    
  73. S. Farooq, M.H. Yousaf & F. Hussain
    A generic passive image forgery detection scheme using local binary pattern with rich models
    Computers & Electrical Engineering, Elsevier BV, 2017
    DOI: 10.1016/j.compeleceng.2017.05.008
    BibTeX
    @article{Farooq2017,
     author = {Farooq, Sundus and Yousaf, Muhammad Haroon and Hussain, Fawad},
     title = {A generic passive image forgery detection scheme using local binary pattern with rich models},
     journal = {Computers & Electrical Engineering},
     publisher = {Elsevier BV},
     year = {2017}}
    
  74. B. Feng, J. Weng & W. Lu
    Improved Algorithms for Robust Histogram Shape-Based Image Watermarking
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_21
    BibTeX
    @article{Feng2017,
     author = {Feng, Bingwen and Weng, Jian and Lu, Wei},
     title = {Improved Algorithms for Robust Histogram Shape-Based Image Watermarking},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  75. V. Ferraris, N. Dobigeon, Q. Wei & M. Chabert
    Change detection between multi-band images using a robust fusion-based approach
    Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics
    2017, pp. 3346-3350
    DOI: 10.1109/ICASSP.2017.7952776
    BibTeX
    @inproceedings{Ferraris2017,
     author = {Ferraris, V. and Dobigeon, N. and Wei, Q. and Chabert, M.},
     title = {Change detection between multi-band images using a robust fusion-based approach},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics},
     year = {2017},
     pages = {3346--3350}}
    
  76. V. Ferraris, N. Dobigeon, Q. Wei & M. Chabert
    Robust Fusion of Multiband Images With Different Spatial and Spectral Resolutions for Change Detection
    IEEE Transactions on Computational Imaging, 2017, Vol. 3(2), pp. 175-186
    DOI: 10.1109/TCI.2017.2692645
    BibTeX
    @article{Ferraris2017a,
     author = {Ferraris, V. and Dobigeon, N. and Wei, Q. and Chabert, M.},
     title = {Robust Fusion of Multiband Images With Different Spatial and Spectral Resolutions for Change Detection},
     journal = {IEEE Transactions on Computational Imaging},
     year = {2017},
     volume = {3},
     number = {2},
     pages = {175--186}}
    
  77. G.R. Franco
    Identificación de la Fuente en Ficheros Multimedia de Redes Sociales
    Departamento de Ingeniería del Software e Inteligencia Artificial FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID, Departamento de Ingeniería del Software e Inteligencia Artificial FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID, 2017
    BibTeX
    @thesis{Franco2017,
     author = {Franco, Guillermo Rodríguez},
     title = {Identificación de la Fuente en Ficheros Multimedia de Redes Sociales},
     school = {Departamento de Ingeniería del Software e Inteligencia Artificial FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID},
     year = {2017}}
    
  78. D. Freire-Obregón, F. Narducci, S. Barra & M. Castrillón-Santana
    Deep learning for source camera identification on mobile devices
    ArXiv, 2017
    BibTeX
    @article{Freire-Obregon2017,
     author = {Freire-Obregón, David and Narducci, Fabio and Barra, Silvio and Castrillón-Santana, Modesto},
     title = {Deep learning for source camera identification on mobile devices},
     journal = {ArXiv},
     year = {2017}}
    
  79. T.D. Gadhiya, A.K. Roy, S.K. Mitra & V. Mall
    Use of discrete wavelet transform method for detection and localization of tampering in a digital medical image
    Proc. IEEE Region 10 Symp. (TENSYMP)
    2017, pp. 1-5
    DOI: 10.1109/TENCONSpring.2017.8070082
    BibTeX
    @inproceedings{Gadhiya2017,
     author = {Gadhiya, T. D. and Roy, A. K. and Mitra, S. K. and Mall, V.},
     title = {Use of discrete wavelet transform method for detection and localization of tampering in a digital medical image},
     booktitle = {Proc. IEEE Region 10 Symp. (TENSYMP)},
     year = {2017},
     pages = {1--5}}
    
  80. S. Georgievska, R. Bakhshi, A. Gavai, A. Sclocco & B. van Werkhoven
    Clustering image noise patterns by embedding and visualization for common source camera detection
    Digital Investigation, Elsevier BV, 2017
    DOI: 10.1016/j.diin.2017.08.005
    BibTeX
    @article{Georgievska2017,
     author = {Georgievska, Sonja and Bakhshi, Rena and Gavai, Anand and Sclocco, Alessio and van Werkhoven, Ben},
     title = {Clustering image noise patterns by embedding and visualization for common source camera detection},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2017}}
    
  81. N.K. Gill, R. Garg & E.A. Doegar
    A review paper on digital image forgery detection techniques
    Proc. Communication and Networking Technologies (ICCCNT) 2017 8th Int. Conf. Computing
    2017, pp. 1-7
    DOI: 10.1109/ICCCNT.2017.8203904
    BibTeX
    @inproceedings{Gill2017,
     author = {Gill, N. K. and Garg, R. and Doegar, E. A.},
     title = {A review paper on digital image forgery detection techniques},
     booktitle = {Proc. Communication and Networking Technologies (ICCCNT) 2017 8th Int. Conf. Computing},
     year = {2017},
     pages = {1--7}}
    
  82. O. Giudice, A. Paratore, M. Moltisanti & S. Battiato
    A Classification Engine for Image Ballistics of Social Data
    Image Analysis and Processing - ICIAP 2017, Springer, 2017
    DOI: 10.1007/978-3-319-68548-9_57
    BibTeX
    @article{Giudice2017,
     author = {Giudice, Oliver and Paratore, Antonino and Moltisanti, Marco and Battiato, Sebastiano},
     title = {A Classification Engine for Image Ballistics of Social Data},
     journal = {Image Analysis and Processing - ICIAP 2017},
     publisher = {Springer},
     year = {2017}}
    
  83. L.I. Gonçalves
    Detecção Automática De Indícios De Fraude Em Assinaturas Em Documentos Digitais
    Instituto Federal De Educação, Ciência E Tecnologia De São Paulo, Instituto Federal De Educação, Ciência E Tecnologia De São Paulo, 2017
    BibTeX
    @phdthesis{Goncalves2017,
     author = {Gonçalves, Leandro Inácio},
     title = {Detecção Automática De Indícios De Fraude Em Assinaturas Em Documentos Digitais},
     school = {Instituto Federal De Educação, Ciência E Tecnologia De São Paulo},
     year = {2017}}
    
  84. W. Gu, G. Yang, D. Zhang & M. Xia
    A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix
    Cloud Computing and Security, Springer, 2017
    DOI: 10.1007/978-3-319-68542-7_35
    BibTeX
    @article{Gu2017,
     author = {Gu, Wenwu and Yang, Gaobo and Zhang, Dengyong and Xia, Ming},
     title = {A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2017}}
    
  85. D. Güera, Y. Wang, L. Bondi, P. Bestagini, S. Tubaro & E.J. Delp
    A Counter-Forensic Method for CNN-Based Camera Model Identification
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1840-1847
    DOI: 10.1109/CVPRW.2017.230
    BibTeX
    @inproceedings{Gueera2017,
     author = {Güera, D. and Wang, Y. and Bondi, L. and Bestagini, P. and Tubaro, S. and Delp, E. J.},
     title = {A Counter-Forensic Method for CNN-Based Camera Model Identification},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1840--1847}}
    
  86. A. Gupta
    Performance Enhancement of Copy-Move Forgery Detection by Using Shi Tomasi-Surf Detector and Surf-PSO Algorithm
    Thapar University, Thapar University, 2017
    BibTeX
    @mastersthesis{Gupta2017,
     author = {Gupta, Anmol},
     title = {Performance Enhancement of Copy-Move Forgery Detection by Using Shi Tomasi-Surf Detector and Surf-PSO Algorithm},
     school = {Thapar University},
     year = {2017}}
    
  87. H.G. Hadigheh & G. bin sulong
    Feature base fusion for splicing forgery detection based on neuro fuzzy
    arXiv, 2017
    BibTeX
    @article{Hadigheh2017,
     author = {Hadigheh, Habib Ghaffari and bin sulong, Ghazali},
     title = {Feature base fusion for splicing forgery detection based on neuro fuzzy},
     journal = {arXiv},
     year = {2017}}
    
  88. B. Harjito & H. Prasetyo
    Image forensics using EDBTC feature
    Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)
    2017, pp. 167-168
    DOI: 10.1109/ICCE-China.2017.7991048
    BibTeX
    @inproceedings{Harjito2017,
     author = {Harjito, B. and Prasetyo, H.},
     title = {Image forensics using EDBTC feature},
     booktitle = {Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)},
     year = {2017},
     pages = {167--168}}
    
  89. B. Harjito & H. Prasetyo
    Image forensics using EDBTC feature
    Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)
    2017, pp. 167-168
    DOI: 10.1109/ICCE-China.2017.7991048
    BibTeX
    @inproceedings{Harjito2017a,
     author = {Harjito, B. and Prasetyo, H.},
     title = {Image forensics using EDBTC feature},
     booktitle = {Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)},
     year = {2017},
     pages = {167--168}}
    
  90. K. Hayat & T. Qazi
    Forgery detection in digital images via discrete wavelet and discrete cosine transforms
    Computers & Electrical Engineering, Elsevier BV, 2017
    DOI: 10.1016/j.compeleceng.2017.03.013
    BibTeX
    @article{Hayat2017,
     author = {Hayat, Khizar and Qazi, Tanzeela},
     title = {Forgery detection in digital images via discrete wavelet and discrete cosine transforms},
     journal = {Computers & Electrical Engineering},
     publisher = {Elsevier BV},
     year = {2017}}
    
  91. X. He, Q. Guan, Y. Tong, X. Zhao & H. Yu
    A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-53465-7_11
    BibTeX
    @article{He2017,
     author = {He, Xin and Guan, Qingxiao and Tong, Yanfei and Zhao, Xianfeng and Yu, Haibo},
     title = {A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  92. A. Hilal, T. Hamzeh & S. Chantaf
    Copy-move forgery detection using principal component analysis and discrete cosine transform
    Proc. Sensors Networks Smart and Emerging Technologies (SENSET)
    2017, pp. 1-4
    DOI: 10.1109/SENSET.2017.8125021
    BibTeX
    @inproceedings{Hilal2017a,
     author = {Hilal, A. and Hamzeh, T. and Chantaf, S.},
     title = {Copy-move forgery detection using principal component analysis and discrete cosine transform},
     booktitle = {Proc. Sensors Networks Smart and Emerging Technologies (SENSET)},
     year = {2017},
     pages = {1--4}}
    
  93. M.V. Hilal, P. Yannawar & A.T. Gaikwad
    Image inconsistency detection using histogram of orientated gradient (HOG)
    Proc. 1st Int. Conf. Intelligent Systems and Information Management (ICISIM)
    2017, pp. 22-25
    DOI: 10.1109/ICISIM.2017.8122141
    BibTeX
    @inproceedings{Hilal2017,
     author = {Hilal, M. V. and Yannawar, P. and Gaikwad, A. T.},
     title = {Image inconsistency detection using histogram of orientated gradient (HOG)},
     booktitle = {Proc. 1st Int. Conf. Intelligent Systems and Information Management (ICISIM)},
     year = {2017},
     pages = {22--25}}
    
  94. M. Hildebrandt, T. Neubert, A. Makrushin & J. Dittmann
    Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps
    Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)
    2017, pp. 1-6
    DOI: 10.1109/IWBF.2017.7935087
    BibTeX
    @inproceedings{Hildebrandt2017,
     author = {Hildebrandt, M. and Neubert, T. and Makrushin, A. and Dittmann, J.},
     title = {Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps},
     booktitle = {Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)},
     year = {2017},
     pages = {1--6}}
    
  95. Y. Hold-Geoffroy, K. Sunkavalli, J. Eisenmann, M. Fisher, E. Gambaretto, S. Hadap & J.-F. Lalonde
    A Perceptual Measure for Deep Single Image Camera Calibration
    ArXiv, 2017
    BibTeX
    @article{Hold-Geoffroy2017,
     author = {Hold-Geoffroy, Yannick and Sunkavalli, Kalyan and Eisenmann, Jonathan and Fisher, Matt and Gambaretto, Emiliano and Hadap, Sunil and Lalonde, Jean-François},
     title = {A Perceptual Measure for Deep Single Image Camera Calibration},
     journal = {ArXiv},
     year = {2017}}
    
  96. M.S. Hossain, M.F. Alhamid & G. Muhammad
    Collaborative analysis model for trending images on social networks
    Future Generation Computer Systems, Elsevier BV, 2017
    DOI: 10.1016/j.future.2017.01.030
    BibTeX
    @article{Hossain2017,
     author = {Hossain, M. Shamim and Alhamid, Mohammed F. and Muhammad, Ghulam},
     title = {Collaborative analysis model for trending images on social networks},
     journal = {Future Generation Computer Systems},
     publisher = {Elsevier BV},
     year = {2017}}
    
  97. M. Hu, X. Wang, G. Xu & H. Yu
    A Detection Method for Copy- Move Image Forgery Using Frequency -Based Techniques
    Journal of Image and Signal Processing, Hans Publishers, 2017, Vol. 06(01), pp. 8-16
    DOI: 10.12677/jisp.2017.61002
    BibTeX
    @article{Hu2017,
     author = {Hu, Meidong and Wang, Xiaotong and Xu, Guanlei and Yu, Hao},
     title = {A Detection Method for Copy- Move Image Forgery Using Frequency -Based Techniques},
     journal = {Journal of Image and Signal Processing},
     publisher = {Hans Publishers},
     year = {2017},
     volume = {06},
     number = {01},
     pages = {8--16}}
    
  98. Y.-C. Hu, K.-K.R. Choo & W.-L. Chen
    Tamper detection and image recovery for BTC-compressed images
    Multimedia Tools and Applications, Springer, 2017, Vol. 76(14), pp. 15435
    DOI: 10.1007/s11042-016-3847-7
    BibTeX
    @article{Hu2017a,
     author = {Hu, Yu-Chen and Choo, Kim-Kwang Raymond and Chen, Wu-Lin},
     title = {Tamper detection and image recovery for BTC-compressed images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     volume = {76},
     number = {14},
     pages = {15435}}
    
  99. M.M. Isaac & M. Wilscy
    Multiscale Local Gabor Phase Quantization for image forgery detection
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5189-5
    BibTeX
    @article{Isaac2017,
     author = {Isaac, Meera Mary and Wilscy, M.},
     title = {Multiscale Local Gabor Phase Quantization for image forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  100. V.I. Ivanov & J.S. Baras
    Authentication of Swipe Fingerprint Scanners
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(9), pp. 2212-2226
    DOI: 10.1109/TIFS.2017.2702592
    BibTeX
    @article{Ivanov2017,
     author = {Ivanov, V. I. and Baras, J. S.},
     title = {Authentication of Swipe Fingerprint Scanners},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {9},
     pages = {2212--2226}}
    
  101. H. Jain, J. Das, H.K. Verma & N. Khanna
    An enhanced statistical approach for median filtering detection using difference image
    Proc. Security and Behavior Analysis (ISBA) 2017 IEEE Int. Conf. Identity
    2017, pp. 1-7
    DOI: 10.1109/ISBA.2017.7947704
    BibTeX
    @inproceedings{Jain2017,
     author = {Jain, H. and Das, J. and Verma, H. K. and Khanna, N.},
     title = {An enhanced statistical approach for median filtering detection using difference image},
     booktitle = {Proc. Security and Behavior Analysis (ISBA) 2017 IEEE Int. Conf. Identity},
     year = {2017},
     pages = {1--7}}
    
  102. M. Javanmard & R. Refayen
    Using Sensor Pattern Noise for Camera Identification
    International Journal of Computer Science and Information Security, 2017
    BibTeX
    @article{Javanmard2017,
     author = {Javanmard, Mahdi and Refayen, Raheleh},
     title = {Using Sensor Pattern Noise for Camera Identification},
     journal = {International Journal of Computer Science and Information Security},
     year = {2017}}
    
  103. J.J. Jeon, H.J. Shin & I.K. Eom
    Estimation of Bayer CFA pattern configuration based on singular value decomposition
    EURASIP Journal on Image and Video Processing, Springer Nature, 2017, Vol. 2017(1)
    DOI: 10.1186/s13640-017-0196-z
    BibTeX
    @article{Jeon2017,
     author = {Jeon, Jong Ju and Shin, Hyun Jun and Eom, Il Kyu},
     title = {Estimation of Bayer CFA pattern configuration based on singular value decomposition},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer Nature},
     year = {2017},
     volume = {2017},
     number = {1}}
    
  104. X. Jiang, P. He, T. Sun, F. Xie & S. Wang
    Detection of Double Compression with the Same Coding Parameters Based on Quality Degradation Mechanism Analysis
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2745687
    BibTeX
    @article{Jiang2017,
     author = {Jiang, X. and He, P. and Sun, T. and Xie, F. and Wang, S.},
     title = {Detection of Double Compression with the Same Coding Parameters Based on Quality Degradation Mechanism Analysis},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  105. T. Julliand, V. Nozick, I. Echizen & H. Talbot
    Using The Noise Density Down Projection To Expose Splicing In JPEG Images
    2017
    BibTeX
    @electronic{Julliand2017,
     author = {Julliand, Thibault and Nozick, Vincent and Echizen, Isao and Talbot, Hugues},
     title = {Using The Noise Density Down Projection To Expose Splicing In JPEG Images},
     year = {2017}}
    
  106. D.-J. Jung & H.-K. Lee
    Frame-rate conversion detection based on periodicity of motion artifact
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4519-y
    BibTeX
    @article{Jung2017,
     author = {Jung, Dae-Jin and Lee, Heung-Kyu},
     title = {Frame-rate conversion detection based on periodicity of motion artifact},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  107. M.F. Jwaid & T.N. Baraskar
    Study and analysis of copy-move splicing image forgery detection techniques
    Proc. Analytics and Cloud) (I-SMAC) 2017 Int. Conf. I-SMAC (IoT in Social, Mobile
    2017, pp. 697-702
    DOI: 10.1109/I-SMAC.2017.8058268
    BibTeX
    @inproceedings{Jwaid2017,
     author = {Jwaid, M. F. and Baraskar, T. N.},
     title = {Study and analysis of copy-move splicing image forgery detection techniques},
     booktitle = {Proc. Analytics and Cloud) (I-SMAC) 2017 Int. Conf. I-SMAC (IoT in Social, Mobile},
     year = {2017},
     pages = {697--702}}
    
  108. N. Kanagavalli & L. Latha
    A survey of copy-move image forgery detection techniques
    Proc. Int. Conf. Inventive Systems and Control (ICISC)
    2017, pp. 1-6
    DOI: 10.1109/ICISC.2017.8068703
    BibTeX
    @inproceedings{Kanagavalli2017,
     author = {Kanagavalli, N. and Latha, L.},
     title = {A survey of copy-move image forgery detection techniques},
     booktitle = {Proc. Int. Conf. Inventive Systems and Control (ICISC)},
     year = {2017},
     pages = {1--6}}
    
  109. A. Kashyap, R.S. Parmar, M. Agrawal & H. Gupta
    An Evaluation of Digital Image Forgery Detection Approaches
    arX, 2017
    BibTeX
    @article{Kashyap2017,
     author = {Kashyap, Abhishek and Parmar, Rajesh Singh and Agrawal, Megha and Gupta, Hariom},
     title = {An Evaluation of Digital Image Forgery Detection Approaches},
     journal = {arX},
     year = {2017}}
    
  110. M. Kaur & S. Gupta
    A fusion framework based on fuzzy integrals for passive-blind image tamper detection
    Cluster Computing, Springer, 2017, pp. 1
    DOI: 10.1007/s10586-017-1393-3
    BibTeX
    @article{Kaur2017,
     author = {Kaur, Mandeep and Gupta, Savita},
     title = {A fusion framework based on fuzzy integrals for passive-blind image tamper detection},
     journal = {Cluster Computing},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  111. W.C.N. Kaura & S. Dhavale
    Analysis of SIFT and SURF features for copy-move image forgery detection
    Proc. Embedded and Communication Systems (ICIIECS) 2017 Int. Conf. Innovations in Information
    2017, pp. 1-4
    DOI: 10.1109/ICIIECS.2017.8276160
    BibTeX
    @inproceedings{Kaura2017,
     author = {Kaura, W. C. N. and Dhavale, S.},
     title = {Analysis of SIFT and SURF features for copy-move image forgery detection},
     booktitle = {Proc. Embedded and Communication Systems (ICIIECS) 2017 Int. Conf. Innovations in Information},
     year = {2017},
     pages = {1--4}}
    
  112. D.-G. Kim, J.-U. Hou & H.-K. Lee
    Learning deep features for source color laser printer identification based on cascaded learning
    arXiv, 2017
    BibTeX
    @article{Kim2017,
     author = {Kim, Do-Guk and Hou, Jong-Uk and Lee, Heung-Kyu},
     title = {Learning deep features for source color laser printer identification based on cascaded learning},
     journal = {arXiv},
     year = {2017}}
    
  113. D.-H. Kim & H.-Y. Le
    Image Manipulation Detection using Convolutional Neural Network
    International Journal of Applied Engineering Research, 2017
    BibTeX
    @article{Kim2017a,
     author = {Kim, Dong-Hyun and Le, Hae-Yeoun},
     title = {Image Manipulation Detection using Convolutional Neural Network},
     journal = {International Journal of Applied Engineering Research},
     year = {2017}}
    
  114. S. Kingra, N. Aggarwal & R.D. Singh
    Inter-frame forgery detection in H.264 videos using motion and brightness gradients
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4762-2
    BibTeX
    @article{Kingra2017,
     author = {Kingra, Staffy and Aggarwal, Naveen and Singh, Raahat Devender},
     title = {Inter-frame forgery detection in H.264 videos using motion and brightness gradients},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  115. P. Korus
    Digital image integrity – a survey of protection and verification techniques
    Digital Signal Processing, Elsevier BV, 2017
    DOI: 10.1016/j.dsp.2017.08.009
    BibTeX
    @article{Korus2017,
     author = {Korus, Paweł},
     title = {Digital image integrity – a survey of protection and verification techniques},
     journal = {Digital Signal Processing},
     publisher = {Elsevier BV},
     year = {2017}}
    
  116. A. Kuznetsov
    A Copy-Move Detection Algorithm Based on Geometric Local Binary Pattern
    Digital Communication. Towards a Smart and Secure Future Internet
    Springer, 2017
    DOI: 10.1007/978-3-319-67639-5_7
    BibTeX
    @incollection{Kuznetsov2017b,
     author = {Kuznetsov, Andrey},
     title = {A Copy-Move Detection Algorithm Based on Geometric Local Binary Pattern},
     booktitle = {Digital Communication. Towards a Smart and Secure Future Internet},
     publisher = {Springer},
     year = {2017}}
    
  117. A. Kuznetsov & V. Myasnikov
    Using Efficient Linear Local Features in the Copy-Move Forgery Detection Task
    Analysis of Images, Social Networks and Texts, Springer, 2017
    DOI: 10.1007/978-3-319-52920-2_28
    BibTeX
    @article{Kuznetsov2017,
     author = {Kuznetsov, Andrey and Myasnikov, Vladislav},
     title = {Using Efficient Linear Local Features in the Copy-Move Forgery Detection Task},
     journal = {Analysis of Images, Social Networks and Texts},
     publisher = {Springer},
     year = {2017}}
    
  118. A. Kuznetsov & V. Myasnikov
    A new copy-move forgery detection algorithm using image preprocessing procedure
    Procedia Engineering, Elsevier BV, 2017, Vol. 201, pp. 436-444
    DOI: 10.1016/j.proeng.2017.09.671
    BibTeX
    @article{Kuznetsov2017a,
     author = {Kuznetsov, Andrey and Myasnikov, Vladislav},
     title = {A new copy-move forgery detection algorithm using image preprocessing procedure},
     journal = {Procedia Engineering},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {201},
     pages = {436--444}}
    
  119. Y. Lai, T. Huang, J. Lin & H. Lu
    An improved block-based matching algorithm of copy-move forgery detection
    Multimedia Tools and Applications, Springer Nature, 2017
    DOI: 10.1007/s11042-017-5094-y
    BibTeX
    @article{Lai2017,
     author = {Lai, Yuecong and Huang, Tianqiang and Lin, Jing and Lu, Henan},
     title = {An improved block-based matching algorithm of copy-move forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2017}}
    
  120. A. Lawgaly
    Digital Camera Identification Using Sensor Pattern Noise for Forensics Applications
    Northumbria University, Northumbria University, 2017
    BibTeX
    @phdthesis{Lawgaly2017,
     author = {Lawgaly, Ashref},
     title = {Digital Camera Identification Using Sensor Pattern Noise for Forensics Applications},
     school = {Northumbria University},
     year = {2017}}
    
  121. S.-h. Lee, D.-h. Kim, T.-w. Oh, K.-b. Kim & H.-y. Lee
    Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering -- 모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술
    KIPS Tr. Software and Data Eng., 2017, Vol. 6(1)
    DOI: 10.3745/KTSDE.2017.6.1.15
    BibTeX
    @article{Lee2017,
     author = {Lee, Sang-hyeong and Kim, Dong-hyun and Oh, Tae-woo and Kim, Ki-bom and Lee, Hae-yeoun},
     title = {Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering -- 모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술},
     journal = {KIPS Tr. Software and Data Eng.},
     year = {2017},
     volume = {6},
     number = {1}}
    
  122. T. Le-Tien, T. Huynh-Kha, L.P. Cong-Hoan & A. Tran-Hong
    Combined Zernike Moment and Multiscale Analysis for Tamper Detection in Digital Images
    Informatica, 2017, Vol. 41, pp. 59-70
    BibTeX
    @article{Le-Tien2017,
     author = {Le-Tien, Thuong and Huynh-Kha, Tu and Cong-Hoan, Long Pham and Tran-Hong, An},
     title = {Combined Zernike Moment and Multiscale Analysis for Tamper Detection in Digital Images},
     journal = {Informatica},
     year = {2017},
     volume = {41},
     pages = {59--70}}
    
  123. T. Le-Tien, T. Huynh-Kha, T. Nguyen-Thanh, T. Pham-Duc & T. Nguyen-Huu
    An evaluation on the effective processing time of Raspberry Pi-3B-based embedded systems for determining forged images
    Proc. 4th NAFOSTED Conf. Information and Computer Science
    2017, pp. 213-218
    DOI: 10.1109/NAFOSTED.2017.8108066
    BibTeX
    @inproceedings{Le-Tien2017a,
     author = {Le-Tien, T. and Huynh-Kha, T. and Nguyen-Thanh, T. and Pham-Duc, T. and Nguyen-Huu, T.},
     title = {An evaluation on the effective processing time of Raspberry Pi-3B-based embedded systems for determining forged images},
     booktitle = {Proc. 4th NAFOSTED Conf. Information and Computer Science},
     year = {2017},
     pages = {213--218}}
    
  124. A. Li, S. Zhou & R. Wang
    An Improved Method for Eliminating Ghosting in Image Stitching
    Proc. 9th Int. Conf. Intelligent Human-Machine Systems and Cybernetics (IHMSC)
    2017, Vol. 2, pp. 415-418
    DOI: 10.1109/IHMSC.2017.205
    BibTeX
    @inproceedings{Li2017f,
     author = {Li, A. and Zhou, S. and Wang, R.},
     title = {An Improved Method for Eliminating Ghosting in Image Stitching},
     booktitle = {Proc. 9th Int. Conf. Intelligent Human-Machine Systems and Cybernetics (IHMSC)},
     year = {2017},
     volume = {2},
     pages = {415--418}}
    
  125. C.-T. Li & X. Lin
    A fast source-oriented image clustering method for digital forensics
    EURASIP Journal on Image and Video Processing, Springer Nature, 2017, Vol. 2017(1)
    DOI: 10.1186/s13640-017-0217-y
    BibTeX
    @article{Li2017e,
     author = {Li, Chang-Tsun and Lin, Xufeng},
     title = {A fast source-oriented image clustering method for digital forensics},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer Nature},
     year = {2017},
     volume = {2017},
     number = {1}}
    
  126. D. Li, L. Yuan, S. Hu & Z. Wang
    Research on Image Splicing Based on Weighted Poisson Fusion
    International Journal of Computer Science Engineering (IJCSE), 2017
    BibTeX
    @article{Li2017d,
     author = {Li, Dan and Yuan, Ling and Hu, Song and Wang, Zeqi},
     title = {Research on Image Splicing Based on Weighted Poisson Fusion},
     journal = {International Journal of Computer Science Engineering (IJCSE)},
     year = {2017}}
    
  127. F. Li, M. Xin, J. Li & J. Yu
    Improved detection for copy-move forgery with multi-scale sliding windows
    Proc. Int. Symp. Intelligent Signal Processing and Communication Systems (ISPACS)
    2017, pp. 231-236
    DOI: 10.1109/ISPACS.2017.8266479
    BibTeX
    @inproceedings{Li2017h,
     author = {Li, F. and Xin, M. and Li, J. and Yu, J.},
     title = {Improved detection for copy-move forgery with multi-scale sliding windows},
     booktitle = {Proc. Int. Symp. Intelligent Signal Processing and Communication Systems (ISPACS)},
     year = {2017},
     pages = {231--236}}
    
  128. H. Li, W. Luo, X. qiu & J. Huang
    Image Forgery Localization via Integrating Tampering Possibility Maps
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2656823
    BibTeX
    @article{Li2017,
     author = {Li, H. and Luo, W. and qiu, X. and Huang, J.},
     title = {Image Forgery Localization via Integrating Tampering Possibility Maps},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  129. H. Li, W. Luo & J. Huang
    Localization of Diffusion-Based Inpainting in Digital Images
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 3050-3064
    DOI: 10.1109/TIFS.2017.2730822
    BibTeX
    @article{Li2017b,
     author = {Li, H. and Luo, W. and Huang, J.},
     title = {Localization of Diffusion-Based Inpainting in Digital Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {12},
     pages = {3050--3064}}
    
  130. H. Li, W. Luo, Q. Rao & J. Huang
    Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack
    arXiv, 2017
    BibTeX
    @article{Li2017c,
     author = {Li, Haodong and Luo, Weiqi and Rao, Quanquan and Huang, Jiwu},
     title = {Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack},
     journal = {arXiv},
     year = {2017}}
    
  131. X. Li, W. Xu, S. Wang & X. Qu
    Are You Lying: Validating the Time-Location of Outdoor Images
    Applied Cryptography and Network Security, Springer, 2017
    DOI: 10.1007/978-3-319-61204-1_6
    BibTeX
    @article{Li2017g,
     author = {Li, Xiaopeng and Xu, Wenyuan and Wang, Song and Qu, Xianshan},
     title = {Are You Lying: Validating the Time-Location of Outdoor Images},
     journal = {Applied Cryptography and Network Security},
     publisher = {Springer},
     year = {2017}}
    
  132. Y. Li, J. Zhou & A. Cheng
    SIFT Keypoint Removal via Directed Graph Construction for Color Images
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 2971-2985
    DOI: 10.1109/TIFS.2017.2730362
    BibTeX
    @article{Li2017a,
     author = {Li, Y. and Zhou, J. and Cheng, A.},
     title = {SIFT Keypoint Removal via Directed Graph Construction for Color Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {12},
     pages = {2971--2985}}
    
  133. D. Liang, C. Lu & H. Jin
    Soft multimedia anomaly detection based on neural network and optimization driven support vector machine
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5352-z
    BibTeX
    @article{Liang2017,
     author = {Liang, Dong and Lu, Chen and Jin, Hao},
     title = {Soft multimedia anomaly detection based on neural network and optimization driven support vector machine},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  134. C. Lin, W. Lu, W. Sun, J. Zeng, T. Xu & J.-H. Lai
    Region duplication detection based on image segmentation and keypoint contexts
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5027-9
    BibTeX
    @article{Lin2017,
     author = {Lin, Cong and Lu, Wei and Sun, Wei and Zeng, Jinhua and Xu, Tianhua and Lai, Jian-Huang},
     title = {Region duplication detection based on image segmentation and keypoint contexts},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  135. R. Lionnie, R.B. Bahaweres, S. Attamimi & M. Alaydrus
    A study on pre-processing methods for copy-move forgery detection based on SIFT
    Proc. TENCON 2017 - 2017 IEEE Region 10 Conf
    2017, pp. 1142-1147
    DOI: 10.1109/TENCON.2017.8228029
    BibTeX
    @inproceedings{Lionnie2017,
     author = {Lionnie, R. and Bahaweres, R. B. and Attamimi, S. and Alaydrus, M.},
     title = {A study on pre-processing methods for copy-move forgery detection based on SIFT},
     booktitle = {Proc. TENCON 2017 - 2017 IEEE Region 10 Conf},
     year = {2017},
     pages = {1142--1147}}
    
  136. A. Liu, Z. Zhao, C. Zhang & Y. Su
    Median filtering forensics in digital images based on frequency-domain features
    Multimedia Tools and Applications, Springer, 2017, Vol. 76(21), pp. 22119
    DOI: 10.1007/s11042-017-4845-0
    BibTeX
    @article{Liu2017h,
     author = {Liu, Anan and Zhao, Zhengyu and Zhang, Chengqian and Su, Yuting},
     title = {Median filtering forensics in digital images based on frequency-domain features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     volume = {76},
     number = {21},
     pages = {22119}}
    
  137. B. Liu & C.M. Pun
    Multi-object splicing forgery detection using noise level difference
    Proc. IEEE Conf. Dependable and Secure Computing
    2017, pp. 533-534
    DOI: 10.1109/DESEC.2017.8073884
    BibTeX
    @inproceedings{Liu2017f,
     author = {Liu, B. and Pun, C. M.},
     title = {Multi-object splicing forgery detection using noise level difference},
     booktitle = {Proc. IEEE Conf. Dependable and Secure Computing},
     year = {2017},
     pages = {533--534}}
    
  138. C. Liu & M. Kirchner
    Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise
    2017
    BibTeX
    @unpublished{Liu2017b,
     author = {Liu, Chang and Kirchner, Matthias},
     title = {Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise},
     year = {2017}}
    
  139. Q. Liu
    An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics
    Pattern Recognition, Elsevier BV, 2017, Vol. 65, pp. 35-46
    DOI: 10.1016/j.patcog.2016.12.010
    BibTeX
    @article{Liu2017a,
     author = {Liu, Qingzhong},
     title = {An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics},
     journal = {Pattern Recognition},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {65},
     pages = {35--46}}
    
  140. Y. Liu, Q. Guan & X. Zhao
    Copy-move Forgery Detection based on Convolutional Kernel Network
    arXiv, 2017
    BibTeX
    @article{Liu2017c,
     author = {Liu, Yaqi and Guan, Qingxiao and Zhao, Xianfeng},
     title = {Copy-move Forgery Detection based on Convolutional Kernel Network},
     journal = {arXiv},
     year = {2017}}
    
  141. Y. Liu, Q. Guan & X. Zhao
    Copy-move forgery detection based on convolutional kernel network
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5374-6
    BibTeX
    @article{Liu2017g,
     author = {Liu, Yaqi and Guan, Qingxiao and Zhao, Xianfeng},
     title = {Copy-move forgery detection based on convolutional kernel network},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  142. Y. Liu, Y. Huang, J. Zhang, X. Liu & H. Shen
    Noisy Smoothing Image Source Identification
    Cyberspace Safety and Security
    Springer International Publishing, 2017, pp. 135-147
    DOI: 10.1007/978-3-319-69471-9_10
    BibTeX
    @incollection{Liu2017d,
     author = {Liu, Yuying and Huang, Yonggang and Zhang, Jun and Liu, Xu and Shen, Hualei},
     title = {Noisy Smoothing Image Source Identification},
     booktitle = {Cyberspace Safety and Security},
     publisher = {Springer International Publishing},
     year = {2017},
     pages = {135--147}}
    
  143. Y. Liu, R. Ni & Y. Zhao
    Forensics of Operation History Including Image Blurring and Noise Addition based on Joint Features
    Advances in Intelligent Information Hiding and Multimedia Signal Processing
    Springer, 2017
    DOI: 10.1007/978-3-319-50212-0_11
    BibTeX
    @incollection{Liu2017,
     author = {Liu, Yahui and Ni, Rongrong and Zhao, Yao},
     title = {Forensics of Operation History Including Image Blurring and Noise Addition based on Joint Features},
     booktitle = {Advances in Intelligent Information Hiding and Multimedia Signal Processing},
     publisher = {Springer},
     year = {2017}}
    
  144. Y. Liu, H.-X. Wang, H.-Z. Wu & Y. Chen
    An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points
    Cloud Computing and Security, Springer, 2017
    DOI: 10.1007/978-3-319-68505-2_6
    BibTeX
    @article{Liu2017e,
     author = {Liu, Yong and Wang, Hong-Xia and Wu, Han-Zhou and Chen, Yi},
     title = {An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2017}}
    
  145. M. Long, F. Peng & Y. Zhu
    Identifying natural images and computer generated graphics based on binary similarity measures of PRNU
    Multimedia Tools and Applications, Springer Nature, 2017
    DOI: 10.1007/s11042-017-5101-3
    BibTeX
    @article{Long2017,
     author = {Long, Min and Peng, Fei and Zhu, Yin},
     title = {Identifying natural images and computer generated graphics based on binary similarity measures of PRNU},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2017}}
    
  146. R.R. López
    Identificación De La Fuente En Vídeos De Dispositivos Móviles
    Departamento De Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, Departamento De Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, 2017
    BibTeX
    @mastersthesis{Lopez2017,
     author = {López, Raquel Ramos},
     title = {Identificación De La Fuente En Vídeos De Dispositivos Móviles},
     school = {Departamento De Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid},
     year = {2017}}
    
  147. F. Luan, S. Paris, E. Shechtman & K. Bala
    Deep Photo Style Transfer
    arXiv, 2017
    BibTeX
    @article{Luan2017,
     author = {Luan, Fujun and Paris, Sylvain and Shechtman, Eli and Bala, Kavita},
     title = {Deep Photo Style Transfer},
     journal = {arXiv},
     year = {2017}}
    
  148. Y. Lyu, X. Shen & H. Chen
    Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector
    Chinese Journal of Electronics, 2017
    BibTeX
    @article{Lyu2017,
     author = {Lyu, Y. and Shen, X. and Chen, H.},
     title = {Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector},
     journal = {Chinese Journal of Electronics},
     year = {2017}}
    
  149. B. Mader, M.S. Banks & H. Farid
    Identifying Computer-Generated Portraits: The Importance of Training and Incentives
    Perception, SAGE Publications, 2017, Vol. 46(9), pp. 1062-1076
    DOI: 10.1177/0301006617713633
    BibTeX
    @article{Mader2017,
     author = {Mader, Brandon and Banks, Martin S. and Farid, Hany},
     title = {Identifying Computer-Generated Portraits: The Importance of Training and Incentives},
     journal = {Perception},
     publisher = {SAGE Publications},
     year = {2017},
     volume = {46},
     number = {9},
     pages = {1062--1076}}
    
  150. V.H. Mahale, M.M.H. Ali, P.L. Yannawar & A.T. Gaikwad
    Image Inconsistency Detection Using Local Binary Pattern (LBP)
    Procedia Computer Science, Elsevier BV, 2017, Vol. 115, pp. 501-508
    DOI: 10.1016/j.procs.2017.09.097
    BibTeX
    @article{Mahale2017,
     author = {Mahale, Vivek H. and Ali, Mouad M. H. and Yannawar, Pravin L. and Gaikwad, Ashok T.},
     title = {Image Inconsistency Detection Using Local Binary Pattern (LBP)},
     journal = {Procedia Computer Science},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {115},
     pages = {501--508}}
    
  151. T. Mahmood, A. Irtaza, Z. Mehmood & M.T. Mahmood
    Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images
    Forensic Science International, Elsevier BV, 2017, Vol. 279, pp. 8-21
    DOI: 10.1016/j.forsciint.2017.07.037
    BibTeX
    @article{Mahmood2017,
     author = {Mahmood, Toqeer and Irtaza, Aun and Mehmood, Zahid and Mahmood, Muhammad Tariq},
     title = {Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {279},
     pages = {8--21}}
    
  152. T. Mahmood, Z. Mehmood, M. Shah & Z. Khan
    An efficient forensic technique for exposing region duplication forgery in digital images
    Applied Intelligence, Springer, 2017, pp. 1
    DOI: 10.1007/s10489-017-1038-5
    BibTeX
    @article{Mahmood2017a,
     author = {Mahmood, Toqeer and Mehmood, Zahid and Shah, Mohsin and Khan, Zakir},
     title = {An efficient forensic technique for exposing region duplication forgery in digital images},
     journal = {Applied Intelligence},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  153. C. Maigrot, E. Kijak, R. Sicre & V. Claveau
    Tampering Detection and Localization in Images from Social Networks: A CBIR Approach
    Image Analysis and Processing - ICIAP 2017, Springer, 2017
    DOI: 10.1007/978-3-319-68560-1_67
    BibTeX
    @article{Maigrot2017,
     author = {Maigrot, Cedric and Kijak, Ewa and Sicre, Ronan and Claveau, Vincent},
     title = {Tampering Detection and Localization in Images from Social Networks: A CBIR Approach},
     journal = {Image Analysis and Processing - ICIAP 2017},
     publisher = {Springer},
     year = {2017}}
    
  154. P. Malik
    Limitation of PFA-Events as a Forensic Tool
    2017
    BibTeX
    @electronic{Malik2017,
     author = {Malik, Parveen},
     title = {Limitation of PFA-Events as a Forensic Tool},
     year = {2017}}
    
  155. P. Malik & K. Karthik
    Iterative content adaptable purple fringe detection
    Signal, Image and Video Processing, Springer, 2017, pp. 1
    DOI: 10.1007/s11760-017-1144-1
    BibTeX
    @article{Malik2017a,
     author = {Malik, Parveen and Karthik, Kannan},
     title = {Iterative content adaptable purple fringe detection},
     journal = {Signal, Image and Video Processing},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  156. S. Mandelli, L. Bondi, S. Lameri, V. Lipari, P. Bestagini & S. Tubaro
    Inpainting-based Camera Anonymization
    Proc of the ICIP 2017
    Pr, 2017
    BibTeX
    @inproceedings{Mandelli2017,
     author = {Mandelli, Sara and Bondi, Luca and Lameri, Silvia and Lipari, Vincenzo and Bestagini, Paolo and Tubaro, Stefano},
     title = {Inpainting-based Camera Anonymization},
     booktitle = {Proc of the ICIP 2017},
     journal = {Pr},
     year = {2017}}
    
  157. V.T. Manu & B.M. Mehtre
    Blind technique using blocking artifacts and entropy of histograms for image tampering detection
    Jiang, X., Arai, M. & Chen, G. (ed.)
    Second International Workshop on Pattern Recognition
    SPIE, 2017
    DOI: 10.1117/12.2280306
    BibTeX
    @inproceedings{Manu2017a,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Blind technique using blocking artifacts and entropy of histograms for image tampering detection},
     booktitle = {Second International Workshop on Pattern Recognition},
     publisher = {SPIE},
     year = {2017}}
    
  158. V.T. Manu & B.M. Mehtre
    Copy-move tampering detection using affine transformation property preservation on clustered keypoints
    Signal, Image and Video Processing, Springer, 2017, pp. 1
    DOI: 10.1007/s11760-017-1191-7
    BibTeX
    @article{Manu2017,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Copy-move tampering detection using affine transformation property preservation on clustered keypoints},
     journal = {Signal, Image and Video Processing},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  159. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    A deep learning approach for iris sensor model identification
    Pattern Recognition Letters, Elsevier BV, 2017
    DOI: 10.1016/j.patrec.2017.04.010
    BibTeX
    @article{Marra2017,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {A deep learning approach for iris sensor model identification},
     journal = {Pattern Recognition Letters},
     publisher = {Elsevier BV},
     year = {2017}}
    
  160. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Blind PRNU-Based Image Clustering for Source Identification
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(9), pp. 2197-2211
    DOI: 10.1109/TIFS.2017.2701335
    BibTeX
    @article{Marra2017a,
     author = {Marra, F. and Poggi, G. and Sansone, C. and Verdoliva, L.},
     title = {Blind PRNU-Based Image Clustering for Source Identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {9},
     pages = {2197--2211}}
    
  161. K.A. Martire, G. Edmond, D.J. Navarro & B.R. Newell
    On the likelihood of “encapsulating all uncertainty”
    Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 76-79
    DOI: 10.1016/j.scijus.2016.10.004
    BibTeX
    @article{Martire2017,
     author = {Martire, Kristy A. and Edmond, Gary and Navarro, Daniel J. and Newell, Ben R.},
     title = {On the likelihood of “encapsulating all uncertainty”},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     number = {1},
     pages = {76--79}}
    
  162. O. Mayer & M.C. Stamm
    Countering Anti-Forensics of Lateral Chromatic Aberration
    Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17
    ACM Press, 2017
    DOI: 10.1145/3082031.3083242
    BibTeX
    @inproceedings{Mayer2017,
     author = {Mayer, Owen and Stamm, Matthew C.},
     title = {Countering Anti-Forensics of Lateral Chromatic Aberration},
     booktitle = {Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17},
     publisher = {ACM Press},
     year = {2017}}
    
  163. A. Meenakshi Sundaram & C. Nandini
    ASRD: Algorithm for Spliced Region Detection in Digital Image Forensics
    Software Engineering Trends and Techniques in Intelligent Systems, Springer, 2017
    DOI: 10.1007/978-3-319-57141-6_10
    BibTeX
    @article{MeenakshiSundaram2017,
     author = {Meenakshi Sundaram, A. and Nandini, C.},
     title = {ASRD: Algorithm for Spliced Region Detection in Digital Image Forensics},
     journal = {Software Engineering Trends and Techniques in Intelligent Systems},
     publisher = {Springer},
     year = {2017}}
    
  164. S. Misra, M. Maheswaran & S. Hashmi
    Case Studies of Selected IoT Deployments
    Security Challenges and Approaches in Internet of Things, Springer, 2017
    DOI: 10.1007/978-3-319-44230-3_6
    BibTeX
    @article{Misra2017,
     author = {Misra, Sridipta and Maheswaran, Muthucumaru and Hashmi, Salman},
     title = {Case Studies of Selected IoT Deployments},
     journal = {Security Challenges and Approaches in Internet of Things},
     publisher = {Springer},
     year = {2017}}
    
  165. S. Misra, M. Maheswaran & S. Hashmi
    System Model for the Internet of Things
    Security Challenges and Approaches in Internet of Things, Springer, 2017
    DOI: 10.1007/978-3-319-44230-3_2
    BibTeX
    @article{Misra2017a,
     author = {Misra, Sridipta and Maheswaran, Muthucumaru and Hashmi, Salman},
     title = {System Model for the Internet of Things},
     journal = {Security Challenges and Approaches in Internet of Things},
     publisher = {Springer},
     year = {2017}}
    
  166. S. Misra, M. Maheswaran & S. Hashmi
    Vulnerable Features and Threats
    Security Challenges and Approaches in Internet of Things, Springer, 2017
    DOI: 10.1007/978-3-319-44230-3_3
    BibTeX
    @article{Misra2017b,
     author = {Misra, Sridipta and Maheswaran, Muthucumaru and Hashmi, Salman},
     title = {Vulnerable Features and Threats},
     journal = {Security Challenges and Approaches in Internet of Things},
     publisher = {Springer},
     year = {2017}}
    
  167. N.S. Monson & K.V.M. Kumar
    Behaviour knowledge space-based fusion for image forgery detection
    Proc. Int. Conf. Inventive Communication and Computational Technologies (ICICCT)
    2017, pp. 400-403
    DOI: 10.1109/ICICCT.2017.7975228
    BibTeX
    @inproceedings{Monson2017,
     author = {Monson, N. S. and Kumar, K. V. M.},
     title = {Behaviour knowledge space-based fusion for image forgery detection},
     booktitle = {Proc. Int. Conf. Inventive Communication and Computational Technologies (ICICCT)},
     year = {2017},
     pages = {400--403}}
    
  168. S.G. Muñoz
    Integridad En Imágenes de Dispositivos Móviles
    Departamento de Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, Departamento de Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, 2017
    BibTeX
    @mastersthesis{Munoz2017,
     author = {Muñoz, Santiago Gómez},
     title = {Integridad En Imágenes de Dispositivos Móviles},
     school = {Departamento de Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid},
     year = {2017}}
    
  169. S. Mushtaq & A.H. Mir
    Copy-Move forgery detection in images using grey-level run length matrix features
    International Journal of Forensic Engineering, Inderscience Publishers, 2017, Vol. 3(4), pp. 303
    DOI: 10.1504/ijfe.2017.087645
    BibTeX
    @article{Mushtaq2017,
     author = {Mushtaq, Saba and Mir, Ajaz Hussain},
     title = {Copy-Move forgery detection in images using grey-level run length matrix features},
     journal = {International Journal of Forensic Engineering},
     publisher = {Inderscience Publishers},
     year = {2017},
     volume = {3},
     number = {4},
     pages = {303}}
    
  170. G. Muzaffer, E.S. Karaagacli & G. Ulutas
    Recent keypoint based copy move forgery detection techniques
    Proc. Int. Artificial Intelligence and Data Processing Symp. (IDAP)
    2017, pp. 1-7
    DOI: 10.1109/IDAP.2017.8090251
    BibTeX
    @inproceedings{Muzaffer2017,
     author = {Muzaffer, G. and Karaagacli, E. S. and Ulutas, G.},
     title = {Recent keypoint based copy move forgery detection techniques},
     booktitle = {Proc. Int. Artificial Intelligence and Data Processing Symp. (IDAP)},
     year = {2017},
     pages = {1--7}}
    
  171. G. Muzaffer & G. Ulutas
    A fast and effective digital image copy move forgery detection with binarized SIFT
    Proc. 40th Int. Conf. Telecommunications and Signal Processing (TSP)
    2017, pp. 595-598
    DOI: 10.1109/TSP.2017.8076056
    BibTeX
    @inproceedings{Muzaffer2017b,
     author = {Muzaffer, G. and Ulutas, G.},
     title = {A fast and effective digital image copy move forgery detection with binarized SIFT},
     booktitle = {Proc. 40th Int. Conf. Telecommunications and Signal Processing (TSP)},
     year = {2017},
     pages = {595--598}}
    
  172. G. Muzaffer, G. Ulutaş & E. Gedikli
    PSO and SURF based digital image forgery detection
    Proc. Int. Conf. Computer Science and Engineering (UBMK)
    2017, pp. 688-692
    DOI: 10.1109/UBMK.2017.8093499
    BibTeX
    @inproceedings{Muzaffer2017a,
     author = {Muzaffer, G. and Ulutaş, G. and Gedikli, E.},
     title = {PSO and SURF based digital image forgery detection},
     booktitle = {Proc. Int. Conf. Computer Science and Engineering (UBMK)},
     year = {2017},
     pages = {688--692}}
    
  173. F.G.B.D. Natale & G. Boato
    Detecting morphological filtering of binary images
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2656472
    BibTeX
    @article{Natale2017,
     author = {Natale, F. G. B. De and Boato, G.},
     title = {Detecting morphological filtering of binary images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  174. M.N. Nazli & A.Y.A. Maghari
    Comparison between image forgery detection algorithms
    Proc. 8th Int. Conf. Information Technology (ICIT)
    2017, pp. 442-445
    DOI: 10.1109/ICITECH.2017.8080040
    BibTeX
    @inproceedings{Nazli2017,
     author = {Nazli, M. N. and Maghari, A. Y. A.},
     title = {Comparison between image forgery detection algorithms},
     booktitle = {Proc. 8th Int. Conf. Information Technology (ICIT)},
     year = {2017},
     pages = {442--445}}
    
  175. M.A. Nematollahi, C. Vorakulpipat & H.G. Rosales
    Preliminary on Watermarking Technology
    Digital Watermarking, Springer, 2017
    DOI: 10.1007/978-981-10-2095-7_1
    BibTeX
    @article{Nematollahi2017,
     author = {Nematollahi, Mohammad Ali and Vorakulpipat, Chalee and Rosales, Hamurabi Gamboa},
     title = {Preliminary on Watermarking Technology},
     journal = {Digital Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  176. T. Neubert
    Face Morphing Detection: An Approach Based on Image Degradation Analysis
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_8
    BibTeX
    @article{Neubert2017,
     author = {Neubert, Tom},
     title = {Face Morphing Detection: An Approach Based on Image Degradation Analysis},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  177. R.M.H. Nguyen & M.S. Brown
    RAW Image Reconstruction Using a Self-contained sRGB–JPEG Image with Small Memory Overhead
    International Journal of Computer Vision, Springer, 2017, pp. 1
    DOI: 10.1007/s11263-017-1056-0
    BibTeX
    @article{Nguyen2017,
     author = {Nguyen, Rang M. H. and Brown, Michael S.},
     title = {RAW Image Reconstruction Using a Self-contained sRGB–JPEG Image with Small Memory Overhead},
     journal = {International Journal of Computer Vision},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  178. J. Ni, C. Chen, Z. Shen & Y.Q. Shi
    Blind Forensics of Successive Geometric Transformations in Digital Images using Spectral Method: Theory and Applications
    IEEE Transactions on Image Processing, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIP.2017.2682963
    BibTeX
    @article{Ni2017,
     author = {Ni, J. and Chen, C. and Shen, Z. and Shi, Y. Q.},
     title = {Blind Forensics of Successive Geometric Transformations in Digital Images using Spectral Method: Theory and Applications},
     journal = {IEEE Transactions on Image Processing},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  179. S.J. Nightingale, K.A. Wade & D.G. Watson
    Can people identify original and manipulated photos of real-world scenes?
    Cognitive Research:Principles and Implications, 2017
    DOI: 10.1186/s41235-017-0067-2
    BibTeX
    @article{Nightingale2017,
     author = {Nightingale, Sophie J. and Wade, Kimerley A. and Watson, Derrick G.},
     title = {Can people identify original and manipulated photos of real-world scenes?},
     journal = {Cognitive Research:Principles and Implications},
     year = {2017}}
    
  180. Y. Niu, Y. Zhao & R. Ni
    Robust Median Filtering Detection based on Local Difference Descriptor
    Signal Processing: Image Communication, Elsevier BV, 2017
    DOI: 10.1016/j.image.2017.01.008
    BibTeX
    @article{Niu2017,
     author = {Niu, Yakun and Zhao, Yao and Ni, RongRong},
     title = {Robust Median Filtering Detection based on Local Difference Descriptor},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017}}
    
  181. Y.U.K.I. Obara, N.I.W.A. Yusuke & W.A.D.A. Shigeo
    Detection and Identification of Image Manipulation Based on Reversible Histogram Shift
    Electronics and Communications in Japan, Wiley-Blackwell, 2017, Vol. 100(9), pp. 13-22
    DOI: 10.1002/ecj.11973
    BibTeX
    @article{Obara2017,
     author = {Obara, Y. U. K. I. and Yusuke, N. I. W. A. and Shigeo, W. A. D. A.},
     title = {Detection and Identification of Image Manipulation Based on Reversible Histogram Shift},
     journal = {Electronics and Communications in Japan},
     publisher = {Wiley-Blackwell},
     year = {2017},
     volume = {100},
     number = {9},
     pages = {13--22}}
    
  182. V.K. Pandey, J. Singh & H. Parthasarathy
    Algebraic technique for computationally efficient Hahn moment invariants
    Multidimensional Systems and Signal Processing, Springer, 2017, pp. 1
    DOI: 10.1007/s11045-017-0516-6
    BibTeX
    @article{Pandey2017,
     author = {Pandey, Vishal Kumar and Singh, Jyotsna and Parthasarathy, Harish},
     title = {Algebraic technique for computationally efficient Hahn moment invariants},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  183. C.-S. Park & J.Y. Choeh
    Fast and robust copy-move forgery detection based on scale-space representation
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5248-y
    BibTeX
    @article{Park2017,
     author = {Park, Chun-Su and Choeh, Joon Yeon},
     title = {Fast and robust copy-move forgery detection based on scale-space representation},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  184. C. Pasquini, G. Boato & F. Pérez-González
    Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 2890-2905
    DOI: 10.1109/TIFS.2017.2725201
    BibTeX
    @article{Pasquini2017,
     author = {Pasquini, C. and Boato, G. and Pérez-González, F.},
     title = {Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {12},
     pages = {2890--2905}}
    
  185. A. Peng, Y. Wu & X. Kang
    Revealing Traces of Image Resampling and Resampling Antiforensics
    Advances in Multimedia, 2017
    DOI: 10.1155/2017/7130491
    BibTeX
    @article{Peng2017,
     author = {Peng, Anjie and Wu, Yadong and Kang, Xiangui},
     title = {Revealing Traces of Image Resampling and Resampling Antiforensics},
     journal = {Advances in Multimedia},
     year = {2017}}
    
  186. B. Peng, W. Wang, J. Dong & T. Tan
    Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1813-1821
    DOI: 10.1109/CVPRW.2017.227
    BibTeX
    @inproceedings{Peng2017a,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1813--1821}}
    
  187. B. Peng, W. Wang, J. Dong & T. Tan
    Image Forensics Based on Planar Contact Constraints of 3D Objects
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2752728
    BibTeX
    @article{Peng2017b,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Image Forensics Based on Planar Contact Constraints of 3D Objects},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  188. B. Peng, W. Wang, J. Dong & T. Tan
    Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1813-1821
    DOI: 10.1109/CVPRW.2017.227
    BibTeX
    @inproceedings{Peng2017d,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1813--1821}}
    
  189. F. Peng, X.-h. Hu & M. Long
    Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces
    Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer, 2017
    DOI: 10.1007/978-3-319-72389-1_30
    BibTeX
    @article{Peng2017c,
     author = {Peng, Fei and Hu, Xiao-hua and Long, Min},
     title = {Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces},
     journal = {Security, Privacy, and Anonymity in Computation, Communication, and Storage},
     publisher = {Springer},
     year = {2017}}
    
  190. Q.-T. Phan, G. Boato & F.G.B.D. Natale
    Image Clustering by Source Camera via Sparse Representation
    Proceedings of the 2nd International Workshop on Multimedia Forensics and Security - MFSec '17
    ACM Press, 2017
    DOI: 10.1145/3078897.3080532
    BibTeX
    @inproceedings{Phan2017,
     author = {Phan, Quoc-Tin and Boato, Giulia and Natale, Francesco G. B. De},
     title = {Image Clustering by Source Camera via Sparse Representation},
     booktitle = {Proceedings of the 2nd International Workshop on Multimedia Forensics and Security - MFSec '17},
     publisher = {ACM Press},
     year = {2017}}
    
  191. A. Pourkashani, A. Shahbahrami & B.A. Fomani
    Copy Move Forgery Detection Using Histogram Quantization of Cross Power Spectrum
    Proc. Int. Conf. High Performance Computing Simulation (HPCS)
    2017, pp. 826-831
    DOI: 10.1109/HPCS.2017.125
    BibTeX
    @inproceedings{Pourkashani2017,
     author = {Pourkashani, A. and Shahbahrami, A. and Fomani, B. A.},
     title = {Copy Move Forgery Detection Using Histogram Quantization of Cross Power Spectrum},
     booktitle = {Proc. Int. Conf. High Performance Computing Simulation (HPCS)},
     year = {2017},
     pages = {826--831}}
    
  192. C.S. Prakash, K.V. Anand & S. Maheshkar
    Detection of Copy-move Image Forgery Using Dct
    Advances in Computational Intelligence
    Springer, 2017
    DOI: 10.1007/978-981-10-2525-9_25
    BibTeX
    @incollection{Prakash2017,
     author = {Prakash, Choudhary Shyam and Anand, Kumar Vijay and Maheshkar, Sushila},
     title = {Detection of Copy-move Image Forgery Using Dct},
     booktitle = {Advances in Computational Intelligence},
     publisher = {Springer},
     year = {2017}}
    
  193. C.S. Prakash & S. Maheshkar
    Detection Algorithm for Copy-Move Forgery Based on Circle Block
    Proceedings of International Conference on Computer Vision and Image Processing, Springer, 2017
    DOI: 10.1007/978-981-10-2107-7_32
    BibTeX
    @article{Prakash2017a,
     author = {Prakash, Choudhary Shyam and Maheshkar, Sushila},
     title = {Detection Algorithm for Copy-Move Forgery Based on Circle Block},
     journal = {Proceedings of International Conference on Computer Vision and Image Processing},
     publisher = {Springer},
     year = {2017}}
    
  194. C.S. Prakash & S. Maheshkar
    Copy-Move Forgery Detection Using DyWT
    International Journal of Multimedia Data Engineering and Management (IJMDEM), IGI Global, 2017, Vol. 8(2), pp. 1-9
    BibTeX
    @article{Prakash2017b,
     author = {Prakash, Choudhary Shyam and Maheshkar, Sushila},
     title = {Copy-Move Forgery Detection Using DyWT},
     journal = {International Journal of Multimedia Data Engineering and Management (IJMDEM)},
     publisher = {IGI Global},
     year = {2017},
     volume = {8},
     number = {2},
     pages = {1--9}}
    
  195. T. Qiao, F. Retraint, R. Cogranne & T.H. Thai
    Individual camera device identification from JPEG images
    Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 52, pp. 74-86
    DOI: 10.1016/j.image.2016.12.011
    BibTeX
    @article{Qiao2017,
     author = {Qiao, Tong and Retraint, Florent and Cogranne, Rémi and Thai, Thanh Hai},
     title = {Individual camera device identification from JPEG images},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {52},
     pages = {74--86}}
    
  196. T. Qiao, A. Zhu & F. Retraint
    Exposing image resampling forgery by using linear parametric model
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4314-1
    BibTeX
    @article{Qiao2017a,
     author = {Qiao, Tong and Zhu, Aichun and Retraint, Florent},
     title = {Exposing image resampling forgery by using linear parametric model},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  197. S. Rahman & A. Robles-Kelly
    Estimating Reflectance Parameters, Light Direction, and Shape from a Single Multispectral Image
    IEEE Transactions on Computational Imaging, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TCI.2017.2717788
    BibTeX
    @article{Rahman2017,
     author = {Rahman, S. and Robles-Kelly, A.},
     title = {Estimating Reflectance Parameters, Light Direction, and Shape from a Single Multispectral Image},
     journal = {IEEE Transactions on Computational Imaging},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  198. N. Rahmouni, V. Nozick, J. Yamagishi & I. Echizen
    Distinguishing computer graphics from natural images using convolution neural networks
    Proc. IEEE Workshop Information Forensics and Security (WIFS)
    2017, pp. 1-6
    DOI: 10.1109/WIFS.2017.8267647
    BibTeX
    @inproceedings{Rahmouni2017,
     author = {Rahmouni, N. and Nozick, V. and Yamagishi, J. and Echizen, I.},
     title = {Distinguishing computer graphics from natural images using convolution neural networks},
     booktitle = {Proc. IEEE Workshop Information Forensics and Security (WIFS)},
     year = {2017},
     pages = {1--6}}
    
  199. B.S. Rao
    A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4426-2
    BibTeX
    @article{Rao2017,
     author = {Rao, B. Subrahmanyeswara},
     title = {A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  200. Q. Rao & J. Wang
    Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation
    IEEE Signal Processing Letters, Institute of Electrical and Electronics Engineers (IEEE), 2017, pp. 1-1
    DOI: 10.1109/lsp.2017.2681426
    BibTeX
    @article{Rao2017a,
     author = {Rao, Qiang and Wang, Jianjun},
     title = {Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation},
     journal = {IEEE Signal Processing Letters},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     pages = {1--1}}
    
  201. Q. Rao & J. Wang
    Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation
    IEEE Signal Processing Letters, Institute of Electrical and Electronics Engineers (IEEE), 2017, Vol. 24(6), pp. 809-813
    DOI: 10.1109/LSP.2017.2681426
    BibTeX
    @article{Rao2017b,
     author = {Rao, Q. and Wang, J.},
     title = {Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation},
     journal = {IEEE Signal Processing Letters},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     volume = {24},
     number = {6},
     pages = {809--813}}
    
  202. M.R. Resmi & S. Vishnukumar
    A novel segmentation based copy-move forgery detection in digital images
    Proc. Int. Conf. Networks Advances in Computational Technologies (NetACT)
    2017, pp. 346-350
    DOI: 10.1109/NETACT.2017.8076793
    BibTeX
    @inproceedings{Resmi2017,
     author = {Resmi, M. R. and Vishnukumar, S.},
     title = {A novel segmentation based copy-move forgery detection in digital images},
     booktitle = {Proc. Int. Conf. Networks Advances in Computational Technologies (NetACT)},
     year = {2017},
     pages = {346--350}}
    
  203. H.K. Rhee
    Median filtering detection based on variations and residual in image forensics
    2017
    BibTeX
    @unpublished{Rhee2017,
     author = {Rhee, Hyeon Kang},
     title = {Median filtering detection based on variations and residual in image forensics},
     year = {2017}}
    
  204. K.H. Rhee
    Forgery image detection of Gaussian filtering by support vector machine using edge characteristics
    Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)
    2017, pp. 231-236
    DOI: 10.1109/ICUFN.2017.7993782
    BibTeX
    @inproceedings{Rhee2017a,
     author = {Rhee, K. H.},
     title = {Forgery image detection of Gaussian filtering by support vector machine using edge characteristics},
     booktitle = {Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)},
     year = {2017},
     pages = {231--236}}
    
  205. K.H. Rhee
    Forgery image detection of Gaussian filtering by support vector machine using edge characteristics
    Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)
    2017, pp. 231-236
    DOI: 10.1109/ICUFN.2017.7993782
    BibTeX
    @inproceedings{Rhee2017b,
     author = {Rhee, K. H.},
     title = {Forgery image detection of Gaussian filtering by support vector machine using edge characteristics},
     booktitle = {Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)},
     year = {2017},
     pages = {231--236}}
    
  206. K.H. Rhee
    Detection of JPEG Compression Anti-Forensics
    Journal of the Institute of Electronics and Information Engineers, 2017, Vol. 54(11)
    BibTeX
    @article{Rhee2017c,
     author = {Rhee, Kang Hyeon},
     title = {Detection of JPEG Compression Anti-Forensics},
     journal = {Journal of the Institute of Electronics and Information Engineers},
     year = {2017},
     volume = {54},
     number = {11}}
    
  207. I. Riad, A. Fadlil & T. Sari
    Image Forensic for detecting Splicing Image with Distance Function
    International Journal of Computer Applications, 2017, Vol. 169(5), pp. 6-10
    BibTeX
    @article{Riad2017,
     author = {Riad, Imam and Fadlil, Abdul and Sari, Titi},
     title = {Image Forensic for detecting Splicing Image with Distance Function},
     journal = {International Journal of Computer Applications},
     year = {2017},
     volume = {169},
     number = {5},
     pages = {6--10}}
    
  208. C. Riess
    Illumination Analysis in Physics-Based Image Forensics: A Joint Discussion of Illumination Direction and Color
    Digital Communication. Towards a Smart and Secure Future Internet
    Springer, 2017
    DOI: 10.1007/978-3-319-67639-5_9
    BibTeX
    @incollection{Riess2017a,
     author = {Riess, Christian},
     title = {Illumination Analysis in Physics-Based Image Forensics: A Joint Discussion of Illumination Direction and Color},
     booktitle = {Digital Communication. Towards a Smart and Secure Future Internet},
     publisher = {Springer},
     year = {2017}}
    
  209. C. Riess, M. Unberath, F. Naderi, S. Pfaller, M. Stamminger & E. Angelopoulou
    Handling multiple materials for exposure of digital forgeries using 2-D lighting environments
    Multimedia Tools and Applications, Springer, 2017, Vol. 76(4), pp. 4747
    DOI: 10.1007/s11042-016-3655-0
    BibTeX
    @article{Riess2017,
     author = {Riess, Christian and Unberath, Mathias and Naderi, Farzad and Pfaller, Sven and Stamminger, Marc and Angelopoulou, Elli},
     title = {Handling multiple materials for exposure of digital forgeries using 2-D lighting environments},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     volume = {76},
     number = {4},
     pages = {4747}}
    
  210. A. Roy, R.S. Chakraborty, U. Sameer & R. Naskar
    Camera Source Identification Using Discrete Cosine Transform Residue Features and Ensemble Classifier
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1848-1854
    DOI: 10.1109/CVPRW.2017.231
    BibTeX
    @inproceedings{Roy2017,
     author = {Roy, A. and Chakraborty, R. S. and Sameer, U. and Naskar, R.},
     title = {Camera Source Identification Using Discrete Cosine Transform Residue Features and Ensemble Classifier},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1848--1854}}
    
  211. K. Sachdev, M. Kaur & S. Gupta
    A Robust and Fast Technique to Detect Copy Move Forgery in Digital Images Using SLIC Segmentation and SURF Keypoints
    Proceeding of International Conference on Intelligent Communication, Control and Devices, Springer, 2017
    DOI: 10.1007/978-981-10-1708-7_91
    BibTeX
    @article{Sachdev2017,
     author = {Sachdev, Kanica and Kaur, Mandeep and Gupta, Savita},
     title = {A Robust and Fast Technique to Detect Copy Move Forgery in Digital Images Using SLIC Segmentation and SURF Keypoints},
     journal = {Proceeding of International Conference on Intelligent Communication, Control and Devices},
     publisher = {Springer},
     year = {2017}}
    
  212. S. Sadeghi, S. Dadkhah, H.A. Jalab, G. Mazzola & D. Uliyan
    State of the art in passive digital image forgery detection: copy-move image forgery
    Pattern Analysis and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s10044-017-0678-8
    BibTeX
    @article{Sadeghi2017,
     author = {Sadeghi, Somayeh and Dadkhah, Sajjad and Jalab, Hamid A. and Mazzola, Giuseppe and Uliyan, Diaa},
     title = {State of the art in passive digital image forgery detection: copy-move image forgery},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  213. S. Saito, Y. Tomioka & H. Kitazawa
    A Theoretical Framework for Estimating False Acceptance Rate of PRNU-based Camera Identification
    IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2017, pp. 1-1
    DOI: 10.1109/tifs.2017.2692683
    BibTeX
    @article{Saito2017,
     author = {Saito, Shota and Tomioka, Yoichi and Kitazawa, Hitoshi},
     title = {A Theoretical Framework for Estimating False Acceptance Rate of PRNU-based Camera Identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     pages = {1--1}}
    
  214. S. Saito, Y. Tomioka & H. Kitazawa
    A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(9), pp. 2026-2035
    DOI: 10.1109/TIFS.2017.2692683
    BibTeX
    @article{Saito2017a,
     author = {Saito, S. and Tomioka, Y. and Kitazawa, H.},
     title = {A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {9},
     pages = {2026--2035}}
    
  215. R.N. Salimi
    Deteksi Copy-move Untuk Forensik Citra Dengan Modifikasi Algoritma Duplication Detection Dan Robust Detection
    Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya, Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya, 2017
    BibTeX
    @thesis{Salimi2017,
     author = {Salimi, Rahmat Nazali},
     title = {Deteksi Copy-move Untuk Forensik Citra Dengan Modifikasi Algoritma Duplication Detection Dan Robust Detection},
     school = {Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya},
     year = {2017}}
    
  216. R. Salloum, Y. Ren & C.C.J. Kuo
    Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)
    ArXiv, 2017
    BibTeX
    @article{Salloum2017,
     author = {Salloum, Ronald and Ren, Yuzhuo and Kuo, C. C. Jay},
     title = {Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)},
     journal = {ArXiv},
     year = {2017}}
    
  217. V.U. Sameer, R. Naskar, N. Musthyala & K. Kokkalla
    Deep Learning Based Counter–Forensic Image Classification for Camera Model Identification
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_5
    BibTeX
    @article{Sameer2017,
     author = {Sameer, Venkata Udaya and Naskar, Ruchira and Musthyala, Nikhita and Kokkalla, Kalyan},
     title = {Deep Learning Based Counter–Forensic Image Classification for Camera Model Identification},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  218. V. Schetinger, M. Iuliani, A. Piva & M.M. Oliveira
    Image Forgery Detection confronts Image Composition
    Computers & Graphics, Elsevier BV, 2017
    DOI: 10.1016/j.cag.2017.08.014
    BibTeX
    @article{Schetinger2017,
     author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.},
     title = {Image Forgery Detection confronts Image Composition},
     journal = {Computers & Graphics},
     publisher = {Elsevier BV},
     year = {2017}}
    
  219. C. Seibold, W. Samek, A. Hilsmann & P. Eisert
    Detection of Face Morphing Attacks by Deep Learning
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_9
    BibTeX
    @article{Seibold2017,
     author = {Seibold, Clemens and Samek, Wojciech and Hilsmann, Anna and Eisert, Peter},
     title = {Detection of Face Morphing Attacks by Deep Learning},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  220. Z.K. Senturk & D. Akgun
    Seam carving based image resizing detection using hybrid features
    Tehnicki vjesnik - Technical Gazette, Mechanical Engineering Faculty in Slavonski Brod, 2017, Vol. 24(6)
    DOI: 10.17559/tv-20160804121351
    BibTeX
    @article{Senturk2017,
     author = {Senturk, Zehra Karapinar and Akgun, Devrim},
     title = {Seam carving based image resizing detection using hybrid features},
     journal = {Tehnicki vjesnik - Technical Gazette},
     publisher = {Mechanical Engineering Faculty in Slavonski Brod},
     year = {2017},
     volume = {24},
     number = {6}}
    
  221. P.M. Shelke & R.S. Prasad
    Tradeoffs Between Forensics and Anti-Forensics of Digital Images
    International Journal of Rough Sets and Data Analysis, IGI Global, 2017, Vol. 4(2), pp. 92-105
    DOI: 10.4018/ijrsda.2017040107
    BibTeX
    @article{Shelke2017,
     author = {Shelke, Priya Makarand and Prasad, Rajesh Shardanand},
     title = {Tradeoffs Between Forensics and Anti-Forensics of Digital Images},
     journal = {International Journal of Rough Sets and Data Analysis},
     publisher = {IGI Global},
     year = {2017},
     volume = {4},
     number = {2},
     pages = {92--105}}
    
  222. M.M. Shetty & D.H. Manjaiah
    Challenges of Distributed Storage Systems in Internet of Things
    Internet of Things: Novel Advances and Envisioned Applications, Springer, 2017
    DOI: 10.1007/978-3-319-53472-5_9
    BibTeX
    @article{Shetty2017,
     author = {Shetty, Madhvaraj M. and Manjaiah, D. H.},
     title = {Challenges of Distributed Storage Systems in Internet of Things},
     journal = {Internet of Things: Novel Advances and Envisioned Applications},
     publisher = {Springer},
     year = {2017}}
    
  223. C. Shi, N.-F. Law, F.H.F. Leung & W.-C. Siu
    A local variance based approach to alleviate the scene content interference for source camera identification
    Digital Investigation, Elsevier BV, 2017
    DOI: 10.1016/j.diin.2017.07.005
    BibTeX
    @article{Shi2017a,
     author = {Shi, Chao and Law, Ngai-Fong and Leung, Frank H. F. and Siu, Wan-Chi},
     title = {A local variance based approach to alleviate the scene content interference for source camera identification},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2017}}
    
  224. H.J. Shin, J.J. Jeon & I.K. Eom
    Bayer CFA pattern identification using color difference model
    Proc of the ICEIC 2017 International Conference on Electronics, Information, and Communication
    2017, pp. 187-188
    BibTeX
    @inproceedings{Shin2017,
     author = {Shin, Hyun Jun and Jeon, Jong Ju and Eom, Il Kyu},
     title = {Bayer CFA pattern identification using color difference model},
     booktitle = {Proc of the ICEIC 2017 International Conference on Electronics, Information, and Communication},
     year = {2017},
     pages = {187--188}}
    
  225. H.J. Shin, J.J. Jeon & I.K. Eom
    Color filter array pattern identification using variance of color difference image
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2017, Vol. 26(4), pp. 043015
    DOI: 10.1117/1.jei.26.4.043015
    BibTeX
    @article{Shin2017a,
     author = {Shin, Hyun Jun and Jeon, Jong Ju and Eom, Il Kyu},
     title = {Color filter array pattern identification using variance of color difference image},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2017},
     volume = {26},
     number = {4},
     pages = {043015}}
    
  226. N. Sidere, F. Cruz, M. Coustaty & J.M. Ogier
    A dataset for forgery detection and spotting in document images
    Proc. Seventh Int. Conf. Emerging Security Technologies (EST)
    2017, pp. 26-31
    DOI: 10.1109/EST.2017.8090394
    BibTeX
    @inproceedings{Sidere2017,
     author = {Sidere, N. and Cruz, F. and Coustaty, M. and Ogier, J. M.},
     title = {A dataset for forgery detection and spotting in document images},
     booktitle = {Proc. Seventh Int. Conf. Emerging Security Technologies (EST)},
     year = {2017},
     pages = {26--31}}
    
  227. G. Singh & K. Singh
    Improved JPEG anti-forensics with better image visual quality and forensic undetectability
    Forensic Science International, Elsevier BV, 2017, Vol. 277, pp. 133-147
    DOI: 10.1016/j.forsciint.2017.06.003
    BibTeX
    @article{Singh2017a,
     author = {Singh, Gurinder and Singh, Kulbir},
     title = {Improved JPEG anti-forensics with better image visual quality and forensic undetectability},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {277},
     pages = {133--147}}
    
  228. N. Singh, A. Gupta & R.C. Jain
    Global Contrast Enhancement Based Image Forensics Using Statistical Features
    Advances in Electrical and Electronic Engineering, VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences, 2017, Vol. 15(3)
    DOI: 10.15598/aeee.v15i3.2189
    BibTeX
    @article{Singh2017b,
     author = {Singh, Neetu and Gupta, Abhinav and Jain, Roop Chand},
     title = {Global Contrast Enhancement Based Image Forensics Using Statistical Features},
     journal = {Advances in Electrical and Electronic Engineering},
     publisher = {VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences},
     year = {2017},
     volume = {15},
     number = {3}}
    
  229. R.D. Singh & N. Aggarwal
    Video content authentication techniques: a comprehensive survey
    Multimedia Systems, Springer, 2017, pp. 1
    DOI: 10.1007/s00530-017-0538-9
    BibTeX
    @article{Singh2017,
     author = {Singh, Raahat Devender and Aggarwal, Naveen},
     title = {Video content authentication techniques: a comprehensive survey},
     journal = {Multimedia Systems},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  230. M. Sivarathinabala, S. Abirami & R. Baskaran
    A Study on Security and Surveillance System Using Gait Recognition
    Intelligent Techniques in Signal Processing for Multimedia Security, Springer, 2017
    DOI: 10.1007/978-3-319-44790-2_11
    BibTeX
    @article{Sivarathinabala2017,
     author = {Sivarathinabala, M. and Abirami, S. and Baskaran, R.},
     title = {A Study on Security and Surveillance System Using Gait Recognition},
     journal = {Intelligent Techniques in Signal Processing for Multimedia Security},
     publisher = {Springer},
     year = {2017}}
    
  231. C. Soize
    Random Matrix Models and Nonparametric Method for Uncertainty Quantification
    Handbook of Uncertainty Quantification, Springer, 2017
    DOI: 10.1007/978-3-319-12385-1_5
    BibTeX
    @article{Soize2017,
     author = {Soize, Christian},
     title = {Random Matrix Models and Nonparametric Method for Uncertainty Quantification},
     journal = {Handbook of Uncertainty Quantification},
     publisher = {Springer},
     year = {2017}}
    
  232. B. Soni, P.K. Das & D.M. Thounaojam
    Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature
    Proceedings of the 7th International Conference on Computer and Communication Technology - ICCCT-2017
    ACM Press, 2017
    DOI: 10.1145/3154979.3155001
    BibTeX
    @inproceedings{Soni2017,
     author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei},
     title = {Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature},
     booktitle = {Proceedings of the 7th International Conference on Computer and Communication Technology - ICCCT-2017},
     publisher = {ACM Press},
     year = {2017}}
    
  233. A.R. Soobhany, A.S. Akbari & Z.C. Schreuders
    Source Camera Identification Using Non-decimated Wavelet Transform
    11th International Conference on Global Security, Safety & Sustainability
    2017
    BibTeX
    @inproceedings{Soobhany2017,
     author = {Soobhany, A. Ryad and Akbari, A. Sheikh and Schreuders, Z. C.},
     title = {Source Camera Identification Using Non-decimated Wavelet Transform},
     booktitle = {11th International Conference on Global Security, Safety & Sustainability},
     year = {2017}}
    
  234. A.R. Soobhany, A. Sheikh Akbari & Z.C. Schreuders
    Reinforced source camera identification using non-decimated wavelet transform
    IET International Conference on Biomedical Image and Signal Processing, 2017
    BibTeX
    @article{Soobhany2017a,
     author = {Soobhany, A. R. and Sheikh Akbari, A. and Schreuders, Z. C.},
     title = {Reinforced source camera identification using non-decimated wavelet transform},
     journal = {IET International Conference on Biomedical Image and Signal Processing},
     year = {2017}}
    
  235. L. Su & C. Li
    A novel passive forgery detection algorithm for video region duplication
    Multidimensional Systems and Signal Processing, Springer Nature, 2017
    DOI: 10.1007/s11045-017-0496-6
    BibTeX
    @article{Su2017,
     author = {Su, Lichao and Li, Cuihua},
     title = {A novel passive forgery detection algorithm for video region duplication},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer Nature},
     year = {2017}}
    
  236. Y. Su, X. Jin, C. Zhang & Y. Chen
    Hierarchical Image Resampling Detection Based on Blind Deconvolution
    Journal of Visual Communication and Image Representation, Elsevier BV, 2017
    DOI: 10.1016/j.jvcir.2017.01.009
    BibTeX
    @article{Su2017a,
     author = {Su, Yuting and Jin, Xiao and Zhang, Chengqian and Chen, Yawei},
     title = {Hierarchical Image Resampling Detection Based on Blind Deconvolution},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2017}}
    
  237. B. Subrahmanyeswara Rao
    A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4426-2
    BibTeX
    @article{SubrahmanyeswaraRao2017,
     author = {Subrahmanyeswara Rao, B.},
     title = {A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  238. D.B. Tariang, A. Roy, R.S. Chakraborty & R. Naskar
    Automated JPEG forgery detection with correlation based localization
    Proc. IEEE Int. Conf. Multimedia Expo Workshops (ICMEW)
    2017, pp. 226-231
    DOI: 10.1109/ICMEW.2017.8026326
    BibTeX
    @inproceedings{Tariang2017,
     author = {Tariang, D. B. and Roy, A. and Chakraborty, R. S. and Naskar, R.},
     title = {Automated JPEG forgery detection with correlation based localization},
     booktitle = {Proc. IEEE Int. Conf. Multimedia Expo Workshops (ICMEW)},
     year = {2017},
     pages = {226--231}}
    
  239. Tarman & H. Saini
    M-SIFT: A detection algorithm for copy move image forgery
    Proc. Computing and Control (ISPCC) 2017 4th Int. Conf. Signal Processing
    2017, pp. 425-430
    DOI: 10.1109/ISPCC.2017.8269716
    BibTeX
    @inproceedings{Tarman2017,
     author = {Tarman and Saini, H.},
     title = {M-SIFT: A detection algorithm for copy move image forgery},
     booktitle = {Proc. Computing and Control (ISPCC) 2017 4th Int. Conf. Signal Processing},
     year = {2017},
     pages = {425--430}}
    
  240. S. Taspinar, M. Mohanty & N. Memon
    PRNU-Based Camera Attribution From Multiple Seam-Carved Images
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 3065-3080
    DOI: 10.1109/TIFS.2017.2737961
    BibTeX
    @article{Taspinar2017,
     author = {Taspinar, S. and Mohanty, M. and Memon, N.},
     title = {PRNU-Based Camera Attribution From Multiple Seam-Carved Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {12},
     pages = {3065--3080}}
    
  241. K. Taya, N. Takeda, T. Kobayashi, Y. Ozaki & N. Kuroki
    Detecting Doctored JPEG Image Based on Block Noise Analysis and Double JPEG Analysis
    IEEJ Transactions on Electronics, Information and Systems, Institute of Electrical Engineers of Japan (IEE Japan), 2017, Vol. 137(5), pp. 742-749
    DOI: 10.1541/ieejeiss.137.742
    BibTeX
    @article{Taya2017,
     author = {Taya, Kunihiko and Takeda, Naoto and Kobayashi, Tadashi and Ozaki, Yoshiaki and Kuroki, Nobutaka},
     title = {Detecting Doctored JPEG Image Based on Block Noise Analysis and Double JPEG Analysis},
     journal = {IEEJ Transactions on Electronics, Information and Systems},
     publisher = {Institute of Electrical Engineers of Japan (IEE Japan)},
     year = {2017},
     volume = {137},
     number = {5},
     pages = {742--749}}
    
  242. S. Teerakanok & T. Uehara
    Digital Media Tampering Detection Techniques: An Overview
    Proc. IEEE 41st Annual Computer Software and Applications Conf. (COMPSAC)
    2017, Vol. 2, pp. 170-174
    DOI: 10.1109/COMPSAC.2017.109
    BibTeX
    @inproceedings{Teerakanok2017,
     author = {Teerakanok, S. and Uehara, T.},
     title = {Digital Media Tampering Detection Techniques: An Overview},
     booktitle = {Proc. IEEE 41st Annual Computer Software and Applications Conf. (COMPSAC)},
     year = {2017},
     volume = {2},
     pages = {170--174}}
    
  243. A.U. Tembe & S.S. Thombre
    Survey of copy-paste forgery detection in digital image forensic
    Proc. Int. Conf. Innovative Mechanisms for Industry Applications (ICIMIA)
    2017, pp. 248-252
    DOI: 10.1109/ICIMIA.2017.7975613
    BibTeX
    @inproceedings{Tembe2017,
     author = {Tembe, A. U. and Thombre, S. S.},
     title = {Survey of copy-paste forgery detection in digital image forensic},
     booktitle = {Proc. Int. Conf. Innovative Mechanisms for Industry Applications (ICIMIA)},
     year = {2017},
     pages = {248--252}}
    
  244. D. Teyssou, J.-M. Leung, E. Apostolidis, K. Apostolidis, S. Papadopoulos, M. Zampoglou, O. Papadopoulou & V. Mezaris
    The InVID Plug-in: Web Video Verification on the Browser
    Proceedings of the 1st workshop on multimedia verification, 2017
    DOI: 10.1145/3132384.3132387
    BibTeX
    @article{Teyssou2017,
     author = {Teyssou, Denis and Leung, Jean-Michel and Apostolidis, Evlampios and Apostolidis, Konstantinos and Papadopoulos, Symeon and Zampoglou, Markos and Papadopoulou, Olga and Mezaris, Vasileios},
     title = {The InVID Plug-in: Web Video Verification on the Browser},
     journal = {Proceedings of the 1st workshop on multimedia verification},
     year = {2017}}
    
  245. T.H. Thai, R. Cogranne, F. Retraint & T.N.C. Doan
    JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(1), pp. 123-133
    DOI: 10.1109/TIFS.2016.2604208
    BibTeX
    @article{Thai2017,
     author = {Thai, T. H. and Cogranne, R. and Retraint, F. and Doan, T. N. C.},
     title = {JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {1},
     pages = {123--133}}
    
  246. T.H. Thai, R. Cogranne, F. Retraint & T.N.C. Doan
    JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(1), pp. 123-133
    DOI: 10.1109/TIFS.2016.2604208
    BibTeX
    @article{Thai2017a,
     author = {Thai, T. H. and Cogranne, R. and Retraint, F. and Doan, T. N. C.},
     title = {JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {1},
     pages = {123--133}}
    
  247. V. Thirunavukkarasu, J. Satheesh Kumar, G.S. Chae & J. Kishorkumar
    Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering
    Wireless Personal Communications, Springer, 2017, pp. 1
    DOI: 10.1007/s11277-016-3941-1
    BibTeX
    @article{Thirunavukkarasu2017,
     author = {Thirunavukkarasu, V. and Satheesh Kumar, J. and Chae, Gyoo Soo and Kishorkumar, J.},
     title = {Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering},
     journal = {Wireless Personal Communications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  248. N. Tian, B.W.-K. Ling, C. Qing & Z. Yang
    Camera identification based on very low bit rate videos with overall noise pattern having time varying statistics
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4323-0
    BibTeX
    @article{Tian2017,
     author = {Tian, Nili and Ling, Bingo Wing-Kuen and Qing, Chunmei and Yang, Zhijing},
     title = {Camera identification based on very low bit rate videos with overall noise pattern having time varying statistics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  249. M.H. Tirnaz & A. Bastan fard
    Identification of Manipulation in Digital Images through Hybrid Block-based and Key Points Algorithm
    QUID, 2017(28), pp. 78-92
    BibTeX
    @article{Tirnaz2017,
     author = {Tirnaz, Mohammad Hossein and Bastan fard, Azam},
     title = {Identification of Manipulation in Digital Images through Hybrid Block-based and Key Points Algorithm},
     journal = {QUID},
     year = {2017},
     number = {28},
     pages = {78--92}}
    
  250. H.K. Tu, L.T. Thuong, H.V.U. Synh, H.T. San & H.V. Khoa
    Develop an algorithm for image forensics using feature comparison and sharpness estimation
    Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing
    2017, pp. 82-87
    DOI: 10.1109/SIGTELCOM.2017.7849800
    BibTeX
    @inproceedings{Tu2017,
     author = {Tu, H. K. and Thuong, L. T. and Synh, H. V. U. and San, H. T. and Khoa, H. Van},
     title = {Develop an algorithm for image forensics using feature comparison and sharpness estimation},
     booktitle = {Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing},
     year = {2017},
     pages = {82--87}}
    
  251. H.K. Tu, L.T. Thuong, H.V.U. Synh, H.T. San & H.V. Khoa
    Develop an algorithm for image forensics using feature comparison and sharpness estimation
    Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing
    2017, pp. 82-87
    DOI: 10.1109/SIGTELCOM.2017.7849800
    BibTeX
    @inproceedings{Tu2017a,
     author = {Tu, H. K. and Thuong, L. T. and Synh, H. V. U. and San, H. T. and Khoa, H. Van},
     title = {Develop an algorithm for image forensics using feature comparison and sharpness estimation},
     booktitle = {Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing},
     year = {2017},
     pages = {82--87}}
    
  252. V. Tuba, R. Jovanovic & M. Tuba
    Digital image forgery detection based on shadow HSV inconsistency
    2017 5th International Symposium on Digital Forensic and Security (ISDFS)
    IEEE, 2017
    DOI: 10.1109/isdfs.2017.7916505
    BibTeX
    @inproceedings{Tuba2017,
     author = {Tuba, Viktor and Jovanovic, Raka and Tuba, Milan},
     title = {Digital image forgery detection based on shadow HSV inconsistency},
     booktitle = {2017 5th International Symposium on Digital Forensic and Security (ISDFS)},
     publisher = {IEEE},
     year = {2017}}
    
  253. D.M. Uliyan, H.A. Jalab, A. Abuarqoub & M. Abu-Hashem
    Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor
    Proceedings of the International Conference on Future Networks and Distributed Systems
    ACM, 2017, pp. 6:1-6:6
    DOI: 10.1145/3102304.3102310
    BibTeX
    @inproceedings{Uliyan2017,
     author = {Uliyan, Diaa M. and Jalab, Hamid A. and Abuarqoub, Abdelrahman and Abu-Hashem, Muhannad},
     title = {Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor},
     booktitle = {Proceedings of the International Conference on Future Networks and Distributed Systems},
     publisher = {ACM},
     year = {2017},
     pages = {6:1--6:6}}
    
  254. G. Ulutas, A. Ustubioglu, B. Ustubioglu, V. Nabiyev & M. Ulutas
    Medical Image Tamper Detection Based on Passive Image Authentication
    Journal of Digital Imaging, Springer, 2017, pp. 1
    DOI: 10.1007/s10278-017-9961-x
    BibTeX
    @article{Ulutas2017,
     author = {Ulutas, Guzin and Ustubioglu, Arda and Ustubioglu, Beste and Nabiyev, Vasif and Ulutas, Mustafa},
     title = {Medical Image Tamper Detection Based on Passive Image Authentication},
     journal = {Journal of Digital Imaging},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  255. B. Üstübioğlu, G. Ulutaş, V.V. Nabiyev, M. Ulutaş & A. Üstübioğlu
    A fast detection method for frame duplication forgery based on correlation
    Proc. 25th Signal Processing and Communications Applications Conf. (SIU)
    2017, pp. 1-4
    DOI: 10.1109/SIU.2017.7960530
    BibTeX
    @inproceedings{Uestuebioglu2017,
     author = {Üstübioğlu, B. and Ulutaş, G. and Nabiyev, V. V. and Ulutaş, M. and Üstübioğlu, A.},
     title = {A fast detection method for frame duplication forgery based on correlation},
     booktitle = {Proc. 25th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2017},
     pages = {1--4}}
    
  256. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    User Authentication via PRNU-Based Physical Unclonable Functions
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(8), pp. 1941-1956
    DOI: 10.1109/TIFS.2017.2697402
    BibTeX
    @article{Valsesia2017a,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {User Authentication via PRNU-Based Physical Unclonable Functions},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {8},
     pages = {1941--1956}}
    
  257. D. Valsesia, G. Coluccia, T. Bianchi & E. MagliValsesia
    User Authentication via PRNU-based Physical Unclonable Functions
    IEEE Transactions on Information, 2017
    BibTeX
    @article{Valsesia2017,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and MagliValsesia, E.},
     title = {User Authentication via PRNU-based Physical Unclonable Functions},
     journal = {IEEE Transactions on Information},
     year = {2017}}
    
  258. D. Vázquez-Padín, F. Pérez-González & P. Comesaña-Alfaro
    Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling
    arXiv, 2017
    BibTeX
    @article{Vazquez-Padin2017,
     author = {Vázquez-Padín, David and Pérez-González, Fernando and Comesaña-Alfaro, Pedro},
     title = {Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling},
     journal = {arXiv},
     year = {2017}}
    
  259. D. Vázquez-Padín, F. Pérez-González & P. Comesaña-Alfaro
    A Random Matrix Approach to the Forensic Analysis of Upscaled Images
    IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2017, Vol. 12(9), pp. 1-1
    DOI: 10.1109/tifs.2017.2699638
    BibTeX
    @article{Vazquez-Padin2017a,
     author = {Vázquez-Padín, D. and Pérez-González, F. and Comesaña-Alfaro, P.},
     title = {A Random Matrix Approach to the Forensic Analysis of Upscaled Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     volume = {12},
     number = {9},
     pages = {1--1}}
    
  260. D. Vázquez-Padín, F. Pérez-González & P. Comesaña-Alfaro
    Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling
    Digital Communication. Towards a Smart and Secure Future Internet
    Springer, 2017
    DOI: 10.1007/978-3-319-67639-5_10
    BibTeX
    @incollection{Vazquez-Padin2017b,
     author = {Vázquez-Padín, David and Pérez-González, Fernando and Comesaña-Alfaro, Pedro},
     title = {Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling},
     booktitle = {Digital Communication. Towards a Smart and Secure Future Internet},
     publisher = {Springer},
     year = {2017}}
    
  261. U.S. Venkata, R. Naskar, N. Musthyala & K. Kokkalla
    Deep Learning based Counter-Forensic Image Classification for Camera Model Identification
    Proc of the International Workshop on Digital Forensics and Watermarking (IWDW), Madgeburg, Germany, 23-25 August 2017
    2017
    BibTeX
    @conference{Venkata2017,
     author = {Venkata, Udaya Sameer and Naskar, Ruchira and Musthyala, Nikhita and Kokkalla, Kalyan},
     title = {Deep Learning based Counter-Forensic Image Classification for Camera Model Identification},
     booktitle = {Proc of the International Workshop on Digital Forensics and Watermarking (IWDW), Madgeburg, Germany, 23-25 August 2017},
     year = {2017}}
    
  262. V. Verma, N. Agarwal & N. Khanna
    DCT-domain Deep Convolutional Neural Networks for Multiple JPEG Compression Classification
    ArXiv, 2017
    BibTeX
    @article{Verma2017,
     author = {Verma, Vinay and Agarwal, Nikita and Khanna, Nitin},
     title = {DCT-domain Deep Convolutional Neural Networks for Multiple JPEG Compression Classification},
     journal = {ArXiv},
     year = {2017}}
    
  263. D.S. Vidyadharan & S.M. Thampi
    Detecting Spliced Face Using Texture Analysis
    Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer, 2017
    DOI: 10.1007/978-3-319-72395-2_72
    BibTeX
    @article{Vidyadharan2017,
     author = {Vidyadharan, Divya S. and Thampi, Sabu M.},
     title = {Detecting Spliced Face Using Texture Analysis},
     journal = {Security, Privacy, and Anonymity in Computation, Communication, and Storage},
     publisher = {Springer},
     year = {2017}}
    
  264. T. Vijayanandh & A. Shenbagavalli
    Tamper detection of medical images using statistical moments against various attacks
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5473-4
    BibTeX
    @article{Vijayanandh2017,
     author = {Vijayanandh, T. and Shenbagavalli, A.},
     title = {Tamper detection of medical images using statistical moments against various attacks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  265. J. Waleed, T.M. Hasan & T. Abbas
    Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image
    Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)
    2017, pp. 156-161
    DOI: 10.1109/NTICT.2017.7976108
    BibTeX
    @inproceedings{Waleed2017,
     author = {Waleed, J. and Hasan, T. M. and Abbas, T.},
     title = {Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image},
     booktitle = {Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)},
     year = {2017},
     pages = {156--161}}
    
  266. J. Waleed, T.M. Hasan & T. Abbas
    Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image
    Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)
    2017, pp. 156-161
    DOI: 10.1109/NTICT.2017.7976108
    BibTeX
    @inproceedings{Waleed2017a,
     author = {Waleed, J. and Hasan, T. M. and Abbas, T.},
     title = {Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image},
     booktitle = {Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)},
     year = {2017},
     pages = {156--161}}
    
  267. Q. Wan, K. Panetta & S. Agaian
    A video forensic technique for detecting frame integrity using human visual system-inspired measure
    Proc. IEEE Int. Symp. Technologies for Homeland Security (HST)
    2017, pp. 1-6
    DOI: 10.1109/THS.2017.7943466
    BibTeX
    @inproceedings{Wan2017,
     author = {Wan, Q. and Panetta, K. and Agaian, S.},
     title = {A video forensic technique for detecting frame integrity using human visual system-inspired measure},
     booktitle = {Proc. IEEE Int. Symp. Technologies for Homeland Security (HST)},
     year = {2017},
     pages = {1--6}}
    
  268. C.-C.C. Wang & Han
    Robust Copy-move Forgery Detection through Invariant Moment Features
    The Fifth International Conference on Informatics & Applications (ICIA 2016)
    2017
    BibTeX
    @conference{Wang2017c,
     author = {Wang, Chien-Chang Chen and Han},
     title = {Robust Copy-move Forgery Detection through Invariant Moment Features},
     booktitle = {The Fifth International Conference on Informatics & Applications (ICIA 2016)},
     year = {2017}}
    
  269. K. Wang
    A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens
    2017
    BibTeX
    @unpublished{Wang2017,
     author = {Wang, Kai},
     title = {A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens},
     year = {2017}}
    
  270. R. Wang, W. Lu, S. Xiang, X. Zhao & J. Wang
    Digital image splicing detection based on Markov features in QDCT and QWT domain
    ArXiv, 2017
    BibTeX
    @article{Wang2017b,
     author = {Wang, Ruxin and Lu, Wei and Xiang, Shijun and Zhao, Xianfeng and Wang, Jinwei},
     title = {Digital image splicing detection based on Markov features in QDCT and QWT domain},
     journal = {ArXiv},
     year = {2017}}
    
  271. W. Wang, F. Liu, T. Guo & Y. Ren
    Temporal Integration Based Visual Cryptography Scheme and Its Application
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_30
    BibTeX
    @article{Wang2017a,
     author = {Wang, Wen and Liu, Feng and Guo, Teng and Ren, Yawei},
     title = {Temporal Integration Based Visual Cryptography Scheme and Its Application},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  272. Y. Wang, L. Tian & C. Li
    LBP-SVD Based Copy Move Forgery Detection Algorithm
    Proc. IEEE Int. Symp. Multimedia (ISM)
    2017, pp. 553-556
    DOI: 10.1109/ISM.2017.108
    BibTeX
    @inproceedings{Wang2017f,
     author = {Wang, Y. and Tian, L. and Li, C.},
     title = {LBP-SVD Based Copy Move Forgery Detection Algorithm},
     booktitle = {Proc. IEEE Int. Symp. Multimedia (ISM)},
     year = {2017},
     pages = {553--556}}
    
  273. Z.F. Wang, L. Zhu, Q.S. Min & C.Y. Zeng
    Double compression detection based on feature fusion
    Proc. Int. Conf. Machine Learning and Cybernetics (ICMLC)
    2017, Vol. 2, pp. 379-384
    DOI: 10.1109/ICMLC.2017.8108951
    BibTeX
    @inproceedings{Wang2017d,
     author = {Wang, Z. F. and Zhu, L. and Min, Q. S. and Zeng, C. Y.},
     title = {Double compression detection based on feature fusion},
     booktitle = {Proc. Int. Conf. Machine Learning and Cybernetics (ICMLC)},
     year = {2017},
     volume = {2},
     pages = {379--384}}
    
  274. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    A scale invariant digital image copy-paste forgery detection approach based on NCC
    International Journal of Computer Applications, 2017
    BibTeX
    @article{Warbhe2017,
     author = {Warbhe, Anil Dada and Dharaskar, Rajiv V. and Thakare, Vilas M.},
     title = {A scale invariant digital image copy-paste forgery detection approach based on NCC},
     journal = {International Journal of Computer Applications},
     year = {2017}}
    
  275. W.T. Weldtsadik, H.J. Kim, Y. Choi & C. Kim
    Circle Block Based Copy-Move Forgery Detection
    Yoon, K. & Kim, C. G. (ed.)
    Proceedings of the 3rd EEECS 2017 Okinawa Jichikaikan Okinawa Pref. Municipal Center, Japan January 9-11, 2017
    2017
    BibTeX
    @inproceedings{Weldtsadik2017,
     author = {Weldtsadik, Wendimagegn Tariku and Kim, Hyoung Joog and Choi, Yongsoo and Kim, Cheongghil},
     title = {Circle Block Based Copy-Move Forgery Detection},
     booktitle = {Proceedings of the 3rd EEECS 2017 Okinawa Jichikaikan Okinawa Pref. Municipal Center, Japan January 9-11, 2017},
     year = {2017}}
    
  276. L. Wen, H. Qi & S. Lyu
    Contrast Enhancement Estimation for Digital Image Forensics
    ArXiv, 2017
    BibTeX
    @article{Wen2017a,
     author = {Wen, Longyin and Qi, Honggang and Lyu, Siwei},
     title = {Contrast Enhancement Estimation for Digital Image Forensics},
     journal = {ArXiv},
     year = {2017}}
    
  277. W. Wen & S. Khatibi
    Estimation of Image Sensor Fill Factor Using a Single Arbitrary Image
    Sensors, MDPI AG, 2017, Vol. 17(3), pp. 620
    DOI: 10.3390/s17030620
    BibTeX
    @article{Wen2017,
     author = {Wen, Wei and Khatibi, Siamak},
     title = {Estimation of Image Sensor Fill Factor Using a Single Arbitrary Image},
     journal = {Sensors},
     publisher = {MDPI AG},
     year = {2017},
     volume = {17},
     number = {3},
     pages = {620}}
    
  278. Y. Wo, K. Yang, G. Han, H. Chen & W. Wu
    Copy --move forgery detection based on multi-radius PCET
    IET Image Proc, 2017, Vol. 11(2), pp. 99-108
    DOI: 10.1049/iet-ipr.2016.0229
    BibTeX
    @article{Wo2017,
     author = {Wo, Y. and Yang, K. and Han, G. and Chen, H. and Wu, W.},
     title = {Copy --move forgery detection based on multi-radius PCET},
     journal = {IET Image Proc},
     year = {2017},
     volume = {11},
     number = {2},
     pages = {99--108}}
    
  279. H.-T. Wu, S. Tang & Y.-Q. Shi
    Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_22
    BibTeX
    @article{Wu2017a,
     author = {Wu, Hao-Tian and Tang, Shaohua and Shi, Yun-Qing},
     title = {Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  280. M.-L. Wu, C.-S. Fahn & Y.-F. Chen
    Image-format-independent tampered image detection based on overlapping concurrent directional patterns and neural networks
    Applied Intelligence, Springer, 2017, pp. 1
    DOI: 10.1007/s10489-017-0893-4
    BibTeX
    @article{Wu2017,
     author = {Wu, Meng-Luen and Fahn, Chin-Shyurng and Chen, Yi-Fan},
     title = {Image-format-independent tampered image detection based on overlapping concurrent directional patterns and neural networks},
     journal = {Applied Intelligence},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  281. W. Xing, S. Zhao & S. Zhang
    Blind Identification Technology of Computer Generated Image Based on Texture Recognition
    Journal of Computational and Theoretical Nanoscience, American Scientific Publishers, 2017, Vol. 14(7), pp. 3312-3322
    DOI: 10.1166/jctn.2017.6628
    BibTeX
    @article{Xing2017,
     author = {Xing, Weiwei and Zhao, Shibo and Zhang, Shunli},
     title = {Blind Identification Technology of Computer Generated Image Based on Texture Recognition},
     journal = {Journal of Computational and Theoretical Nanoscience},
     publisher = {American Scientific Publishers},
     year = {2017},
     volume = {14},
     number = {7},
     pages = {3312--3322}}
    
  282. Q. Xu, T. Sun, X. Jiang & Y. Dong
    HEVC Double Compression Detection Based on SN-PUPM Feature
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_1
    BibTeX
    @article{Xu2017,
     author = {Xu, Qianyi and Sun, Tanfeng and Jiang, Xinghao and Dong, Yi},
     title = {HEVC Double Compression Detection Based on SN-PUPM Feature},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  283. J. Yaduwanshi & P. Bansal
    A Novel Approach for Copy Move Forgery Detection Using Template Matching
    Proceedings of International Conference on Communication and Networks, Springer, 2017
    DOI: 10.1007/978-981-10-2750-5_72
    BibTeX
    @article{Yaduwanshi2017,
     author = {Yaduwanshi, Jyoti and Bansal, Pratosh},
     title = {A Novel Approach for Copy Move Forgery Detection Using Template Matching},
     journal = {Proceedings of International Conference on Communication and Networks},
     publisher = {Springer},
     year = {2017}}
    
  284. J. Yan
    Novel Security and Privacy Perspectives of Camera Fingerprints
    Security Protocols XXIV, Springer, 2017
    DOI: 10.1007/978-3-319-62033-6_11
    BibTeX
    @article{Yan2017,
     author = {Yan, Jeff},
     title = {Novel Security and Privacy Perspectives of Camera Fingerprints},
     journal = {Security Protocols XXIV},
     publisher = {Springer},
     year = {2017}}
    
  285. J. Yan
    Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion)
    Security Protocols XXIV, Springer, 2017
    DOI: 10.1007/978-3-319-62033-6_12
    BibTeX
    @article{Yan2017a,
     author = {Yan, Jeff},
     title = {Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion)},
     journal = {Security Protocols XXIV},
     publisher = {Springer},
     year = {2017}}
    
  286. B. Yang, Z. Li, W. Hu & E. Cao
    A Median Filtering Forensics Approach Based on Machine Learning
    Cloud Computing and Security, Springer, 2017
    DOI: 10.1007/978-3-319-68542-7_44
    BibTeX
    @article{Yang2017i,
     author = {Yang, Bin and Li, Zhenyu and Hu, Weifeng and Cao, Enguo},
     title = {A Median Filtering Forensics Approach Based on Machine Learning},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2017}}
    
  287. B. Yang, X. Qiu, W. Hu, H. Guo & C. Song
    Exposing Copy-move Forgery Based on Improved Sift Descriptor
    Journal of Internet Technology, 2017, Vol. 18(2), pp. 417-425
    BibTeX
    @article{Yang2017c,
     author = {Yang, Bin and Qiu, Xiaolin and Hu, Weifeng and Guo, Honglei and Song, Chunlin},
     title = {Exposing Copy-move Forgery Based on Improved Sift Descriptor},
     journal = {Journal of Internet Technology},
     year = {2017},
     volume = {18},
     number = {2},
     pages = {417--425}}
    
  288. B. Yang, X. Sun, H. Guo, Z. Xia & X. Chen
    A copy-move forgery detection method based on CMFD-SIFT
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4289-y
    BibTeX
    @article{Yang2017,
     author = {Yang, Bin and Sun, Xingming and Guo, Honglei and Xia, Zhihua and Chen, Xianyi},
     title = {A copy-move forgery detection method based on CMFD-SIFT},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  289. F. Yang, J. Li, W. Lu & J. Weng
    Copy-move forgery detection based on hybrid features
    Engineering Applications of Artificial Intelligence, Elsevier BV, 2017, Vol. 59, pp. 73-83
    DOI: 10.1016/j.engappai.2016.12.022
    BibTeX
    @article{Yang2017a,
     author = {Yang, Fan and Li, Jingwei and Lu, Wei and Weng, Jian},
     title = {Copy-move forgery detection based on hybrid features},
     journal = {Engineering Applications of Artificial Intelligence},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {59},
     pages = {73--83}}
    
  290. G. Yang, W. Qi, X. Li & Z. Guo
    Improved Reversible Visible Watermarking Based on Adaptive Block Partition
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_23
    BibTeX
    @article{Yang2017f,
     author = {Yang, Guangyuan and Qi, Wenfa and Li, Xiaolong and Guo, Zongming},
     title = {Improved Reversible Visible Watermarking Based on Adaptive Block Partition},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  291. H.-y. Yang, Y. Niu, L.-x. Jiao, Y.-n. Liu, X.-y. Wang & Z.-l. Zhou
    Robust copy-move forgery detection based on multi-granularity Superpixels matching
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4978-1
    BibTeX
    @article{Yang2017g,
     author = {Yang, Hong-ying and Niu, Ying and Jiao, Li-xian and Liu, Yu-nan and Wang, Xiang-yang and Zhou, Zhi-li},
     title = {Robust copy-move forgery detection based on multi-granularity Superpixels matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  292. J. Yang, H. Ren, G. Zhu, J. Huang & Y.-Q. Shi
    Detecting median filtering via two-dimensional AR models of multiple filtered residuals
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4691-0
    BibTeX
    @article{Yang2017d,
     author = {Yang, Jianquan and Ren, Honglei and Zhu, Guopu and Huang, Jiwu and Shi, Yun-Qing},
     title = {Detecting median filtering via two-dimensional AR models of multiple filtered residuals},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  293. P. Yang, R. Li, R. Ni & Y. Zhao
    Recaptured Image Forensics Based on Quality Aware and Histogram Feature
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_3
    BibTeX
    @article{Yang2017e,
     author = {Yang, Pengpeng and Li, Ruihan and Ni, Rongrong and Zhao, Yao},
     title = {Recaptured Image Forensics Based on Quality Aware and Histogram Feature},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  294. P. Yang, R. Ni, Y. Zhao & W. Zhao
    Source camera identification based on content-adaptive fusion residual networks
    Pattern Recognition Letters, Elsevier BV, 2017
    DOI: 10.1016/j.patrec.2017.10.016
    BibTeX
    @article{Yang2017h,
     author = {Yang, Pengpeng and Ni, Rongrong and Zhao, Yao and Zhao, Wei},
     title = {Source camera identification based on content-adaptive fusion residual networks},
     journal = {Pattern Recognition Letters},
     publisher = {Elsevier BV},
     year = {2017}}
    
  295. P. Yang, W. Zhao, R. Ni & Y. Zhao
    Source Camera Identification Based On Content-Adaptive Fusion Network
    arXiv, 2017
    BibTeX
    @article{Yang2017b,
     author = {Yang, Pengpeng and Zhao, Wei and Ni, Rongrong and Zhao, Yao},
     title = {Source Camera Identification Based On Content-Adaptive Fusion Network},
     journal = {arXiv},
     year = {2017}}
    
  296. H. Yao, F. Cao, Z. Tang, J. Wang & T. Qiao
    Expose noise level inconsistency incorporating the inhomogeneity scoring strategy
    Multimedia Tools and Applications, Springer Nature, 2017
    DOI: 10.1007/s11042-017-5206-8
    BibTeX
    @article{Yao2017,
     author = {Yao, Heng and Cao, Fang and Tang, Zhenjun and Wang, Jinwei and Qiao, Tong},
     title = {Expose noise level inconsistency incorporating the inhomogeneity scoring strategy},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2017}}
    
  297. J. Ye & Y.-Q. Shi
    A Hybrid Feature Model for Seam Carving Detection
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_7
    BibTeX
    @article{Ye2017,
     author = {Ye, Jingyu and Shi, Yun-Qing},
     title = {A Hybrid Feature Model for Seam Carving Detection},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  298. K. Ye, J. Dong, W. Wang, J. Xu & T. Tan
    Image Forgery Detection Based on Semantic Image Understanding
    Communications in Computer and Information Science
    Springer Singapore, 2017, pp. 472-481
    DOI: 10.1007/978-981-10-7299-4_39
    BibTeX
    @incollection{Ye2017b,
     author = {Ye, Kui and Dong, Jing and Wang, Wei and Xu, Jindong and Tan, Tieniu},
     title = {Image Forgery Detection Based on Semantic Image Understanding},
     booktitle = {Communications in Computer and Information Science},
     publisher = {Springer Singapore},
     year = {2017},
     pages = {472--481}}
    
  299. K. Ye, X. Sun, J. Xu, J. Dong & T. Tan
    Influence Evaluation for Image Tampering Using Saliency Mechanism
    Communications in Computer and Information Science
    Springer Singapore, 2017, pp. 518-527
    DOI: 10.1007/978-981-10-7299-4_43
    BibTeX
    @incollection{Ye2017a,
     author = {Ye, Kui and Sun, Xiaobo and Xu, Jindong and Dong, Jing and Tan, Tieniu},
     title = {Influence Evaluation for Image Tampering Using Saliency Mechanism},
     booktitle = {Communications in Computer and Information Science},
     publisher = {Springer Singapore},
     year = {2017},
     pages = {518--527}}
    
  300. M. Zakariah, M.K. Khan & H. Malik
    Digital multimedia audio forensics: past, present and future
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4277-2
    BibTeX
    @article{Zakariah2017,
     author = {Zakariah, Mohammed and Khan, Muhammad Khurram and Malik, Hafiz},
     title = {Digital multimedia audio forensics: past, present and future},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  301. M. Zampoglou, S. Papadopoulos, Y. Kompatsiaris & J. Spangenberg
    A Web-Based Service for Disturbing Image Detection
    MultiMedia Modeling, Springer, 2017
    DOI: 10.1007/978-3-319-51814-5_37
    BibTeX
    @article{Zampoglou2017a,
     author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis and Spangenberg, Jochen},
     title = {A Web-Based Service for Disturbing Image Detection},
     journal = {MultiMedia Modeling},
     publisher = {Springer},
     year = {2017}}
    
  302. F. Zeng, W. Wang, J. Chen & M. Tang
    Detecting blurred image splicing using blur type inconsistency
    International Journal of Innovative Computing and Applications, Inderscience Publishers, 2017, Vol. 8(1), pp. 31
    DOI: 10.1504/ijica.2017.082495
    BibTeX
    @article{Zeng2017,
     author = {Zeng, Feng and Wang, Wei and Chen, Junjie and Tang, Min},
     title = {Detecting blurred image splicing using blur type inconsistency},
     journal = {International Journal of Innovative Computing and Applications},
     publisher = {Inderscience Publishers},
     year = {2017},
     volume = {8},
     number = {1},
     pages = {31}}
    
  303. H. Zeng, J. Yu, X. Kang & S. Lyu
    Countering JPEG anti-forensics based on noise level estimation
    Science China Information Sciences, Springer Nature, 2017, Vol. 61(3)
    DOI: 10.1007/s11432-016-0426-1
    BibTeX
    @article{Zeng2017a,
     author = {Zeng, Hui and Yu, Jingjing and Kang, Xiangui and Lyu, Siwei},
     title = {Countering JPEG anti-forensics based on noise level estimation},
     journal = {Science China Information Sciences},
     publisher = {Springer Nature},
     year = {2017},
     volume = {61},
     number = {3}}
    
  304. Y. Zhan, Y. Chen, Q. Zhang & X. Kang
    Image Forensics Based on Transfer Learning and Convolutional Neural Network
    Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec 17
    ACM Press, 2017
    DOI: 10.1145/3082031.3083250
    BibTeX
    @inproceedings{Zhan2017,
     author = {Zhan, Yifeng and Chen, Yifang and Zhang, Qiong and Kang, Xiangui},
     title = {Image Forensics Based on Transfer Learning and Convolutional Neural Network},
     booktitle = {Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec 17},
     publisher = {ACM Press},
     year = {2017}}
    
  305. D. Zhang, Q. Li, G. Yang, L. Li & X. Sun
    Detection of image seam carving by using weber local descriptor and local binary patterns
    Journal of Information Security and Applications, Elsevier BV, 2017, Vol. 36, pp. 135-144
    DOI: 10.1016/j.jisa.2017.09.003
    BibTeX
    @article{Zhang2017e,
     author = {Zhang, Dengyong and Li, Qingguo and Yang, Gaobo and Li, Leida and Sun, Xingming},
     title = {Detection of image seam carving by using weber local descriptor and local binary patterns},
     journal = {Journal of Information Security and Applications},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {36},
     pages = {135--144}}
    
  306. D. Zhang, Z. Liang, G. Yang, Q. Li, L. Li & X. Sun
    A robust forgery detection algorithm for object removal by exemplar-based image inpainting
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4829-0
    BibTeX
    @article{Zhang2017c,
     author = {Zhang, Dengyong and Liang, Zaoshan and Yang, Gaobo and Li, Qingguo and Li, Leida and Sun, Xingming},
     title = {A robust forgery detection algorithm for object removal by exemplar-based image inpainting},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  307. D. Zhang, T. Yin, G. Yang, M. Xia, L. Li & X. Sun
    Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies
    Journal of Visual Communication and Image Representation, Elsevier BV, 2017, Vol. 48, pp. 281-291
    DOI: 10.1016/j.jvcir.2017.07.006
    BibTeX
    @article{Zhang2017b,
     author = {Zhang, Dengyong and Yin, Ting and Yang, Gaobo and Xia, Ming and Li, Leida and Sun, Xingming},
     title = {Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {48},
     pages = {281--291}}
    
  308. L.-B. Zhang, F. Peng & M. Long
    Source Camera Identification Based on Guided Image Estimation and Block Weighted Average
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-53465-7_8
    BibTeX
    @article{Zhang2017,
     author = {Zhang, Le-Bing and Peng, Fei and Long, Min},
     title = {Source Camera Identification Based on Guided Image Estimation and Block Weighted Average},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  309. W. Zhang, Z. Yang, S. Niu & J. Wang
    Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-53465-7_12
    BibTeX
    @article{Zhang2017a,
     author = {Zhang, Weiwei and Yang, Zhenghong and Niu, Shaozhang and Wang, Junbin},
     title = {Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  310. Y. Zhang & V.L.L. Thing
    A multi-scale noise-resistant feature adaptation approach for image tampering localization over Facebook
    Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)
    2017, pp. 272-276
    DOI: 10.1109/SIPROCESS.2017.8124547
    BibTeX
    @inproceedings{Zhang2017f,
     author = {Zhang, Y. and Thing, V. L. L.},
     title = {A multi-scale noise-resistant feature adaptation approach for image tampering localization over Facebook},
     booktitle = {Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)},
     year = {2017},
     pages = {272--276}}
    
  311. Y. Zhang, L. Zheng & V.L.L. Thing
    Automated face swapping and its detection
    Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)
    2017, pp. 15-19
    DOI: 10.1109/SIPROCESS.2017.8124497
    BibTeX
    @inproceedings{Zhang2017g,
     author = {Zhang, Y. and Zheng, L. and Thing, V. L. L.},
     title = {Automated face swapping and its detection},
     booktitle = {Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)},
     year = {2017},
     pages = {15--19}}
    
  312. Z. Zhang, D. Wang, C. Wang & X. Zhou
    Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors
    KSII Transactions on Internet and Information Systems, Korean Society for Internet Information (KSII), 2017, Vol. 11(9)
    DOI: 10.3837/tiis.2017.09.021
    BibTeX
    @article{Zhang2017d,
     author = {Zhang, Zhi and Wang, Dongyan and Wang, Chengyou and Zhou, Xiao},
     title = {Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors},
     journal = {KSII Transactions on Internet and Information Systems},
     publisher = {Korean Society for Internet Information (KSII)},
     year = {2017},
     volume = {11},
     number = {9}}
    
  313. F. Zhao, W. Shi, B. Qin & B. Liang
    Image forgery detection using segmentation and swarm intelligent algorithm
    Wuhan University Journal of Natural Sciences, Springer, 2017, Vol. 22(2), pp. 141
    DOI: 10.1007/s11859-017-1227-4
    BibTeX
    @article{Zhao2017,
     author = {Zhao, Fei and Shi, Wenchang and Qin, Bo and Liang, Bin},
     title = {Image forgery detection using segmentation and swarm intelligent algorithm},
     journal = {Wuhan University Journal of Natural Sciences},
     publisher = {Springer},
     year = {2017},
     volume = {22},
     number = {2},
     pages = {141}}
    
  314. J. Zhong, Y. Gan, J. Young, L. Huang & P. Lin
    A new block-based method for copy move forgery detection under image geometric transforms
    Multimedia Tools and Applications, Springer, 2017, Vol. 76(13), pp. 14887
    DOI: 10.1007/s11042-016-4201-9
    BibTeX
    @article{Zhong2017,
     author = {Zhong, Junliu and Gan, Yanfen and Young, Janson and Huang, Lian and Lin, Peiyu},
     title = {A new block-based method for copy move forgery detection under image geometric transforms},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     volume = {76},
     number = {13},
     pages = {14887}}
    
  315. J. Zhou, J. Ni & Y. Rao
    Block-Based Convolutional Neural Network for Image Forgery Detection
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_6
    BibTeX
    @article{Zhou2017,
     author = {Zhou, Jianghong and Ni, Jiangqun and Rao, Yuan},
     title = {Block-Based Convolutional Neural Network for Image Forgery Detection},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  316. Y. Zhu, T.T. Ng, B. Wen, X. Shen & B. Li
    Copy-move forgery detection in the presence of similar but genuine objects
    Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)
    2017, pp. 25-29
    DOI: 10.1109/SIPROCESS.2017.8124499
    BibTeX
    @inproceedings{Zhu2017,
     author = {Zhu, Y. and Ng, T. T. and Wen, B. and Shen, X. and Li, B.},
     title = {Copy-move forgery detection in the presence of similar but genuine objects},
     booktitle = {Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)},
     year = {2017},
     pages = {25--29}}
    
  317. А.А. Варламова & А.В. Кузнецов
    Image Splicing Localization Based on CFA-artifacts Analysis
    Компьютерная оптика, 2017
    BibTeX
    @article{Варламова2017,
     author = {Варламова, Анна Александровна and Кузнецов, Андрей Владимирович},
     title = {Image Splicing Localization Based on CFA-artifacts Analysis},
     journal = {Компьютерная оптика},
     year = {2017}}
    
  318. Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers (Lecture Notes in Computer Science)
    Shi, Y. Q., Kim, H. J., Perez-Gonzalez & F., Liu, F. (ed.)
    Springer, 2017
    BibTeX
    @book{Shi2017,,
     title = {Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers (Lecture Notes in Computer Science)},
     publisher = {Springer},
     year = {2017}}
    


2016

  1. O.M. Al-Qershi & B.E. Khoo
    Information Science and Applications (ICIsa) 2016
    Kim, J. K. & Joukov, N. (ed.)
    Lecture Notes in Electrical Engineering
    Chapter Copy-Move Forgery Detection Using on Locality Sensitive Hashing and k-means Clustering
    Springer Singapore, 2016, pp. 663-672
    DOI: 10.1007/978-981-10-0557-2_65
    BibTeX
    @inbook{Al-Qershi2016,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Information Science and Applications (ICIsa) 2016},
     booktitle = {Lecture Notes in Electrical Engineering},
     publisher = {Springer Singapore},
     year = {2016},
     pages = {663--672}}
    
  2. J. Abbasi Aghamaleki & A. Behrad
    Malicious Inter-frame Video Tampering Detection in Mpeg Videos Using Time and Spatial Domain Analysis of Quantization Effects
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4004-z
    BibTeX
    @article{AbbasiAghamaleki2016,
     author = {Abbasi Aghamaleki, Javad and Behrad, Alireza},
     title = {Malicious Inter-frame Video Tampering Detection in Mpeg Videos Using Time and Spatial Domain Analysis of Quantization Effects},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  3. S. Abramova & R. Böhme
    Detecting Copy--move Forgeries in Scanned Text Documents
    Digital-Forensics and Watermarking
    Springer Science + Business Media, 2016, pp. 3-18
    DOI: 10.1007/978-3-662-43886-2_1
    BibTeX
    @incollection{Abramova2016,
     author = {Abramova, Svetlana and Böhme, Rainer},
     title = {Detecting Copy--move Forgeries in Scanned Text Documents},
     booktitle = {Digital-Forensics and Watermarking},
     publisher = {Springer Science + Business Media},
     year = {2016},
     pages = {3--18}}
    
  4. N. Afshin, F. Razzazi & M.S. Moin
    A Dictionary Based Approach to JPEG Anti-forensics
    Proc. IEEE 8th Int. Conf. Intelligent Systems (IS)
    2016, pp. 778-783
    DOI: 10.1109/IS.2016.7737401
    BibTeX
    @inproceedings{Afshin2016,
     author = {Afshin, N. and Razzazi, F. and Moin, M. S.},
     title = {A Dictionary Based Approach to JPEG Anti-forensics},
     booktitle = {Proc. IEEE 8th Int. Conf. Intelligent Systems (IS)},
     year = {2016},
     pages = {778--783}}
    
  5. S. Agarwal & S. Chand
    Texture Operator Based Image Splicing Detection Hybrid Technique
    Proc. Second Int. Conf. Computational Intelligence Communication Technology (CICT)
    2016, pp. 116-120
    DOI: 10.1109/CICT.2016.31
    BibTeX
    @inproceedings{Agarwal2016,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Texture Operator Based Image Splicing Detection Hybrid Technique},
     booktitle = {Proc. Second Int. Conf. Computational Intelligence Communication Technology (CICT)},
     year = {2016},
     pages = {116--120}}
    
  6. S. Agarwal & S. Chand
    Image tampering detection using local phase based operator
    Proc. Int. Conf. Emerging Trends in Electrical Electronics Sustainable Energy Systems (ICETEESES)
    2016, pp. 355-360
    DOI: 10.1109/ICETEESES.2016.7581409
    BibTeX
    @inproceedings{Agarwal2016a,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Image tampering detection using local phase based operator},
     booktitle = {Proc. Int. Conf. Emerging Trends in Electrical Electronics Sustainable Energy Systems (ICETEESES)},
     year = {2016},
     pages = {355--360}}
    
  7. V. Agarwal & V. Mane
    Reflective SIFT for improving the detection of copy-move image forgery
    Proc. Second Int. Conf. Research in Computational Intelligence and Communication Networks (ICRCICN)
    2016, pp. 84-88
    DOI: 10.1109/ICRCICN.2016.7813636
    BibTeX
    @inproceedings{Agarwal2016b,
     author = {Agarwal, V. and Mane, V.},
     title = {Reflective SIFT for improving the detection of copy-move image forgery},
     booktitle = {Proc. Second Int. Conf. Research in Computational Intelligence and Communication Networks (ICRCICN)},
     year = {2016},
     pages = {84--88}}
    
  8. Z. Akhtar & E. Khan
    Identifying High Quality JPEG Compressed Images through Exhaustive Recompression Technique
    Proc. Communications and Informatics (ICACCI) 2016 Int. Conf. Advances in Computing
    2016, pp. 652-656
    DOI: 10.1109/ICACCI.2016.7732120
    BibTeX
    @inproceedings{Akhtar2016,
     author = {Akhtar, Z. and Khan, E.},
     title = {Identifying High Quality JPEG Compressed Images through Exhaustive Recompression Technique},
     booktitle = {Proc. Communications and Informatics (ICACCI) 2016 Int. Conf. Advances in Computing},
     year = {2016},
     pages = {652--656}}
    
  9. K.R. Akshatha, H. Anitha, A.K. Karunakar, U. Raghavendra & D. Shetty
    Source Camera Identification Using Noise Residual
    Proc. of the International conference on Recent Trends in Electronics, Information & Communication Technology, 20/05/2016, SVCE Bangalore
    2016
    BibTeX
    @inproceedings{Akshatha2016,
     author = {Akshatha, K. R. and Anitha, H. and Karunakar, A. K. and Raghavendra, U. and Shetty, Dinesh},
     title = {Source Camera Identification Using Noise Residual},
     booktitle = {Proc. of the International conference on Recent Trends in Electronics, Information & Communication Technology, 20/05/2016, SVCE Bangalore},
     year = {2016}}
    
  10. K.R. Akshatha, A.K. Karunakar, H. Anitha, U. Raghavendra & D. Shetty
    Digital Camera Identification Using PRNU: A Feature Based Approach
    Digital Investigation, Elsevier BV, 2016
    DOI: 10.1016/j.diin.2016.10.002
    BibTeX
    @article{Akshatha2016a,
     author = {Akshatha, K. R. and Karunakar, A. K. and Anitha, H. and Raghavendra, U. and Shetty, Dinesh},
     title = {Digital Camera Identification Using PRNU: A Feature Based Approach},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2016}}
    
  11. A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad, G. Bebis & H. Mathkour
    Passive Detection of Image Forgery Using DCT and Local Binary Pattern
    Signal, Image and Video Processing, 2016, pp. 1-8
    DOI: 10.1007/s11760-016-0899-0
    BibTeX
    @article{Alahmadi2016,
     author = {Alahmadi, Amani and Hussain, Muhammad and Aboalsamh, Hatim and Muhammad, Ghulam and Bebis, George and Mathkour, Hassan},
     title = {Passive Detection of Image Forgery Using DCT and Local Binary Pattern},
     journal = {Signal, Image and Video Processing},
     year = {2016},
     pages = {1--8}}
    
  12. L. Alamro & N. Yusoff
    Copy-move Forgery Detection in Digital Image
    AIP Conference Proceedings, 2016, Vol. 1761(1)
    DOI: 10.1063/1.4960855
    BibTeX
    @article{Alamro2016,
     author = {Alamro, Loai and Yusoff, Nooraini},
     title = {Copy-move Forgery Detection in Digital Image},
     journal = {AIP Conference Proceedings},
     year = {2016},
     volume = {1761},
     number = {1}}
    
  13. M. Al-Ani & F. Khelifi
    On the Sensor Pattern Noise Estimation in Image Forensics: A Systematic Empirical Evaluation
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2640938
    BibTeX
    @article{Al-Ani2016,
     author = {Al-Ani, M. and Khelifi, F.},
     title = {On the Sensor Pattern Noise Estimation in Image Forensics: A Systematic Empirical Evaluation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  14. M.M. Al-Hammadi & S. Emmanuel
    Improving SURF Based Copy-Move Forgery Detection Using Super Resolution
    Proc. IEEE Int. Symp. Multimedia (ISM)
    2016, pp. 341-344
    DOI: 10.1109/ISM.2016.0075
    BibTeX
    @inproceedings{Al-Hammadi2016,
     author = {Al-Hammadi, M. M. and Emmanuel, S.},
     title = {Improving SURF Based Copy-Move Forgery Detection Using Super Resolution},
     booktitle = {Proc. IEEE Int. Symp. Multimedia (ISM)},
     year = {2016},
     pages = {341--344}}
    
  15. M. Alhussein
    Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine
    Proc. UKSim-AMSS 18th Int. Conf. Computer Modelling and Simulation (UKSim)
    2016, pp. 196-199
    DOI: 10.1109/UKSim.2016.39
    BibTeX
    @inproceedings{Alhussein2016,
     author = {Alhussein, M.},
     title = {Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine},
     booktitle = {Proc. UKSim-AMSS 18th Int. Conf. Computer Modelling and Simulation (UKSim)},
     year = {2016},
     pages = {196--199}}
    
  16. M.H. Alkawaz, G. Sulong, T. Saba & A. Rehman
    Detection of copy-move image forgery based on discrete cosine transform
    Neural Computing and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s00521-016-2663-3
    BibTeX
    @article{Alkawaz2016,
     author = {Alkawaz, Mohammed Hazim and Sulong, Ghazali and Saba, Tanzila and Rehman, Amjad},
     title = {Detection of copy-move image forgery based on discrete cosine transform},
     journal = {Neural Computing and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  17. M. Almeida, P.L. Correia & P.K. Larsen
    Biofov -- an Open Platform for Forensic Video Analysis and Biometric Data Extraction
    Proc. 4th Int. Conf. Biometrics and Forensics (IWBF)
    2016, pp. 1-6
    DOI: 10.1109/IWBF.2016.7449693
    BibTeX
    @inproceedings{Almeida2016,
     author = {Almeida, M. and Correia, P. L. and Larsen, P. K.},
     title = {Biofov -- an Open Platform for Forensic Video Analysis and Biometric Data Extraction},
     booktitle = {Proc. 4th Int. Conf. Biometrics and Forensics (IWBF)},
     year = {2016},
     pages = {1--6}}
    
  18. O.M. Al-Qershi & B.E. Khoo
    Copy-move Forgery Detection Using on Locality Sensitive Hashing and K-means Clustering
    Information Science and Applications (ICISA) 2016
    Springer, 2016
    DOI: 10.1007/978-981-10-0557-2_65
    BibTeX
    @incollection{Al-Qershi2016b,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Copy-move Forgery Detection Using on Locality Sensitive Hashing and K-means Clustering},
     booktitle = {Information Science and Applications (ICISA) 2016},
     publisher = {Springer},
     year = {2016}}
    
  19. I. Amerini, R. Becarelli, F. Brancati, R. Caldelli, G. Giunta & M.L. Itria
    Media Trustworthiness Verification and Event Assessment through an Integrated Framework: A Case-study
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3303-8
    BibTeX
    @article{Amerini2016,
     author = {Amerini, Irene and Becarelli, Rudy and Brancati, Francesco and Caldelli, Roberto and Giunta, Gabriele and Itria, Massimiliano L.},
     title = {Media Trustworthiness Verification and Event Assessment through an Integrated Framework: A Case-study},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  20. S. Amneet
    Feature Development Based on CFA Artifacts for Image Forgery Detection
    Thapar University, Thapar University, 2016
    BibTeX
    @mastersthesis{Amneet2016,
     author = {Amneet, Singh},
     title = {Feature Development Based on CFA Artifacts for Image Forgery Detection},
     school = {Thapar University},
     year = {2016}}
    
  21. B. Anderson-Sackaney & A. Abdel-Dayem
    Evaluation of Sensor Pattern Noise Estimators for Source Camera Identification
    International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2016, Vol. 10(12)
    BibTeX
    @article{Anderson-Sackaney2016,
     author = {Anderson-Sackaney, Benjamin and Abdel-Dayem, Amr},
     title = {Evaluation of Sensor Pattern Noise Estimators for Source Camera Identification},
     journal = {International Journal of Computer, Electrical, Automation, Control and Information Engineering},
     year = {2016},
     volume = {10},
     number = {12}}
    
  22. K. Asghar, Z. Habib & M. Hussain
    Copy-move and Splicing Image Forgery Detection and Localization Techniques: A Review
    Australian Journal of Forensic Sciences, 2016, Vol. 0(0), pp. 1-27
    DOI: 10.1080/00450618.2016.1153711
    BibTeX
    @article{Asghar2016,
     author = {Asghar, Khurshid and Habib, Zulfiqar and Hussain, Muhammad},
     title = {Copy-move and Splicing Image Forgery Detection and Localization Techniques: A Review},
     journal = {Australian Journal of Forensic Sciences},
     year = {2016},
     volume = {0},
     number = {0},
     pages = {1--27}}
    
  23. S. Aymaz, Ş. Aymaz & G. Ulutaş
    Detection of copy move forgery using Legendre Moments
    Proc. 24th Signal Processing and Communication Application Conf. (SIU)
    2016, pp. 1125-1128
    DOI: 10.1109/SIU.2016.7495942
    BibTeX
    @inproceedings{Aymaz2016,
     author = {Aymaz, S. and Aymaz, Ş. and Ulutaş, G.},
     title = {Detection of copy move forgery using Legendre Moments},
     booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)},
     year = {2016},
     pages = {1125--1128}}
    
  24. S. Azarian-Pour, M. Babaie-Zadeh & A.R. Sadri
    An automatic JPEG ghost detection approach for digital image forensics
    Proc. 24th Iranian Conf. Electrical Engineering (ICEE)
    2016, pp. 1645-1649
    DOI: 10.1109/IranianCEE.2016.7585785
    BibTeX
    @inproceedings{Azarian-Pour2016,
     author = {Azarian-Pour, S. and Babaie-Zadeh, M. and Sadri, A. R.},
     title = {An automatic JPEG ghost detection approach for digital image forensics},
     booktitle = {Proc. 24th Iranian Conf. Electrical Engineering (ICEE)},
     year = {2016},
     pages = {1645--1649}}
    
  25. S. Azarian-Pour, M. Babaie-Zadeh & A.R. Sadri
    An automatic JPEG ghost detection approach for digital image forensics
    Proc. 24th Iranian Conf. Electrical Engineering (ICEE)
    2016, pp. 1645-1649
    DOI: 10.1109/IranianCEE.2016.7585785
    BibTeX
    @inproceedings{Azarian-Pour2016a,
     author = {Azarian-Pour, S. and Babaie-Zadeh, M. and Sadri, A. R.},
     title = {An automatic JPEG ghost detection approach for digital image forensics},
     booktitle = {Proc. 24th Iranian Conf. Electrical Engineering (ICEE)},
     year = {2016},
     pages = {1645--1649}}
    
  26. M.A. Bagiwa, A.W.A. Wahab, M.Y.I. Idris, S. Khan & K.-K.R. Choo
    Chroma Key Background Detection for Digital Video Using Statistical Correlation of Blurring Artifact
    Digital Investigation, Elsevier BV, 2016, Vol. 19, pp. 29-43
    DOI: 10.1016/j.diin.2016.09.001
    BibTeX
    @article{Bagiwa2016,
     author = {Bagiwa, Mustapha Aminu and Wahab, Ainuddin Wahid Abdul and Idris, Mohd Yamani Idna and Khan, Suleman and Choo, Kim-Kwang Raymond},
     title = {Chroma Key Background Detection for Digital Video Using Statistical Correlation of Blurring Artifact},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {19},
     pages = {29--43}}
    
  27. Bansal
    A novel Analysis of Image Forgery Detection Using SVM
    2016
    BibTeX
    @article{Bansal2016,
     author = {Bansal},
     title = {A novel Analysis of Image Forgery Detection Using SVM},
     year = {2016}}
    
  28. M. Barni, Z. Chen & B. Tondi
    Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823902
    BibTeX
    @inproceedings{Barni2016,
     author = {Barni, M. and Chen, Z. and Tondi, B.},
     title = {Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  29. L. Baroffio, L. Bondi, P. Bestagini & S. Tubaro
    Camera Identification with Deep Convolutional Networks
    arXiv preprint arXiv:1603.01068, 2016
    DOI: 10.1016/j.image.2016.05.007
    BibTeX
    @article{Baroffio2016,
     author = {Baroffio, Luca and Bondi, Luca and Bestagini, Paolo and Tubaro, Stefano},
     title = {Camera Identification with Deep Convolutional Networks},
     journal = {arXiv preprint arXiv:1603.01068},
     year = {2016}}
    
  30. A. Baumy, N.F. Soiliman, M. Abdalla & F.A. El-Samie
    A Discriminative Statistical Model for Digital Image Forgery Detection
    I.J. Engineering and Manufacturing, 2016
    DOI: 10.5815/ijem.
    BibTeX
    @article{Baumy2016,
     author = {Baumy, Amira and Soiliman, Naglaa. F. and Abdalla, Mahmoud and El-Samie, Fathi Abd},
     title = {A Discriminative Statistical Model for Digital Image Forgery Detection},
     journal = {I.J. Engineering and Manufacturing},
     year = {2016}}
    
  31. B. Bayar & M.C. Stamm
    A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer
    Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
    ACM, 2016, pp. 5-10
    DOI: 10.1145/2909827.2930786
    BibTeX
    @inproceedings{Bayar2016,
     author = {Bayar, Belhassen and Stamm, Matthew C.},
     title = {A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer},
     booktitle = {Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security},
     publisher = {ACM},
     year = {2016},
     pages = {5--10}}
    
  32. E. Baykal, B. Ustubioglu & G. Ulutas
    Image forgery detection based on SIFT and k-means++
    Proc. 39th Int. Conf. Telecommunications and Signal Processing (TSP)
    2016, pp. 474-477
    DOI: 10.1109/TSP.2016.7760924
    BibTeX
    @inproceedings{Baykal2016,
     author = {Baykal, E. and Ustubioglu, B. and Ulutas, G.},
     title = {Image forgery detection based on SIFT and k-means++},
     booktitle = {Proc. 39th Int. Conf. Telecommunications and Signal Processing (TSP)},
     year = {2016},
     pages = {474--477}}
    
  33. C.E.H. Berger & K. Slooten
    The LR does not exist
    Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 388-391
    DOI: 10.1016/j.scijus.2016.06.005
    BibTeX
    @article{Berger2016,
     author = {Berger, Charles E. H. and Slooten, Klaas},
     title = {The LR does not exist},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {56},
     number = {5},
     pages = {388--391}}
    
  34. F. Bertini, R. Sharma, A. Iannı, D. Montesi & M.A. Zamboni
    Social Media Investigations Using Shared Photos
    2016
    DOI: 10.1145/2790755.2790765
    BibTeX
    @electronic{Bertini2016,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannı, Andrea and Montesi, Danilo and Zamboni, Mura Anteo},
     title = {Social Media Investigations Using Shared Photos},
     year = {2016}}
    
  35. P. Bestagini, S. Milani, M. Tagliasacchi & S. Tubaro
    Codec and Gop Identification in Double Compressed Videos
    IEEE Transactions on Image Processing, 2016, Vol. 25(5), pp. 2298-2310
    DOI: 10.1109/TIP.2016.2541960
    BibTeX
    @article{Bestagini2016,
     author = {Bestagini, P. and Milani, S. and Tagliasacchi, M. and Tubaro, S.},
     title = {Codec and Gop Identification in Double Compressed Videos},
     journal = {IEEE Transactions on Image Processing},
     year = {2016},
     volume = {25},
     number = {5},
     pages = {2298--2310}}
    
  36. P. Bestagini, M. Tagliasacchi & S. Tubaro
    Image Phylogeny Tree Reconstruction Based on Region Selection
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2059-2063
    DOI: 10.1109/ICASSP.2016.7472039
    BibTeX
    @inproceedings{Bestagini2016a,
     author = {Bestagini, P. and Tagliasacchi, M. and Tubaro, S.},
     title = {Image Phylogeny Tree Reconstruction Based on Region Selection},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2059--2063}}
    
  37. A. Bharati, R. Singh, M. Vatsa & K. Bowyer
    Detecting Facial Retouching Using Supervised Deep Learning
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TIFS.2016.2561898
    BibTeX
    @article{Bharati2016,
     author = {Bharati, A. and Singh, R. and Vatsa, M. and Bowyer, K.},
     title = {Detecting Facial Retouching Using Supervised Deep Learning},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  38. C.N. Bharti & P. Tandel
    A Survey of Image Forgery Detection Techniques
    Proc. Signal Processing and Networking (WiSPNET) 2016 Int. Conf. Wireless Communications
    2016, pp. 877-881
    DOI: 10.1109/WiSPNET.2016.7566257
    BibTeX
    @inproceedings{Bharti2016,
     author = {Bharti, C. N. and Tandel, P.},
     title = {A Survey of Image Forgery Detection Techniques},
     booktitle = {Proc. Signal Processing and Networking (WiSPNET) 2016 Int. Conf. Wireless Communications},
     year = {2016},
     pages = {877--881}}
    
  39. G. Bhartiya & A.S. Jalal
    Forgery Detection Using Feature-clustering in Recompressed JPEG Images
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3964-3
    BibTeX
    @article{Bhartiya2016,
     author = {Bhartiya, Gunjan and Jalal, Anand Singh},
     title = {Forgery Detection Using Feature-clustering in Recompressed JPEG Images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  40. X. Bi, C.M. Pun & X.C. Yuan
    Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection
    Proc. IEEE Trustcom/BigDataSE/ISPA
    2016, pp. 952-956
    DOI: 10.1109/TrustCom.2016.0161
    BibTeX
    @inproceedings{Bi2016a,
     author = {Bi, X. and Pun, C. M. and Yuan, X. C.},
     title = {Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection},
     booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA},
     year = {2016},
     pages = {952--956}}
    
  41. X. Bi, C.-M. Pun & X.-C. Yuan
    Multi-scale feature extraction and adaptive matching for copy-move forgery detection
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4276-3
    BibTeX
    @article{Bi2016,
     author = {Bi, XiuLi and Pun, Chi-Man and Yuan, Xiao-Chen},
     title = {Multi-scale feature extraction and adaptive matching for copy-move forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  42. A. Biedermann, S. Bozza, F. Taroni & C. Aitken
    Reframing the debate: A question of probability, not of likelihood ratio
    Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 392-396
    DOI: 10.1016/j.scijus.2016.05.008
    BibTeX
    @article{Biedermann2016,
     author = {Biedermann, A. and Bozza, S. and Taroni, F. and Aitken, C.},
     title = {Reframing the debate: A question of probability, not of likelihood ratio},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {56},
     number = {5},
     pages = {392--396}}
    
  43. V.A. Binson, N.M. Thomas, S. Thoams, A. Augustine & K.S. Sivakumar
    An advance to cloning detection in digital forensics investigations
    Proc. Int. Conf. Emerging Technological Trends (ICETT)
    2016, pp. 1-5
    DOI: 10.1109/ICETT.2016.7873743
    BibTeX
    @inproceedings{Binson2016,
     author = {Binson, V. A. and Thomas, N. M. and Thoams, S. and Augustine, A. and Sivakumar, K. S.},
     title = {An advance to cloning detection in digital forensics investigations},
     booktitle = {Proc. Int. Conf. Emerging Technological Trends (ICETT)},
     year = {2016},
     pages = {1--5}}
    
  44. G.K. Birajdar & V.H. Mankar
    Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier
    Satapathy, C. S., Joshi, A., Modi, N. & Pathak, N. (ed.)
    Proceedings of International Conference on ICT for Sustainable Development
    Chapter Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier
    Springer Singapore, 2016, pp. 447-455
    DOI: 10.1007/978-981-10-0129-1_47
    BibTeX
    @inbook{Birajdar2016,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier},
     booktitle = {Proceedings of International Conference on ICT for Sustainable Development},
     publisher = {Springer Singapore},
     year = {2016},
     pages = {447--455}}
    
  45. P.M. Birajdar & N.G. Dharashive
    Digital Image Forgery Identification Using Motion Blur Variations as Clue
    KHOJ – Journal of Indian Management Research and Practices, 2016
    BibTeX
    @article{Birajdar2016a,
     author = {Birajdar, P. M. and Dharashive, N. G.},
     title = {Digital Image Forgery Identification Using Motion Blur Variations as Clue},
     journal = {KHOJ – Journal of Indian Management Research and Practices},
     year = {2016}}
    
  46. R. Böhme & M. Kirchner
    Media Forensics
    Information Hiding
    Chapter Chapter 9
    Artech House - Boston, 2016, pp. 231259
    BibTeX
    @inbook{Boehme2016,
     author = {Böhme, Rainer and Kirchner, Matthias},
     title = {Media Forensics},
     booktitle = {Information Hiding},
     publisher = {Artech House - Boston},
     year = {2016},
     pages = {231259}}
    
  47. A. Boz & H.Ş. Bilge
    Copy-move image forgery detection based on LBP and DCT
    Proc. 24th Signal Processing and Communication Application Conf. (SIU)
    2016, pp. 561-564
    DOI: 10.1109/SIU.2016.7495802
    BibTeX
    @inproceedings{Boz2016,
     author = {Boz, A. and Bilge, H. Ş.},
     title = {Copy-move image forgery detection based on LBP and DCT},
     booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)},
     year = {2016},
     pages = {561--564}}
    
  48. A. Brock, T. Lim, J.M. Ritchie & N. Weston
    Neural Photo Editing with Introspective Adversarial Networks
    arXiv, 2016
    BibTeX
    @article{Brock2016,
     author = {Brock, Andrew and Lim, Theodore and Ritchie, J. M. and Weston, Nick},
     title = {Neural Photo Editing with Introspective Adversarial Networks},
     journal = {arXiv},
     year = {2016}}
    
  49. M. Bürker & H.P.A. Lensch
    Scene-based Non-uniformity Correction with Readout Noise Compensation
    Image and Video Technology, Springer, 2016
    DOI: 10.1007/978-3-319-29451-3_26
    BibTeX
    @article{Buerker2016,
     author = {Bürker, Martin and Lensch, Hendrik P. A.},
     title = {Scene-based Non-uniformity Correction with Readout Noise Compensation},
     journal = {Image and Video Technology},
     publisher = {Springer},
     year = {2016}}
    
  50. T. Carvalho, F.A. Faria, H. Pedrini, R. da S. Torres & A. Rocha
    Illuminant-based Transformed Spaces for Image Forensics
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(4), pp. 720-733
    DOI: 10.1109/TIFS.2015.2506548
    BibTeX
    @article{Carvalho2016,
     author = {Carvalho, T. and Faria, F. A. and Pedrini, H. and da S. Torres, R. and Rocha, A.},
     title = {Illuminant-based Transformed Spaces for Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {4},
     pages = {720--733}}
    
  51. G. Cattaneo, G. Roscigno & A. Bruno
    Using PNU-based Techniques to Detect Alien Frames in Videos
    Advanced Concepts for Intelligent Vision Systems, Springer, 2016
    DOI: 10.1007/978-3-319-48680-2_64
    BibTeX
    @article{Cattaneo2016,
     author = {Cattaneo, Giuseppe and Roscigno, Gianluca and Bruno, Andrea},
     title = {Using PNU-based Techniques to Detect Alien Frames in Videos},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2016}}
    
  52. S. Chakraborty & M. Kirchner
    Compression Forensics beyond the First Significant Digit
    2016
    DOI: 10.1109/wifs.2015.7368578
    BibTeX
    @electronic{Chakraborty2016,
     author = {Chakraborty, Sujoy and Kirchner, Matthias},
     title = {Compression Forensics beyond the First Significant Digit},
     year = {2016}}
    
  53. D. Chauhan, D. Kasat, S. Jain & V. Thakare
    Survey on Keypoint Based Copy-move Forgery Detection Methods on Image
    Procedia Computer Science, Elsevier BV, 2016, Vol. 85, pp. 206-212
    DOI: 10.1016/j.procs.2016.05.213
    BibTeX
    @article{Chauhan2016,
     author = {Chauhan, Devanshi and Kasat, Dipali and Jain, Sanjeev and Thakare, Vilas},
     title = {Survey on Keypoint Based Copy-move Forgery Detection Methods on Image},
     journal = {Procedia Computer Science},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {85},
     pages = {206--212}}
    
  54. C.-C. Chen, H. Wang & C.-S. Lin
    An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4179-3
    BibTeX
    @article{Chen2016c,
     author = {Chen, Chien-Chang and Wang, Han and Lin, Cheng-Shian},
     title = {An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  55. H.-p. Chen, X.-J. Shen & J.-W. Long
    Histogram-based Colour Image Fuzzy Clustering Algorithm
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(18), pp. 11417
    DOI: 10.1007/s11042-015-2860-6
    BibTeX
    @article{Chen2016a,
     author = {Chen, Hai-peng and Shen, Xuan-Jing and Long, Jian-Wu},
     title = {Histogram-based Colour Image Fuzzy Clustering Algorithm},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {18},
     pages = {11417}}
    
  56. J. Chen, X. Jiang, T. Sun, P. He & S. Wang
    Detecting Double MPEG Compression with the Same Quantiser Scale Based on Mbm Feature
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2064-2068
    DOI: 10.1109/ICASSP.2016.7472040
    BibTeX
    @inproceedings{Chen2016,
     author = {Chen, J. and Jiang, X. and Sun, T. and He, P. and Wang, S.},
     title = {Detecting Double MPEG Compression with the Same Quantiser Scale Based on Mbm Feature},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2064--2068}}
    
  57. S. Chen, S. Tan, B. Li & J. Huang
    Automatic Detection of Object-Based Forgery in Advanced Video
    IEEE Transactions on Circuits and Systems for Video Technology, 2016, Vol. 26(11), pp. 2138-2151
    DOI: 10.1109/TCSVT.2015.2473436
    BibTeX
    @article{Chen2016b,
     author = {Chen, S. and Tan, S. and Li, B. and Huang, J.},
     title = {Automatic Detection of Object-Based Forgery in Advanced Video},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     year = {2016},
     volume = {26},
     number = {11},
     pages = {2138--2151}}
    
  58. X. Chu, Y. Chen & K.J.R. Liu
    An information theoretic framework for order of operations forensics
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2049-2053
    DOI: 10.1109/ICASSP.2016.7472037
    BibTeX
    @inproceedings{Chu2016,
     author = {Chu, X. and Chen, Y. and Liu, K. J. R.},
     title = {An information theoretic framework for order of operations forensics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2049--2053}}
    
  59. X. Chu, Y. Chen & K.J.R. Liu
    Detectability of the Order of Operations: An Information Theoretic Approach
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(4), pp. 823-836
    DOI: 10.1109/TIFS.2015.2510958
    BibTeX
    @article{Chu2016a,
     author = {Chu, X. and Chen, Y. and Liu, K. J. R.},
     title = {Detectability of the Order of Operations: An Information Theoretic Approach},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {4},
     pages = {823--836}}
    
  60. D. Cozzolino & L. Verdoliva
    Single-image splicing localization through autoencoder-based anomaly detection
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823921
    BibTeX
    @inproceedings{Cozzolino2016,
     author = {Cozzolino, D. and Verdoliva, L.},
     title = {Single-image splicing localization through autoencoder-based anomaly detection},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  61. R. Cristin & V.C. Raj
    Exposing Image Manipulation with Curved Surface Reflection
    Indian Journal of Science and Technology, Indian Society for Education and Environment, 2016, Vol. 9(38)
    DOI: 10.17485/ijst/2016/v9i38/99998
    BibTeX
    @article{Cristin2016,
     author = {Cristin, R. and Raj, V. Cyril},
     title = {Exposing Image Manipulation with Curved Surface Reflection},
     journal = {Indian Journal of Science and Technology},
     publisher = {Indian Society for Education and Environment},
     year = {2016},
     volume = {9},
     number = {38}}
    
  62. N. Dalmia & M. Okade
    First Quantization Matrix Estimation for Double Compressed JPEG Images Utilizing Novel DCT Histogram Selection Strategy
    Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing - ICVGIP '16
    ACM, 2016, pp. 271-278
    DOI: 10.1145/3009977.3010067
    BibTeX
    @inproceedings{Dalmia2016,
     author = {Dalmia, Nandita and Okade, Manish},
     title = {First Quantization Matrix Estimation for Double Compressed JPEG Images Utilizing Novel DCT Histogram Selection Strategy},
     booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing - ICVGIP '16},
     publisher = {ACM},
     year = {2016},
     pages = {271--278}}
    
  63. N. Dalmia & M. Okade
    A novel technique for misalignment parameter estimation in double compressed JPEG images
    Proc. Visual Communications and Image Processing (VCIP)
    2016, pp. 1-4
    DOI: 10.1109/VCIP.2016.7805446
    BibTeX
    @inproceedings{Dalmia2016a,
     author = {Dalmia, N. and Okade, M.},
     title = {A novel technique for misalignment parameter estimation in double compressed JPEG images},
     booktitle = {Proc. Visual Communications and Image Processing (VCIP)},
     year = {2016},
     pages = {1--4}}
    
  64. A. Das, A. Medhi, R.K. Karsh & R.H. Laskar
    Image splicing detection using Gaussian or defocus blur
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 1237-1241
    DOI: 10.1109/ICCSP.2016.7754350
    BibTeX
    @inproceedings{Das2016,
     author = {Das, A. and Medhi, A. and Karsh, R. K. and Laskar, R. H.},
     title = {Image splicing detection using Gaussian or defocus blur},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {1237--1241}}
    
  65. R. Davarzani, S. Mozaffari & K. Yaghmaie
    Perceptual Image Hashing Using Center-symmetric Local Binary Patterns
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(8), pp. 4639
    DOI: 10.1007/s11042-015-2496-6
    BibTeX
    @article{Davarzani2016,
     author = {Davarzani, Reza and Mozaffari, Saeed and Yaghmaie, Khashayar},
     title = {Perceptual Image Hashing Using Center-symmetric Local Binary Patterns},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {8},
     pages = {4639}}
    
  66. J. De Bock & P. De Smet
    Jpgcarve: An Advanced Tool for Automated Recovery of Fragmented JPEG Files
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 19-34
    DOI: 10.1109/TIFS.2015.2475238
    BibTeX
    @article{DeBock2016,
     author = {De Bock, J. and De Smet, P.},
     title = {Jpgcarve: An Advanced Tool for Automated Recovery of Fragmented JPEG Files},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {19--34}}
    
  67. L. Debiasi & A. Uhl
    Comparison of PRNU Enhancement Techniques to Generate PRNU Fingerprints for Biometric Source Sensor Attribution
    2016 4th International Conference on Biometrics and Forensics (IWBF)
    2016, pp. 1-6
    DOI: 10.1109/IWBF.2016.7449674
    BibTeX
    @inproceedings{Debiasi2016,
     author = {Debiasi, L. and Uhl, A.},
     title = {Comparison of PRNU Enhancement Techniques to Generate PRNU Fingerprints for Biometric Source Sensor Attribution},
     booktitle = {2016 4th International Conference on Biometrics and Forensics (IWBF)},
     year = {2016},
     pages = {1--6}}
    
  68. F. Ding, W. Dong, G. Zhu & Y.-Q. Shi
    An Advanced Texture Analysis Method for Image Sharpening Detection
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_7
    BibTeX
    @article{Ding2016,
     author = {Ding, Feng and Dong, Weiqiang and Zhu, Guopu and Shi, Yun-Qing},
     title = {An Advanced Texture Analysis Method for Image Sharpening Detection},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  69. A. Dixit & R.K. Gupta
    Copy-move Image Forgery Detection Using Frequency-based Techniques: A Review
    International Journal of Signal Processing, Image Processing and Pattern Recognition, Science and Engineering Research Support Society, 2016, Vol. 9(3), pp. 71-88
    DOI: 10.14257/ijsip.2016.9.3.07
    BibTeX
    @article{Dixit2016,
     author = {Dixit, Anuja and Gupta, R. K.},
     title = {Copy-move Image Forgery Detection Using Frequency-based Techniques: A Review},
     journal = {International Journal of Signal Processing, Image Processing and Pattern Recognition},
     publisher = {Science and Engineering Research Support Society},
     year = {2016},
     volume = {9},
     number = {3},
     pages = {71--88}}
    
  70. R. Dixit & R. Naskar
    Dywt Based Copy-move Forgery Detection with Improved Detection Accuracy
    Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)
    2016, pp. 133-138
    DOI: 10.1109/SPIN.2016.7566676
    BibTeX
    @inproceedings{Dixit2016a,
     author = {Dixit, R. and Naskar, R.},
     title = {Dywt Based Copy-move Forgery Detection with Improved Detection Accuracy},
     booktitle = {Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)},
     year = {2016},
     pages = {133--138}}
    
  71. J. Dong, L. Chen, J. Tian & X. Xu
    A Novel Image Splicing Detection Method Based on the Inconsistency of Image Noise
    Proc. IEEE 11th Conf. Industrial Electronics and Applications (ICIEA)
    2016, pp. 560-563
    DOI: 10.1109/ICIEA.2016.7603647
    BibTeX
    @inproceedings{Dong2016,
     author = {Dong, J. and Chen, L. and Tian, J. and Xu, X.},
     title = {A Novel Image Splicing Detection Method Based on the Inconsistency of Image Noise},
     booktitle = {Proc. IEEE 11th Conf. Industrial Electronics and Applications (ICIEA)},
     year = {2016},
     pages = {560--563}}
    
  72. W. Dong & J. Wang
    JPEG Compression Forensics against Resizing
    Proc. IEEE Trustcom/BigDataSE/ISPA
    2016, pp. 1001-1007
    DOI: 10.1109/TrustCom.2016.0168
    BibTeX
    @inproceedings{Dong2016a,
     author = {Dong, W. and Wang, J.},
     title = {JPEG Compression Forensics against Resizing},
     booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA},
     year = {2016},
     pages = {1001--1007}}
    
  73. S. Dua, J. Singh & H. Parthasarathy
    Rotation angle estimation of an image using least square method
    Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)
    2016, pp. 296-300
    DOI: 10.1109/SPIN.2016.7566707
    BibTeX
    @inproceedings{Dua2016,
     author = {Dua, S. and Singh, J. and Parthasarathy, H.},
     title = {Rotation angle estimation of an image using least square method},
     booktitle = {Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)},
     year = {2016},
     pages = {296--300}}
    
  74. Y. Duan, D. Bouslimi, G. Yang, H. Shu & G. Coatrieux
    Computed Tomography Image Origin Identification Based on Original Sensor Pattern Noise and 3D Image Reconstruction Algorithm Footprints
    IEEE Journal of Biomedical and Health Informatics, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/JBHI.2016.2575398
    BibTeX
    @article{Duan2016,
     author = {Duan, Y. and Bouslimi, D. and Yang, G. and Shu, H. and Coatrieux, G.},
     title = {Computed Tomography Image Origin Identification Based on Original Sensor Pattern Noise and 3D Image Reconstruction Algorithm Footprints},
     journal = {IEEE Journal of Biomedical and Health Informatics},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  75. E.-S.M. El-Alfy & M.A. Qureshi
    Robust Content Authentication of Gray and Color Images Using LBP-dct Markov-based Features
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3855-7
    BibTeX
    @article{El-Alfy2016,
     author = {El-Alfy, El-Sayed M. and Qureshi, Muhammad A.},
     title = {Robust Content Authentication of Gray and Color Images Using LBP-dct Markov-based Features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  76. A. Elliethy & G. Sharma
    Image Anonymization for PRNU Forensics: A Set Theoretic Framework Addressing Compression Resilience
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3907-3911
    DOI: 10.1109/ICIP.2016.7533092
    BibTeX
    @inproceedings{Elliethy2016,
     author = {Elliethy, A. and Sharma, G.},
     title = {Image Anonymization for PRNU Forensics: A Set Theoretic Framework Addressing Compression Resilience},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3907--3911}}
    
  77. A. Elliethy & G. Sharma
    Image anonymization for PRNU forensics: A set theoretic framework addressing compression resilience
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3907-3911
    DOI: 10.1109/ICIP.2016.7533092
    BibTeX
    @inproceedings{Elliethy2016a,
     author = {Elliethy, A. and Sharma, G.},
     title = {Image anonymization for PRNU forensics: A set theoretic framework addressing compression resilience},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3907--3911}}
    
  78. M. Emam, Q. Han & H. Zhang
    A Keypoint-based Region Duplication Forgery Detection Algorithm
    IEICE TRANSACTIONS on Information and Systems, 2016, Vol. 99-(9), pp. 2413-2416
    DOI: 10.1587/transinf.2016edl8024
    BibTeX
    @article{Emam2016,
     author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli},
     title = {A Keypoint-based Region Duplication Forgery Detection Algorithm},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2016},
     volume = {99-},
     number = {9},
     pages = {2413--2416}}
    
  79. M. Emam, Q. Han & H. Zhang
    Detection of Copy-scale-move Forgery in Digital Images Using Sfop and MROGH
    Social Computing
    Springer, 2016
    DOI: 10.1007/978-981-10-2053-7_29
    BibTeX
    @incollection{Emam2016a,
     author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli},
     title = {Detection of Copy-scale-move Forgery in Digital Images Using Sfop and MROGH},
     booktitle = {Social Computing},
     publisher = {Springer},
     year = {2016}}
    
  80. N.I. Evdokimova & A.V. Kuznetsov
    Copy - Move Detection Algorithm Based on Local Derivative Pattern S
    Information Technology and Nanotechnolog, 2016
    DOI: 10.18287/1613-0073-2016-1638-304-312
    BibTeX
    @article{Evdokimova2016,
     author = {Evdokimova, N. I. and Kuznetsov, A. V.},
     title = {Copy - Move Detection Algorithm Based on Local Derivative Pattern S},
     journal = {Information Technology and Nanotechnolog},
     year = {2016}}
    
  81. S. Fahd, M.M.W. Iqbal, M. Arif & M.I. Javed
    Integrated Model: Statistical Features, Memory Analysis for Scanner and Printer Forensics
    Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)
    2016, pp. 74-77
    DOI: 10.1109/ISDFS.2016.7473521
    BibTeX
    @inproceedings{Fahd2016,
     author = {Fahd, S. and Iqbal, M. M. W. and Arif, M. and Javed, M. I.},
     title = {Integrated Model: Statistical Features, Memory Analysis for Scanner and Printer Forensics},
     booktitle = {Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)},
     year = {2016},
     pages = {74--77}}
    
  82. G. Fahmy & R. Wurtz
    Phase based forgery detection of JPEG anti forensics
    Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)
    2016, pp. 144-149
    DOI: 10.1109/ISSPIT.2016.7886024
    BibTeX
    @inproceedings{Fahmy2016b,
     author = {Fahmy, G. and Wurtz, R.},
     title = {Phase based forgery detection of JPEG anti forensics},
     booktitle = {Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)},
     year = {2016},
     pages = {144--149}}
    
  83. M.F. Fahmy & O.M. Fahmy
    A New Morphological Based Forgery Detection Scheme
    2016 33rd National Radio Science Conference (NRSC)
    2016, pp. 212-216
    DOI: 10.1109/NRSC.2016.7450830
    BibTeX
    @inproceedings{Fahmy2016,
     author = {Fahmy, M. F. and Fahmy, O. M.},
     title = {A New Morphological Based Forgery Detection Scheme},
     booktitle = {2016 33rd National Radio Science Conference (NRSC)},
     year = {2016},
     pages = {212--216}}
    
  84. O.M. Fahmy
    A new Zernike moments based technique for camera identification and forgery detection
    Signal, Image and Video Processing, Springer, 2016, pp. 1
    DOI: 10.1007/s11760-016-1023-1
    BibTeX
    @article{Fahmy2016a,
     author = {Fahmy, O. M.},
     title = {A new Zernike moments based technique for camera identification and forgery detection},
     journal = {Signal, Image and Video Processing},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  85. J. Fan, T. Chen & A.C. Kot
    EXIF-white Balance Recognition for Image Forensic Analysis
    Multidimensional Systems and Signal Processing, Springer, 2016, pp. 1
    DOI: 10.1007/s11045-015-0377-9
    BibTeX
    @article{Fan2016,
     author = {Fan, Jiayuan and Chen, Tao and Kot, Alex ChiChung},
     title = {EXIF-white Balance Recognition for Image Forensic Analysis},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  86. W. Fan, G. Valenzise, F. Banterle & F. Dufaux
    Forensic Detection of Inverse Tone Mapping in Hdr Images
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 166-170
    DOI: 10.1109/ICIP.2016.7532340
    BibTeX
    @inproceedings{Fan2016a,
     author = {Fan, W. and Valenzise, G. and Banterle, F. and Dufaux, F.},
     title = {Forensic Detection of Inverse Tone Mapping in Hdr Images},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {166--170}}
    
  87. W. Fan, K. Wang, F. Cayre & Z. Xiong
    Corrections to “JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality ” [Aug 14 1211-1226]
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(11), pp. 2628
    DOI: 10.1109/TIFS.2016.2585398
    BibTeX
    @article{Fan2016b,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {Corrections to “JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality ” [Aug 14 1211-1226]},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {11},
     pages = {2628}}
    
  88. A. Ferreira, S.C. Felipussi, C. Alfaro, P. Fonseca, J.E. Vargas-Muñoz, J.A. dos Santos & A. Rocha
    Behavior Knowledge Space-based Fusion for Copy --move Forgery Detection
    IEEE Transactions on Image Processing, 2016, Vol. 25(10), pp. 4729-4742
    DOI: 10.1109/TIP.2016.2593583
    BibTeX
    @article{Ferreira2016,
     author = {Ferreira, A. and Felipussi, S. C. and Alfaro, C. and Fonseca, P. and Vargas-Muñoz, J. E. and dos Santos, J. A. and Rocha, A.},
     title = {Behavior Knowledge Space-based Fusion for Copy --move Forgery Detection},
     journal = {IEEE Transactions on Image Processing},
     year = {2016},
     volume = {25},
     number = {10},
     pages = {4729--4742}}
    
  89. A. Ferreira, J.A.D. Santos & A. Rocha
    Multi-directional and Multi-scale Perturbation Approaches for Blind Forensic Median Filtering Detection
    Intelligent Data Analysis, IOS Press, 2016, Vol. 20(s1), pp. S17-S36
    DOI: 10.3233/IDA-160843
    BibTeX
    @article{Ferreira2016a,
     author = {Ferreira, Anselmo and Santos, Jefersson A. Dos and Rocha, Anderson},
     title = {Multi-directional and Multi-scale Perturbation Approaches for Blind Forensic Median Filtering Detection},
     journal = {Intelligent Data Analysis},
     publisher = {IOS Press},
     year = {2016},
     volume = {20},
     number = {s1},
     pages = {S17-S36}}
    
  90. F. Galvan
    First Quantization Table Detection in Double Compressed JPEG Images
    Universitversità degli Studi di Udine, DIPARTIMENTO MATEMATICA E INFORMATICA - DIMI, Università degli Studi di Udine, Dottorato di ricerca in Dottorato di ricerca in Informatica, 27, 2016
    BibTeX
    @phdthesis{Galvan2016,
     author = {Galvan, Fausto},
     title = {First Quantization Table Detection in Double Compressed JPEG Images},
     school = {Universitversità degli Studi di Udine, DIPARTIMENTO MATEMATICA E INFORMATICA - DIMI},
     year = {2016}}
    
  91. Y. Gan & J. Zhong
    Application of Afmt Method for Composite Forgery Detection
    Nonlinear Dynamics, Springer, 2016, Vol. 84(1), pp. 341
    DOI: 10.1007/s11071-015-2524-0
    BibTeX
    @article{Gan2016,
     author = {Gan, Yanfen and Zhong, Junliu},
     title = {Application of Afmt Method for Composite Forgery Detection},
     journal = {Nonlinear Dynamics},
     publisher = {Springer},
     year = {2016},
     volume = {84},
     number = {1},
     pages = {341}}
    
  92. O. Giudice, A. Paratore, M. Moltisanti & S. Battiato
    A Classification Engine for Image Ballistics of Social Data
    ArXiv, 2016
    BibTeX
    @article{Giudice2016,
     author = {Giudice, Oliver and Paratore, Antonino and Moltisanti, Marco and Battiato, Sebastiano},
     title = {A Classification Engine for Image Ballistics of Social Data},
     journal = {ArXiv},
     year = {2016}}
    
  93. J. Gong & J. Guo
    Image Copy-move Forgery Detection Using SURF in Opponent Color Space
    Transactions of Tianjin University, Springer, 2016, Vol. 22(2), pp. 151
    DOI: 10.1007/s12209-016-2705-z
    BibTeX
    @article{Gong2016,
     author = {Gong, Jiachang and Guo, Jichang},
     title = {Image Copy-move Forgery Detection Using SURF in Opponent Color Space},
     journal = {Transactions of Tianjin University},
     publisher = {Springer},
     year = {2016},
     volume = {22},
     number = {2},
     pages = {151}}
    
  94. R.E.J. Granty & G. Kousalya
    Spectral-hashing-based Image Retrieval and Copy-move Forgery Detection
    Australian Journal of Forensic Sciences, Taylor & Francis, 2016, pp. 1-16
    DOI: 10.1080/00450618.2015.1128966
    BibTeX
    @article{Granty2016,
     author = {Granty, Regina Elwin J. and Kousalya, G.},
     title = {Spectral-hashing-based Image Retrieval and Copy-move Forgery Detection},
     journal = {Australian Journal of Forensic Sciences},
     publisher = {Taylor & Francis},
     year = {2016},
     pages = {1--16}}
    
  95. Y. Gu, S. Wang, X. Lin & T. Sun
    USM Sharpening Detection Based on Sparse Coding
    Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)
    2016, pp. 1-5
    DOI: 10.1109/DICTA.2016.7797092
    BibTeX
    @inproceedings{Gu2016,
     author = {Gu, Y. and Wang, S. and Lin, X. and Sun, T.},
     title = {USM Sharpening Detection Based on Sparse Coding},
     booktitle = {Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)},
     year = {2016},
     pages = {1--5}}
    
  96. S. Gupta & P.S. Sandhu
    Highlighting Image Tampering by Feature Extraction Based on Image Quality Deterioration
    Proc. 3rd Int. Conf. Computing for Sustainable Global Development (INDIACom)
    2016, pp. 2362-2367
    BibTeX
    @inproceedings{Gupta2016,
     author = {Gupta, S. and Sandhu, P. S.},
     title = {Highlighting Image Tampering by Feature Extraction Based on Image Quality Deterioration},
     booktitle = {Proc. 3rd Int. Conf. Computing for Sustainable Global Development (INDIACom)},
     year = {2016},
     pages = {2362--2367}}
    
  97. J.G. Han, T.H. Park, Y.H. Moon & I.K. Eom
    Efficient Markov Feature Extraction Method for Image Splicing Detection Using Maximization and Threshold Expansion
    Journal of Electronic Imaging, 2016, Vol. 25(2), pp. 023031
    DOI: 10.1117/1.JEI.25.2.023031
    BibTeX
    @article{Han2016,
     author = {Han, Jong Goo and Park, Tae Hee and Moon, Yong Ho and Eom, Il Kyu},
     title = {Efficient Markov Feature Extraction Method for Image Splicing Detection Using Maximization and Threshold Expansion},
     journal = {Journal of Electronic Imaging},
     year = {2016},
     volume = {25},
     number = {2},
     pages = {023031}}
    
  98. J.-G. Han, I.-K. Eom, Y.-H. Moon & S.-W. Ha
    Selective Feature Extraction Method between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection
    Journal of the Korea Institute of Information and Communication Engineering, The Korean Institute of Information and Communication Sciences, 2016, Vol. 20(4), pp. 833-839
    DOI: 10.6109/jkiice.2016.20.4.833
    BibTeX
    @article{Han2016a,
     author = {Han, Jong-Goo and Eom, Il-Kyu and Moon, Yong-Ho and Ha, Seok-Wun},
     title = {Selective Feature Extraction Method between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection},
     journal = {Journal of the Korea Institute of Information and Communication Engineering},
     publisher = {The Korean Institute of Information and Communication Sciences},
     year = {2016},
     volume = {20},
     number = {4},
     pages = {833--839}}
    
  99. M.F. Hashmi, A.G. Keskara & V. Yadav
    Fuzzy Based Image Forensic Tool for Detection and Classification of Image Cloning
    International Journal of Computational Intelligence Systems, 2016, Vol. 9(2), pp. 351-375
    DOI: 10.1080/18756891.2016.1161364
    BibTeX
    @article{Hashmi2016,
     author = {Hashmi, Mohammad Farukh and Keskara, Avinash G. and Yadav, Vikas},
     title = {Fuzzy Based Image Forensic Tool for Detection and Classification of Image Cloning},
     journal = {International Journal of Computational Intelligence Systems},
     year = {2016},
     volume = {9},
     number = {2},
     pages = {351--375}}
    
  100. K. Henry
    Digital Photography Analysis: Analytical Framework for Measuring the Effects of Saturation on Photo Response Non-uniformity
    University of Central Florida, University of Central Florida, 2016
    BibTeX
    @mastersthesis{Henry2016,
     author = {Henry, Kris},
     title = {Digital Photography Analysis: Analytical Framework for Measuring the Effects of Saturation on Photo Response Non-uniformity},
     school = {University of Central Florida},
     year = {2016}}
    
  101. O. Holmes, M.S. Banks & H. Farid
    Assessing and Improving the Identification of Computer-generated Portraits
    ACM Trans. Appl. Percept., ACM, 2016, Vol. 13(2), pp. 71-712
    DOI: 10.1145/2871714
    BibTeX
    @article{Holmes2016,
     author = {Holmes, Olivia and Banks, Martin S. and Farid, Hany},
     title = {Assessing and Improving the Identification of Computer-generated Portraits},
     journal = {ACM Trans. Appl. Percept.},
     publisher = {ACM},
     year = {2016},
     volume = {13},
     number = {2},
     pages = {71--712}}
    
  102. J.U. Hou & H.K. Lee
    Detection of Hue Modification Using Photo Response Non-uniformity
    IEEE Transactions on Circuits and Systems for Video Technology, 2016, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TCSVT.2016.2539828
    BibTeX
    @article{Hou2016,
     author = {Hou, J. U. and Lee, H. K.},
     title = {Detection of Hue Modification Using Photo Response Non-uniformity},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  103. A. van den Hout & I. Alberink
    Posterior distributions for likelihood ratios in forensic science
    Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 397-401
    DOI: 10.1016/j.scijus.2016.06.011
    BibTeX
    @article{VandenHout2016,
     author = {van den Hout, Ardo and Alberink, Ivo},
     title = {Posterior distributions for likelihood ratios in forensic science},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {56},
     number = {5},
     pages = {397--401}}
    
  104. D. Hu, X. Zhang, Y. Fan, Z.-Q. Zhao, L. Wang, X. Wu & X. Wu
    On Digital Image Trustworthiness
    Applied Soft Computing, Elsevier BV, 2016, Vol. 48, pp. 240-253
    DOI: 10.1016/j.asoc.2016.07.010
    BibTeX
    @article{Hu2016c,
     author = {Hu, Donghui and Zhang, Xiaotian and Fan, Yuqi and Zhao, Zhong-Qiu and Wang, Lina and Wu, Xintao and Wu, Xindong},
     title = {On Digital Image Trustworthiness},
     journal = {Applied Soft Computing},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {48},
     pages = {240--253}}
    
  105. W.-C. Hu, W.-H. Chen, D.-Y. Huang & C.-Y. Yang
    Effective Image Forgery Detection of Tampered Foreground or Background Image Based on Image Watermarking and Alpha Mattes
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(6), pp. 3495
    DOI: 10.1007/s11042-015-2449-0
    BibTeX
    @article{Hu2016,
     author = {Hu, Wu-Chih and Chen, Wei-Hao and Huang, Deng-Yuan and Yang, Ching-Yu},
     title = {Effective Image Forgery Detection of Tampered Foreground or Background Image Based on Image Watermarking and Alpha Mattes},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {6},
     pages = {3495}}
    
  106. X. Hu, J. Ni & R. Pan
    Detecting Video Forgery by Estimating Extrinsic Camera Parameters
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_3
    BibTeX
    @article{Hu2016a,
     author = {Hu, Xianglei and Ni, Jiangqun and Pan, Runbiao},
     title = {Detecting Video Forgery by Estimating Extrinsic Camera Parameters},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  107. Y.-C. Hu, C.-C. Lo & W.-L. Chen
    Probability-based Reversible Image Authentication Scheme for Image Demosaicking
    Future Generation Computer Systems, Elsevier BV, 2016, Vol. 62, pp. 92-103
    DOI: 10.1016/j.future.2016.04.001
    BibTeX
    @article{Hu2016b,
     author = {Hu, Yu-Chen and Lo, Chun-Chi and Chen, Wu-Lin},
     title = {Probability-based Reversible Image Authentication Scheme for Image Demosaicking},
     journal = {Future Generation Computer Systems},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {62},
     pages = {92--103}}
    
  108. Y. Huang, J. Zhang & X. Lan
    Source Camera Identification with Imbalanced Training Dataset
    IJDTA, Science and Engineering Research Support Society, 2016, Vol. 9(1), pp. 205-214
    DOI: 10.14257/ijdta.2016.9.2.22
    BibTeX
    @article{Huang2016,
     author = {Huang, Yonggang and Zhang, Jun and Lan, Xinkai},
     title = {Source Camera Identification with Imbalanced Training Dataset},
     journal = {IJDTA},
     publisher = {Science and Engineering Research Support Society},
     year = {2016},
     volume = {9},
     number = {1},
     pages = {205--214}}
    
  109. T. Huynh-Kha, T. Le-Tien, S. Ha & K. Huynh-Van
    Improving the Computational Cost for Copied Region Detection in Forensic Images
    JOURNAL OF SCIENCE AND TECHNOLOGY: ISSUE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY, 2016, Vol. 2(1), pp. 55-63
    BibTeX
    @article{Huynh-Kha2016,
     author = {Huynh-Kha, Tu and Le-Tien, Thuong and Ha, Synh and Huynh-Van, Khoa},
     title = {Improving the Computational Cost for Copied Region Detection in Forensic Images},
     journal = {JOURNAL OF SCIENCE AND TECHNOLOGY: ISSUE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY},
     year = {2016},
     volume = {2},
     number = {1},
     pages = {55--63}}
    
  110. J.J. Hwang & K.H. Rhee
    Gaussian filtering detection based on features of residuals in image forensics
    Proc. and Vision for the Future (RIVF) 2016 IEEE RIVF Int. Conf. Computing Communication Technologies, Research, Innovation
    2016, pp. 153-157
    DOI: 10.1109/RIVF.2016.7800286
    BibTeX
    @inproceedings{Hwang2016a,
     author = {Hwang, J. J. and Rhee, K. H.},
     title = {Gaussian filtering detection based on features of residuals in image forensics},
     booktitle = {Proc. and Vision for the Future (RIVF) 2016 IEEE RIVF Int. Conf. Computing Communication Technologies, Research, Innovation},
     year = {2016},
     pages = {153--157}}
    
  111. M. gu Hwang, S. m.K. & D. hwan Har
    A Method of Identifying Digital Images with Geometric Distortion
    Australian Journal of Forensic Sciences, 2016
    DOI: 10.1080/00450618.2015.1128970
    BibTeX
    @article{Hwang2016,
     author = {gu Hwang, Min and , Sung min Kim and hwan Har, Dong},
     title = {A Method of Identifying Digital Images with Geometric Distortion},
     journal = {Australian Journal of Forensic Sciences},
     year = {2016}}
    
  112. M.M. Isaac & M. Wilscy
    A key point based copy-move forgery detection using HOG features
    Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
    2016, pp. 1-6
    DOI: 10.1109/ICCPCT.2016.7530253
    BibTeX
    @inproceedings{Isaac2016,
     author = {Isaac, M. M. and Wilscy, M.},
     title = {A key point based copy-move forgery detection using HOG features},
     booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit},
     year = {2016},
     pages = {1--6}}
    
  113. M. Iuliani
    Image Forensics in the Wild
    Universit`a di Firenze, Universit`a di Perugia, INdAM consorziate nel CIAFM, Universit`a di Firenze, Universit`a di Perugia, INdAM consorziate nel CIAFM, 2016
    BibTeX
    @phdthesis{Iuliani2016a,
     author = {Iuliani, Massimo},
     title = {Image Forensics in the Wild},
     school = {Universit`a di Firenze, Universit`a di Perugia, INdAM consorziate nel CIAFM},
     year = {2016}}
    
  114. M. Iuliani, M. Fanfani, C. Colombo & A. Piva
    Reliability Assessment of Principal Point Estimates for Forensic Applications
    Journal of Visual Communication and Image Representation, Elsevier BV, 2016
    DOI: 10.1016/j.jvcir.2016.11.010
    BibTeX
    @article{Iuliani2016,
     author = {Iuliani, Massimo and Fanfani, Marco and Colombo, Carlo and Piva, Alessandro},
     title = {Reliability Assessment of Principal Point Estimates for Forensic Applications},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2016}}
    
  115. M. Jahanirad, A.W.A. Wahab & N.B. Anuar
    An Evolution of Image Source Camera Attribution Approaches
    Forensic Sci Int, Elsevier BV, 2016, Vol. 262, pp. 242275
    DOI: 10.1016/j.forsciint.2016.03.035
    BibTeX
    @article{Jahanirad2016,
     author = {Jahanirad, Mehdi and Wahab, Ainuddin Wahid Abdul and Anuar, Nor Badrul},
     title = {An Evolution of Image Source Camera Attribution Approaches},
     journal = {Forensic Sci Int},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {262},
     pages = {242275}}
    
  116. H.A. Jalab, Z. Moghaddasi, A.M. Hasan & Z. Wakaf
    Image Splicing Detection Using Electromagnetism like Based Descriptor.
    Proc. of the SAI Intelligent Systems Conference 2016, 2016
    BibTeX
    @article{Jalab2016,
     author = {Jalab, Hamid A. and Moghaddasi, Zahra and Hasan, Ali M. and Wakaf, Zouhir},
     title = {Image Splicing Detection Using Electromagnetism like Based Descriptor.},
     journal = {Proc. of the SAI Intelligent Systems Conference 2016},
     year = {2016}}
    
  117. D.C. Jeronymo
    Semi-automatic wavelet soft-thresholding applied to digital image error level analysis
    PeerJ Preprints, 2016
    DOI: 10.7287/peerj.preprints.2619v1
    BibTeX
    @electronic{Jeronymo2016,
     author = {Jeronymo, Daniel C.},
     title = {Semi-automatic wavelet soft-thresholding applied to digital image error level analysis},
     publisher = {PeerJ Preprints},
     year = {2016}}
    
  118. X. Jiang, S. Wei, R. Zhao, Y. Zhao & X. Wu
    Camera Fingerprint: A New Perspective for Identifying User's Identity
    arXiv, 2016
    BibTeX
    @article{Jiang2016,
     author = {Jiang, Xiang and Wei, Shikui and Zhao, Ruizhen and Zhao, Yao and Wu, Xindong},
     title = {Camera Fingerprint: A New Perspective for Identifying User's Identity},
     journal = {arXiv},
     year = {2016}}
    
  119. X. Jinke
    Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments
    International Journal of Security and Its Applications, 2016, Vol. 10(2), pp. 27-38
    DOI: 10.14257/ijsia.2016.10.2.03
    BibTeX
    @article{Jinke2016,
     author = {Jinke, Xiao},
     title = {Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments},
     journal = {International Journal of Security and Its Applications},
     year = {2016},
     volume = {10},
     number = {2},
     pages = {27--38}}
    
  120. T. Julliand, V. Nozick & H. Talbot
    Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images
    2016
    DOI: 10.1049/ic.2015.0111
    BibTeX
    @unpublished{Julliand2016,
     author = {Julliand, Thibault and Nozick, Vincent and Talbot, Hugues},
     title = {Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images},
     year = {2016}}
    
  121. T. Julliand, V. Nozick & H. Talbot
    Image Noise and Digital Image Forensics
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_1
    BibTeX
    @article{Julliand2016a,
     author = {Julliand, Thibaut and Nozick, Vincent and Talbot, Hugues},
     title = {Image Noise and Digital Image Forensics},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  122. T. Julliand, V. Nozick & H. Talbot
    Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images
    Advanced Concepts for Intelligent Vision Systems, Springer, 2016
    DOI: 10.1007/978-3-319-48680-2_12
    BibTeX
    @article{Julliand2016b,
     author = {Julliand, Thibault and Nozick, Vincent and Talbot, Hugues},
     title = {Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2016}}
    
  123. J. Kamenicky, M. Bartos, J. Flusser, B. Mahdian, J. Kotera, A. Novozamsky, S. Saic, F. Sroubek, M. Sorel, A. Zita, B. Zitova, Z. Sima, P. Svarc & J. Horinek
    Pizzaro: Forensic Analysis and Restoration of Image and Video Data
    Forensic Science International, 2016, Vol. 264, pp. 153-166
    DOI: 10.1016/j.forsciint.2016.04.027
    BibTeX
    @article{Kamenicky2016,
     author = {Kamenicky, Jan and Bartos, Michal and Flusser, Jan and Mahdian, Babak and Kotera, Jan and Novozamsky, Adam and Saic, Stanislav and Sroubek, Filip and Sorel, Michal and Zita, Ales and Zitova, Barbara and Sima, Zdenek and Svarc, Petr and Horinek, Jan},
     title = {Pizzaro: Forensic Analysis and Restoration of Image and Video Data},
     journal = {Forensic Science International},
     year = {2016},
     volume = {264},
     pages = {153--166}}
    
  124. A.M. Kandepu & R. Naskar
    Classification based time-efficient, blind source camera identification for videos
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 0871-0875
    DOI: 10.1109/ICCSP.2016.7754271
    BibTeX
    @inproceedings{Kandepu2016,
     author = {Kandepu, A. M. and Naskar, R.},
     title = {Classification based time-efficient, blind source camera identification for videos},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {0871--0875}}
    
  125. R.K. Karsh, A. Das, G.L. Swetha, A. Medhi, R.H. Laskar, U. Arya & R.K. Agarwal
    Copy-move forgery detection using ASIFT
    Proc. 1st India Int. Conf. Information Processing (IICIP)
    2016, pp. 1-5
    DOI: 10.1109/IICIP.2016.7975329
    BibTeX
    @inproceedings{Karsh2016,
     author = {Karsh, R. K. and Das, A. and Swetha, G. L. and Medhi, A. and Laskar, R. H. and Arya, U. and Agarwal, R. K.},
     title = {Copy-move forgery detection using ASIFT},
     booktitle = {Proc. 1st India Int. Conf. Information Processing (IICIP)},
     year = {2016},
     pages = {1--5}}
    
  126. C. Kauba & A. Uhl
    PRNU-based Image Alignment for Defective Pixel Detection
    2016
    BibTeX
    @electronic{Kauba2016,
     author = {Kauba, Christof and Uhl, Andreas},
     title = {PRNU-based Image Alignment for Defective Pixel Detection},
     year = {2016}}
    
  127. M. Kaur & S. Gupta
    A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms
    Security in Computing and Communications
    Springer, 2016
    DOI: 10.1007/978-981-10-2738-3_27
    BibTeX
    @incollection{Kaur2016,
     author = {Kaur, Mandeep and Gupta, Savita},
     title = {A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms},
     booktitle = {Security in Computing and Communications},
     publisher = {Springer},
     year = {2016}}
    
  128. M. Kaur & S. Gupta
    A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms
    Security in Computing and Communications, Springer, 2016
    DOI: 10.1007/978-981-10-2738-3_27
    BibTeX
    @article{Kaur2016a,
     author = {Kaur, Mandeep and Gupta, Savita},
     title = {A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms},
     journal = {Security in Computing and Communications},
     publisher = {Springer},
     year = {2016}}
    
  129. Y. Ke, Q. Shan, F. Qin, W. Min & J. Guo
    Detection of Seam Carved Image Based on Additional Seam Carving Behavior
    International Journal of Signal Processing, Image Processing and Pattern Recognition, 2016, Vol. 9(2), pp. 167-178
    DOI: 10.14257/ijsip.2016.9.2.15
    BibTeX
    @article{Ke2016,
     author = {Ke, Yongzhen and Shan, Qingqing and Qin, Fan and Min, Weidong and Guo, Jing},
     title = {Detection of Seam Carved Image Based on Additional Seam Carving Behavior},
     journal = {International Journal of Signal Processing, Image Processing and Pattern Recognition},
     year = {2016},
     volume = {9},
     number = {2},
     pages = {167--178}}
    
  130. A.R.H. Khayeat, X. Sun & P.L. Rosin
    Improved DSIFT Descriptor Based Copy-rotate-move Forgery Detection
    Image and Video Technology, Springer, 2016
    DOI: 10.1007/978-3-319-29451-3_51
    BibTeX
    @article{Khayeat2016,
     author = {Khayeat, Ali Retha Hasoon and Sun, Xianfang and Rosin, Paul L.},
     title = {Improved DSIFT Descriptor Based Copy-rotate-move Forgery Detection},
     journal = {Image and Video Technology},
     publisher = {Springer},
     year = {2016}}
    
  131. Kim
    Building a Database of Dqt Information to Identify a Source of the Smartphone JPEG Image File
    Journal of the Korea Institute of Information Security and Cryptology, Korea Institute of Information Security and Cryptology, 2016, Vol. 26(2), pp. 359-367
    DOI: 10.13089/JKIISC.2016.26.2.359
    BibTeX
    @article{Kim2016,
     author = {Kim},
     title = {Building a Database of Dqt Information to Identify a Source of the Smartphone JPEG Image File},
     journal = {Journal of the Korea Institute of Information Security and Cryptology},
     publisher = {Korea Institute of Information Security and Cryptology},
     year = {2016},
     volume = {26},
     number = {2},
     pages = {359--367}}
    
  132. X. Kong, B. Wang, M. Yang & Y. Feng
    Multiple Heterogeneous JPEG Image Hierarchical Forensic
    Advanced Multimedia and Ubiquitous Engineering
    Springer, 2016
    DOI: 10.1007/978-981-10-1536-6_66
    BibTeX
    @incollection{Kong2016,
     author = {Kong, Xiangwei and Wang, Bo and Yang, Mingliang and Feng, Yue},
     title = {Multiple Heterogeneous JPEG Image Hierarchical Forensic},
     booktitle = {Advanced Multimedia and Ubiquitous Engineering},
     publisher = {Springer},
     year = {2016}}
    
  133. P. Korus & J. Huang
    Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk
    IEEE Signal Processing Letters, 2016, Vol. 23(1), pp. 169-173
    DOI: 10.1109/LSP.2015.2507598
    BibTeX
    @article{Korus2016,
     author = {Korus, P. and Huang, J.},
     title = {Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {1},
     pages = {169--173}}
    
  134. P. Korus & J. Huang
    Multi-scale Fusion for Improved Localization of Malicious Tampering in Digital Images
    IEEE Transactions on Image Processing, 2016, Vol. 25(3), pp. 1312-1326
    DOI: 10.1109/TIP.2016.2518870
    BibTeX
    @article{Korus2016a,
     author = {Korus, P. and Huang, J.},
     title = {Multi-scale Fusion for Improved Localization of Malicious Tampering in Digital Images},
     journal = {IEEE Transactions on Image Processing},
     year = {2016},
     volume = {25},
     number = {3},
     pages = {1312--1326}}
    
  135. P. Korus & J. Huang
    Multi-scale Analysis Strategies in PRNU-based Tampering Localization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2636089
    BibTeX
    @article{Korus2016b,
     author = {Korus, P. and Huang, J.},
     title = {Multi-scale Analysis Strategies in PRNU-based Tampering Localization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  136. P. Korus & J. Huang
    Evaluation of random field models in multi-modal unsupervised tampering localization
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823898
    BibTeX
    @inproceedings{Korus2016c,
     author = {Korus, P. and Huang, J.},
     title = {Evaluation of random field models in multi-modal unsupervised tampering localization},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  137. P. Korus & J. Huang
    Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk
    IEEE Signal Processing Letters, 2016, Vol. 23(1), pp. 169-173
    DOI: 10.1109/LSP.2015.2507598
    BibTeX
    @article{Korus2016d,
     author = {Korus, P. and Huang, J.},
     title = {Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {1},
     pages = {169--173}}
    
  138. M. Kumar & S. Srivastava
    Identifying Photo Forgery using Lighting Elements
    Indian Journal of Science and Technology, Indian Society for Education and Environment, 2016, Vol. 9(48)
    DOI: 10.17485/ijst/2016/v9i48/105748
    BibTeX
    @article{Kumar2016,
     author = {Kumar, Manoj and Srivastava, Sangeet},
     title = {Identifying Photo Forgery using Lighting Elements},
     journal = {Indian Journal of Science and Technology},
     publisher = {Indian Society for Education and Environment},
     year = {2016},
     volume = {9},
     number = {48}}
    
  139. S. Kumar, J.V. Desai & S. Mukherjee
    A Fast Keypoint Based Hybrid Method for Copy Move Forgery Detection
    ArXiv, 2016
    DOI: 10.12785/ijcds/040203
    BibTeX
    @article{Kumar2016a,
     author = {Kumar, Sunil and Desai, J. V. and Mukherjee, Shaktidev},
     title = {A Fast Keypoint Based Hybrid Method for Copy Move Forgery Detection},
     journal = {ArXiv},
     year = {2016}}
    
  140. R. Kushol, M.S. Salekin, M.H. Kabir & A.A. Khan
    Copy-Move Forgery Detection Using Color Space and Moment Invariants-Based Features
    Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)
    2016, pp. 1-6
    DOI: 10.1109/DICTA.2016.7797027
    BibTeX
    @inproceedings{Kushol2016,
     author = {Kushol, R. and Salekin, M. S. and Kabir, M. H. and Khan, A. A.},
     title = {Copy-Move Forgery Detection Using Color Space and Moment Invariants-Based Features},
     booktitle = {Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)},
     year = {2016},
     pages = {1--6}}
    
  141. A. Kuznetsov
    Remote Sensing Data Copy-move Forgery Protection Algorithm
    Computer Vision and Graphics, Springer, 2016
    DOI: 10.1007/978-3-319-46418-3_48
    BibTeX
    @article{Kuznetsov2016,
     author = {Kuznetsov, Andrey},
     title = {Remote Sensing Data Copy-move Forgery Protection Algorithm},
     journal = {Computer Vision and Graphics},
     publisher = {Springer},
     year = {2016}}
    
  142. A. Kuznetsov & E. Myasnikov
    Copy - Move Detection Algorithm Efficiency Increase Using Binary Space Partitioning Trees
    Information Technology and Nanotechnolog, 2016
    DOI: 10.18287/1613-0073-2016-1638-373-378
    BibTeX
    @article{Kuznetsov2016b,
     author = {Kuznetsov, A. and Myasnikov, E.},
     title = {Copy - Move Detection Algorithm Efficiency Increase Using Binary Space Partitioning Trees},
     journal = {Information Technology and Nanotechnolog},
     year = {2016}}
    
  143. A. Kuznetsov & V. Myasnikov
    A Copy-move Detection Algorithm Using Binary Gradient Contours
    Image Analysis and Recognition, Springer, 2016
    DOI: 10.1007/978-3-319-41501-7_40
    BibTeX
    @article{Kuznetsov2016c,
     author = {Kuznetsov, Andrey and Myasnikov, Vladislav},
     title = {A Copy-move Detection Algorithm Using Binary Gradient Contours},
     journal = {Image Analysis and Recognition},
     publisher = {Springer},
     year = {2016}}
    
  144. A.V. Kuznetsov & V.V. Myasnikov
    New Algorithms for Verifying the Consistency between Satellite Images and Survey Conditions
    Pattern Recognition and Image Analysis, Springer, 2016, Vol. 26(3), pp. 593
    DOI: 10.1134/S1054661816030135
    BibTeX
    @article{Kuznetsov2016a,
     author = {Kuznetsov, A. V. and Myasnikov, V. V.},
     title = {New Algorithms for Verifying the Consistency between Satellite Images and Survey Conditions},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {Springer},
     year = {2016},
     volume = {26},
     number = {3},
     pages = {593}}
    
  145. A. Lawgely & F. Khelifi
    Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2620280
    BibTeX
    @article{Lawgely2016,
     author = {Lawgely, A. and Khelifi, F.},
     title = {Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  146. H.-Y. Lee
    Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering
    2016
    BibTeX
    @article{Lee2016c,
     author = {Lee, Hae-Yeoun},
     title = {Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering},
     year = {2016}}
    
  147. J.-H. Lee
    Camera Identification of Dibr-based Stereoscopic Image Using Sensor Pattern Noise
    Journal of the Korea Institute of Military Science and Technology, The Korea Institute of Military Science and Technology, 2016, Vol. 19(1), pp. 66-75
    DOI: 10.9766/KIMST.2016.19.1.066
    BibTeX
    @article{Lee2016,
     author = {Lee, Jun-Hee},
     title = {Camera Identification of Dibr-based Stereoscopic Image Using Sensor Pattern Noise},
     journal = {Journal of the Korea Institute of Military Science and Technology},
     publisher = {The Korea Institute of Military Science and Technology},
     year = {2016},
     volume = {19},
     number = {1},
     pages = {66--75}}
    
  148. S. Lee, Y. Lee & S. Lee
    A Study on the Evidence Investigation of Forged/modulated Time-stamp at iOS(iPhone, iPad)
    KIPS Transactions on Computer and Communication Systems, Korea Information Processing Society, 2016, Vol. 5(7), pp. 173-180
    DOI: 10.3745/KTCCS.2016.5.7.173
    BibTeX
    @article{Lee2016a,
     author = {Lee, Sanghyun and Lee, Yunho and Lee, Sangjin},
     title = {A Study on the Evidence Investigation of Forged/modulated Time-stamp at iOS(iPhone, iPad)},
     journal = {KIPS Transactions on Computer and Communication Systems},
     publisher = {Korea Information Processing Society},
     year = {2016},
     volume = {5},
     number = {7},
     pages = {173--180}}
    
  149. S.-H. Lee, D.-H. Kim & H.Y. Lee
    Video Acquisition Device Identification using Sensor Pattern Noise
    International Journal of Applied Engineering Research, 2016
    BibTeX
    @article{Lee2016b,
     author = {Lee, Sang-Hyeong and Kim, Dong-Hyun and Lee, Hae Yeoun},
     title = {Video Acquisition Device Identification using Sensor Pattern Noise},
     journal = {International Journal of Applied Engineering Research},
     year = {2016}}
    
  150. H. Li, A.C. Kot & L. Li
    Color Space Identification from Single Images
    Proc. IEEE Int. Symp. Circuits and Systems (ISCAS)
    2016, pp. 1774-1777
    DOI: 10.1109/ISCAS.2016.7538912
    BibTeX
    @inproceedings{Li2016c,
     author = {Li, H. and Kot, A. C. and Li, L.},
     title = {Color Space Identification from Single Images},
     booktitle = {Proc. IEEE Int. Symp. Circuits and Systems (ISCAS)},
     year = {2016},
     pages = {1774--1777}}
    
  151. H. Li, W. Luo, X. Qiu & J. Huang
    Identification of Various Image Operations Using Residual-based Features
    IEEE Transactions on Circuits and Systems for Video Technology, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TCSVT.2016.2599849
    BibTeX
    @article{Li2016d,
     author = {Li, H. and Luo, W. and Qiu, X. and Huang, J.},
     title = {Identification of Various Image Operations Using Residual-based Features},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  152. J. Li, Q. Lin, C. Yu, X. Ren & P. Li
    A Qdct- and Svd-based Color Image Watermarking Scheme Using an Optimized Encrypted Binary Computer-generated Hologram
    Soft Computing, Springer, 2016, pp. 1
    DOI: 10.1007/s00500-016-2320-x
    BibTeX
    @article{Li2016b,
     author = {Li, Jianzhong and Lin, Qun and Yu, Chuying and Ren, Xuechang and Li, Ping},
     title = {A Qdct- and Svd-based Color Image Watermarking Scheme Using an Optimized Encrypted Binary Computer-generated Hologram},
     journal = {Soft Computing},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  153. J. Li, F. Yang, W. Lu & W. Sun
    Keypoint-based Copy-move Detection Scheme by Adopting Mscrs and Improved Feature Matching
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3967-0
    BibTeX
    @article{Li2016a,
     author = {Li, Jingwei and Yang, Fan and Lu, Wei and Sun, Wei},
     title = {Keypoint-based Copy-move Detection Scheme by Adopting Mscrs and Improved Feature Matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  154. R. Li, R. Ni & Y. Zhao
    An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_10
    BibTeX
    @article{Li2016f,
     author = {Li, Ruihan and Ni, Rongrong and Zhao, Yao},
     title = {An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  155. Y. Li & J. Zhou
    Image copy-move forgery detection using hierarchical feature point matching
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2016, pp. 1-4
    DOI: 10.1109/APSIPA.2016.7820758
    BibTeX
    @inproceedings{Li2016g,
     author = {Li, Y. and Zhou, J.},
     title = {Image copy-move forgery detection using hierarchical feature point matching},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2016},
     pages = {1--4}}
    
  156. Y. Li, J. Zhou, A. Cheng, X. Liu & Y.Y. Tang
    SIFT Keypoint Removal and Injection Via Convex Relaxation
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(8), pp. 1722-1735
    DOI: 10.1109/TIFS.2016.2553645
    BibTeX
    @article{Li2016,
     author = {Li, Y. and Zhou, J. and Cheng, A. and Liu, X. and Tang, Y. Y.},
     title = {SIFT Keypoint Removal and Injection Via Convex Relaxation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {8},
     pages = {1722--1735}}
    
  157. P. Lin, Y. Gan, J. Young, J. Zhao & H. Lian
    Applying Polar Sine Transform for Detecting Copy-move Forgery
    Energy Science and Applied Technology ESAT 2016, 2016
    BibTeX
    @article{Lin2016d,
     author = {Lin, P. and Gan, Y. and Young, J. and Zhao, J. and Lian, H.},
     title = {Applying Polar Sine Transform for Detecting Copy-move Forgery},
     journal = {Energy Science and Applied Technology ESAT 2016},
     year = {2016}}
    
  158. X. Lin & C. Li
    Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 126-140
    DOI: 10.1109/TIFS.2015.2478748
    BibTeX
    @article{Lin2016,
     author = {Lin, X. and Li, C.},
     title = {Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {126--140}}
    
  159. X. Lin & C.T. Li
    Enhancing Sensor Pattern Noise Via Filtering Distortion Removal
    IEEE Signal Processing Letters, 2016, Vol. 23(3), pp. 381-385
    DOI: 10.1109/LSP.2016.2521349
    BibTeX
    @article{Lin2016a,
     author = {Lin, X. and Li, C. T.},
     title = {Enhancing Sensor Pattern Noise Via Filtering Distortion Removal},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {3},
     pages = {381--385}}
    
  160. X. Lin & C.T. Li
    Refining PRNU-based Detection of Image Forgeries
    Proc. Digital Media Industry Academic Forum (DMIAF)
    2016, pp. 222-226
    DOI: 10.1109/DMIAF.2016.7574937
    BibTeX
    @inproceedings{Lin2016b,
     author = {Lin, X. and Li, C. T.},
     title = {Refining PRNU-based Detection of Image Forgeries},
     booktitle = {Proc. Digital Media Industry Academic Forum (DMIAF)},
     year = {2016},
     pages = {222--226}}
    
  161. X. Lin & C.T. Li
    Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 126-140
    DOI: 10.1109/TIFS.2015.2478748
    BibTeX
    @article{Lin2016c,
     author = {Lin, X. and Li, C. T.},
     title = {Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {126--140}}
    
  162. X. Lin & C.T. Li
    Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 126-140
    DOI: 10.1109/TIFS.2015.2478748
    BibTeX
    @article{Lin2016f,
     author = {Lin, X. and Li, C. T.},
     title = {Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {126--140}}
    
  163. X. Lin & C.-T. Li
    Image provenance inference through content-based device fingerprint analysis
    Chapter 9
    2016
    BibTeX
    @electronic{Lin2016e,
     author = {Lin, Xufeng and Li, Chang-Tsun},
     title = {Image provenance inference through content-based device fingerprint analysis},
     year = {2016}}
    
  164. X. Lin, S.L. Wang, W.J. Huang & J.Y. Lai
    An Experimental Study on Block DCT Coefficient Analysis for Image Splicing Detection
    Proc. IEEE First Int. Conf. Data Science in Cyberspace (DSC)
    2016, pp. 69-73
    DOI: 10.1109/DSC.2016.38
    BibTeX
    @inproceedings{Lin2016g,
     author = {Lin, X. and Wang, S. L. and Huang, W. J. and Lai, J. Y.},
     title = {An Experimental Study on Block DCT Coefficient Analysis for Image Splicing Detection},
     booktitle = {Proc. IEEE First Int. Conf. Data Science in Cyberspace (DSC)},
     year = {2016},
     pages = {69--73}}
    
  165. A. Liu, Z. Zhao, C. Zhang & Y. Su
    Smooth filtering identification based on convolutional neural networks
    Multimedia Tools and Applications, Springer Nature, 2016
    DOI: 10.1007/s11042-016-4251-z
    BibTeX
    @article{Liu2016a,
     author = {Liu, Anan and Zhao, Zhengyu and Zhang, Chengqian and Su, Yuting},
     title = {Smooth filtering identification based on convolutional neural networks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2016}}
    
  166. Q. Liu
    Exposing Seam Carving Forgery under Recompression Attacks by Hybrid Large Feature Mining
    International Conference on Pattern Recognition, At Cancun
    2016
    BibTeX
    @conference{Liu2016,
     author = {Liu, Qingzhong},
     title = {Exposing Seam Carving Forgery under Recompression Attacks by Hybrid Large Feature Mining},
     booktitle = {International Conference on Pattern Recognition, At Cancun},
     year = {2016}}
    
  167. Q. Liu, A.H. Sung, B. Zhou & M. Qiao
    Exposing Inpainting Forgery in JPEG Images under Recompression Attacks
    Proc. 15th IEEE Int. Conf. Machine Learning and Applications (ICMLA)
    2016, pp. 164-169
    DOI: 10.1109/ICMLA.2016.0035
    BibTeX
    @inproceedings{Liu2016b,
     author = {Liu, Q. and Sung, A. H. and Zhou, B. and Qiao, M.},
     title = {Exposing Inpainting Forgery in JPEG Images under Recompression Attacks},
     booktitle = {Proc. 15th IEEE Int. Conf. Machine Learning and Applications (ICMLA)},
     year = {2016},
     pages = {164--169}}
    
  168. H. Luan & N.F. Law
    A novel dual-threshold SIFT-based copy-move forgery detection
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2016, pp. 1-5
    DOI: 10.1109/APSIPA.2016.7820872
    BibTeX
    @inproceedings{Luan2016,
     author = {Luan, H. and Law, N. F.},
     title = {A novel dual-threshold SIFT-based copy-move forgery detection},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2016},
     pages = {1--5}}
    
  169. T. Mahmood, T. Nawaz, A. Irtaza, R. Ashraf, M. Shah & M.T. Mahmood
    Copy-move Forgery Detection Technique for Forensic Analysis in Digital Images
    Mathematical Problems in Engineering, 2016
    DOI: 10.1109/icet.2015.7389169
    BibTeX
    @article{Mahmood2016,
     author = {Mahmood, Toqeer and Nawaz, Tabassam and Irtaza, Aun and Ashraf, Rehan and Shah, Mohsin and Mahmood, Muhammad Tariq},
     title = {Copy-move Forgery Detection Technique for Forensic Analysis in Digital Images},
     journal = {Mathematical Problems in Engineering},
     year = {2016}}
    
  170. T. Mahmood, T. Nawaz, Z. Mehmood, Z. Khan, M. Shah & R. Ashraf
    Forensic analysis of copy-move forgery in digital images using the stationary wavelets
    Proc. Sixth Int. Conf. Innovative Computing Technology (INTECH)
    2016, pp. 578-583
    DOI: 10.1109/INTECH.2016.7845040
    BibTeX
    @inproceedings{Mahmood2016a,
     author = {Mahmood, T. and Nawaz, T. and Mehmood, Z. and Khan, Z. and Shah, M. and Ashraf, R.},
     title = {Forensic analysis of copy-move forgery in digital images using the stationary wavelets},
     booktitle = {Proc. Sixth Int. Conf. Innovative Computing Technology (INTECH)},
     year = {2016},
     pages = {578--583}}
    
  171. K.W. Mahmoud & A.H.A. Al-Rukab
    Moment Based Copy Move Forgery Detection Methods
    International Journal of Computer Science and Information Security (IJCSIS), 2016
    BibTeX
    @article{Mahmoud2016,
     author = {Mahmoud, Khaled W. and Al-Rukab, Arwa Husien Abu},
     title = {Moment Based Copy Move Forgery Detection Methods},
     journal = {International Journal of Computer Science and Information Security (IJCSIS)},
     year = {2016}}
    
  172. A. Malviya & S. Ladhake
    An Image Forensic Technique for Detection of Copy-move Forgery in Digital Image
    Security in Computing and Communications
    Springer, 2016
    DOI: 10.1007/978-981-10-2738-3_28
    BibTeX
    @incollection{Malviya2016a,
     author = {Malviya, Ashwini and Ladhake, Siddharth},
     title = {An Image Forensic Technique for Detection of Copy-move Forgery in Digital Image},
     booktitle = {Security in Computing and Communications},
     publisher = {Springer},
     year = {2016}}
    
  173. A.V. Malviya & S.A. Ladhake
    Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram
    Procedia Computer Science, 2016, Vol. 79, pp. 383-390
    DOI: 10.1016/j.procs.2016.03.050
    BibTeX
    @article{Malviya2016,
     author = {Malviya, Ashwini V. and Ladhake, Siddharth A.},
     title = {Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram},
     journal = {Procedia Computer Science},
     year = {2016},
     volume = {79},
     pages = {383--390}}
    
  174. A.V. Malviya & S.A. Ladhake
    Region duplication detection using color histogram and moments in digital image
    Proc. Int. Conf. Inventive Computation Technologies (ICICT)
    2016, Vol. 1, pp. 1-4
    DOI: 10.1109/INVENTIVE.2016.7823199
    BibTeX
    @inproceedings{Malviya2016b,
     author = {Malviya, A. V. and Ladhake, S. A.},
     title = {Region duplication detection using color histogram and moments in digital image},
     booktitle = {Proc. Int. Conf. Inventive Computation Technologies (ICICT)},
     year = {2016},
     volume = {1},
     pages = {1--4}}
    
  175. S.S. Mangat & H. Kaur
    Improved copy-move forgery detection in image by feature extraction with KPCA and adaptive method
    Proc. 2nd Int. Conf. Next Generation Computing Technologies (NGCT)
    2016, pp. 694-703
    DOI: 10.1109/NGCT.2016.7877501
    BibTeX
    @inproceedings{Mangat2016,
     author = {Mangat, S. S. and Kaur, H.},
     title = {Improved copy-move forgery detection in image by feature extraction with KPCA and adaptive method},
     booktitle = {Proc. 2nd Int. Conf. Next Generation Computing Technologies (NGCT)},
     year = {2016},
     pages = {694--703}}
    
  176. V.M. Manikandan & V. Masilamani
    A Context Dependent Fragile Watermarking Scheme for Tamper Detection from Demosaicked Color Images
    Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing
    ACM, 2016, pp. 611-618
    DOI: 10.1145/3009977.3009987
    BibTeX
    @inproceedings{Manikandan2016,
     author = {Manikandan, V. M. and Masilamani, V.},
     title = {A Context Dependent Fragile Watermarking Scheme for Tamper Detection from Demosaicked Color Images},
     booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing},
     publisher = {ACM},
     year = {2016},
     pages = {611--618}}
    
  177. V.T. Manu & B.M. Mehtre
    Detection of Copy-move Forgery in Images Using Segmentation and SURF
    Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_55
    BibTeX
    @article{Manu2016,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Detection of Copy-move Forgery in Images Using Segmentation and SURF},
     journal = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  178. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    A Study of Co-occurrence Based Local Features for Camera Model Identification
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3663-0
    BibTeX
    @article{Marra2016,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {A Study of Co-occurrence Based Local Features for Camera Model Identification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  179. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Correlation clustering for PRNU-based blind image source identification
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823910
    BibTeX
    @inproceedings{Marra2016a,
     author = {Marra, F. and Poggi, G. and Sansone, C. and Verdoliva, L.},
     title = {Correlation clustering for PRNU-based blind image source identification},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  180. M. Mathai, D. Rajan & S. Emmanuel
    Video Forgery Detection and Localization Using Normalized Cross-correlation of Moment Features
    2016 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)
    2016, pp. 149-152
    DOI: 10.1109/SSIAI.2016.7459197
    BibTeX
    @inproceedings{Mathai2016,
     author = {Mathai, M. and Rajan, D. and Emmanuel, S.},
     title = {Video Forgery Detection and Localization Using Normalized Cross-correlation of Moment Features},
     booktitle = {2016 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)},
     year = {2016},
     pages = {149--152}}
    
  181. O. Mayer & M. Stamm
    Improved Forgery Detection with Lateral Chromatic Aberration
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2024-2028
    DOI: 10.1109/ICASSP.2016.7472032
    BibTeX
    @inproceedings{Mayer2016,
     author = {Mayer, O. and Stamm, M.},
     title = {Improved Forgery Detection with Lateral Chromatic Aberration},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2024--2028}}
    
  182. A. Mazumdar & P.K. Bora
    Exposing Splicing Forgeries in Digital Images Through Dichromatic Plane Histogram Discrepancies
    Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing
    ACM, 2016, pp. 621-628
    DOI: 10.1145/3009977.3010032
    BibTeX
    @inproceedings{Mazumdar2016,
     author = {Mazumdar, Aniruddha and Bora, Prabin Kumar},
     title = {Exposing Splicing Forgeries in Digital Images Through Dichromatic Plane Histogram Discrepancies},
     booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing},
     publisher = {ACM},
     year = {2016},
     pages = {621--628}}
    
  183. A. Mehrish, A.V. Subramanyam & S. Emmanuel
    Sensor Pattern Noise Estimation Using Probabilistically Estimated Raw Values
    IEEE Signal Processing Letters, 2016, Vol. 23(5), pp. 693-697
    DOI: 10.1109/LSP.2016.2549059
    BibTeX
    @article{Mehrish2016,
     author = {Mehrish, A. and Subramanyam, A. V. and Emmanuel, S.},
     title = {Sensor Pattern Noise Estimation Using Probabilistically Estimated Raw Values},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {5},
     pages = {693--697}}
    
  184. S. Milani, M. Fontana, P. Bestagini & S. Tubaro
    Phylogenetic Analysis of Near-duplicate Images Using Processing Age Metrics
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2054-2058
    DOI: 10.1109/ICASSP.2016.7472038
    BibTeX
    @inproceedings{Milani2016,
     author = {Milani, S. and Fontana, M. and Bestagini, P. and Tubaro, S.},
     title = {Phylogenetic Analysis of Near-duplicate Images Using Processing Age Metrics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2054--2058}}
    
  185. S. Milani & E. Tronca
    Improving three-dimensional reconstruction of buildings from web-harvested images using forensic clues
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 26(1), pp. 011009
    DOI: 10.1117/1.jei.26.1.011009
    BibTeX
    @article{Milani2016a,
     author = {Milani, Simone and Tronca, Enrico},
     title = {Improving three-dimensional reconstruction of buildings from web-harvested images using forensic clues},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2016},
     volume = {26},
     number = {1},
     pages = {011009}}
    
  186. S. Milani & E. Tronca
    Improving Three-dimensional Reconstruction of Buildings from Web-harvested Images Using Forensic Clues
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 26(1), pp. 011009
    DOI: 10.1117/1.jei.26.1.011009
    BibTeX
    @article{Milani2016b,
     author = {Milani, Simone and Tronca, Enrico},
     title = {Improving Three-dimensional Reconstruction of Buildings from Web-harvested Images Using Forensic Clues},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2016},
     volume = {26},
     number = {1},
     pages = {011009}}
    
  187. A.V. Mire, S.B. Dhok, N.J. Mistry & P.D. Porey
    Tampering Localization in Digital Image Using First Two Digit Probability Features
    Satapathy, C. S., Mandal, K. J., Udgata, K. S. & Bhateja, V. (ed.)
    Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3
    Chapter Tampering Localization in Digital Image Using First Two Digit Probability Features
    Springer India, 2016, pp. 133-141
    DOI: 10.1007/978-81-322-2757-1_15
    BibTeX
    @inbook{Mire2016,
     author = {Mire, Archana V. and Dhok, Sanjay B. and Mistry, Narendra J. and Porey, Prakash D.},
     title = {Tampering Localization in Digital Image Using First Two Digit Probability Features},
     booktitle = {Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3},
     publisher = {Springer India},
     year = {2016},
     pages = {133--141}}
    
  188. H. Moradi-Gharghani & M. Nasri
    A new block-based copy-move forgery detection method in digital images
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 1208-1212
    DOI: 10.1109/ICCSP.2016.7754344
    BibTeX
    @inproceedings{Moradi-Gharghani2016,
     author = {Moradi-Gharghani, H. and Nasri, M.},
     title = {A new block-based copy-move forgery detection method in digital images},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {1208--1212}}
    
  189. G.S. Morrison
    Special issue on measuring and reporting the precision of forensic likelihood ratios: Introduction to the debate
    Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 371-373
    DOI: 10.1016/j.scijus.2016.05.002
    BibTeX
    @article{Morrison2016,
     author = {Morrison, Geoffrey Stewart},
     title = {Special issue on measuring and reporting the precision of forensic likelihood ratios: Introduction to the debate},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {56},
     number = {5},
     pages = {371--373}}
    
  190. G. Muzaffer, O. Makul, B. Ustubioglu & G. Ulutas
    Copy Move Forgery Detection Using Gabor Filter and Orb
    Proceedings of 2016International Conference on Image Processing, Production and Computer Science (ICIPCS'2016)
    2016
    BibTeX
    @conference{Muzaffer2016,
     author = {Muzaffer, Gul and Makul, Ozge and Ustubioglu, Beste and Ulutas, Guzin},
     title = {Copy Move Forgery Detection Using Gabor Filter and Orb},
     booktitle = {Proceedings of 2016International Conference on Image Processing, Production and Computer Science (ICIPCS'2016)},
     year = {2016}}
    
  191. V.P. Nampoothiri & N. Sugitha
    Digital Image Forgery --- A Threaten to Digital Forensics
    Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
    2016, pp. 1-6
    DOI: 10.1109/ICCPCT.2016.7530370
    BibTeX
    @inproceedings{Nampoothiri2016,
     author = {Nampoothiri, V. P. and Sugitha, N.},
     title = {Digital Image Forgery --- A Threaten to Digital Forensics},
     booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit},
     year = {2016},
     pages = {1--6}}
    
  192. V.P. Nampoothiri & N. Sugitha
    Digital image forgery --- A threaten to digital forensics
    Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
    2016, pp. 1-6
    DOI: 10.1109/ICCPCT.2016.7530370
    BibTeX
    @inproceedings{Nampoothiri2016a,
     author = {Nampoothiri, V. P. and Sugitha, N.},
     title = {Digital image forgery --- A threaten to digital forensics},
     booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit},
     year = {2016},
     pages = {1--6}}
    
  193. H.C. Nguyen
    A Machine Learning Based Technique for Detecting Digital Image Resampling
    Nguyen, T. N., Trawiʼnski, B., Fujita, H. & Hong, T.-P. (ed.)
    Intelligent Information and Database Systems: 8th Asian Conference, ACIIDS 2016, Da Nang, Vietnam, March 14-16, 2016, Proceedings, Part II
    Chapter A Machine Learning Based Technique for Detecting Digital Image Resampling
    Springer Berlin Heidelberg, 2016, pp. 75-84
    DOI: 10.1007/978-3-662-49390-8_7
    BibTeX
    @inbook{Nguyen2016,
     author = {Nguyen, Hieu Cuong},
     title = {A Machine Learning Based Technique for Detecting Digital Image Resampling},
     booktitle = {Intelligent Information and Database Systems: 8th Asian Conference, ACIIDS 2016, Da Nang, Vietnam, March 14-16, 2016, Proceedings, Part II},
     publisher = {Springer Berlin Heidelberg},
     year = {2016},
     pages = {75--84}}
    
  194. H.H. Nguyen, H.-Q. Nguyen-Son, T.D. Nguyen & I. Echizen
    Discriminating between Computer-generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy
    Digital-Forensics and Watermarking
    Digital-Forensics and Watermarking, Springer, 2016, pp. 39-50
    DOI: 10.1007/978-3-319-31960-5_4
    BibTeX
    @article{Nguyen2016a,
     author = {Nguyen, Huy H. and Nguyen-Son, Hoang-Quoc and Nguyen, Thuc D. and Echizen, Isao},
     title = {Discriminating between Computer-generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy},
     booktitle = {Digital-Forensics and Watermarking},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016},
     pages = {39--50}}
    
  195. R.M.H. Nguyen & M.S. Brown
    RAW Image Reconstruction Using a Self-Contained sRGB-JPEG Image with Only 64 KB Overhead
    Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
    2016, pp. 1655-1663
    DOI: 10.1109/CVPR.2016.183
    BibTeX
    @inproceedings{Nguyen2016b,
     author = {Nguyen, R. M. H. and Brown, M. S.},
     title = {RAW Image Reconstruction Using a Self-Contained sRGB-JPEG Image with Only 64 KB Overhead},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)},
     year = {2016},
     pages = {1655--1663}}
    
  196. R. Nithiya & S. Veluchamy
    Key point descriptor based copy and move image forgery detection system
    Proc. Second Int. Conf. Science Technology Engineering and Management (ICONSTEM)
    2016, pp. 577-581
    DOI: 10.1109/ICONSTEM.2016.7560959
    BibTeX
    @inproceedings{Nithiya2016,
     author = {Nithiya, R. and Veluchamy, S.},
     title = {Key point descriptor based copy and move image forgery detection system},
     booktitle = {Proc. Second Int. Conf. Science Technology Engineering and Management (ICONSTEM)},
     year = {2016},
     pages = {577--581}}
    
  197. M.S.Y. Nuchu
    Compressed Fragile Sensor Noise Fingerprint for Smartphone Identification
    Binghamton University State University of New York, Binghamton University State University of New York, 2016
    BibTeX
    @mastersthesis{Nuchu2016,
     author = {Nuchu, Madhu Sudhan Yadav},
     title = {Compressed Fragile Sensor Noise Fingerprint for Smartphone Identification},
     school = {Binghamton University State University of New York},
     year = {2016}}
    
  198. A.A. de Oliveira, P. Ferrara, A.D. Rosa, A. Piva, M. Barni, S. Goldenstein, Z. Dias & A. Rocha
    Multiple Parenting Phylogeny Relationships in Digital Images
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(2), pp. 328-343
    DOI: 10.1109/TIFS.2015.2493989
    BibTeX
    @article{Oliveira2016,
     author = {de Oliveira, A. A. and Ferrara, P. and Rosa, A. De and Piva, A. and Barni, Mauro and Goldenstein, S. and Dias, Z. and Rocha, A.},
     title = {Multiple Parenting Phylogeny Relationships in Digital Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {2},
     pages = {328--343}}
    
  199. R.S. Oommen, M. Jayamohan & S. Sruthy
    Scale Invariant Detection of Copy-move Forgery Using Fractal Dimension and Singular Values
    Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_47
    BibTeX
    @article{Oommen2016,
     author = {Oommen, Rani Susan and Jayamohan, M. and Sruthy, S.},
     title = {Scale Invariant Detection of Copy-move Forgery Using Fractal Dimension and Singular Values},
     journal = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  200. R.S. Oommen, M. Jayamohan & S. Sruthy
    Using Fractal Dimension and Singular Values for Image Forgery Detection and Localization
    Procedia Technology, Elsevier BV, 2016, Vol. 24, pp. 1452-1459
    DOI: 10.1016/j.protcy.2016.05.176
    BibTeX
    @article{Oommen2016a,
     author = {Oommen, Rani Susan and Jayamohan, M. and Sruthy, S.},
     title = {Using Fractal Dimension and Singular Values for Image Forgery Detection and Localization},
     journal = {Procedia Technology},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {24},
     pages = {1452--1459}}
    
  201. A.L.S. Orozco, J.R. Corripio, D.M.A. González, L.J.G. Villalba & J. Hernandez-Castro
    Theia: A Tool for the Forensic Analysis of Mobile Devices Pictures
    Computing, Springer Science mathplus Business Media, 2016, pp. 1-36
    DOI: 10.1007/s00607-015-0482-5
    BibTeX
    @article{Orozco2016,
     author = {Orozco, Ana Lucila Sandoval and Corripio, Jocelin Rosales and González, David Manuel Arenas and Villalba, Luis Javier Garc\ia and Hernandez-Castro, Julio},
     title = {Theia: A Tool for the Forensic Analysis of Mobile Devices Pictures},
     journal = {Computing},
     publisher = {Springer Science mathplus Business Media},
     year = {2016},
     pages = {1--36}}
    
  202. J. Ouyang, Y. Liu & H. Shu
    Robust Hashing for Image Authentication Using SIFT Feature and Quaternion Zernike Moments
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-015-3225-x
    BibTeX
    @article{Ouyang2016,
     author = {Ouyang, Junlin and Liu, Yizhi and Shu, Huazhong},
     title = {Robust Hashing for Image Authentication Using SIFT Feature and Quaternion Zernike Moments},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  203. R.C. Pandey, S. Prasad, S.K. Singh & K.K. Shukla
    Image Splicing Detection Using HMRF-GMM Based Segmentation Technique and Local Noise Variances
    INROADS- An International Journal of Jaipur National University, Diva Enterprises Private Limited, 2016, Vol. 5(1s), pp. 223
    DOI: 10.5958/2277-4912.2016.00043.6
    BibTeX
    @article{Pandey2016a,
     author = {Pandey, Ramesh Chand and Prasad, Shiv and Singh, Sanjay Kumar and Shukla, K. K.},
     title = {Image Splicing Detection Using HMRF-GMM Based Segmentation Technique and Local Noise Variances},
     journal = {INROADS- An International Journal of Jaipur National University},
     publisher = {Diva Enterprises Private Limited},
     year = {2016},
     volume = {5},
     number = {1s},
     pages = {223}}
    
  204. R.C. Pandey, S.K. Singh & K.K. Shukla
    Passive Forensics in Image and Video Using Noise Features: A Review
    Digital Investigation, Elsevier BV, 2016, Vol. 19, pp. 1-28
    DOI: 10.1016/j.diin.2016.08.002
    BibTeX
    @article{Pandey2016,
     author = {Pandey, Ramesh C. and Singh, Sanjay K. and Shukla, Kaushal K.},
     title = {Passive Forensics in Image and Video Using Noise Features: A Review},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {19},
     pages = {1--28}}
    
  205. P.P. Panzade, C.S. Prakash & S. Maheshkar
    Copy-move forgery detection by using HSV preprocessing and keypoint extraction
    Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel
    2016, pp. 264-269
    DOI: 10.1109/PDGC.2016.7913156
    BibTeX
    @inproceedings{Panzade2016,
     author = {Panzade, P. P. and Prakash, C. S. and Maheshkar, S.},
     title = {Copy-move forgery detection by using HSV preprocessing and keypoint extraction},
     booktitle = {Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel},
     year = {2016},
     pages = {264--269}}
    
  206. C.-S. Park, C. Kim, J. Lee & G.-R. Kwon
    Rotation and Scale Invariant Upsampled Log-polar Fourier Descriptor for Copy-move Forgery Detection
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3575-z
    BibTeX
    @article{Park2016,
     author = {Park, Chun-Su and Kim, Changjae and Lee, Jihoon and Kwon, Goo-Rak},
     title = {Rotation and Scale Invariant Upsampled Log-polar Fourier Descriptor for Copy-move Forgery Detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  207. J.-S. Park, D.-K. Hyun, J.-U. Hou, D.-G. Kim & H.-K. Lee
    Detecting Digital Image Forgery in Near-infrared Image of Cctv
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3871-7
    BibTeX
    @article{Park2016b,
     author = {Park, Jin-Seok and Hyun, Dai-Kyung and Hou, Jong-Uk and Kim, Do-Guk and Lee, Heung-Kyu},
     title = {Detecting Digital Image Forgery in Near-infrared Image of Cctv},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  208. T.H. Park, J.G. Han, Y.H. Moon & I.K. Eom
    Image Splicing Detection Based on Inter-scale 2d Joint Characteristic Function Moments in Wavelet Domain
    EURASIP Journal on Image and Video Processing, 2016, Vol. 2016(1), pp. 1-10
    DOI: 10.1186/s13640-016-0136-3
    BibTeX
    @article{Park2016a,
     author = {Park, Tae Hee and Han, Jong Goo and Moon, Yong Ho and Eom, Il Kyu},
     title = {Image Splicing Detection Based on Inter-scale 2d Joint Characteristic Function Moments in Wavelet Domain},
     journal = {EURASIP Journal on Image and Video Processing},
     year = {2016},
     volume = {2016},
     number = {1},
     pages = {1--10}}
    
  209. A. Parveen & A. Tayal
    An algorithm to detect the forged part in an image
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 1486-1490
    DOI: 10.1109/ICCSP.2016.7754405
    BibTeX
    @inproceedings{Parveen2016,
     author = {Parveen, A. and Tayal, A.},
     title = {An algorithm to detect the forged part in an image},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {1486--1490}}
    
  210. C. Pasquini, G. Boato, N. Alajlan & F.G.B.D. Natale
    A Deterministic Approach to Detect Median Filtering in 1D Data
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(7), pp. 1425-1437
    DOI: 10.1109/TIFS.2016.2530636
    BibTeX
    @article{Pasquini2016,
     author = {Pasquini, C. and Boato, G. and Alajlan, N. and Natale, F. G. B. De},
     title = {A Deterministic Approach to Detect Median Filtering in 1D Data},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {7},
     pages = {1425--1437}}
    
  211. A.B. Patankar, A. Sukhpal, S. Shetye & A. Shroff
    Copy move forgery detection
    Proc. Int. Conf. Workshop Electronics Telecommunication Engineering (ICWET 2016)
    2016, pp. 188-193
    DOI: 10.1049/cp.2016.1145
    BibTeX
    @inproceedings{Patankar2016,
     author = {Patankar, A. B. and Sukhpal, A. and Shetye, S. and Shroff, A.},
     title = {Copy move forgery detection},
     booktitle = {Proc. Int. Conf. Workshop Electronics Telecommunication Engineering (ICWET 2016)},
     year = {2016},
     pages = {188--193}}
    
  212. B. Peng, W. Wang, J. Dong & T. Tan
    Automatic Detection of 3D Lighting Inconsistencies Via a Facial Landmark Based Morphable Model
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3932-3936
    DOI: 10.1109/ICIP.2016.7533097
    BibTeX
    @inproceedings{Peng2016,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Automatic Detection of 3D Lighting Inconsistencies Via a Facial Landmark Based Morphable Model},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3932--3936}}
    
  213. B. Peng, W. Wang, J. Dong & T. Tan
    Optimized 3D Lighting Environment Estimation for Image Forgery Detection
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2623589
    BibTeX
    @article{Peng2016a,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Optimized 3D Lighting Environment Estimation for Image Forgery Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  214. F. Pérez-González, M. Masciopinto, I. González-Iglesias & P. Comesaña
    Fast Sequential Forensic Detection of Camera Fingerprint
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3902-3906
    DOI: 10.1109/ICIP.2016.7533091
    BibTeX
    @inproceedings{Perez-Gonzalez2016,
     author = {Pérez-González, F. and Masciopinto, M. and González-Iglesias, I. and Comesaña, P.},
     title = {Fast Sequential Forensic Detection of Camera Fingerprint},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3902--3906}}
    
  215. C.S. Prakash & S. Maheshkar
    Copy-move forgery detection using lexicographical sort
    Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel
    2016, pp. 149-153
    DOI: 10.1109/PDGC.2016.7913133
    BibTeX
    @inproceedings{Prakash2016,
     author = {Prakash, C. S. and Maheshkar, S.},
     title = {Copy-move forgery detection using lexicographical sort},
     booktitle = {Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel},
     year = {2016},
     pages = {149--153}}
    
  216. S. Prasad & B. Ramkumar
    Passive copy-move forgery detection using SIFT, HOG and SURF features
    Proc. Information Communication Technology (RTEICT) 2016 IEEE Int. Conf. Recent Trends in Electronics
    2016, pp. 706-710
    DOI: 10.1109/RTEICT.2016.7807915
    BibTeX
    @inproceedings{Prasad2016,
     author = {Prasad, S. and Ramkumar, B.},
     title = {Passive copy-move forgery detection using SIFT, HOG and SURF features},
     booktitle = {Proc. Information Communication Technology (RTEICT) 2016 IEEE Int. Conf. Recent Trends in Electronics},
     year = {2016},
     pages = {706--710}}
    
  217. C.-M. Pun, B. Liu & X.-C. Yuan
    Multi-scale Noise Estimation for Image Splicing Forgery Detection
    Journal of Visual Communication and Image Representation, 2016, Vol. 38, pp. 195-206
    DOI: 10.1016/j.jvcir.2016.03.005
    BibTeX
    @article{Pun2016,
     author = {Pun, Chi-Man and Liu, Bo and Yuan, Xiao-Chen},
     title = {Multi-scale Noise Estimation for Image Splicing Forgery Detection},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2016},
     volume = {38},
     pages = {195--206}}
    
  218. K. Purohit & A.N. Rajagopalan
    Splicing Localization in Motion Blurred 3D Scenes
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3922-3926
    DOI: 10.1109/ICIP.2016.7533095
    BibTeX
    @inproceedings{Purohit2016,
     author = {Purohit, K. and Rajagopalan, A. N.},
     title = {Splicing Localization in Motion Blurred 3D Scenes},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3922--3926}}
    
  219. T. Qiao
    Statistical Detection for Digital Image Forensics
    University of technology of troyes, University of technology of troyes, 2016
    BibTeX
    @phdthesis{Qiao2016,
     author = {Qiao, Tong},
     title = {Statistical Detection for Digital Image Forensics},
     school = {University of technology of troyes},
     year = {2016}}
    
  220. C. Qin, P. Ji, J. Wang & C.-C. Chang
    Fragile image watermarking scheme based on VQ index sharing and self-embedding
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-015-3218-9
    BibTeX
    @article{Qin2016,
     author = {Qin, Chuan and Ji, Ping and Wang, Jinwei and Chang, Chin-Chen},
     title = {Fragile image watermarking scheme based on VQ index sharing and self-embedding},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  221. M. Ramya & P. Sridevi
    Mage Forgery Detection Using Improved SLIC
    International Research Journal of Engineering and Technology (IRJET), 2016, Vol. 3(12), pp. 1350-1356
    BibTeX
    @article{Ramya2016,
     author = {Ramya, M. and Sridevi, P.},
     title = {Mage Forgery Detection Using Improved SLIC},
     journal = {International Research Journal of Engineering and Technology (IRJET)},
     year = {2016},
     volume = {3},
     number = {12},
     pages = {1350--1356}}
    
  222. Q. Rao, J. Wang & L. Zhang
    Enhancing Source Camera Identification Based on Multiplicative Denoising Filter
    Proc. IEEE Trustcom/BigDataSE/ISPA
    2016, pp. 983-988
    DOI: 10.1109/TrustCom.2016.0165
    BibTeX
    @inproceedings{Rao2016a,
     author = {Rao, Q. and Wang, J. and Zhang, L.},
     title = {Enhancing Source Camera Identification Based on Multiplicative Denoising Filter},
     booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA},
     year = {2016},
     pages = {983--988}}
    
  223. Y. Rao & J. Ni
    A deep learning approach to detection of splicing and copy-move forgeries in images
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823911
    BibTeX
    @inproceedings{Rao2016,
     author = {Rao, Y. and Ni, J.},
     title = {A deep learning approach to detection of splicing and copy-move forgeries in images},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  224. dos Reis & G.A.A. Costa
    Implementação Do Algoritmo De Detecção De Cópia/clonagem Na Análise Forense De Imagens Digitais
    Acta De Ciências E Saúde, 2016
    BibTeX
    @article{dosReis2016,
     author = {dos Reis and Costa, Gustavo Aranha Araújo},
     title = {Implementação Do Algoritmo De Detecção De Cópia/clonagem Na Análise Forense De Imagens Digitais},
     journal = {Acta De Ciências E Saúde},
     year = {2016}}
    
  225. J. Ren, J. Han & M. Dalla Mura
    Special issue on multimodal data fusion for multidimensional signal processing
    Multidimensional Systems and Signal Processing, Springer, 2016, Vol. 27(4), pp. 801
    DOI: 10.1007/s11045-016-0441-0
    BibTeX
    @article{Ren2016,
     author = {Ren, Jinchang and Han, Junwei and Dalla Mura, Mauro},
     title = {Special issue on multimodal data fusion for multidimensional signal processing},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2016},
     volume = {27},
     number = {4},
     pages = {801}}
    
  226. Y. Ren, J. Shen, Y. Zheng, J. Wang & H.-C. Chao
    Efficient data integrity auditing for storage security in mobile health cloud
    Peer-to-Peer Networking and Applications, Springer, 2016, Vol. 9(5), pp. 854
    DOI: 10.1007/s12083-015-0346-y
    BibTeX
    @article{Ren2016a,
     author = {Ren, Yongjun and Shen, Jian and Zheng, Yuhui and Wang, Jin and Chao, Han-Chieh},
     title = {Efficient data integrity auditing for storage security in mobile health cloud},
     journal = {Peer-to-Peer Networking and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {9},
     number = {5},
     pages = {854}}
    
  227. K.H. Rhee
    Downscaling Forgery Detection Using Pixel Value's Gradients of Digital Image
    Journal of the Institute of Electronics and Information Engineers, 2016
    DOI: 10.5573/ieie.2016.53.2.047
    BibTeX
    @article{Rhee2016,
     author = {Rhee, Kang Hyeon},
     title = {Downscaling Forgery Detection Using Pixel Value's Gradients of Digital Image},
     journal = {Journal of the Institute of Electronics and Information Engineers},
     year = {2016}}
    
  228. K.H. Rhee
    Gaussian filtering detection using band pass residual and contrast of forgery image
    Proc. Electronics and Mobile Communication Conf 2016 IEEE 7th Annual Information Technology (IEMCON)
    2016, pp. 1-4
    DOI: 10.1109/IEMCON.2016.7746310
    BibTeX
    @inproceedings{Rhee2016a,
     author = {Rhee, K. H.},
     title = {Gaussian filtering detection using band pass residual and contrast of forgery image},
     booktitle = {Proc. Electronics and Mobile Communication Conf 2016 IEEE 7th Annual Information Technology (IEMCON)},
     year = {2016},
     pages = {1--4}}
    
  229. K.H. Rhee
    Median Filtering Detection Using Variation of Neighboring Line Pairs for Image Forensic
    Proc. IEEE 5th Int Consumer Electronics - Berlin (ICCE-Berlin) Conf
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 25(5), pp. 103-107
    DOI: 10.1117/1.JEI.25.5.053039
    BibTeX
    @inproceedings{Rhee2016b,
     author = {Rhee, K. H.},
     title = {Median Filtering Detection Using Variation of Neighboring Line Pairs for Image Forensic},
     booktitle = {Proc. IEEE 5th Int Consumer Electronics - Berlin (ICCE-Berlin) Conf},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2016},
     volume = {25},
     number = {5},
     pages = {103--107}}
    
  230. P. Rota, E. Sangineto, V. Conotter & C. Pramerdorfer
    Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?
    Proc. 23rd Int. Conf. Pattern Recognition (ICPR)
    2016, pp. 2503-2508
    DOI: 10.1109/ICPR.2016.7900012
    BibTeX
    @inproceedings{Rota2016,
     author = {Rota, P. and Sangineto, E. and Conotter, V. and Pramerdorfer, C.},
     title = {Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?},
     booktitle = {Proc. 23rd Int. Conf. Pattern Recognition (ICPR)},
     year = {2016},
     pages = {2503--2508}}
    
  231. P. Rota, E. Sangineto, V. Conotter & C. Pramerdorfer
    Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?
    Proc. 23rd Int. Conf. Pattern Recognition (ICPR)
    2016, pp. 2503-2508
    DOI: 10.1109/ICPR.2016.7900012
    BibTeX
    @inproceedings{Rota2016a,
     author = {Rota, P. and Sangineto, E. and Conotter, V. and Pramerdorfer, C.},
     title = {Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?},
     booktitle = {Proc. 23rd Int. Conf. Pattern Recognition (ICPR)},
     year = {2016},
     pages = {2503--2508}}
    
  232. G.K. Saini & M. Mahajan
    Improvement in Copy-Move Forgery Detection Using Hybrid Approach
    International Journal of Modern Education & Computer Science, 2016
    BibTeX
    @article{Saini2016,
     author = {Saini, Gurmeet Kaur and Mahajan, Manish},
     title = {Improvement in Copy-Move Forgery Detection Using Hybrid Approach},
     journal = {International Journal of Modern Education & Computer Science},
     year = {2016}}
    
  233. N.S. Saji & R. Rajan
    Identification of source-enhanced composite images
    Proc. Int. Conf. Emerging Technological Trends (ICETT)
    2016, pp. 1-6
    DOI: 10.1109/ICETT.2016.7873666
    BibTeX
    @inproceedings{Saji2016,
     author = {Saji, N. S. and Rajan, R.},
     title = {Identification of source-enhanced composite images},
     booktitle = {Proc. Int. Conf. Emerging Technological Trends (ICETT)},
     year = {2016},
     pages = {1--6}}
    
  234. S. Salekin, R. Kushol & H. Kabir
    An Efficient Circular Block Approach for Copy-Move Forgery Detection
    IUT JOURNAL OF ENGINEERING AND TECHNOLOGY (JET), 2016, Vol. 12(2), pp. 9-20
    BibTeX
    @article{Salekin2016,
     author = {Salekin, Sirajus and Kushol, Rafsanjany and Kabir, Hasanul},
     title = {An Efficient Circular Block Approach for Copy-Move Forgery Detection},
     journal = {IUT JOURNAL OF ENGINEERING AND TECHNOLOGY (JET)},
     year = {2016},
     volume = {12},
     number = {2},
     pages = {9--20}}
    
  235. V.U. Sameer, S. Sugumaran & R. Naskar
    Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches
    Information Systems Security, Springer, 2016
    DOI: 10.1007/978-3-319-49806-5_22
    BibTeX
    @article{Sameer2016,
     author = {Sameer, Venkata Udaya and Sugumaran, S. and Naskar, Ruchira},
     title = {Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches},
     journal = {Information Systems Security},
     publisher = {Springer},
     year = {2016}}
    
  236. A.L. Sandoval Orozco, J.R. Corripio, L.J. García Villalba & J.C. Hernández Castro
    Image Source Acquisition Identification of Mobile Devices Based on the Use of Features
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(12), pp. 7087
    DOI: 10.1007/s11042-015-2633-2
    BibTeX
    @article{SandovalOrozco2016,
     author = {Sandoval Orozco, Ana Lucila and Corripio, Jocelin Rosales and García Villalba, Luis Javier and Hernández Castro, Julio César},
     title = {Image Source Acquisition Identification of Mobile Devices Based on the Use of Features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {12},
     pages = {7087}}
    
  237. O. Saurer, G. Baatz, K. Köser, L. Ladický & M. Pollefeys
    Image Based Geo-localization in the Alps
    International Journal of Computer Vision, Springer, 2016, Vol. 116(3), pp. 213
    DOI: 10.1007/s11263-015-0830-0
    BibTeX
    @article{Saurer2016,
     author = {Saurer, Olivier and Baatz, Georges and Köser, Kevin and Ladický, L’ubor and Pollefeys, Marc},
     title = {Image Based Geo-localization in the Alps},
     journal = {International Journal of Computer Vision},
     publisher = {Springer},
     year = {2016},
     volume = {116},
     number = {3},
     pages = {213}}
    
  238. O. Saurer, G. Baatz, K. Köser, L. Ladický & M. Pollefeys
    Image-based Large-scale Geo-localization in Mountainous Regions
    Large-Scale Visual Geo-Localization, Springer, 2016
    DOI: 10.1007/978-3-319-25781-5_11
    BibTeX
    @article{Saurer2016a,
     author = {Saurer, Olivier and Baatz, Georges and Köser, Kevin and Ladický, L’ubor and Pollefeys, Marc},
     title = {Image-based Large-scale Geo-localization in Mountainous Regions},
     journal = {Large-Scale Visual Geo-Localization},
     publisher = {Springer},
     year = {2016}}
    
  239. V. Schetinger, M. Iuliani, A. Piva & M.M. Oliveira
    Digital Image Forensics Vs. Image Composition: An Indirect Arms Race
    arXiv preprint arXiv:1601.03239, 2016
    DOI: 10.1109/wifs.2015.7368598
    BibTeX
    @article{Schetinger2016,
     author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.},
     title = {Digital Image Forensics Vs. Image Composition: An Indirect Arms Race},
     journal = {arXiv preprint arXiv:1601.03239},
     year = {2016}}
    
  240. V. Schetinger, M. Iuliani, A. Piva & M.M. Oliveira
    Digital Image Forensics vs. Image Composition: An Indirect Arms Race
    arxiv, 2016
    BibTeX
    @article{Schetinger2016a,
     author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.},
     title = {Digital Image Forensics vs. Image Composition: An Indirect Arms Race},
     journal = {arxiv},
     year = {2016}}
    
  241. R. Sekhar & R.S. Shaji
    A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor
    Suresh, P. L. & Panigrahi, K. B. (ed.)
    Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2
    Chapter A Study on Segmentation-Based Copy-Move Forgery Detection Using DAISY Descriptor
    Springer India, 2016, pp. 223-233
    DOI: 10.1007/978-81-322-2674-1_23
    BibTeX
    @inbook{Sekhar2016b,
     author = {Sekhar, Resmi and Shaji, R. S.},
     title = {A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor},
     booktitle = {Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2},
     publisher = {Springer India},
     year = {2016},
     pages = {223--233}}
    
  242. R. Serizel, V. Bisot, S. Essid & G. Richard
    Machine listening techniques as a complement to video image analysis in forensics
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 948-952
    DOI: 10.1109/ICIP.2016.7532497
    BibTeX
    @inproceedings{Serizel2016,
     author = {Serizel, R. and Bisot, V. and Essid, S. and Richard, G.},
     title = {Machine listening techniques as a complement to video image analysis in forensics},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {948--952}}
    
  243. A. Shahroudnejad & M. Rahmati
    Copy-move forgery detection in digital images using affine-SIFT
    Proc. 2nd Int. Conf. of Signal Processing and Intelligent Systems (ICSPIS)
    2016, pp. 1-5
    DOI: 10.1109/ICSPIS.2016.7869896
    BibTeX
    @inproceedings{Shahroudnejad2016,
     author = {Shahroudnejad, A. and Rahmati, M.},
     title = {Copy-move forgery detection in digital images using affine-SIFT},
     booktitle = {Proc. 2nd Int. Conf. of Signal Processing and Intelligent Systems (ICSPIS)},
     year = {2016},
     pages = {1--5}}
    
  244. S. Sharma & S.V. Dhavale
    A review of passive forensic techniques for detection of copy-move attacks on digital videos
    Proc. 3rd Int. Conf. Advanced Computing and Communication Systems (ICACCS)
    2016, Vol. 01, pp. 1-6
    DOI: 10.1109/ICACCS.2016.7586396
    BibTeX
    @inproceedings{Sharma2016,
     author = {Sharma, S. and Dhavale, S. V.},
     title = {A review of passive forensic techniques for detection of copy-move attacks on digital videos},
     booktitle = {Proc. 3rd Int. Conf. Advanced Computing and Communication Systems (ICACCS)},
     year = {2016},
     volume = {01},
     pages = {1--6}}
    
  245. S. Sharma, A.V. Subramanyam, M. Jain, A. Mehrish & S. Emmanuel
    Anti-forensic technique for median filtering using L1-L2 TV model
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823571
    BibTeX
    @inproceedings{Sharma2016a,
     author = {Sharma, S. and Subramanyam, A. V. and Jain, M. and Mehrish, A. and Emmanuel, S.},
     title = {Anti-forensic technique for median filtering using L1-L2 TV model},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  246. P.M. Shelke & R.S. Prasad
    Improved JPEG Anti-forensics Using Non Local Means De-noising
    Advances in Innovative Engineering and Technologies, 2016
    BibTeX
    @article{Shelke2016,
     author = {Shelke, P. M. and Prasad, Rajesh S.},
     title = {Improved JPEG Anti-forensics Using Non Local Means De-noising},
     journal = {Advances in Innovative Engineering and Technologies},
     year = {2016}}
    
  247. G. Sheng & T. Gao
    Detection of Seam-carving Image Based on Benford}s Law for Forensic Applications
    International Journal of Digital Crime and Forensics (IJDCF), 2016, Vol. 8(1)
    DOI: 10.4018/IJDCF.2016010104
    BibTeX
    @article{Sheng2016a,
     author = {Sheng, Guorui and Gao, Tiegang},
     title = {Detection of Seam-carving Image Based on Benford}s Law for Forensic Applications},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2016},
     volume = {8},
     number = {1}}
    
  248. G. Sheng, T. Li, Q. Su, B. Chen & Y. Tang
    Detection of Content-aware Image Resizing Based on Benford}s Law
    Soft Computing, 2016, pp. 1-9
    DOI: 10.1007/s00500-016-2146-6
    BibTeX
    @article{Sheng2016,
     author = {Sheng, Guorui and Li, Tao and Su, Qingtang and Chen, Beijing and Tang, Yi},
     title = {Detection of Content-aware Image Resizing Based on Benford}s Law},
     journal = {Soft Computing},
     year = {2016},
     pages = {1--9}}
    
  249. Y.D. Shin
    Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm
    IJSIA, Science and Engineering Research Support Society, 2016, Vol. 10(5), pp. 203-214
    DOI: 10.14257/ijsia.2016.10.5.19
    BibTeX
    @article{Shin2016a,
     author = {Shin, Y. D.},
     title = {Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm},
     journal = {IJSIA},
     publisher = {Science and Engineering Research Support Society},
     year = {2016},
     volume = {10},
     number = {5},
     pages = {203--214}}
    
  250. Y.-D. Shin
    Fast Exploration of Copy-move Forgery Image
    Advanced Science and Technology Letters, 2016
    DOI: 10.9717/kmms.2013.16.4.411
    BibTeX
    @article{Shin2016,
     author = {Shin, Yong-Dal},
     title = {Fast Exploration of Copy-move Forgery Image},
     journal = {Advanced Science and Technology Letters},
     year = {2016}}
    
  251. G. Singh & K. Singh
    Forensics for partially double compressed doctored JPEG images
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4290-5
    BibTeX
    @article{Singh2016b,
     author = {Singh, Gurinder and Singh, Kulbir},
     title = {Forensics for partially double compressed doctored JPEG images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  252. N. Singh & A. Gupta
    Analysis of contrast enhancement forensics in compressed and uncompressed images
    Proc. Int. Conf. Signal Processing and Communication (ICSC)
    2016, pp. 303-307
    DOI: 10.1109/ICSPCom.2016.7980596
    BibTeX
    @inproceedings{Singh2016c,
     author = {Singh, N. and Gupta, A.},
     title = {Analysis of contrast enhancement forensics in compressed and uncompressed images},
     booktitle = {Proc. Int. Conf. Signal Processing and Communication (ICSC)},
     year = {2016},
     pages = {303--307}}
    
  253. N. Singh & S. Joshi
    Digital Image Forensics and Counter Anti-forensics
    Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, Springer, 2016
    DOI: 10.1007/978-81-322-2638-3_90
    BibTeX
    @article{Singh2016,
     author = {Singh, Neha and Joshi, Sandeep},
     title = {Digital Image Forensics and Counter Anti-forensics},
     journal = {Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing},
     publisher = {Springer},
     year = {2016}}
    
  254. N. Singh & S. Joshi
    Digital Image Forensics and Counter Anti-forensics
    Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing
    Springer, 2016
    DOI: 10.1007/978-81-322-2638-3_90
    BibTeX
    @incollection{Singh2016a,
     author = {Singh, Neha and Joshi, Sandeep},
     title = {Digital Image Forensics and Counter Anti-forensics},
     booktitle = {Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing},
     publisher = {Springer},
     year = {2016}}
    
  255. G. Soman & J.K. John
    Block-based Forgery Detection Using Global and Local Features
    Proceedings of the International Conference on Soft Computing Systems, Springer, 2016
    DOI: 10.1007/978-81-322-2671-0_14
    BibTeX
    @article{Soman2016,
     author = {Soman, Gayathri and John, Jyothish K.},
     title = {Block-based Forgery Detection Using Global and Local Features},
     journal = {Proceedings of the International Conference on Soft Computing Systems},
     publisher = {Springer},
     year = {2016}}
    
  256. A.R. Soobhany, A. Sheikh-Akbari & Z.C. Schreuders
    Source Camera Identification Using Non-decimated Wavelet Transform
    Global Security, Safety and Sustainability - The Security Challenges of the Connected World, Springer, 2016
    DOI: 10.1007/978-3-319-51064-4_11
    BibTeX
    @article{Soobhany2016,
     author = {Soobhany, Ahmad Ryad and Sheikh-Akbari, Akbar and Schreuders, Z. Cliffe},
     title = {Source Camera Identification Using Non-decimated Wavelet Transform},
     journal = {Global Security, Safety and Sustainability - The Security Challenges of the Connected World},
     publisher = {Springer},
     year = {2016}}
    
  257. J. Sreelakshmy I & J. Anver
    An improved method for copy-move forgery detection in digital forensic
    Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)
    2016, pp. 1-4
    DOI: 10.1109/GET.2016.7916684
    BibTeX
    @inproceedings{SreelakshmyI2016,
     author = {Sreelakshmy I, J. and Anver, J.},
     title = {An improved method for copy-move forgery detection in digital forensic},
     booktitle = {Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)},
     year = {2016},
     pages = {1--4}}
    
  258. C. Srinivasa Rao & S.B.G. Tilak Babu
    Image Authentication Using Local Binary Pattern on the Low Frequency Components
    Microelectronics, Electromagnetics and Telecommunications, Springer, 2016
    DOI: 10.1007/978-81-322-2728-1_49
    BibTeX
    @article{SrinivasaRao2016,
     author = {Srinivasa Rao, Ch. and Tilak Babu, S. B. G.},
     title = {Image Authentication Using Local Binary Pattern on the Low Frequency Components},
     journal = {Microelectronics, Electromagnetics and Telecommunications},
     publisher = {Springer},
     year = {2016}}
    
  259. C. Srinivasa Rao & S.B.G. Tilak Babu
    Image Authentication Using Local Binary Pattern on the Low Frequency Components
    Microelectronics, Electromagnetics and Telecommunications
    Springer, 2016
    DOI: 10.1007/978-81-322-2728-1_49
    BibTeX
    @incollection{SrinivasaRao2016a,
     author = {Srinivasa Rao, Ch. and Tilak Babu, S. B. G.},
     title = {Image Authentication Using Local Binary Pattern on the Low Frequency Components},
     booktitle = {Microelectronics, Electromagnetics and Telecommunications},
     publisher = {Springer},
     year = {2016}}
    
  260. X. Su, B. Zhang, L. Yang, Z. Li & Y. Yang
    Scale Invariant Kernelized Correlation Filter Based on Gaussian Output
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_50
    BibTeX
    @article{Su2016,
     author = {Su, Xiangbo and Zhang, Baochang and Yang, Linlin and Li, Zhigang and Yang, Yun},
     title = {Scale Invariant Kernelized Correlation Filter Based on Gaussian Output},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  261. K. Sudhakar, V.M. Sandeep & S. Kulkarni
    Redundant sift features via level sets for fast copy move forgery detection
    Proc. Int. Conf. Signal and Information Processing (IConSIP)
    2016, pp. 1-4
    DOI: 10.1109/ICONSIP.2016.7857475
    BibTeX
    @inproceedings{Sudhakar2016,
     author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.},
     title = {Redundant sift features via level sets for fast copy move forgery detection},
     booktitle = {Proc. Int. Conf. Signal and Information Processing (IConSIP)},
     year = {2016},
     pages = {1--4}}
    
  262. A. Taimori, F. Razzazi, A. Behrad, A. Ahmadi & M. Babaie-Zadeh
    A Novel Forensic Image Analysis Tool for Discovering Double JPEG Compression Clues
    Multimedia Tools and Applications, 2016, pp. 1-35
    DOI: 10.1007/s11042-016-3409-z
    BibTeX
    @article{Taimori2016,
     author = {Taimori, Ali and Razzazi, Farbod and Behrad, Alireza and Ahmadi, Ali and Babaie-Zadeh, Massoud},
     title = {A Novel Forensic Image Analysis Tool for Discovering Double JPEG Compression Clues},
     journal = {Multimedia Tools and Applications},
     year = {2016},
     pages = {1--35}}
    
  263. Y. Tan, B. Wang, M. Li, Y. Guo, X. Kong & Y. Shi
    Digital-forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
    Shi, Y.-Q., Kim, J. H., Pérez-González, F. & Echizen, I. (ed.)
    Volume 9569 of the series Lecture Notes in Computer Science
    Chapter Camera Source Identification with Limited Labeled Training Set
    Springer International Publishing, 2016, pp. 18-27
    DOI: 10.1007/978-3-319-31960-5_2
    BibTeX
    @inbook{Tan2016,
     author = {Tan, Yue and Wang, Bo and Li, Ming and Guo, Yanqing and Kong, Xiangwei and Shi, Yunqing},
     title = {Digital-forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
     booktitle = {Volume 9569 of the series Lecture Notes in Computer Science},
     publisher = {Springer International Publishing},
     year = {2016},
     pages = {18--27}}
    
  264. S. Taspinar, M. Mohanty & N. Memon
    PRNU Based Source Attribution with a Collection of Seam-carved Images
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 156-160
    DOI: 10.1109/ICIP.2016.7532338
    BibTeX
    @inproceedings{Taspinar2016,
     author = {Taspinar, S. and Mohanty, M. and Memon, N.},
     title = {PRNU Based Source Attribution with a Collection of Seam-carved Images},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {156--160}}
    
  265. S. Teerakanok & T. Uehara
    Enhancing Image Forgery Detection Using 2-d Cross Products
    Advances in Digital Forensics XII
    Springer, 2016
    DOI: 10.1007/978-3-319-46279-0_15
    BibTeX
    @incollection{Teerakanok2016,
     author = {Teerakanok, Songpon and Uehara, Tetsutaro},
     title = {Enhancing Image Forgery Detection Using 2-d Cross Products},
     booktitle = {Advances in Digital Forensics XII},
     publisher = {Springer},
     year = {2016}}
    
  266. T.H. Thai, F. Retraint & R. Cogranne
    Camera model identification based on the generalized noise model in natural images
    Digital Signal Processing, Elsevier BV, 2016, Vol. 48, pp. 285-297
    DOI: 10.1016/j.dsp.2015.10.002
    BibTeX
    @article{Thai2016,
     author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi},
     title = {Camera model identification based on the generalized noise model in natural images},
     journal = {Digital Signal Processing},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {48},
     pages = {285--297}}
    
  267. M.K. Thakur, V. Saxena & J.P. Gupta
    Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video
    Satapathy, C. S., Mandal, K. J., Udgata, K. S. & Bhateja, V. (ed.)
    Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3
    Chapter Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video
    Springer India, 2016, pp. 451-459
    DOI: 10.1007/978-81-322-2757-1_45
    BibTeX
    @inbook{Thakur2016,
     author = {Thakur, Manish K. and Saxena, Vikas and Gupta, J. P.},
     title = {Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video},
     booktitle = {Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3},
     publisher = {Springer India},
     year = {2016},
     pages = {451--459}}
    
  268. V. Thirunavukkarasu & J.S. Kumar
    A Novel Method to Detect Copy-move Tampering in Digital Images
    Indian Journal of Science and Technology, 2016, Vol. 9(8)
    DOI: 10.17485/ijst/2016/v9i8/87900
    BibTeX
    @article{Thirunavukkarasu2016,
     author = {Thirunavukkarasu, V. and Kumar, J. Satheesh},
     title = {A Novel Method to Detect Copy-move Tampering in Digital Images},
     journal = {Indian Journal of Science and Technology},
     year = {2016},
     volume = {9},
     number = {8}}
    
  269. V. Thirunavukkarasu & J.S. Kumar
    Passive image tamper detection based on Fast Retina Key Point Descriptor
    Proc. IEEE Int. Conf. Advances in Computer Applications (ICACA)
    2016, pp. 279-285
    DOI: 10.1109/ICACA.2016.7887966
    BibTeX
    @inproceedings{Thirunavukkarasu2016a,
     author = {Thirunavukkarasu, V. and Kumar, J. S.},
     title = {Passive image tamper detection based on Fast Retina Key Point Descriptor},
     booktitle = {Proc. IEEE Int. Conf. Advances in Computer Applications (ICACA)},
     year = {2016},
     pages = {279--285}}
    
  270. L.-T. Thuong, H.-K. Tu & B.-D. Sinh
    Blind Image Forgeries Detection Using Detail Components from the Wavelet Transform
    Frontiers in Artificial Intelligence and Applications, IOS Press, 2016, Vol. 282(Advances in Digital Technologies), pp. 91-104
    DOI: 10.3233/978-1-61499-637-8-91
    BibTeX
    @article{Le-Tien2016,
     author = {Thuong, Le-Tien and Tu, Huynh-Kha and Sinh, Bui-Duc},
     title = {Blind Image Forgeries Detection Using Detail Components from the Wavelet Transform},
     journal = {Frontiers in Artificial Intelligence and Applications},
     publisher = {IOS Press},
     year = {2016},
     volume = {282},
     number = {Advances in Digital Technologies},
     pages = {91--104}}
    
  271. M.J. Tsai, C.L. Hsu, J.S. Yin & I. Yuadi
    Digital forensics for printed character source identification
    Proc. IEEE Int. Conf. Multimedia and Expo (ICME)
    2016, pp. 1-6
    DOI: 10.1109/ICME.2016.7552892
    BibTeX
    @inproceedings{Tsai2016,
     author = {Tsai, M. J. and Hsu, C. L. and Yin, J. S. and Yuadi, I.},
     title = {Digital forensics for printed character source identification},
     booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo (ICME)},
     year = {2016},
     pages = {1--6}}
    
  272. A. Tuama
    Camera Model Identification Based Machine Learning Approach with High Order Statistics Features
    Poc. of the 24th European Signal Processing Conference (EUSIPCO 2016), 2016
    BibTeX
    @article{Tuama2016a,
     author = {Tuama, A.},
     title = {Camera Model Identification Based Machine Learning Approach with High Order Statistics Features},
     journal = {Poc. of the 24th European Signal Processing Conference (EUSIPCO 2016)},
     year = {2016}}
    
  273. A. Tuama, F. Comby & M. Chaumont
    Source Camera Model Identification Using Features from Contaminated Sensor Noise
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_8
    BibTeX
    @article{Tuama2016,
     author = {Tuama, Amel and Comby, Frederic and Chaumont, Marc},
     title = {Source Camera Model Identification Using Features from Contaminated Sensor Noise},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  274. A. Tuama, F. Comby & M. Chaumont.
    Camera Model Identification with the Use of Deep Convolutional Neural Networks
    IEEE International Workshop on Information Forensics and Security, Dec 201, 2016
    BibTeX
    @article{Tuama2016b,
     author = {Tuama, Amel and Comby, Frederic and Chaumont., Marc},
     title = {Camera Model Identification with the Use of Deep Convolutional Neural Networks},
     journal = {IEEE International Workshop on Information Forensics and Security, Dec 201},
     year = {2016}}
    
  275. I. Tuba, E. Tuba & M. Beko
    Digital image forgery detection based on shadow texture features
    Proc. 24th Telecommunications Forum (TELFOR)
    2016, pp. 1-4
    DOI: 10.1109/TELFOR.2016.7818875
    BibTeX
    @inproceedings{Tuba2016,
     author = {Tuba, I. and Tuba, E. and Beko, M.},
     title = {Digital image forgery detection based on shadow texture features},
     booktitle = {Proc. 24th Telecommunications Forum (TELFOR)},
     year = {2016},
     pages = {1--4}}
    
  276. M.B.E. Tuba & R. Jovanovic
    Overlapping Block Based Algorithm for Copy-move Forgery Detection in Digital Images
    International Journal of Computers, 2016
    BibTeX
    @article{Brajic2016,
     author = {Tuba, Momcilo Brajicand Eva and Jovanovic, Raka},
     title = {Overlapping Block Based Algorithm for Copy-move Forgery Detection in Digital Images},
     journal = {International Journal of Computers},
     year = {2016}}
    
  277. D.M. Uliyan, H.A. Jalab, A.W.A. Wahab & S. Sadeghi
    Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-points
    Symmetry, 2016
    DOI: 10.3390/sym8070062
    BibTeX
    @article{Uliyan2016a,
     author = {Uliyan, Diaa M. and Jalab, Hamid A. and Wahab, Ainuddin W. Abdul and Sadeghi, Somayeh},
     title = {Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-points},
     journal = {Symmetry},
     year = {2016}}
    
  278. D.M. Uliyan, H.A. Jalab, A.W.A. Wahab, P. Shivakumara & S. Sadeghi
    A Novel Forged Blurred Region Detection System for Image Forensic Applications
    Expert Systems with Applications, Elsevier BV, 2016, Vol. 64, pp. 1-10
    DOI: 10.1016/j.eswa.2016.07.026
    BibTeX
    @article{Uliyan2016,
     author = {Uliyan, Diaa M. and Jalab, Hamid A. and Wahab, Ainuddin W. Abdul and Shivakumara, Palaiahnakote and Sadeghi, Somayeh},
     title = {A Novel Forged Blurred Region Detection System for Image Forensic Applications},
     journal = {Expert Systems with Applications},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {64},
     pages = {1--10}}
    
  279. B. Ustubioglu, G. Ulutas, M. Ulutas, V. Nabiyev & A. Ustubioglu
    LBP-DCT Based Copy Move Forgery Detection Algorithm
    Lecture Notes in Electrical Engineering
    Springer, 2016, pp. 127-136
    DOI: 10.1007/978-3-319-22635-4_11
    BibTeX
    @incollection{Ustubioglu2016,
     author = {Ustubioglu, Beste and Ulutas, Guzin and Ulutas, Mustafa and Nabiyev, Vasif and Ustubioglu, Arda},
     title = {LBP-DCT Based Copy Move Forgery Detection Algorithm},
     booktitle = {Lecture Notes in Electrical Engineering},
     publisher = {Springer},
     year = {2016},
     pages = {127--136}}
    
  280. B. Ustubioglu, G. Ulutas, M. Ulutas & V.V. Nabiyev
    Improved Copy-move Forgery Detection Based on the Clds and Colour Moments
    The Imaging Science Journal, 2016, Vol. 64(4), pp. 215-225
    DOI: 10.1080/13682199.2016.1162922
    BibTeX
    @article{Ustubioglu2016a,
     author = {Ustubioglu, B. and Ulutas, G. and Ulutas, M. and Nabiyev, V. V.},
     title = {Improved Copy-move Forgery Detection Based on the Clds and Colour Moments},
     journal = {The Imaging Science Journal},
     year = {2016},
     volume = {64},
     number = {4},
     pages = {215--225}}
    
  281. B. Ustubioglu, G. Ulutas, M. Ulutas & V.V. Nabiyev
    A New Copy Move Forgery Detection Technique with Automatic Threshold Determination
    AEU\ - International Journal of Electronics and Communications, 2016, pp. -
    DOI: 10.1016/j.aeue.2016.05.005
    BibTeX
    @article{Ustubioglu2016b,
     author = {Ustubioglu, Beste and Ulutas, Guzin and Ulutas, Mustafa and Nabiyev, Vasif V.},
     title = {A New Copy Move Forgery Detection Technique with Automatic Threshold Determination},
     journal = {AEU\ - International Journal of Electronics and Communications},
     year = {2016},
     pages = {-}}
    
  282. D. Vaishnavi & T.S. Subashini
    Recognizing Image Splicing Forgeries Using Histogram Features
    2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC)
    2016, pp. 1-4
    DOI: 10.1109/ICBDSC.2016.7460342
    BibTeX
    @inproceedings{Vaishnavi2016,
     author = {Vaishnavi, D. and Subashini, T. S.},
     title = {Recognizing Image Splicing Forgeries Using Histogram Features},
     booktitle = {2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC)},
     year = {2016},
     pages = {1--4}}
    
  283. L.J.G. Villalba, A.L.S. Orozco, J.R. Corripio & J. Hernandez-Castro
    A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques
    Future Generation Computer Systems, Elsevier, 2016
    DOI: 10.1016/j.future.2016.11.007
    BibTeX
    @article{Villalba2016a,
     author = {Villalba, Luis Javier Garc\ia and Orozco, Ana Lucila Sandoval and Corripio, Jocelin Rosales and Hernandez-Castro, Julio},
     title = {A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques},
     journal = {Future Generation Computer Systems},
     publisher = {Elsevier},
     year = {2016}}
    
  284. L.J.G. Villalba, A.L.S. Orozco, R.R. López & J.H. Castro
    Identification of Smartphone Brand and Model Via Forensic Video Analysis
    Expert Systems with Applications, 2016, Vol. 55, pp. 59-69
    DOI: 10.1016/j.eswa.2016.01.025
    BibTeX
    @article{Villalba2016,
     author = {Villalba, Luis Javier García and Orozco, Ana Lucila Sandoval and López, Raquel Ramos and Castro, Julio Hernandez},
     title = {Identification of Smartphone Brand and Model Via Forensic Video Analysis},
     journal = {Expert Systems with Applications},
     year = {2016},
     volume = {55},
     pages = {59--69}}
    
  285. H. Wang, H. Wang & C. Shi
    An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_37
    BibTeX
    @article{Wang2016o,
     author = {Wang, Huan and Wang, Hongxia and Shi, Canghong},
     title = {An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  286. H. Wang, H.-X. Wang, X.-M. Sun & Q. Qian
    A Passive Authentication Scheme for Copy-move Forgery Based on Package Clustering Algorithm
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3687-5
    BibTeX
    @article{Wang2016a,
     author = {Wang, Huan and Wang, Hong-Xia and Sun, Xing-Ming and Qian, Qing},
     title = {A Passive Authentication Scheme for Copy-move Forgery Based on Package Clustering Algorithm},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  287. J. Wang, T. Li, Y.-Q. Shi, S. Lian & J. Ye
    Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4153-0
    BibTeX
    @article{Wang2016d,
     author = {Wang, Jinwei and Li, Ting and Shi, Yun-Qing and Lian, Shiguo and Ye, Jingyu},
     title = {Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  288. Q. Wang & R. Zhang
    Double JPEG Compression Forensics Based on a Convolutional Neural Network
    EURASIP Journal on Information Security, Springer, 2016, Vol. 2016(1), pp. 1
    DOI: 10.1186/s13635-016-0047-y
    BibTeX
    @article{Wang2016b,
     author = {Wang, Qing and Zhang, Rong},
     title = {Double JPEG Compression Forensics Based on a Convolutional Neural Network},
     journal = {EURASIP Journal on Information Security},
     publisher = {Springer},
     year = {2016},
     volume = {2016},
     number = {1},
     pages = {1}}
    
  289. Q. Wang & R. Zhang
    Double JPEG compression forensics based on a convolutional neural network
    EURASIP Journal on Information Security, Springer, 2016, Vol. 2016(1), pp. 1
    DOI: 10.1186/s13635-016-0047-y
    BibTeX
    @article{Wang2016e,
     author = {Wang, Qing and Zhang, Rong},
     title = {Double JPEG compression forensics based on a convolutional neural network},
     journal = {EURASIP Journal on Information Security},
     publisher = {Springer},
     year = {2016},
     volume = {2016},
     number = {1},
     pages = {1}}
    
  290. X.-Y. Wang, S. Li, Y.-N. Liu, Y. Niu, H.-Y. Yang & Z.-l. Zhou
    A new keypoint-based copy-move forgery detection for small smooth regions
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4140-5
    BibTeX
    @article{Wang2016c,
     author = {Wang, Xiang-Yang and Li, Shuo and Liu, Yu-Nan and Niu, Ying and Yang, Hong-Ying and Zhou, Zhi-li},
     title = {A new keypoint-based copy-move forgery detection for small smooth regions},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  291. X.-y. Wang, Y.-n. Liu, H. Xu, P. Wang & H.-y. Yang
    Robust Copy-move Forgery Detection Using Quaternion Exponent Moments
    Pattern Analysis and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s10044-016-0588-1
    BibTeX
    @article{Wang2016,
     author = {Wang, Xiang-yang and Liu, Yu-nan and Xu, Huan and Wang, Pei and Yang, Hong-ying},
     title = {Robust Copy-move Forgery Detection Using Quaternion Exponent Moments},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  292. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    A Scaling Robust Copy-paste Tampering Detection for Digital Image Forensics
    Procedia Computer Science, 2016, Vol. 79, pp. 458-465
    DOI: 10.1016/j.procs.2016.03.059
    BibTeX
    @article{Warbhe2016,
     author = {Warbhe, Anil Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {A Scaling Robust Copy-paste Tampering Detection for Digital Image Forensics},
     journal = {Procedia Computer Science},
     year = {2016},
     volume = {79},
     pages = {458--465}}
    
  293. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    Computationally Efficient Digital Image Forensic Method for Image Authentication
    Procedia Computer Science, 2016, Vol. 78, pp. 464-470
    DOI: 10.1016/j.procs.2016.02.089
    BibTeX
    @article{Warbhe2016a,
     author = {Warbhe, Anil Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {Computationally Efficient Digital Image Forensic Method for Image Authentication},
     journal = {Procedia Computer Science},
     year = {2016},
     volume = {78},
     pages = {464--470}}
    
  294. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    Digital Image Forensics: An Affine Transform Robust Copy-paste Tampering Detection
    Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)
    2016, pp. 1-5
    DOI: 10.1109/ISCO.2016.7727045
    BibTeX
    @inproceedings{Warbhe2016b,
     author = {Warbhe, A. Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {Digital Image Forensics: An Affine Transform Robust Copy-paste Tampering Detection},
     booktitle = {Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)},
     year = {2016},
     pages = {1--5}}
    
  295. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    Digital image forensics: An affine transform robust copy-paste tampering detection
    Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)
    2016, pp. 1-5
    DOI: 10.1109/ISCO.2016.7727045
    BibTeX
    @inproceedings{Warbhe2016c,
     author = {Warbhe, A. Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {Digital image forensics: An affine transform robust copy-paste tampering detection},
     booktitle = {Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)},
     year = {2016},
     pages = {1--5}}
    
  296. N.B.A. Warif, A.W.A. Wahab, M.Y.I. Idris, R. Ramli, R. Salleh, S. Shamshirband & K.-K.R. Choo
    Copy-move Forgery Detection: Survey, Challenges and Future Directions
    Journal of Network and Computer Applications, Elsevier BV, 2016, Vol. 75, pp. 259-278
    DOI: 10.1016/j.jnca.2016.09.008
    BibTeX
    @article{Ashraf2016,
     author = {Warif, Nor Bakiah Abd and Wahab, Ainuddin Wahid Abdul and Idris, Mohd Yamani Idna and Ramli, Roziana and Salleh, Rosli and Shamshirband, Shahaboddin and Choo, Kim-Kwang Raymond},
     title = {Copy-move Forgery Detection: Survey, Challenges and Future Directions},
     journal = {Journal of Network and Computer Applications},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {75},
     pages = {259--278}}
    
  297. B. Wen, Y. Zhu, R. Subramanian, T.T. Ng, X. Shen & S. Winkler
    COVERAGE --- A novel database for copy-move forgery detection
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 161-165
    DOI: 10.1109/ICIP.2016.7532339
    BibTeX
    @inproceedings{Wen2016a,
     author = {Wen, B. and Zhu, Y. and Subramanian, R. and Ng, T. T. and Shen, X. and Winkler, S.},
     title = {COVERAGE --- A novel database for copy-move forgery detection},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {161--165}}
    
  298. B. Wen, Y. Zhu, R. Subramanian, T.-T. Ng, X. Shen & S. Winkler
    COVERAGE Novel Database for Copy-move Forgery Detection
    ICASSP(submitted), 2016
    DOI: 10.1109/icip.2016.7532339
    BibTeX
    @article{Wen2016,
     author = {Wen, Bihan and Zhu, Ye and Subramanian, Ramanathan and Ng, Tian-Tsong and Shen, Xuanjing and Winkler, Stefan},
     title = {COVERAGE Novel Database for Copy-move Forgery Detection},
     journal = {ICASSP(submitted)},
     year = {2016}}
    
  299. S. Wenchang, Z. Fei, Q. Bo & L. Bin
    Improving Image Copy-move Forgery Detection with Particle Swarm Optimization Techniques
    China Communications, 2016, Vol. 13(1), pp. 139-149
    DOI: 10.1109/CC.2016.7405711
    BibTeX
    @article{Wenchang2016,
     author = {Wenchang, Shi and Fei, Zhao and Bo, Qin and Bin, Liang},
     title = {Improving Image Copy-move Forgery Detection with Particle Swarm Optimization Techniques},
     journal = {China Communications},
     year = {2016},
     volume = {13},
     number = {1},
     pages = {139--149}}
    
  300. D. Williams, G. Krishnalal & V.P. Jagathy Raj
    Fraudulent Image Recognition Using Stable Inherent Feature
    Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_2
    BibTeX
    @article{Williams2016,
     author = {Williams, Deny and Krishnalal, G. and Jagathy Raj, V. P.},
     title = {Fraudulent Image Recognition Using Stable Inherent Feature},
     journal = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  301. D. Williams, G. Krishnalal & V.P. Jagathy Raj
    Fraudulent Image Recognition Using Stable Inherent Feature
    Advances in Signal Processing and Intelligent Recognition Systems
    Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_2
    BibTeX
    @incollection{Williams2016a,
     author = {Williams, Deny and Krishnalal, G. and Jagathy Raj, V. P.},
     title = {Fraudulent Image Recognition Using Stable Inherent Feature},
     booktitle = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  302. M. Xia, G. Yang, L. Li, R. Li & X. Sun
    Detecting Video Frame Rate Up-conversion Based on Frame-level Analysis of Average Texture Variation
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3468-1
    BibTeX
    @article{Xia2016,
     author = {Xia, Min and Yang, Gaobo and Li, Leida and Li, Ran and Sun, Xingming},
     title = {Detecting Video Frame Rate Up-conversion Based on Frame-level Analysis of Average Texture Variation},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  303. L. Xicheng & X. Jianzhong
    Blind Identification Algorithm of Photorealistic Computer Grapic Based on Weber Local Features.
    Journal of Digital Information Management, 2016
    BibTeX
    @article{Xicheng2016,
     author = {Xicheng, Liu and Jianzhong, Xi},
     title = {Blind Identification Algorithm of Photorealistic Computer Grapic Based on Weber Local Features.},
     journal = {Journal of Digital Information Management},
     year = {2016}}
    
  304. Y. Xie & Y. Wang
    Blind Authentication for Detecting Multi-image Forgery
    Proc. SPIE, 2016, Vol. 10033, pp. 1003346-1003346-5
    DOI: 10.1117/12.2245319
    BibTeX
    @other{Xie2016,
     author = {Xie, Yi and Wang, Yulin},
     title = {Blind Authentication for Detecting Multi-image Forgery},
     journal = {Proc. SPIE},
     year = {2016},
     volume = {10033},
     pages = {1003346-1003346-5}}
    
  305. B. Xu, X. Wang, X. Zhou, J. Xi & S. Wang
    Source Camera Identification from Image Texture Features
    Neurocomputing, 2016, pp. -
    DOI: 10.1016/j.neucom.2016.05.012
    BibTeX
    @article{Xu2016,
     author = {Xu, Bingchao and Wang, Xiaofeng and Zhou, Xiaorui and Xi, Jianghuan and Wang, Shangping},
     title = {Source Camera Identification from Image Texture Features},
     journal = {Neurocomputing},
     year = {2016},
     pages = {-}}
    
  306. C.P. Yan, C.M. Pun & X.C. Yuan
    Quaternion-Based Image Hashing for Adaptive Tampering Localization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(12), pp. 2664-2677
    DOI: 10.1109/TIFS.2016.2594136
    BibTeX
    @article{Yan2016,
     author = {Yan, C. P. and Pun, C. M. and Yuan, X. C.},
     title = {Quaternion-Based Image Hashing for Adaptive Tampering Localization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {12},
     pages = {2664--2677}}
    
  307. B. Yang & H. Guo
    An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_40
    BibTeX
    @article{Yang2016b,
     author = {Yang, Bin and Guo, Honglei},
     title = {An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  308. L. Yang, T. Gao, Y. Xuan & H. Gao
    Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length
    International Journal of Digital Crime and Forensics (IJDCF), 2016
    DOI: 10.4018/IJDCF.2016040103
    BibTeX
    @article{Yang2016,
     author = {Yang, Liang and Gao, Tiegang and Xuan, Yan and Gao, Hang},
     title = {Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2016}}
    
  309. P. Yang, G. Yang & D. Zhang
    Rotation Invariant Local Binary Pattern for Blind Detection of Copy-move Forgery with Affine Transform
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_36
    BibTeX
    @article{Yang2016c,
     author = {Yang, Pei and Yang, Gaobo and Zhang, Dengyong},
     title = {Rotation Invariant Local Binary Pattern for Blind Detection of Copy-move Forgery with Affine Transform},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  310. H. Yao
    A Novel Image Noise Level Function Estimation Approach Using Camera Response Function Constraint
    Plapper, P., Guo, M. & Suhag, S. (ed.)
    MATEC Web of Conferences, EDP Sciences, 2016, Vol. 42, pp. 06004
    DOI: 10.1051/matecconf/20164206004
    BibTeX
    @article{Yao2016a,
     author = {Yao, Heng},
     title = {A Novel Image Noise Level Function Estimation Approach Using Camera Response Function Constraint},
     journal = {MATEC Web of Conferences},
     publisher = {EDP Sciences},
     year = {2016},
     volume = {42},
     pages = {06004}}
    
  311. H. Yao, S. Wang, X. Zhang, C. Qin & J. Wang
    Detecting Image Splicing Based on Noise Level Inconsistency
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3660-3
    BibTeX
    @article{Yao2016,
     author = {Yao, Heng and Wang, Shuozhong and Zhang, Xinpeng and Qin, Chuan and Wang, Jinwei},
     title = {Detecting Image Splicing Based on Noise Level Inconsistency},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  312. Y. Yao, Y. Cheng & X. Li
    Video Objects Removal Forgery Detection and Localization
    Proc. Nicograph Int. (NicoInt)
    2016, pp. 137
    DOI: 10.1109/NicoInt.2016.30
    BibTeX
    @inproceedings{Yao2016b,
     author = {Yao, Y. and Cheng, Y. and Li, X.},
     title = {Video Objects Removal Forgery Detection and Localization},
     booktitle = {Proc. Nicograph Int. (NicoInt)},
     year = {2016},
     pages = {137}}
    
  313. A. Yaşar, F. Deniz & M. Doru
    Suspect Camera Determination
    Proc. 24th Signal Processing and Communication Application Conf. (SIU)
    2016, pp. 1837-1840
    DOI: 10.1109/SIU.2016.7496120
    BibTeX
    @inproceedings{Yasar2016,
     author = {Yaşar, A. and Deniz, F. and Doru, M.},
     title = {Suspect Camera Determination},
     booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)},
     year = {2016},
     pages = {1837--1840}}
    
  314. F. Yavuz, A. Bal & H. Cukur
    An Effective Detection Algorithm for Region Duplication Forgery in Digital Images
    Casasent, D. & Alam, M. S. (ed.)
    Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O (April 20, 2016)
    Proc. SPIE, 2016, Vol. 9845, pp. 98450O-98450O-7
    DOI: 10.1117/12.2223732
    BibTeX
    @inproceedings{Yavuz2016,
     author = {Yavuz, Fatih and Bal, Abdullah and Cukur, Huseyin},
     title = {An Effective Detection Algorithm for Region Duplication Forgery in Digital Images},
     booktitle = {Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O (April 20, 2016)},
     journal = {Proc. SPIE},
     year = {2016},
     volume = {9845},
     pages = {98450O-98450O-7}}
    
  315. R.P. Yohannan & M. Manuel
    Detection of copy-move forgery based on Gabor filter
    Proc. IEEE Int. Conf. Engineering and Technology (ICETECH)
    2016, pp. 629-634
    DOI: 10.1109/ICETECH.2016.7569326
    BibTeX
    @inproceedings{Yohannan2016,
     author = {Yohannan, R. P. and Manuel, M.},
     title = {Detection of copy-move forgery based on Gabor filter},
     booktitle = {Proc. IEEE Int. Conf. Engineering and Technology (ICETECH)},
     year = {2016},
     pages = {629--634}}
    
  316. B.A.B. Youssef & E.H. Atta
    Image Forgery Detection using FREAK Binary Descriptor and Level Set Segmentation
    International Journal of Scientific & Engineering Research, Volu, 2016, Vol. 7(2)
    BibTeX
    @article{Youssef2016,
     author = {Youssef, Bayumy A. B. and Atta, Essam H.},
     title = {Image Forgery Detection using FREAK Binary Descriptor and Level Set Segmentation},
     journal = {International Journal of Scientific & Engineering Research, Volu},
     year = {2016},
     volume = {7},
     number = {2}}
    
  317. L. Yu, Q. Han & X. Niu
    Feature Point-based Copy-move Forgery Detection: Covering the Non-textured Areas
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(2), pp. 1159
    DOI: 10.1007/s11042-014-2362-y
    BibTeX
    @article{Yu2016,
     author = {Yu, Liyang and Han, Qi and Niu, Xiamu},
     title = {Feature Point-based Copy-move Forgery Detection: Covering the Non-textured Areas},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {2},
     pages = {1159}}
    
  318. Y. Yuan, Y. Zhang, S. Chen & H. Wang
    Robust Region Duplication Detection on Log-polar Domain Using Band Limitation
    Arabian Journal for Science and Engineering, Springer, 2016, pp. 1
    DOI: 10.1007/s13369-016-2268-2
    BibTeX
    @article{Yuan2016,
     author = {Yuan, Yue and Zhang, Yun and Chen, Shuang and Wang, Hong},
     title = {Robust Region Duplication Detection on Log-polar Domain Using Band Limitation},
     journal = {Arabian Journal for Science and Engineering},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  319. M. Zampoglou, S. Papadopoulos & Y. Kompatsiaris
    Large-scale Evaluation of Splicing Localization Algorithms for Web Images
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3795-2
    BibTeX
    @article{Zampoglou2016a,
     author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis},
     title = {Large-scale Evaluation of Splicing Localization Algorithms for Web Images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  320. M. Zampoglou, S. Papadopoulos, Y. Kompatsiaris, R. Bouwmeester & J. Spangenberg
    Web and Social Media Image Forensics for News Professionals
    2016
    BibTeX
    @electronic{Zampoglou2016,
     author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis and Bouwmeester, Ruben and Spangenberg, Jochen},
     title = {Web and Social Media Image Forensics for News Professionals},
     year = {2016}}
    
  321. M. Zandi, A. Mahmoudi-Aznaveh & A. Talebpour
    Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(11), pp. 2499-2512
    DOI: 10.1109/TIFS.2016.2585118
    BibTeX
    @article{Zandi2016,
     author = {Zandi, M. and Mahmoudi-Aznaveh, A. and Talebpour, A.},
     title = {Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {11},
     pages = {2499--2512}}
    
  322. H. Zeng, X. Kang & A. Peng
    A Multi-purpose Countermeasure against Image Anti-forensics Using Autoregressive Model
    Neurocomputing, Elsevier BV, 2016, Vol. 189, pp. 117-122
    DOI: 10.1016/j.neucom.2015.12.089
    BibTeX
    @article{Zeng2016,
     author = {Zeng, Hui and Kang, Xiangui and Peng, Anjie},
     title = {A Multi-purpose Countermeasure against Image Anti-forensics Using Autoregressive Model},
     journal = {Neurocomputing},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {189},
     pages = {117--122}}
    
  323. H. Zeng, J. Liu, J. Yu, X. Kang, Y.Q. Shi & Z.J. Wang
    A Framework of Camera Source Identification Bayesian Game
    IEEE Transactions on Cybernetics, 2016, Vol. PP(99), pp. 1-12
    DOI: 10.1109/TCYB.2016.2557802
    BibTeX
    @article{Zeng2016a,
     author = {Zeng, H. and Liu, J. and Yu, J. and Kang, X. and Shi, Y. Q. and Wang, Z. J.},
     title = {A Framework of Camera Source Identification Bayesian Game},
     journal = {IEEE Transactions on Cybernetics},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1--12}}
    
  324. H. Zeng, Y. Zhan, X. Kang & X. Lin
    Image Splicing Localization Using PCA-based Noise Level Estimation
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3712-8
    BibTeX
    @article{Zeng2016c,
     author = {Zeng, Hui and Zhan, Yifeng and Kang, Xiangui and Lin, Xiaodan},
     title = {Image Splicing Localization Using PCA-based Noise Level Estimation},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  325. J. Zeng, W. Lu, R. Yang & X. Qiu
    Practical Tools for Digital Image Forensic Authentication
    Advanced Multimedia and Ubiquitous Engineering
    Springer, 2016
    DOI: 10.1007/978-981-10-1536-6_59
    BibTeX
    @incollection{Zeng2016d,
     author = {Zeng, Jinhua and Lu, Wei and Yang, Rui and Qiu, Xiulian},
     title = {Practical Tools for Digital Image Forensic Authentication},
     booktitle = {Advanced Multimedia and Ubiquitous Engineering},
     publisher = {Springer},
     year = {2016}}
    
  326. J. Zeng, S. Shi, Y. Li & Q. Lu
    Practical Inspection Workflow for Digital Image Forensic Authentication
    Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)
    2016, pp. 172
    DOI: 10.1109/ISDFS.2016.7473540
    BibTeX
    @inproceedings{Zeng2016b,
     author = {Zeng, J. and Shi, S. and Li, Y. and Lu, Q.},
     title = {Practical Inspection Workflow for Digital Image Forensic Authentication},
     booktitle = {Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)},
     year = {2016},
     pages = {172}}
    
  327. L. Zhan, Y. Zhu & Z. Mo
    An Image Splicing Detection Method Based on PCA Minimum Eigenvalues
    Journal of Information Hiding and Multimedia Signal Processing, 2016
    BibTeX
    @article{Zhan2016,
     author = {Zhan, Lifei and Zhu, Yuesheng and Mo, Zhiwei},
     title = {An Image Splicing Detection Method Based on PCA Minimum Eigenvalues},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2016}}
    
  328. J. Zhang, W. Zhu, B. Li, W. Hu & J. Yang
    Image Copy Detection Based on Convolutional Neural Networks
    Pattern Recognition, Springer, 2016
    DOI: 10.1007/978-981-10-3005-5_10
    BibTeX
    @article{Zhang2016d,
     author = {Zhang, Jing and Zhu, Wenting and Li, Bing and Hu, Weiming and Yang, Jinfeng},
     title = {Image Copy Detection Based on Convolutional Neural Networks},
     journal = {Pattern Recognition},
     publisher = {Springer},
     year = {2016}}
    
  329. L.-B. Zhang, F. Peng & M. Long
    Identifing source camera using guided image estimation and block weighted average
    Journal of Visual Communication and Image Representation, Elsevier BV, 2016
    DOI: 10.1016/j.jvcir.2016.12.013
    BibTeX
    @article{Zhang2016b,
     author = {Zhang, Le-Bing and Peng, Fei and Long, Min},
     title = {Identifing source camera using guided image estimation and block weighted average},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2016}}
    
  330. Q. Zhang, W. Lu & J. Weng
    Joint Image Splicing Detection in DCT and Contourlet Transform Domain
    Journal of Visual Communication and Image Representation, Elsevier BV, 2016, Vol. 40, pp. 449-458
    DOI: 10.1016/j.jvcir.2016.07.013
    BibTeX
    @article{Zhang2016a,
     author = {Zhang, Qingbo and Lu, Wei and Weng, Jian},
     title = {Joint Image Splicing Detection in DCT and Contourlet Transform Domain},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {40},
     pages = {449--458}}
    
  331. Z. Zhang, J. Hou, Z. Li & D. Li
    Inter-frame Forgery Detection for Static-background Video Based on Mvp Consistency
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_9
    BibTeX
    @article{Zhang2016,
     author = {Zhang, Zhenzhen and Hou, Jianjun and Li, Zhaohong and Li, Dongdong},
     title = {Inter-frame Forgery Detection for Static-background Video Based on Mvp Consistency},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  332. Y. Zhanga, J. Goha, L.L. Wina & V. Thinga
    Image Region Forgery Detection: A Deep Learning Approach
    Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber-Security by Design
    2016, Vol. 14, pp. 1
    DOI: 10.1109/icip.1994.413765
    BibTeX
    @inproceedings{Zhanga2016,
     author = {Zhanga, Ying and Goha, Jonathan and Wina, Lei Lei and Thinga, Vrizlynn},
     title = {Image Region Forgery Detection: A Deep Learning Approach},
     booktitle = {Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber-Security by Design},
     year = {2016},
     volume = {14},
     pages = {1}}
    
  333. Zhao
    An Overview on Passive Image Forensics Technology for Automatic Computer Forgery
    International Journal of Digital Crime and Forensics (IJDCF), 2016, Vol. 8(4)
    DOI: 10.4018/IJDCF.2016100102
    BibTeX
    @article{Zhao2016a,
     author = {Zhao},
     title = {An Overview on Passive Image Forensics Technology for Automatic Computer Forgery},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2016},
     volume = {8},
     number = {4}}
    
  334. F. Zhao, W. Shi, B. Qin & B. Liang
    Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-move Forgery Detection
    Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer, 2016
    DOI: 10.1007/978-3-319-49148-6_39
    BibTeX
    @article{Zhao2016b,
     author = {Zhao, Fei and Shi, Wenchang and Qin, Bo and Liang, Bin},
     title = {Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-move Forgery Detection},
     journal = {Security, Privacy, and Anonymity in Computation, Communication, and Storage},
     publisher = {Springer},
     year = {2016}}
    
  335. F. Zhao, W. Shi, B. Qin & B. Liang
    A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation
    Proc. Third Int. Conf. Trustworthy Systems and their Applications (TSA)
    2016, pp. 8-16
    DOI: 10.1109/TSA.2016.12
    BibTeX
    @inproceedings{Zhao2016c,
     author = {Zhao, F. and Shi, W. and Qin, B. and Liang, B.},
     title = {A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation},
     booktitle = {Proc. Third Int. Conf. Trustworthy Systems and their Applications (TSA)},
     year = {2016},
     pages = {8--16}}
    
  336. X. Zhao & M.C. Stamm
    Computationally Efficient Demosaicing Filter Estimation for Forensic Camera Model Identification
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 151-155
    DOI: 10.1109/ICIP.2016.7532337
    BibTeX
    @inproceedings{Zhao2016,
     author = {Zhao, X. and Stamm, M. C.},
     title = {Computationally Efficient Demosaicing Filter Estimation for Forensic Camera Model Identification},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {151--155}}
    
  337. J. Zheng, Y. Liu, J. Ren, T. Zhu, Y. Yan & H. Yang
    Fusion of Block and Keypoints Based Approaches for Effective Copy-move Image Forgery Detection
    Multidimensional Systems and Signal Processing, 2016, pp. 1-17
    DOI: 10.1007/s11045-016-0416-1
    BibTeX
    @article{Zheng2016,
     author = {Zheng, Jiangbin and Liu, Yanan and Ren, Jinchang and Zhu, Tingge and Yan, Yijun and Yang, Heng},
     title = {Fusion of Block and Keypoints Based Approaches for Effective Copy-move Image Forgery Detection},
     journal = {Multidimensional Systems and Signal Processing},
     year = {2016},
     pages = {1--17}}
    
  338. H. Zhou, Y. Shen, X. Zhu, B. Liu, Z. Fu & N. Fan
    Digital Image Modification Detection Using Color Information and Its Histograms
    Forensic Science International, Elsevier BV, 2016, Vol. 266, pp. 379-388
    DOI: 10.1016/j.forsciint.2016.06.005
    BibTeX
    @article{Zhou2016,
     author = {Zhou, Haoyu and Shen, Yue and Zhu, Xinghui and Liu, Bo and Fu, Zigang and Fan, Na},
     title = {Digital Image Modification Detection Using Color Information and Its Histograms},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {266},
     pages = {379--388}}
    
  339. Y. Zhou & Y. Xie
    Copy-move Forgery Detection Using Improved SIFT
    Proc. SPIE, 2016, Vol. 10033, pp. 100334S-100334S-6
    DOI: 10.1117/12.2244287
    BibTeX
    @other{Zhou2016a,
     author = {Zhou, Yigang and Xie, Yunfang},
     title = {Copy-move Forgery Detection Using Improved SIFT},
     journal = {Proc. SPIE},
     year = {2016},
     volume = {10033},
     pages = {100334S-100334S-6}}
    
  340. N. Zhu, C. Deng & X. Gao
    A Learning-to-rank Approach for Image Scaling Factor Estimation
    Neurocomputing, 2016, pp. -
    DOI: 10.1016/j.neucom.2015.06.113
    BibTeX
    @article{Zhu2016,
     author = {Zhu, Nan and Deng, Cheng and Gao, Xinbo},
     title = {A Learning-to-rank Approach for Image Scaling Factor Estimation},
     journal = {Neurocomputing},
     year = {2016},
     pages = {-}}
    
  341. N. Zhu, C. Deng & X. Gao
    Image Sharpening Detection Based on Multiresolution Overshoot Artifact Analysis
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3938-5
    BibTeX
    @article{Zhu2016c,
     author = {Zhu, Nan and Deng, Cheng and Gao, Xinbo},
     title = {Image Sharpening Detection Based on Multiresolution Overshoot Artifact Analysis},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  342. Y. Zhu, T.-T. Ng, X. Shen & B. Wen
    Revisiting Copy-move Forgery Detection by Considering Realistic Image with Similar but Genuine Objects
    arXiv preprint arXiv:1601.07262, 2016
    DOI: 10.1007/s11042-014-2431-2
    BibTeX
    @article{Zhu2016a,
     author = {Zhu, Ye and Ng, Tian-Tsong and Shen, Xuanjing and Wen, Bihan},
     title = {Revisiting Copy-move Forgery Detection by Considering Realistic Image with Similar but Genuine Objects},
     journal = {arXiv preprint arXiv:1601.07262},
     year = {2016}}
    
  343. Y. Zhu, X. Shen & H. Chen
    Copy-move Forgery Detection Based on Scaled ORB
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(6), pp. 3221
    DOI: 10.1007/s11042-014-2431-2
    BibTeX
    @article{Zhu2016b,
     author = {Zhu, Ye and Shen, Xuanjing and Chen, Haipeng},
     title = {Copy-move Forgery Detection Based on Scaled ORB},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {6},
     pages = {3221}}
    
  344. Y. Zhu, R. Subramanian, T.T. Ng, S. Winkler & R. Ratnam
    Comparison of human and machine performance for copy-move image forgery detection involving similar but genuine objects
    Proc. IEEE Region 10 Conf. (TENCON)
    2016, pp. 1379-1383
    DOI: 10.1109/TENCON.2016.7848240
    BibTeX
    @inproceedings{Zhu2016e,
     author = {Zhu, Y. and Subramanian, R. and Ng, T. T. and Winkler, S. and Ratnam, R.},
     title = {Comparison of human and machine performance for copy-move image forgery detection involving similar but genuine objects},
     booktitle = {Proc. IEEE Region 10 Conf. (TENCON)},
     year = {2016},
     pages = {1379--1383}}
    
  345. Y. Zhu, R. Subramanian, T.-T. Ng, S. Winkler & R. Ratnam
    Comparison of Human and Machine Performance for Copy-move Image Forgery Detection Involving Similar but Genuine Objects
    Proc. IEEE Region 10 International Conference (TENCON), Singapore, Nov. 22-25, 2016
    2016
    BibTeX
    @conference{Zhu2016d,
     author = {Zhu, Y. and Subramanian, R. and Ng, T.-T. and Winkler, S. and Ratnam, R.},
     title = {Comparison of Human and Machine Performance for Copy-move Image Forgery Detection Involving Similar but Genuine Objects},
     booktitle = {Proc. IEEE Region 10 International Conference (TENCON), Singapore, Nov. 22-25, 2016},
     year = {2016}}
    
  346. V. Zorilo, Y. Lebedeva, M. Kozina & D. Belush
    Method of Photomontage Detection under Conditions of Limitations Absence for Photos Falsification
    Odes'kyi Politechnichnyi Universytet. Pratsi, Odessa National Polytechnic University, 2016(2), pp. 51-55
    DOI: 10.15276/opu.2.49.2016.12
    BibTeX
    @article{Zorilo2016,
     author = {Zorilo, Viktoriya and Lebedeva, Yelena and Kozina, Maria and Belush, Daria},
     title = {Method of Photomontage Detection under Conditions of Limitations Absence for Photos Falsification},
     journal = {Odes'kyi Politechnichnyi Universytet. Pratsi},
     publisher = {Odessa National Polytechnic University},
     year = {2016},
     number = {2},
     pages = {51--55}}
    
  347. Digital-Forensics and Watermarking
    Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Echizen, I. (ed.)
    Springer International Publishing, 2016
    BibTeX
    @book{Shi2016,,
     title = {Digital-Forensics and Watermarking},
     publisher = {Springer International Publishing},
     year = {2016}}
    


2015

  1. W. Zhao & H. Liu
    An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames
    Zha, H., Chen, X., Wang, L. & Miao, Q. (ed.)
    Computer Vision
    Springer Berlin Heidelberg, 2015, Vol. 546, pp. 325-334
    DOI: 10.1007/978-3-662-48558-3_33
    BibTeX
    @incollection{Zhao2015b,
     author = {Zhao, Wenyong and Liu, Hong},
     title = {An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames},
     booktitle = {Computer Vision},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     volume = {546},
     pages = {325--334}}
    
  2. E. Achimescu, R.O. Preda, N. Vizireanu & I. Pirnog
    Multiple Point Android Digital Image Authentication
    Proc. Int Signals, Circuits and Systems (ISSCS) Symp
    2015, pp. 1-4
    DOI: 10.1109/ISSCS.2015.7203945
    BibTeX
    @inproceedings{Achimescu2015,
     author = {Achimescu, E. and Preda, R. O. and Vizireanu, N. and Pirnog, I.},
     title = {Multiple Point Android Digital Image Authentication},
     booktitle = {Proc. Int Signals, Circuits and Systems (ISSCS) Symp},
     year = {2015},
     pages = {1--4}}
    
  3. S. Agarwal & S. Chand
    Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization
    I.J. Image, Graphics and Signal Processing, 2015
    DOI: 10.5815/ijigsp.2015.10.08
    BibTeX
    @article{Agarwal2015,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015}}
    
  4. S. Agarwal & S. Chand
    Anti-forensics of JPEG Images Using Interpolation
    I.J. Image, Graphics and Signal Processing, 2015, Vol. 12, pp. 10-17
    DOI: 10.5815/ijigsp.2015.12.02
    BibTeX
    @article{Agarwal2015a,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Anti-forensics of JPEG Images Using Interpolation},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015},
     volume = {12},
     pages = {10--17}}
    
  5. H.M. Ahmed & S.R. Salim
    A Method for Detect Forgery from Images
    Eng.& Tech.Journal, 2015, Vol. 33(2)
    DOI: 10.1109/ceec.2014.6958558
    BibTeX
    @article{Ahmed2015,
     author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan},
     title = {A Method for Detect Forgery from Images},
     journal = {Eng.& Tech.Journal},
     year = {2015},
     volume = {33},
     number = {2}}
    
  6. H.M. Ahmed & S.R. Salim
    Method for Detect and Extract Forgery from Images
    Al - Mansour Journal, 2015
    BibTeX
    @article{Ahmed2015a,
     author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan},
     title = {Method for Detect and Extract Forgery from Images},
     journal = {Al - Mansour Journal},
     year = {2015}}
    
  7. F. Alanazi & A. Jones
    The Value of Metadata in Digital Forensics
    Proc. European Intelligence and Security Informatics Conf
    2015, pp. 182
    DOI: 10.1109/EISIC.2015.26
    BibTeX
    @inproceedings{Alanazi2015,
     author = {Alanazi, F. and Jones, A.},
     title = {The Value of Metadata in Digital Forensics},
     booktitle = {Proc. European Intelligence and Security Informatics Conf},
     year = {2015},
     pages = {182}}
    
  8. A. Alani & Z. Al-Khanjari
    Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation
    Proc. of the Int. Academic Conf. on Law, Politics & Management
    Al-Khanjari,, 2015
    BibTeX
    @inproceedings{Alani2015,
     author = {Alani, A. and Al-Khanjari, Z.},
     title = {Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation},
     booktitle = {Proc. of the Int. Academic Conf. on Law, Politics & Management},
     journal = {Al-Khanjari,},
     year = {2015}}
    
  9. M. Al-Ani, F. Khelifi, A. Lawgaly & A. Bouridane
    A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification
    Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf
    2015, pp. 1-5
    DOI: 10.1109/AVSS.2015.7301808
    BibTeX
    @inproceedings{Al-Ani2015,
     author = {Al-Ani, Mustafa and Khelifi, Fouad and Lawgaly, Ashref and Bouridane, Ahmed},
     title = {A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification},
     booktitle = {Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf},
     year = {2015},
     pages = {1--5}}
    
  10. A.S. Alfraih, J.A. Briffa & S. Wesemeyer
    Cloning Localization Approach Using K-means Clustering and Support Vector Machine
    Journal of Electronic Imaging, 2015, Vol. 24(4), pp. 043019
    DOI: 10.1117/1.JEI.24.4.043019
    BibTeX
    @article{Alfraih2015,
     author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan},
     title = {Cloning Localization Approach Using K-means Clustering and Support Vector Machine},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {4},
     pages = {043019}}
    
  11. A.S. Alfraih, J.A. Briffa & S. Wesemeyer
    Cloning Localization Based on Feature Extraction and K-means Clustering
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_31
    BibTeX
    @article{Alfraih2015a,
     author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan},
     title = {Cloning Localization Based on Feature Extraction and K-means Clustering},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  12. O.M. Al-Qershi & B.E. Khoo
    Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_37
    BibTeX
    @article{Al-Qershi2015,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  13. R.A. Alsanussi, H.E. Shamardan, Mostafa & S.M. Mostafa
    Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions
    Egyptian Computer Science Journal, ECS, 2015, Vol. 36(6), pp. 80-95
    BibTeX
    @article{Alsanussi2015,
     author = {Alsanussi, Reem A. and Shamardan, Hossam Eldeen and Mostafa and Mostafa, Sami M.},
     title = {Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions},
     journal = {Egyptian Computer Science Journal, ECS},
     year = {2015},
     volume = {36},
     number = {6},
     pages = {80--95}}
    
  14. I. Amerini
    A Feature-based Forensic Procedure for Splicing Forgeries Detection
    Mathematical Problems in Engineering, 2015, Vol. 2015(653164)
    DOI: 10.1155/2015/653164
    BibTeX
    @article{Amerini2015b,
     author = {Amerini, Irene},
     title = {A Feature-based Forensic Procedure for Splicing Forgeries Detection},
     journal = {Mathematical Problems in Engineering},
     year = {2015},
     volume = {2015},
     number = {653164}}
    
  15. I. Amerini, R. Becarelli, B. Bertini & R. Caldelli
    Acquisition Source Identification through a Blind Image Classification
    Image Processing, IET, 2015, Vol. 9(4), pp. 329-337
    DOI: 10.1049/iet-ipr.2014.0316
    BibTeX
    @article{Amerini2015a,
     author = {Amerini, Irene and Becarelli, R. and Bertini, B. and Caldelli, R.},
     title = {Acquisition Source Identification through a Blind Image Classification},
     journal = {Image Processing, IET},
     year = {2015},
     volume = {9},
     number = {4},
     pages = {329--337}}
    
  16. I. Amerini, R. Caldelli, A.D. Bimbo, A.D. Fuccia, A.P. Rizzo & L. Saravo
    Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study
    Forensic Science International, 2015
    DOI: 10.1016/j.forsciint.2015.03.020
    BibTeX
    @article{Amerini2015,
     author = {Amerini, Irene and Caldelli, Roberto and Bimbo, Alberto Del and Fuccia, Andrea Di and Rizzo, Anna Paola and Saravo, Luigi},
     title = {Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study},
     journal = {Forensic Science International},
     year = {2015}}
    
  17. B. Arbab-Zavar, X. Wei, J.D. Bustard, M.S. Nixon & C.-T. Li
    On Forensic Use of Biometrics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 270-304
    DOI: 10.1002/9781118705773.ch7
    BibTeX
    @incollection{Arbab-Zavar2015,
     author = {Arbab-Zavar, Banafshe and Wei, Xingjie and Bustard, John D. and Nixon, Mark S. and Li, Chang-Tsun},
     title = {On Forensic Use of Biometrics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {270--304}}
    
  18. E. Ardizzone, A.R. Bruno & G. Mazzola
    Copy-move Forgery Detection by Matching Triangles of Keypoints
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(10), pp. 2084-2094
    DOI: 10.1109/TIFS.2015.2445742
    BibTeX
    @article{Ardizzone2015a,
     author = {Ardizzone, Edoardo and Bruno, Arcangelo Ranieri. and Mazzola, Giuseppe},
     title = {Copy-move Forgery Detection by Matching Triangles of Keypoints},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {10},
     pages = {2084--2094}}
    
  19. E. Ardizzone & G. Mazzola
    A Tool to Support the Creation of Datasets of Tampered Videos
    Image Analysis and Processing — ICIAP 2015
    Springer, 2015, pp. 665-675
    DOI: 10.1007/978-3-319-23234-8_61
    BibTeX
    @incollection{Ardizzone2015,
     author = {Ardizzone, Edoardo and Mazzola, Giuseppe},
     title = {A Tool to Support the Creation of Datasets of Tampered Videos},
     booktitle = {Image Analysis and Processing — ICIAP 2015},
     publisher = {Springer},
     year = {2015},
     pages = {665--675}}
    
  20. M. Arun Anoop
    Image Forgery and Its Detection: A Survey
    Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
    2015, pp. 1-9
    DOI: 10.1109/ICIIECS.2015.7193253
    BibTeX
    @inproceedings{ArunAnoop2015,
     author = {Arun Anoop, M.},
     title = {Image Forgery and Its Detection: A Survey},
     booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf},
     year = {2015},
     pages = {1--9}}
    
  21. A. Arun, A. Vimala, Y.C. Joshya & C.A. Murugan
    Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination
    International Journal of Advanced Engineering and Global Technology, 2015, Vol. 3(2)
    BibTeX
    @article{Arun2015,
     author = {Arun, Anusree and Vimala, A. and Joshya, Y. Camy and Murugan, C. Arul},
     title = {Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination},
     journal = {International Journal of Advanced Engineering and Global Technology},
     year = {2015},
     volume = {3},
     number = {2}}
    
  22. K. Bahrami, A. Kot, L. Li & H. Li
    Blurred Image Splicing Localization by Exposing Blur Type Inconsistency
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 999-1009
    DOI: 10.1109/TIFS.2015.2394231
    BibTeX
    @article{Bahrami2015,
     author = {Bahrami, K. and Kot, A. and Li, L. and Li, H.},
     title = {Blurred Image Splicing Localization by Exposing Blur Type Inconsistency},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {99},
     pages = {999--1009}}
    
  23. K. Bahrami & A.C. Kot
    Image Splicing Localization Based on Blur Type Inconsistency
    Proc. IEEE Int Circuits and Systems (ISCAS) Symp
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1042-1045
    DOI: 10.1109/ISCAS.2015.7168815
    BibTeX
    @inproceedings{Bahrami2015a,
     author = {Bahrami, K. and Kot, A. C.},
     title = {Image Splicing Localization Based on Blur Type Inconsistency},
     booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1042--1045}}
    
  24. M. Barni, M. Fontani & B. Tondi
    Universal Counterforensics of Multiple Compressed JPEG Images
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_3
    BibTeX
    @article{Barni2015,
     author = {Barni, Mauro and Fontani, Marco and Tondi, Benedetta},
     title = {Universal Counterforensics of Multiple Compressed JPEG Images},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  25. A. Bartle & A. Langley
    Analysis of Photo Response Non-uniformity (PRNU)
    Journal of Homicide and Major Incident, 2015, Vol. 10(2), pp. 45-57
    DOI: 10.1016/j.forsciint.2012.12.018
    BibTeX
    @article{Bartle2015,
     author = {Bartle, Anna and Langley, Andy},
     title = {Analysis of Photo Response Non-uniformity (PRNU)},
     journal = {Journal of Homicide and Major Incident},
     year = {2015},
     volume = {10},
     number = {2},
     pages = {45--57}}
    
  26. S. Bayram, H.T. Sencar & N. Memon
    Sensor Fingerprint Identification through Composite Fingerprints and Group Testing
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 597-612
    DOI: 10.1109/TIFS.2014.2385634
    BibTeX
    @article{Bayram2015,
     author = {Bayram, Sevinc and Sencar, H. T. and Memon, N.},
     title = {Sensor Fingerprint Identification through Composite Fingerprints and Group Testing},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {597--612}}
    
  27. M.A. Bennet, R.K. Krishna, G.S. Babu & B.S. Jayavignesh
    Performance analysis of forgery detection of JPEG image compression
    Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)
    2015, pp. 1-12
    DOI: 10.1109/GET.2015.7453773
    BibTeX
    @inproceedings{Bennet2015,
     author = {Bennet, M. A. and Krishna, R. K. and Babu, G. S. and Jayavignesh, B. S.},
     title = {Performance analysis of forgery detection of JPEG image compression},
     booktitle = {Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)},
     year = {2015},
     pages = {1--12}}
    
  28. F. Bertini, R. Sharma, A. Iannì & D. Montesi
    Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
    Digital Forensics and Cyber Crime, Springer, 2015
    DOI: 10.1007/978-3-319-25512-5_12
    BibTeX
    @article{Bertini2015b,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo},
     title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting},
     journal = {Digital Forensics and Cyber Crime},
     publisher = {Springer},
     year = {2015}}
    
  29. F. Bertini, R. Sharma, A. Iannì & D. Montesi
    Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
    James, J. & Breitinger, F. (ed.)
    Digital Forensics and Cyber Crime
    Springer International Publishing, 2015, Vol. 157, pp. 176-186
    DOI: 10.1007/978-3-319-25512-5_12
    BibTeX
    @incollection{Bertini2015,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo},
     title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting},
     booktitle = {Digital Forensics and Cyber Crime},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {157},
     pages = {176--186}}
    
  30. F. Bertini, R. Sharma, A. Iann\i & D. Montesi
    Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint
    Proceedings of the 19th International Database Engineering &38, Applications Symposium
    ACM, 2015, pp. 23-32
    DOI: 10.1145/2790755.2790765
    BibTeX
    @inproceedings{Bertini2015a,
     author = {Bertini, Flavio and Sharma, Rajesh and Iann\i, Andrea and Montesi, Danilo},
     title = {Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint},
     booktitle = {Proceedings of the 19th International Database Engineering &38, Applications Symposium},
     publisher = {ACM},
     year = {2015},
     pages = {23--32}}
    
  31. X.-L. Bi, C.-M. Pun & X.-C. Yuan
    Over-segmentation Based Image Forgery Detection
    Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)
    2015
    DOI: 10.2991/esac-15.2015.7
    BibTeX
    @inproceedings{Bi2015,
     author = {Bi, Xiu-Li and Pun, Chi-Man and Yuan, Xiao-Chen},
     title = {Over-segmentation Based Image Forgery Detection},
     booktitle = {Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)},
     year = {2015}}
    
  32. T. Bianchi & A. Piva
    Image and Video Processing History Recovery
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 572-611
    DOI: 10.1002/9781118705773.ch15
    BibTeX
    @incollection{Bianchi2015,
     author = {Bianchi, Tiziano and Piva, Alessandro},
     title = {Image and Video Processing History Recovery},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {572--611}}
    
  33. P. Binnar & V. Mane
    Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency
    Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
    2015, pp. 398-402
    DOI: 10.1109/ICATCCT.2015.7456916
    BibTeX
    @inproceedings{Binnar2015,
     author = {Binnar, P. and Mane, V.},
     title = {Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency},
     booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)},
     year = {2015},
     pages = {398--402}}
    
  34. I.N. Blokhin & S.N. Ilchenko
    Fake As a Format of Modern Journalism: The Information Reliability Problem
    Indian Journal of Science and Technology, 2015, Vol. 8(Special Issue 10)
    DOI: 10.17485/ijst/2015/v8is(10)/84840
    BibTeX
    @article{Blokhin2015,
     author = {Blokhin, Igor Nikolaevich and Ilchenko, Sergey Nikolaevich},
     title = {Fake As a Format of Modern Journalism: The Information Reliability Problem},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {Special Issue 10}}
    
  35. T.K. Boaz & C.J. Prabhakar
    Localization Overlaid Text Based on Noise Inconsistencies
    Advanced Computational Intelligence: An International Journal, 2015
    BibTeX
    @article{Boaz2015,
     author = {Boaz, Too Kipyego and Prabhakar, C. J.},
     title = {Localization Overlaid Text Based on Noise Inconsistencies},
     journal = {Advanced Computational Intelligence: An International Journal},
     year = {2015}}
    
  36. W. Burger & M.J. Burge
    Digital Image Processing: An Algorithmic Introduction Using Java
    Springer, 2015
    DOI: 10.1007/978-1-84800-195-4_1
    BibTeX
    @book{Burger2015,
     author = {Burger, Wilhelm and Burge, Mark J.},
     title = {Digital Image Processing: An Algorithmic Introduction Using Java},
     publisher = {Springer},
     year = {2015},
     edition = {3rd}}
    
  37. R. Caldelli, I. Amerini & A. Costanzo
    SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/eusipco.2015.7362747
    BibTeX
    @inproceedings{Caldelli2015,
     author = {Caldelli, R. and Amerini, Irene and Costanzo, A.},
     title = {SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  38. G. Cao, Y. Chen, G. Zong & Y. Chen
    Detection of copy-move forgery in digital image using locality preserving projections
    Proc. 8th Int. Congress Image and Signal Processing (CISP)
    2015, pp. 599-603
    DOI: 10.1109/CISP.2015.7407949
    BibTeX
    @inproceedings{Cao2015c,
     author = {Cao, G. and Chen, Y. and Zong, G. and Chen, Y.},
     title = {Detection of copy-move forgery in digital image using locality preserving projections},
     booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)},
     year = {2015},
     pages = {599--603}}
    
  39. G. Cao, Y. Wang, Y. Zhao, R. Ni & C. Lin
    On the Security of Image Manipulation Forensics
    Ho, Y.-S., Sang, J., Ro, Y., Kim, J. & Wu, F. (ed.)
    Advances in Multimedia Information Processing - PCM 2015
    Advances in Multimedia Information Processing -- PCM 2015, Springer Science + Business Media, 2015, Vol. 9314, pp. 97-105
    DOI: 10.1007/978-3-319-24075-6_10
    BibTeX
    @incollection{Cao2015b,
     author = {Cao, Gang and Wang, Yongbin and Zhao, Yao and Ni, Rongrong and Lin, Chunyu},
     title = {On the Security of Image Manipulation Forensics},
     booktitle = {Advances in Multimedia Information Processing - PCM 2015},
     journal = {Advances in Multimedia Information Processing -- PCM 2015},
     publisher = {Springer Science + Business Media},
     year = {2015},
     volume = {9314},
     pages = {97--105}}
    
  40. X. Cao, H. Zhao, C. Wang & W. Zhang
    Image Composite Authentication Using a Single Shadow Observation
    Science China Information Sciences, Science China Press, 2015, pp. 1-13
    DOI: 10.1007/s11432-015-5296-8
    BibTeX
    @article{Cao2015a,
     author = {Cao, XiaoChun and Zhao, HanDong and Wang, Chuan and Zhang, Wei},
     title = {Image Composite Authentication Using a Single Shadow Observation},
     journal = {Science China Information Sciences},
     publisher = {Science China Press},
     year = {2015},
     pages = {1--13}}
    
  41. Y. Cao, T. Gao, G. Sheng, L. Fan & L. Gao
    A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.
    J Forensic Sci, College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., 2015, Vol. 60(1), pp. 197-205
    DOI: 10.1111/1556-4029.12618
    BibTeX
    @article{Cao2015,
     author = {Cao, Yanjun and Gao, Tiegang and Sheng, Guorui and Fan, Li and Gao, Lin},
     title = {A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.},
     journal = {J Forensic Sci},
     school = {College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China.},
     year = {2015},
     volume = {60},
     number = {1},
     pages = {197--205}}
    
  42. M. Carnein, P. Schöttle & R. Böhme
    Forensics of High-quality JPEG Images with Color Subsampling
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368556
    BibTeX
    @inproceedings{Carnein2015,
     author = {Carnein, M. and Schöttle, P. and Böhme, R.},
     title = {Forensics of High-quality JPEG Images with Color Subsampling},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  43. M. Carnein, P. Schöttle & R. Böhme
    Forensics of high-quality JPEG images with color subsampling
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368556
    BibTeX
    @inproceedings{Carnein2015a,
     author = {Carnein, M. and Schöttle, P. and Böhme, R.},
     title = {Forensics of high-quality JPEG images with color subsampling},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2015},
     pages = {1--6}}
    
  44. T. Carvalho, F.A. Faria, H. Pedrini, R.S. Torres & A. Rocha
    Illuminant-based Transformed Spaces for Image Forensics
    IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2015.2506548
    BibTeX
    @article{Carvalho2015a,
     author = {Carvalho, T. and Faria, F. A. and Pedrini, H. and Torres, R. S. and Rocha, A.},
     title = {Illuminant-based Transformed Spaces for Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  45. T. Carvalho, H. Farid & E. Kee
    Exposing Photo Manipulation from User-guided 3D Lighting Analysis
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 940902-940902-10
    DOI: 10.1117/12.2075544
    BibTeX
    @inproceedings{Carvalho2015,
     author = {Carvalho, Tiago and Farid, Hany and Kee, Eric},
     title = {Exposing Photo Manipulation from User-guided 3D Lighting Analysis},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {940902-940902-10}}
    
  46. G. Cattaneo, U. Ferraro Petrillo, G. Roscigno & C. Fusco
    A PNU-based Technique to Detect Forged Regions in Digital Images
    Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
    Advanced Concepts for Intelligent Vision Systems
    Advanced Concepts for Intelligent Vision Systems, Springer, 2015, Vol. 9386, pp. 486-498
    DOI: 10.1007/978-3-319-25903-1_42
    BibTeX
    @article{Cattaneo2015,
     author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Roscigno, Gianluca and Fusco, Carmine},
     title = {A PNU-based Technique to Detect Forged Regions in Digital Images},
     booktitle = {Advanced Concepts for Intelligent Vision Systems},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2015},
     volume = {9386},
     pages = {486--498}}
    
  47. J. Charpe & A. Bhattacharya
    Revealing Image Forgery through Image Manipulation Detection
    Proc. Global Conf. Communication Technologies (GCCT)
    2015, pp. 723-727
    DOI: 10.1109/GCCT.2015.7342759
    BibTeX
    @inproceedings{Charpe2015,
     author = {Charpe, J. and Bhattacharya, A.},
     title = {Revealing Image Forgery through Image Manipulation Detection},
     booktitle = {Proc. Global Conf. Communication Technologies (GCCT)},
     year = {2015},
     pages = {723--727}}
    
  48. B. Chen, G. Coatrieux, J. Wu, Z. Dong, J. Coatrieux & H. Shu
    Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection
    IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 63(20), pp. 5424-5436
    DOI: 10.1109/TSP.2015.2451107
    BibTeX
    @article{Chen2015b,
     author = {Chen, B. and Coatrieux, G. and Wu, J. and Dong, Z. and Coatrieux, J. and Shu, H.},
     title = {Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection},
     journal = {IEEE Transactions on Signal Processing},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {63},
     number = {20},
     pages = {5424--5436}}
    
  49. C. Chen & M.C. Stamm
    Camera Model Identification Framework Using an Ensemble of Demosaicing Features
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368573
    BibTeX
    @inproceedings{Chen2015a,
     author = {Chen, Chen and Stamm, M. C.},
     title = {Camera Model Identification Framework Using an Ensemble of Demosaicing Features},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  50. J. Chen, X. Kang, Y. Liu & Z.J. Wang
    Median Filtering Forensics Based on Convolutional Neural Networks
    Signal Processing Letters, IEEE, 2015, Vol. 22(11), pp. 1849-1853
    DOI: 10.1109/LSP.2015.2438008
    BibTeX
    @article{Chen2015,
     author = {Chen, J. and Kang, X. and Liu, Y. and Wang, Z. J.},
     title = {Median Filtering Forensics Based on Convolutional Neural Networks},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {11},
     pages = {1849--1853}}
    
  51. L.M. Chen
    Images, Videos, and Bigdata
    Mathematical Problems in Data Science
    Springer, 2015
    DOI: 10.1007/978-3-319-25127-1_5
    BibTeX
    @incollection{Chen2015c,
     author = {Chen, Li M.},
     title = {Images, Videos, and Bigdata},
     booktitle = {Mathematical Problems in Data Science},
     publisher = {Springer},
     year = {2015}}
    
  52. S. Chen, S. Tan, B. Li & J. Huang
    Automatic Detection of Object-based Forgery in Advanced Video
    IEEE Transactions on Circuits and Systems for Video Technology, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. PP(11), pp. 2138-2151
    DOI: 10.1109/TCSVT.2015.2473436
    BibTeX
    @article{Chen2015d,
     author = {Chen, Shengda and Tan, Shunquan and Li, Bin and Huang, Jiwu},
     title = {Automatic Detection of Object-based Forgery in Advanced Video},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {PP},
     number = {11},
     pages = {2138--2151}}
    
  53. P.K. Chiluka, S.R. Das, M.H. Assaf, S.N. Biswas, S. Morton, E.M. Petriu & V. Groza
    Digital Wavelet Transform Based Image Forgery Detection Using Post -processing
    Proc of SDPS 2015, 2015
    BibTeX
    @article{Chiluka2015,
     author = {Chiluka, Praveen K. and Das, Sunil R. and Assaf, Mansour H. and Biswas, Satyendra N. and Morton, Scott and Petriu, Emil M. and Groza, Voicu},
     title = {Digital Wavelet Transform Based Image Forgery Detection Using Post -processing},
     journal = {Proc of SDPS 2015},
     year = {2015}}
    
  54. Christopher & T.A. Kovashka
    Who’s behind the Camera? Identifying the Authorship of a Photograph
    arXiv, 2015
    BibTeX
    @article{Christopher2015,
     author = {Christopher and Kovashka, Thomas Adriana},
     title = {Who’s behind the Camera? Identifying the Authorship of a Photograph},
     journal = {arXiv},
     year = {2015}}
    
  55. X. Chu
    Fundamental Limits in Multimedia Forensics and Anti-forensics
    Faculty of the Graduate School of the University of Maryland, Department of Electrical and Computer Engineering University of Maryland, 2015
    BibTeX
    @phdthesis{Chu2015a,
     author = {Chu, X.},
     title = {Fundamental Limits in Multimedia Forensics and Anti-forensics},
     school = {Faculty of the Graduate School of the University of Maryland},
     year = {2015}}
    
  56. X. Chu, Y. Chen, M. Stamm & K. Liu
    Information Theoretical Limit of Media Forensics: The Forensicability
    IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2015.2510820
    BibTeX
    @article{Chu2015e,
     author = {Chu, X. and Chen, Y. and Stamm, M. and Liu, K.},
     title = {Information Theoretical Limit of Media Forensics: The Forensicability},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  57. X. Chu, M.C. Stamm, Y. Chen & K.J.R. Liu
    On Antiforensic Concealability with Rate-distortion Tradeoff
    Image Processing, IEEE Transactions on, 2015, Vol. 24(3), pp. 1087-1100
    DOI: 10.1109/TIP.2015.2390137
    BibTeX
    @article{Chu2015,
     author = {Chu, X. and Stamm, M. C. and Chen, Y. and Liu, K. J. R.},
     title = {On Antiforensic Concealability with Rate-distortion Tradeoff},
     journal = {Image Processing, IEEE Transactions on},
     year = {2015},
     volume = {24},
     number = {3},
     pages = {1087--1100}}
    
  58. D. Codreanu, A. Peninou & F. Sedes
    Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework
    Proc. 10th Int Availability, Reliability and Security (ARES) Conf
    2015, pp. 611-617
    DOI: 10.1109/ARES.2015.102
    BibTeX
    @inproceedings{Codreanu2015,
     author = {Codreanu, D. and Peninou, A. and Sedes, F.},
     title = {Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework},
     booktitle = {Proc. 10th Int Availability, Reliability and Security (ARES) Conf},
     year = {2015},
     pages = {611--617}}
    
  59. V. Conotter, P. Comesana & F. Perez-Gonzalez
    Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
    Information Forensics and Security, IEEE Transactions on, 2015(99)
    DOI: 10.1109/TIFS.2015.2424195
    BibTeX
    @article{Conotter2015,
     author = {Conotter, V. and Comesana, P. and Perez-Gonzalez, F.},
     title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     number = {99}}
    
  60. V. Conotter, P. Comesaña & F. Pérez-González
    Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(11), pp. 2257-2269
    DOI: 10.1109/TIFS.2015.2424195
    BibTeX
    @article{Conotter2015a,
     author = {Conotter, V. and Comesaña, P. and Pérez-González, F.},
     title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {11},
     pages = {2257--2269}}
    
  61. suisse de la presse Consiglio svizzero della stampa & S.P. Conseil
    Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»
    2015
    BibTeX
    @electronic{SchweizerPresserat2015,
     author = {suisse de la presse Consiglio svizzero della stampa and Conseil, Schweizer Presserat},
     title = {Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»},
     year = {2015}}
    
  62. J.R. Corripio, A.L.S. Orozco & L.J.G. Villalba
    Unsupervised Classification of Mobile Device Images
    ICIT 2015 The 7th International Conference on Information Technology
    2015
    DOI: 10.15849/icit.2015.0014
    BibTeX
    @inproceedings{Corripio2015,
     author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García},
     title = {Unsupervised Classification of Mobile Device Images},
     booktitle = {ICIT 2015 The 7th International Conference on Information Technology},
     year = {2015}}
    
  63. J.R. Corripio, A.L.S. Orozco & L.J.G. Villalba
    New Technique of Forensic Analysis for Digital Cameras in Mobile Devices
    Proc of the 7th International Conference on Information Technology ICIT
    2015
    DOI: 10.15849/icit.2015.0105
    BibTeX
    @inproceedings{Corripio2015a,
     author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García},
     title = {New Technique of Forensic Analysis for Digital Cameras in Mobile Devices},
     booktitle = {Proc of the 7th International Conference on Information Technology ICIT},
     year = {2015}}
    
  64. D. Cozzolino, G. Poggi & L. Verdoliva
    Splicebuster: A New Blind Image Splicing Detector
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368565
    BibTeX
    @inproceedings{Cozzolino2015,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Splicebuster: A New Blind Image Splicing Detector},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  65. D. Cozzolino, G. Poggi & L. Verdoliva
    Efficient Dense-field Copy-move Forgery Detection
    IEEE Transactions on Information Forensics and Security, 2015
    DOI: 10.1109/TIFS.2015.2455334
    BibTeX
    @article{Cozzolino2015a,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Efficient Dense-field Copy-move Forgery Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015}}
    
  66. L. D'Amiano, D. Cozzolino, G. Poggi & L. Verdoliva
    Video Forgery Detection and Localization Based on 3D Patchmatch
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169805
    BibTeX
    @inproceedings{DAmiano2015,
     author = {D'Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Video Forgery Detection and Localization Based on 3D Patchmatch},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  67. L. D’Amiano, D. Cozzolino, G. Poggi & L. Verdoliva
    Video Forgery Detection and Localization Based on 3D Patchmatch
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf, 2015
    DOI: 10.1109/icmew.2015.7169805
    BibTeX
    @article{D’Amiano2015,
     author = {D’Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Video Forgery Detection and Localization Based on 3D Patchmatch},
     journal = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015}}
    
  68. P. Dangale, P. Amage, S. Ubale, D. Jadhav & G.M. Gaikwad
    Image Validation by Demosaicing
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(4), pp. 118-121
    DOI: 10.17148/ijarcce.2015.4329
    BibTeX
    @article{Dangale2015,
     author = {Dangale, P. and Amage, P. and Ubale, S. and Jadhav, D. and Gaikwad, G. M.},
     title = {Image Validation by Demosaicing},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {4},
     pages = {118--121}}
    
  69. D.-T. Dang-Nguyen, C. Pasquini, V. Conotter & G. Boato
    Raise: A Raw Images Dataset for Digital Image Forensics
    Proceedings of the 6th ACM Multimedia Systems Conference
    ACM, 2015, pp. 219-224
    DOI: 10.1145/2713168.2713194
    BibTeX
    @inproceedings{Dang-Nguyen2015,
     author = {Dang-Nguyen, Duc-Tien and Pasquini, Cecilia and Conotter, Valentina and Boato, Giulia},
     title = {Raise: A Raw Images Dataset for Digital Image Forensics},
     booktitle = {Proceedings of the 6th ACM Multimedia Systems Conference},
     publisher = {ACM},
     year = {2015},
     pages = {219--224}}
    
  70. R. Davarzani, S. Mozaffari & Kh.Yaghmaie
    Image Authentication Using LBP-based Perceptual Image Hashing
    Journal of AI and Data Mining, 2015
    BibTeX
    @article{Davarzani2015,
     author = {Davarzani, R. and Mozaffari, S. and Kh.Yaghmaie},
     title = {Image Authentication Using LBP-based Perceptual Image Hashing},
     journal = {Journal of AI and Data Mining},
     year = {2015}}
    
  71. A. De Rosa, M. Fontani, M. Massai, A. Piva & M. Barni
    Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics
    Signal Processing Letters, IEEE, 2015, Vol. 22(8), pp. 1132-1136
    DOI: 10.1109/LSP.2015.2389241
    BibTeX
    @article{DeRosa2015,
     author = {De Rosa, A. and Fontani, M. and Massai, M. and Piva, A. and Barni, Mauro},
     title = {Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {8},
     pages = {1132--1136}}
    
  72. L. Debiasi
    A Forensic Analysis of the CASIA-iris V4 Database
    Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, 2015
    BibTeX
    @mastersthesis{Debiasi2015b,
     author = {Debiasi, Luca},
     title = {A Forensic Analysis of the CASIA-iris V4 Database},
     school = {Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg},
     year = {2015}}
    
  73. L. Debiasi & A. Uhl
    Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    2015
    DOI: 10.1109/eusipco.2015.7362489
    BibTeX
    @inproceedings{Debiasi2015,
     author = {Debiasi, Luca and Uhl, Andreas},
     title = {Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     year = {2015}}
    
  74. L. Debiasi & A. Uhl
    Techniques for a Forensic Analysis of the CASia-IRis V4 Database
    Proc. Int Biometrics and Forensics (IWBF) Workshop
    2015, pp. 1-6
    DOI: 10.1109/IWBF.2015.7110236
    BibTeX
    @inproceedings{Debiasi2015a,
     author = {Debiasi, L. and Uhl, A.},
     title = {Techniques for a Forensic Analysis of the CASia-IRis V4 Database},
     booktitle = {Proc. Int Biometrics and Forensics (IWBF) Workshop},
     year = {2015},
     pages = {1--6}}
    
  75. S. Dhevana & C. Jayasri
    A Bayesian Classifier Approach for Glcm Based Image Forgery Detection
    International Journal of Engineering Research & Technology, 2015, Vol. 4(2)
    BibTeX
    @article{Dhevana2015,
     author = {Dhevana, S. and Jayasri, C.},
     title = {A Bayesian Classifier Approach for Glcm Based Image Forgery Detection},
     journal = {International Journal of Engineering Research & Technology},
     year = {2015},
     volume = {4},
     number = {2}}
    
  76. F. Ding, G. Zhu, J. Yang, J. Xie & Y.Q. Shi
    Edge Perpendicular Binary Coding for USM Sharpening Detection
    IEEE Signal Processing Letters, 2015, Vol. 22(3), pp. 327-331
    DOI: 10.1109/LSP.2014.2359033
    BibTeX
    @article{Ding2015,
     author = {Ding, F. and Zhu, G. and Yang, J. and Xie, J. and Shi, Y. Q.},
     title = {Edge Perpendicular Binary Coding for USM Sharpening Detection},
     journal = {IEEE Signal Processing Letters},
     year = {2015},
     volume = {22},
     number = {3},
     pages = {327--331}}
    
  77. A. Ebrahimi, S. Ibrahim, E. Ghazizadeh & M. Alizadeh
    Paint-doctored JPEG Image Forensics Based on Blocking Artifacts
    Proc. Int Computing and Communication (IEMCON) Conf. and Workshop
    2015, pp. 1-5
    DOI: 10.1109/IEMCON.2015.7344427
    BibTeX
    @inproceedings{Ebrahimi2015,
     author = {Ebrahimi, Ali and Ibrahim, Subariah and Ghazizadeh, Eghbal and Alizadeh, Mojtaba},
     title = {Paint-doctored JPEG Image Forensics Based on Blocking Artifacts},
     booktitle = {Proc. Int Computing and Communication (IEMCON) Conf. and Workshop},
     year = {2015},
     pages = {1--5}}
    
  78. A. Ebrahimi, S. Ibrahim, E. Ghazizadeh & M. Alizadeh
    Paint-doctored JPEG image forensics based on blocking artifacts
    Proc. Int. Conf. and Workshop Computing and Communication (IEMCON)
    2015, pp. 1-5
    DOI: 10.1109/IEMCON.2015.7344427
    BibTeX
    @inproceedings{Ebrahimi2015a,
     author = {Ebrahimi, A. and Ibrahim, S. and Ghazizadeh, E. and Alizadeh, M.},
     title = {Paint-doctored JPEG image forensics based on blocking artifacts},
     booktitle = {Proc. Int. Conf. and Workshop Computing and Communication (IEMCON)},
     year = {2015},
     pages = {1--5}}
    
  79. J.G.R. Elwin & G. Kousalya
    Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform
    Indian Journal of Science and Technology, 2015, Vol. 8(S9), pp. 128-139
    DOI: 10.17485/ijst/2015/v8is9/54344
    BibTeX
    @article{Elwin2015,
     author = {Elwin, J. Granty Regina and Kousalya, G.},
     title = {Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {S9},
     pages = {128--139}}
    
  80. M. Emam, Q. Han & X. Niu
    PCET Based Copy-move Forgery Detection in Images under Geometric Transforms
    Multimedia Tools and Applications, Springer US, 2015, pp. 1-15
    DOI: 10.1007/s11042-015-2872-2
    BibTeX
    @article{Emam2015a,
     author = {Emam, Mahmoud and Han, Qi and Niu, Xiamu},
     title = {PCET Based Copy-move Forgery Detection in Images under Geometric Transforms},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2015},
     pages = {1--15}}
    
  81. M. Emam, Q. Han, L. Yu, Y. Zhang & X. Niu
    A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform
    Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)
    Proc. SPIE, 2015, Vol. 9631, pp. 963104-963104-6
    DOI: 10.1117/12.2196997
    BibTeX
    @inproceedings{Emam2015,
     author = {Emam, Mahmoud and Han, Qi and Yu, Liyang and Zhang, Ye and Niu, Xiamu},
     title = {A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform},
     booktitle = {Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9631},
     pages = {963104-963104-6}}
    
  82. G. Fahmy
    Integer DCT Convergence for JPEG-75 Forensics for Images
    Journal of Information Assurance and Security, 2015, Vol. 10, pp. 80-88
    BibTeX
    @article{Fahmy2015a,
     author = {Fahmy, Gamal},
     title = {Integer DCT Convergence for JPEG-75 Forensics for Images},
     journal = {Journal of Information Assurance and Security},
     year = {2015},
     volume = {10},
     pages = {80--88}}
    
  83. G. Fahmy, A. Alqallaf & R. Wurtz
    Phase based detection of JPEG counter forensics
    Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits
    2015, pp. 37-40
    DOI: 10.1109/ICECS.2015.7440243
    BibTeX
    @inproceedings{Fahmy2015b,
     author = {Fahmy, G. and Alqallaf, A. and Wurtz, R.},
     title = {Phase based detection of JPEG counter forensics},
     booktitle = {Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits},
     year = {2015},
     pages = {37--40}}
    
  84. O.M. Fahmy
    An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise
    Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf
    2015, pp. 249-252
    DOI: 10.1109/IWSSIP.2015.7314223
    BibTeX
    @inproceedings{Fahmy2015,
     author = {Fahmy, O. M.},
     title = {An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise},
     booktitle = {Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf},
     year = {2015},
     pages = {249--252}}
    
  85. J. Fan, T. Chen & J. Cao
    Image Tampering Detection Using Noise Histogram Features
    Proc. IEEE Int Digital Signal Processing (DSP) Conf
    2015, pp. 1044-1048
    DOI: 10.1109/ICDSP.2015.7252037
    BibTeX
    @inproceedings{Fan2015b,
     author = {Fan, Jiayuan and Chen, Tao and Cao, Jiuwen},
     title = {Image Tampering Detection Using Noise Histogram Features},
     booktitle = {Proc. IEEE Int Digital Signal Processing (DSP) Conf},
     year = {2015},
     pages = {1044--1048}}
    
  86. W. Fan
    Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images
    Université Grenoble Alpes, Université Grenoble Alpes, 2015
    BibTeX
    @phdthesis{Fan2015a,
     author = {Fan, Wei},
     title = {Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images},
     school = {Université Grenoble Alpes},
     year = {2015}}
    
  87. W. Fan, K. Wang & F. Cayre
    General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368606
    BibTeX
    @inproceedings{Fan2015e,
     author = {Fan, W. and Wang, K. and Cayre, F.},
     title = {General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  88. W. Fan, K. Wang & F. Cayre
    General-purpose image forensics using patch likelihood under image statistical models
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368606
    BibTeX
    @inproceedings{Fan2015f,
     author = {Fan, W. and Wang, K. and Cayre, F.},
     title = {General-purpose image forensics using patch likelihood under image statistical models},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2015},
     pages = {1--6}}
    
  89. W. Fan, K. Wang, F. Cayre & Z. Xiong
    Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 1076-1091
    DOI: 10.1109/TIFS.2015.2398362
    BibTeX
    @article{Fan2015,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {99},
     pages = {1076--1091}}
    
  90. W. Fan, K. Wang, F. Cayre & Z. Xiong
    Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution
    #IEEE_J_IFS#, 2015, Vol. 10(5), pp. 1076-1091
    DOI: 10.1109/TIFS.2015.2398362
    BibTeX
    @article{Fan2015c,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution},
     journal = {#IEEE_J_IFS#},
     year = {2015},
     volume = {10},
     number = {5},
     pages = {1076--1091}}
    
  91. Y. Fan, P. Carre & C. Fernandez-Maloigne
    Image Splicing Detection with Local Illumination Estimation
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 2940-2944
    DOI: 10.1109/ICIP.2015.7351341
    BibTeX
    @inproceedings{Fan2015d,
     author = {Fan, Yu and Carre, Philippe and Fernandez-Maloigne, Christine},
     title = {Image Splicing Detection with Local Illumination Estimation},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {2940--2944}}
    
  92. S. ..J. .. Fang & H. ..Y. .. Ge
    Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows
    Network Security and Communication Engineering
    Network Security and Communication Engineering, Informa UK Limited, 2015, pp. 313-316
    DOI: 10.1201/b18660-70
    BibTeX
    @incollection{Fang2015,
     author = {Fang, S. . J. . and Ge, H. . Y. .},
     title = {Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows},
     booktitle = {Network Security and Communication Engineering},
     journal = {Network Security and Communication Engineering},
     publisher = {Informa UK Limited},
     year = {2015},
     pages = {313--316}}
    
  93. G.M. Farinella, M.V. Giuffrida, V. Digiacomo & S. Battiato
    On Blind Source Camera Identification
    Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
    Advanced Concepts for Intelligent Vision Systems
    Advanced Concepts for Intelligent Vision Systems, Springer International Publishing, 2015, Vol. 9386, pp. 464-473
    DOI: 10.1007/978-3-319-25903-1_40
    BibTeX
    @incollection{Farinella2015,
     author = {Farinella, Giovanni Maria and Giuffrida, M. V. and Digiacomo, V. and Battiato, Sebastiano},
     title = {On Blind Source Camera Identification},
     booktitle = {Advanced Concepts for Intelligent Vision Systems},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9386},
     pages = {464--473}}
    
  94. P. Ferrara, M. Fontani, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    Unsupervised Fusion for Forgery Localization Exploiting Background Information
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169770
    BibTeX
    @inproceedings{Ferrara2015,
     author = {Ferrara, P. and Fontani, M. and Bianchi, T. and De Rosa, A. and Piva, A. and Barni, Mauro},
     title = {Unsupervised Fusion for Forgery Localization Exploiting Background Information},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  95. A. Ferreira, L.C. Navarro, G. Pinheiro, J.A. dos Santos & A. Rocha
    Laser Printer Attribution: Exploring New Features and Beyond
    Forensic Science International, Elsevier BV, 2015, Vol. 247(0), pp. 105-125
    DOI: 10.1016/j.forsciint.2014.11.030
    BibTeX
    @article{Ferreira2015,
     author = {Ferreira, Anselmo and Navarro, Luiz C. and Pinheiro, Giuliano and dos Santos, Jefersson A. and Rocha, Anderson},
     title = {Laser Printer Attribution: Exploring New Features and Beyond},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2015},
     volume = {247},
     number = {0},
     pages = {105--125}}
    
  96. Y. Fusheng & T. Gao
    A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram
    Tan, T., Ruan, Q., Wang, S., Ma, H. & Di, K. (ed.)
    Advances in Image and Graphics Technologies
    Springer Berlin Heidelberg, 2015, Vol. 525, pp. 63-71
    DOI: 10.1007/978-3-662-47791-5_8
    BibTeX
    @incollection{Fusheng2015,
     author = {Fusheng, Yang and Gao, Tiegang},
     title = {A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram},
     booktitle = {Advances in Image and Graphics Technologies},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     volume = {525},
     pages = {63--71}}
    
  97. S. Gao
    A Hybrid Approach for Camera-model Detection
    International Journal of Security and Its Applications, 2015, Vol. 9(8)
    DOI: 10.14257/ijsia.2015.9.8.24
    BibTeX
    @article{Gao2015,
     author = {Gao, Shang},
     title = {A Hybrid Approach for Camera-model Detection},
     journal = {International Journal of Security and Its Applications},
     year = {2015},
     volume = {9},
     number = {8}}
    
  98. L.A. Gatys, A.S. Ecker & M. Bethge
    A Neural Algorithm of Artistic Style
    arXiv, 2015
    BibTeX
    @article{Gatys2015,
     author = {Gatys, Leon A. and Ecker, Alexander S. and Bethge, Matthias},
     title = {A Neural Algorithm of Artistic Style},
     journal = {arXiv},
     year = {2015}}
    
  99. H. Ge & S. Fang
    Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows
    Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015
    2015, pp. 116-121
    DOI: 10.1109/iccss.2015.7281160
    BibTeX
    @inproceedings{Ge2015,
     author = {Ge, Huayong and Fang, Shujuan},
     title = {Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows},
     booktitle = {Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015},
     year = {2015},
     pages = {116--121}}
    
  100. N.I. Glumov, A.V. Kuznetsov & V.V. Myasnikov
    Algorithms for Detection of Plain Copy-move Regions in Digital Images
    Pattern Recognition and Image Analysis, Pleiades Publishing, 2015, Vol. 25(3), pp. 423-429
    DOI: 10.1134/S1054661815030074
    BibTeX
    @article{Glumov2015,
     author = {Glumov, N. I. and Kuznetsov, A. V. and Myasnikov, V. V.},
     title = {Algorithms for Detection of Plain Copy-move Regions in Digital Images},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {Pleiades Publishing},
     year = {2015},
     volume = {25},
     number = {3},
     pages = {423--429}}
    
  101. A. Gubrud
    The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery
    Arizona State University, Arizona State University, 2015
    BibTeX
    @mastersthesis{Gubrud2015,
     author = {Gubrud, Aaron},
     title = {The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery},
     school = {Arizona State University},
     year = {2015}}
    
  102. A. Gupta, S. Gupta & A. Mehra
    Video Authentication in Digital Forensic
    Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf
    2015, pp. 659-663
    DOI: 10.1109/ABLAZE.2015.7154945
    BibTeX
    @inproceedings{Gupta2015,
     author = {Gupta, A. and Gupta, S. and Mehra, A.},
     title = {Video Authentication in Digital Forensic},
     booktitle = {Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf},
     year = {2015},
     pages = {659--663}}
    
  103. E. Gürbüz, G. Ulutaş & M. Ulutaş
    Rotation invariant copy move forgery detection method
    Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)
    2015, pp. 202-206
    DOI: 10.1109/ELECO.2015.7394451
    BibTeX
    @inproceedings{Guerbuez2015,
     author = {Gürbüz, E. and Ulutaş, G. and Ulutaş, M.},
     title = {Rotation invariant copy move forgery detection method},
     booktitle = {Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)},
     year = {2015},
     pages = {202--206}}
    
  104. F. Hakimi & M. Hariri
    Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm
    Electronics Information & Planning, 2015
    BibTeX
    @article{Hakimi2015,
     author = {Hakimi, Fahime and Hariri, Mahdi},
     title = {Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm},
     journal = {Electronics Information & Planning},
     year = {2015}}
    
  105. F. Hakimi, M. Hariri & F. GharehBaghi
    Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform
    Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)
    2015, pp. 1074-1077
    DOI: 10.1109/KBEI.2015.7436195
    BibTeX
    @inproceedings{Hakimi2015a,
     author = {Hakimi, F. and Hariri, M. and GharehBaghi, F.},
     title = {Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform},
     booktitle = {Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)},
     year = {2015},
     pages = {1074--1077}}
    
  106. H. Han, Y. Li, S. Niu & Z. Gong
    Tamper detection based on the consistency of quantization error caused by multiple JPEG compression
    Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)
    2015, pp. 314-319
    DOI: 10.1109/ICCT.2015.7399850
    BibTeX
    @inproceedings{Han2015,
     author = {Han, Hongli and Li, Yezhou and Niu, Shaozhang and Gong, Zhenzhen},
     title = {Tamper detection based on the consistency of quantization error caused by multiple JPEG compression},
     booktitle = {Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)},
     year = {2015},
     pages = {314--319}}
    
  107. F.S. Hashem & G. Sulong
    Passive Aproaches for Detecting Image Tampering: A Review
    Jurnal Teknologi, 2015, Vol. 73(2), pp. 31-36
    DOI: 10.11113/jt.v73.4189
    BibTeX
    @article{Hashem2015,
     author = {Hashem, Fatma Salman and Sulong, Ghazali},
     title = {Passive Aproaches for Detecting Image Tampering: A Review},
     journal = {Jurnal Teknologi},
     year = {2015},
     volume = {73},
     number = {2},
     pages = {31--36}}
    
  108. M.F. Hashmi, A. Hambarde & A. Keskar
    Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets
    2015
    BibTeX
    @electronic{Hashmi2015a,
     author = {Hashmi, M. F. and Hambarde, A. and Keskar, A.},
     title = {Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets},
     year = {2015}}
    
  109. M.F. Hashmi & A.G. Keskar
    Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery
    J Electr Eng Technol., 2015, pp. 709-718
    DOI: 10.5370/jeet.2015.10.4.1886
    BibTeX
    @article{Hashmi2015,
     author = {Hashmi, Mohammad Farukh and Keskar, Avinash G.},
     title = {Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery},
     journal = {J Electr Eng Technol.},
     year = {2015},
     pages = {709--718}}
    
  110. H. Hel-Or & I. Yerushalmy
    Camera-based Image Forgery Detection
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch14
    BibTeX
    @inbook{Hel-Or2015,
     author = {Hel-Or, Hagit and Yerushalmy, Ido},
     title = {Camera-based Image Forgery Detection},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  111. A.T.S. Ho & S. Li
    Digital Image Forensics with Statistical Analysis
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch13
    BibTeX
    @inbook{Ho2015,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Digital Image Forensics with Statistical Analysis},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  112. A.T.S. Ho & S. Li
    Printer and Scanner Forensics
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch10
    BibTeX
    @inbook{Ho2015a,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Printer and Scanner Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  113. A.T.S. Ho & S. Li
    Digital Image Forensics with Statistical Analysis
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch13
    BibTeX
    @inbook{Ho2015b,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Digital Image Forensics with Statistical Analysis},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  114. A.T.S. Ho & S. Li
    Multimedia Analytics for Image Collection Forensics
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch8
    BibTeX
    @inbook{Ho2015c,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Multimedia Analytics for Image Collection Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  115. B. Hoogeboom, I. Alberink & D. Vrijdag
    Photogrammetry in Digital Forensics
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch5
    BibTeX
    @inbook{Hoogeboom2015,
     author = {Hoogeboom, Bart and Alberink, Ivo and Vrijdag, Derk},
     title = {Photogrammetry in Digital Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  116. J. Hou & Y. Cheng
    Expose Spliced Photographic Basing on Boundary and Noise Features
    IEICE TRANSACTIONS on Information and Systems, 2015, Vol. E98-D(7)
    DOI: 10.1587/transinf.2014edl8232
    BibTeX
    @article{Hou2015,
     author = {Hou, Jun and Cheng, Yan},
     title = {Expose Spliced Photographic Basing on Boundary and Noise Features},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2015},
     volume = {E98-D},
     number = {7}}
    
  117. C.-M. Hsu, J.-C. Lee & W.-K. Chen
    An Efficient Detection Algorithm for Copy-move Forgery
    Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)
    2015, pp. 33-36
    DOI: 10.1109/AsiaJCIS.2015.16
    BibTeX
    @inproceedings{Hsu2015,
     author = {Hsu, Chen-Ming and Lee, Jen-Chun and Chen, Wei-Kuei},
     title = {An Efficient Detection Algorithm for Copy-move Forgery},
     booktitle = {Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)},
     year = {2015},
     pages = {33--36}}
    
  118. W.-C. Hu, J.-S. Dai & J.-S. Jian
    Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components
    Digital Signal Processing, 2015, Vol. 39(0), pp. 50-62
    DOI: 10.1016/j.dsp.2015.01.006
    BibTeX
    @article{Hu2015,
     author = {Hu, Wu-Chih and Dai, Jing-Siou and Jian, Jhih-Syuan},
     title = {Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components},
     journal = {Digital Signal Processing},
     year = {2015},
     volume = {39},
     number = {0},
     pages = {50--62}}
    
  119. D.-Y. Huang, C.-N. Huang, W.-C. Hu & C.-H. Chou
    Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-3152-x
    BibTeX
    @article{Huang2015a,
     author = {Huang, Deng-Yuan and Huang, Ching-Ning and Hu, Wu-Chih and Chou, Chih-Hung},
     title = {Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  120. Y. Huang, J. Zhang & H. Huang
    Camera Model Identification with Unknown Models
    IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 10(12), pp. 2692-2704
    DOI: 10.1109/TIFS.2015.2474836
    BibTeX
    @article{Huang2015,
     author = {Huang, Y. and Zhang, J. and Huang, H.},
     title = {Camera Model Identification with Unknown Models},
     journal = {IEEE Transactions on Information Forensics and Security},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {10},
     number = {12},
     pages = {2692--2704}}
    
  121. T.K. Huynh, K.V. Huynh, T. Le-Tien & S.C. Nguyen
    A Survey on Image Forgery Detection Techniques
    Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on
    2015, pp. 71-76
    DOI: 10.1109/RIVF.2015.7049877
    BibTeX
    @inproceedings{Huynh2015,
     author = {Huynh, Tu K. and Huynh, Khoa V. and Le-Tien, Thuong and Nguyen, Sy C.},
     title = {A Survey on Image Forgery Detection Techniques},
     booktitle = {Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on},
     year = {2015},
     pages = {71--76}}
    
  122. T. Huynh-Kha, T. Le-Tien, S.H. Viet-Uyen & K. Huynh-Van
    The efficiency of applying DWT and feature extraction into copy-move images detection
    Proc. Int. Conf. Advanced Technologies for Communications (ATC)
    2015, pp. 44-49
    DOI: 10.1109/ATC.2015.7388368
    BibTeX
    @inproceedings{Huynh-Kha2015,
     author = {Huynh-Kha, T. and Le-Tien, T. and Viet-Uyen, S. Ha and Huynh-Van, K.},
     title = {The efficiency of applying DWT and feature extraction into copy-move images detection},
     booktitle = {Proc. Int. Conf. Advanced Technologies for Communications (ATC)},
     year = {2015},
     pages = {44--49}}
    
  123. R.W. Ibrahim, Z. Moghaddasi, H.A. Jalab & R.M. Noor
    Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection
    Entropy, 2015, Vol. 17(7), pp. 4775
    DOI: 10.3390/e17074775
    BibTeX
    @article{Ibrahim2015,
     author = {Ibrahim, Rabha W. and Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md},
     title = {Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection},
     journal = {Entropy},
     year = {2015},
     volume = {17},
     number = {7},
     pages = {4775}}
    
  124. M.M. Isaac & M. Wilscy
    Copy-move Forgery Detection Based on Harris Corner Points and BRISK
    Proceedings of the Third International Symposium on Women in Computing and Informatics
    ACM, 2015, pp. 394-399
    DOI: 10.1145/2791405.2791453
    BibTeX
    @inproceedings{Isaac2015,
     author = {Isaac, Meera Mary and Wilscy, M.},
     title = {Copy-move Forgery Detection Based on Harris Corner Points and BRISK},
     booktitle = {Proceedings of the Third International Symposium on Women in Computing and Informatics},
     publisher = {ACM},
     year = {2015},
     pages = {394--399}}
    
  125. M.M. Isaac & M. Wilscy
    Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization
    Procedia Computer Science, 2015, Vol. 58, pp. 76-83
    DOI: 10.1016/j.procs.2015.08.016
    BibTeX
    @article{Isaac2015a,
     author = {Isaac, Meera Mary and Wilscy, M.},
     title = {Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {58},
     pages = {76--83}}
    
  126. M. Iuliani, G. Fabbri & A. Piva
    Image Splicing Detection Based on General Perspective Constraints
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368598
    BibTeX
    @inproceedings{Iuliani2015,
     author = {Iuliani, M. and Fabbri, G. and Piva, A.},
     title = {Image Splicing Detection Based on General Perspective Constraints},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  127. B.G. Jeong, Y.H. Moon & I.K. Eom
    Blind Identification of Image Manipulation Type Using Mixed Statistical Moments
    Journal of Electronic Imaging, 2015, Vol. 24(1), pp. 013029
    DOI: 10.1117/1.JEI.24.1.013029
    BibTeX
    @article{Jeong2015,
     author = {Jeong, Bo Gyu and Moon, Yong Ho and Eom, Il Kyu},
     title = {Blind Identification of Image Manipulation Type Using Mixed Statistical Moments},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {1},
     pages = {013029}}
    
  128. V. Joshi & S. Jain
    Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques
    Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf
    2015, pp. 1121-1124
    BibTeX
    @inproceedings{Joshi2015,
     author = {Joshi, V. and Jain, S.},
     title = {Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques},
     booktitle = {Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf},
     year = {2015},
     pages = {1121--1124}}
    
  129. T. Julliand, V. Nozick & H. Talbot
    Automated Image Splicing Detection from Noise Estimation in Raw Images
    Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf
    2015, pp. 1-6
    DOI: 10.1049/ic.2015.0111
    BibTeX
    @inproceedings{Julliand2015,
     author = {Julliand, T. and Nozick, V. and Talbot, H.},
     title = {Automated Image Splicing Detection from Noise Estimation in Raw Images},
     booktitle = {Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf},
     year = {2015},
     pages = {1--6}}
    
  130. T. Julliand, V. Nozick & H. Talbot
    Image Noise and Digital Image Forensics
    IWDW
    2015
    DOI: 10.1007/978-3-319-31960-5_1
    BibTeX
    @inproceedings{Julliand2015a,
     author = {Julliand, Thibaut and Nozick, Vincent and Talbot, Hugues},
     title = {Image Noise and Digital Image Forensics},
     booktitle = {IWDW},
     year = {2015}}
    
  131. D.-J. Jung, D.-K. Hyun & H.-K. Lee
    Recaptured Video Detection Based on Sensor Pattern Noise
    EURASIP Journal on Image and Video Processing, Springer, 2015, Vol. 2015(1), pp. 1
    DOI: 10.1186/s13640-015-0096-z
    BibTeX
    @article{Jung2015,
     author = {Jung, Dae-Jin and Hyun, Dai-Kyung and Lee, Heung-Kyu},
     title = {Recaptured Video Detection Based on Sensor Pattern Noise},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2015},
     volume = {2015},
     number = {1},
     pages = {1}}
    
  132. N. Kalka, N. Bartlow, B. Cukic & A. Ross
    A Preliminary Study on Identifying Sensors from Iris Images
    2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/CVPRW.2015.7301319
    BibTeX
    @inproceedings{Kalka2015,
     author = {Kalka, Nathan and Bartlow, Nick and Cukic, Bojan and Ross, Arun},
     title = {A Preliminary Study on Identifying Sensors from Iris Images},
     booktitle = {2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  133. X. Kang, J. Liu, H. Liu & Z.J. Wang
    Forensics and Counter Anti-forensics of Video Inter-frame Forgery
    Multimedia Tools and Applications, 2015, pp. 1-21
    DOI: 10.1007/s11042-015-2762-7
    BibTeX
    @article{Kang2015a,
     author = {Kang, Xiangui and Liu, Jingxian and Liu, Hongmei and Wang, Z. Jane},
     title = {Forensics and Counter Anti-forensics of Video Inter-frame Forgery},
     journal = {Multimedia Tools and Applications},
     year = {2015},
     pages = {1--21}}
    
  134. X. Kang, T. Qin & H. Zeng
    Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks
    Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
    2015, pp. 483-487
    DOI: 10.1109/ChinaSIP.2015.7230449
    BibTeX
    @inproceedings{Kang2015,
     author = {Kang, Xiangui and Qin, Tengfei and Zeng, Hui},
     title = {Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks},
     booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf},
     year = {2015},
     pages = {483--487}}
    
  135. A. Karaküçük & A.E. Dirik
    Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution
    Digital Investigation, 2015, Vol. 12(0), pp. 66-76
    DOI: 10.1016/j.diin.2015.01.017
    BibTeX
    @article{Karakuecuek2015,
     author = {Karaküçük, Ahmet and Dirik, Ahmet Emir},
     title = {Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution},
     journal = {Digital Investigation},
     year = {2015},
     volume = {12},
     number = {0},
     pages = {66--76}}
    
  136. A. Karaküçük, A.E. Dirik, H.T. Sencar & N.D. Memon
    Recent Advances in Counter PRNU Based Source Attribution and Beyond
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 94090N-94090N-11
    DOI: 10.1117/12.2182458
    BibTeX
    @inproceedings{Karakuecuek2015a,
     author = {Karaküçük, Ahmet and Dirik, Ahmet E. and Sencar, Hüsrev T. and Memon, Nasir D.},
     title = {Recent Advances in Counter PRNU Based Source Attribution and Beyond},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {94090N-94090N-11}}
    
  137. A. Kashyap, B. Suresh, M. Agrawal, H. Gupta & S.D. Joshi
    Detection of Splicing Forgery Using Wavelet Decomposition
    Proc. Int Computing, Communication Automation (ICCCA) Conf
    2015, pp. 843-848
    DOI: 10.1109/CCAA.2015.7148492
    BibTeX
    @inproceedings{Kashyap2015,
     author = {Kashyap, A. and Suresh, B. and Agrawal, M. and Gupta, H. and Joshi, S. D.},
     title = {Detection of Splicing Forgery Using Wavelet Decomposition},
     booktitle = {Proc. Int Computing, Communication Automation (ICCCA) Conf},
     year = {2015},
     pages = {843--848}}
    
  138. C. Kauba & A. Uhl
    Fingerprint Recognition under the Influence of Image Sensor Ageing
    Department of Computer Sciences, University of Salzburg, Department of Computer Sciences, University of Salzburg, 2015
    DOI: 10.1109/iwbf.2016.7449683
    BibTeX
    @techreport{Kauba2015,
     author = {Kauba, Christof and Uhl, Andreas},
     title = {Fingerprint Recognition under the Influence of Image Sensor Ageing},
     school = {Department of Computer Sciences, University of Salzburg},
     year = {2015}}
    
  139. A. Kaur & S. Malhotra
    Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
    IOSR Journal of Computer Engineering (IOSR-JCE), 2015, Vol. 17(3), pp. 47-52
    BibTeX
    @article{Kaur2015,
     author = {Kaur, Amaninder and Malhotra, Sheenam},
     title = {Passive Image Forensic Method to Detect Resampling Forgery in Digital Images},
     journal = {IOSR Journal of Computer Engineering (IOSR-JCE)},
     year = {2015},
     volume = {17},
     number = {3},
     pages = {47--52}}
    
  140. M. Kaur & S. Gupta
    Evaluation of image forensic cues for fusion
    Proc. Third Int. Conf. Image Information Processing (ICIIP)
    2015, pp. 301-305
    DOI: 10.1109/ICIIP.2015.7414785
    BibTeX
    @inproceedings{Kaur2015a,
     author = {Kaur, M. and Gupta, S.},
     title = {Evaluation of image forensic cues for fusion},
     booktitle = {Proc. Third Int. Conf. Image Information Processing (ICIIP)},
     year = {2015},
     pages = {301--305}}
    
  141. R. Kaushik, R.K. Bajaj & J. Mathew
    On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments
    Procedia Computer Science, 2015, Vol. 70, pp. 130-136
    DOI: 10.1016/j.procs.2015.10.058
    BibTeX
    @article{Kaushik2015,
     author = {Kaushik, Rajeev and Bajaj, Rakesh Kumar and Mathew, Jimson},
     title = {On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {70},
     pages = {130--136}}
    
  142. Ke
    An Efficient Blind Detection Algorithm of Median Filtered Image
    International Journal of Hybrid Information Technology, 2015, Vol. 8(1), pp. 181-192
    DOI: 10.14257/ijhit.2015.8.1.16
    BibTeX
    @article{Ke2015,
     author = {Ke},
     title = {An Efficient Blind Detection Algorithm of Median Filtered Image},
     journal = {International Journal of Hybrid Information Technology},
     year = {2015},
     volume = {8},
     number = {1},
     pages = {181--192}}
    
  143. A. Kharboutly, W.P. , G. Subsol & D. Hoa
    Improving Sensor Noise Analysis for CT-scanner Identification
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    2015
    DOI: 10.1109/eusipco.2015.7362817
    BibTeX
    @inproceedings{Kharboutly2015,
     author = {Kharboutly, Anas and , William Puech and Subsol, Gerard and Hoa, Denis},
     title = {Improving Sensor Noise Analysis for CT-scanner Identification},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     year = {2015}}
    
  144. A. Kharboutly, W. Puech, G. Subsol & D. Hoa
    Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images
    Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on
    2015, pp. 325-330
    DOI: 10.1109/IPTA.2015.7367158
    BibTeX
    @inproceedings{Kharboutly2015a,
     author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.},
     title = {Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images},
     booktitle = {Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on},
     year = {2015},
     pages = {325--330}}
    
  145. K. Khuspe & V. Mane
    Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM
    Communication, Information & Computing Technology (ICCICT), 2015 International Conference on
    2015, pp. 1-5
    DOI: 10.1109/ICCICT.2015.7045718
    BibTeX
    @inproceedings{Khuspe2015,
     author = {Khuspe, Kalyani and Mane, Vanita},
     title = {Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM},
     booktitle = {Communication, Information & Computing Technology (ICCICT), 2015 International Conference on},
     year = {2015},
     pages = {1--5}}
    
  146. M. Kirchner
    Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    IS&T/SPIE Electronic Imaging
    2015, Vol. 9409, pp. 940903-940903-12
    DOI: 10.1117/12.2082789
    BibTeX
    @inproceedings{Kirchner2015,
     author = {Kirchner, Matthias},
     title = {Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2015},
     volume = {9409},
     pages = {940903-940903-12}}
    
  147. T.A. Kohale, S.D. Chede & P.R. Lakhe
    Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(1)
    DOI: 10.17148/ijarcce.2015.4129
    BibTeX
    @article{Kohale2015,
     author = {Kohale, Tushant A. and Chede, S. D. and Lakhe, P. R.},
     title = {Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {1}}
    
  148. P. Koniusz & A. Cherian
    Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors
    arxiv, 2015
    BibTeX
    @article{Koniuz2015,
     author = {Koniusz, Piotr and Cherian, Anoop},
     title = {Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors},
     journal = {arxiv},
     year = {2015}}
    
  149. P.A. Koshy & K.N. Nair
    Exposing Image Forgery through Contrast Enhancement
    International Journal of Science and Research (IJSR), 2015, Vol. 4(12), pp. 1044-1048
    DOI: 10.21275/v4i12.nov152185
    BibTeX
    @article{Koshy2015,
     author = {Koshy, Priya Ann and Nair, Kavitha N.},
     title = {Exposing Image Forgery through Contrast Enhancement},
     journal = {International Journal of Science and Research (IJSR)},
     year = {2015},
     volume = {4},
     number = {12},
     pages = {1044--1048}}
    
  150. P. Kovesi
    Good Colour Maps: How to Design Them
    arXiv:1509.03700, 2015
    BibTeX
    @article{Kovesi2015,
     author = {Kovesi, Peter},
     title = {Good Colour Maps: How to Design Them},
     journal = {arXiv:1509.03700},
     year = {2015}}
    
  151. C. Kraetzer & J. Dittmann
    Considerations on the Benchmarking of Media Forensics
    Proc. 23rd European Signal Processing Conf. (EUSIPCO)
    2015, pp. 61-65
    DOI: 10.1109/EUSIPCO.2015.7362345
    BibTeX
    @inproceedings{Kraetzer2015,
     author = {Kraetzer, C. and Dittmann, J.},
     title = {Considerations on the Benchmarking of Media Forensics},
     booktitle = {Proc. 23rd European Signal Processing Conf. (EUSIPCO)},
     year = {2015},
     pages = {61--65}}
    
  152. C. Kraetzer & J. Dittmann
    Microphone Forensics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 411-441
    DOI: 10.1002/9781118705773.ch11
    BibTeX
    @incollection{Kraetzer2015a,
     author = {Kraetzer, Christian and Dittmann, Jana},
     title = {Microphone Forensics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {411--441}}
    
  153. N. Kulkarni & V. Mane
    Source Camera Identification Using GLCM
    Proc. IEEE Int. Advance Computing Conf. (IACC)
    2015, pp. 1242-1246
    DOI: 10.1109/IADCC.2015.7154900
    BibTeX
    @inproceedings{Kulkarni2015,
     author = {Kulkarni, Nilambari and Mane, Vanita},
     title = {Source Camera Identification Using GLCM},
     booktitle = {Proc. IEEE Int. Advance Computing Conf. (IACC)},
     year = {2015},
     pages = {1242--1246}}
    
  154. S. Kumar, J.V. Desai & S. Mukherjee
    Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors
    I.J. Image, Graphics and Signal Processing, 2015(6), pp. 38-44
    DOI: 10.5815/ijigsp.2015.06.05
    BibTeX
    @article{Kumar2015,
     author = {Kumar, Sunil and Desai, J. V. and Mukherjee, Shaktidev},
     title = {Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015},
     number = {6},
     pages = {38--44}}
    
  155. Y.-N. Lai, T.-G. Gao, J.-X. Li & G.-R. Sheng
    Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern
    Huang, D.-S., Bevilacqua, V. & Premaratne, P. (ed.)
    Intelligent Computing Theories and Methodologies
    Springer International Publishing, 2015, Vol. 9225, pp. 421-432
    DOI: 10.1007/978-3-319-22180-9_41
    BibTeX
    @incollection{Lai2015,
     author = {Lai, Yun-Ni and Gao, Tie-Gang and Li, Jia-Xin and Sheng, Guo-Rui},
     title = {Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern},
     booktitle = {Intelligent Computing Theories and Methodologies},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9225},
     pages = {421--432}}
    
  156. K.-f. Lau, N.-f. Law & W.-c. Siu
    Use of Sensor Noise for Source Identification
    Proc. Int Noise and Fluctuations (ICNF) Conf
    Institute of Electrical and Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/ICNF.2015.7288548
    BibTeX
    @inproceedings{Lau2015,
     author = {Lau, Kwun-fung and Law, Ngai-fong and Siu, Wan-chi},
     title = {Use of Sensor Noise for Source Identification},
     booktitle = {Proc. Int Noise and Fluctuations (ICNF) Conf},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  157. J.-C. Lee
    Copy-move Image Forgery Detection Based on Gabor Magnitude
    Journal of Visual Communication and Image Representation, 2015, Vol. 31, pp. 320-334
    DOI: 10.1016/j.jvcir.2015.07.007
    BibTeX
    @article{Lee2015b,
     author = {Lee, Jen-Chun},
     title = {Copy-move Image Forgery Detection Based on Gabor Magnitude},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2015},
     volume = {31},
     pages = {320--334}}
    
  158. J.-C. Lee, C.-P. Chang & W.-K. Chen
    Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients
    Information Sciences, 2015(0), pp. -
    DOI: 10.1016/j.ins.2015.03.009
    BibTeX
    @article{Lee2015,
     author = {Lee, Jen-Chun and Chang, Chien-Ping and Chen, Wei-Kuei},
     title = {Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients},
     journal = {Information Sciences},
     year = {2015},
     number = {0},
     pages = {-}}
    
  159. S.-H. Lee, T.-W. Oh, K. Kim & H.-Y. Lee
    Digital Camera Identification Using Sensor Pattern Noise
    Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)
    2015, pp. 30-35
    BibTeX
    @inproceedings{Lee2015a,
     author = {Lee, Sang-Hyeong and Oh, Tae-Woo and Kim, Kibom and Lee, Hae-Yeoun},
     title = {Digital Camera Identification Using Sensor Pattern Noise},
     booktitle = {Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)},
     year = {2015},
     pages = {30--35}}
    
  160. M.D. Leom, C.J. DOrazio, G. Deegan & K.K.R. Choo
    Forensic Collection and Analysis of Thumbnails in Android
    Proc. IEEE Trustcom/BigDataSE/ISPA
    2015, Vol. 1, pp. 1059-1066
    DOI: 10.1109/Trustcom.2015.483
    BibTeX
    @inproceedings{Leom2015,
     author = {Leom, M. D. and DOrazio, C. J. and Deegan, G. and Choo, K. K. R.},
     title = {Forensic Collection and Analysis of Thumbnails in Android},
     booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA},
     year = {2015},
     volume = {1},
     pages = {1059--1066}}
    
  161. J. Lepsoy, S. Kim, D. Atnafu & H.J. Kim
    Metadata protection scheme for JPEG privacy security using hierarchical and group-based models
    Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)
    2015, pp. 1-5
    DOI: 10.1109/ICTA.2015.7426905
    BibTeX
    @inproceedings{Lepsoy2015,
     author = {Lepsoy, J. and Kim, S. and Atnafu, D. and Kim, H. J.},
     title = {Metadata protection scheme for JPEG privacy security using hierarchical and group-based models},
     booktitle = {Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)},
     year = {2015},
     pages = {1--5}}
    
  162. T. Le-Tien, T. Huynh-Ngoc, T. Huynh-Kha & L. Marie
    Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors
    Gervasi, O., Murgante, B., Misra, S., Gavrilova, M. L., Rocha, A. M. A. C., Torre, C., Taniar, D. & Apduhan, B. O. (ed.)
    Computational Science and Its Applications -- ICCSA 2015
    Springer International Publishing, 2015, Vol. 9158, pp. 458-475
    DOI: 10.1007/978-3-319-21410-8_36
    BibTeX
    @incollection{Le-Tien2015,
     author = {Le-Tien, Thuong and Huynh-Ngoc, Tan and Huynh-Kha, Tu and Marie, Luong},
     title = {Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors},
     booktitle = {Computational Science and Its Applications -- ICCSA 2015},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9158},
     pages = {458--475}}
    
  163. B. Li, T.T. Ng, X. Li, S. Tan & J. Huang
    Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation
    IEEE Transactions on Image Processing, 2015, Vol. 24(5), pp. 1471-1484
    DOI: 10.1109/TIP.2015.2405477
    BibTeX
    @article{Li2015g,
     author = {Li, B. and Ng, T. T. and Li, X. and Tan, S. and Huang, J.},
     title = {Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation},
     journal = {IEEE Transactions on Image Processing},
     year = {2015},
     volume = {24},
     number = {5},
     pages = {1471--1484}}
    
  164. B. Li, T.-T. Ng, X. Li, S. Tan & J. Huang
    Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 558-573
    DOI: 10.1109/TIFS.2015.2389148
    BibTeX
    @article{Li2015a,
     author = {Li, Bin and Ng, Tian-Tsong and Li, Xiaolong and Tan, Shunquan and Huang, Jiwu},
     title = {Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {558--573}}
    
  165. C. Li, Q. Ma, L. Xiao, M. Li & A. Zhang
    Image Splicing Detection Based on Markov Features in Qdct Domain
    Huang, D.-S., Jo, K.-H. & Hussain, A. (ed.)
    Intelligent Computing Theories and Methodologies
    Advanced Intelligent Computing Theories and Applications, Springer International Publishing, 2015, Vol. 9226, pp. 170-176
    DOI: 10.1007/978-3-319-22186-1_17
    BibTeX
    @incollection{Li2015c,
     author = {Li, Ce and Ma, Qiang and Xiao, Limei and Li, Ming and Zhang, Aihua},
     title = {Image Splicing Detection Based on Markov Features in Qdct Domain},
     booktitle = {Intelligent Computing Theories and Methodologies},
     journal = {Advanced Intelligent Computing Theories and Applications},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9226},
     pages = {170--176}}
    
  166. J. Li, X. Li, B. Yang & X. Sun
    Segmentation-based Image Copy-move Forgery Detection Scheme
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 507-518
    DOI: 10.1109/TIFS.2014.2381872
    BibTeX
    @article{Li2015,
     author = {Li, Jian and Li, Xiaolong and Yang, Bin and Sun, Xingming},
     title = {Segmentation-based Image Copy-move Forgery Detection Scheme},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {507--518}}
    
  167. J. Li, Y. Zhao & R. Ni
    Detection of Seam Carving and Contrast Enhancement Operation Chain
    Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
    2015, pp. 235-238
    DOI: 10.1109/IIH-MSP.2015.89
    BibTeX
    @inproceedings{Li2015i,
     author = {Li, J. and Zhao, Y. and Ni, R.},
     title = {Detection of Seam Carving and Contrast Enhancement Operation Chain},
     booktitle = {Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)},
     year = {2015},
     pages = {235--238}}
    
  168. R. Li, C. Kotropoulos, C.T. Li & Y. Guan
    Random Subspace Method for Source Camera Identification
    Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)
    2015, pp. 1-5
    DOI: 10.1109/MLSP.2015.7324339
    BibTeX
    @inproceedings{Li2015f,
     author = {Li, R. and Kotropoulos, C. and Li, C. T. and Guan, Y.},
     title = {Random Subspace Method for Source Camera Identification},
     booktitle = {Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)},
     year = {2015},
     pages = {1--5}}